last executing test programs: 13m2.488708754s ago: executing program 1 (id=76): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={0x0, 0x6, &(0x7f0000000000)={&(0x7f00000002c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xc}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_QUANTUM={0x8, 0xf}]}}]}, 0x38}}, 0x0) 13m1.895598041s ago: executing program 1 (id=77): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 13m1.577689881s ago: executing program 0 (id=78): bpf$MAP_CREATE(0x2000000000000000, &(0x7f00000008c0)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 12m58.505470362s ago: executing program 0 (id=79): r0 = socket(0xa, 0x3, 0x3a) getsockopt$MRT6(r0, 0x29, 0xcf, 0x0, 0x0) 12m57.272868889s ago: executing program 0 (id=80): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r2}, 0x10) capget(&(0x7f0000000700)={0x19980330}, 0x0) 12m56.467571733s ago: executing program 0 (id=81): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000014007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010008000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 12m55.097805503s ago: executing program 0 (id=82): sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) socket(0x10, 0x80002, 0x4) listen(0xffffffffffffffff, 0x3f9) openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) syz_open_dev$loop(0x0, 0x47ffffa, 0x122c42) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f00000003c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000000)={@cgroup=r4, r4, 0x2e, 0x0, 0x0, @void, @value}, 0x20) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000180), 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r5) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000140), 0x4) close_range(r3, 0xffffffffffffffff, 0x0) 12m50.50700351s ago: executing program 0 (id=83): r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@raw={'raw\x00', 0x8, 0x3, 0x528, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x458, 0xffffffff, 0xffffffff, 0x458, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x62}, 0x0, 0x358, 0x388, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_hsr\x00', {0x4, 0x8, 0x20, 0x5e1b2d47, 0xf91, 0x5, 0x4, 0x9f7, 0x18}, {0x8}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x588) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd6300800701082c"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r1, &(0x7f0000000440)=ANY=[], 0xfdef) 12m19.400801753s ago: executing program 1 (id=84): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0}, 0x18) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x18) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 12m17.602920087s ago: executing program 1 (id=85): bpf$PROG_LOAD(0x5, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f00000003c0)=0x7) r0 = getpid() seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x6) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70200001400894fb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) socket$inet6(0xa, 0x2, 0x3a) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00'}, 0x18) personality(0x5000007) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, 0x0, 0x400c004) r6 = add_key$keyring(&(0x7f0000000300), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r6, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)=@chain={'key_or_keyring:', r6}) keyctl$revoke(0x3, r6) 12m5.226328534s ago: executing program 32 (id=83): r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@raw={'raw\x00', 0x8, 0x3, 0x528, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x458, 0xffffffff, 0xffffffff, 0x458, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x62}, 0x0, 0x358, 0x388, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_hsr\x00', {0x4, 0x8, 0x20, 0x5e1b2d47, 0xf91, 0x5, 0x4, 0x9f7, 0x18}, {0x8}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x588) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd6300800701082c"], 0xfdef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r1, &(0x7f0000000440)=ANY=[], 0xfdef) 11m52.716819595s ago: executing program 1 (id=87): sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) socket(0x10, 0x80002, 0x4) listen(0xffffffffffffffff, 0x3f9) openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) syz_open_dev$loop(0x0, 0x47ffffa, 0x122c42) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f00000003c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000000)={@cgroup=r4, r4, 0x2e, 0x0, 0x0, @void, @value}, 0x20) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000180), 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r5) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000140), 0x4) close_range(r3, 0xffffffffffffffff, 0x0) 11m49.5482437s ago: executing program 1 (id=88): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x18) syz_emit_ethernet(0x52, &(0x7f00000003c0)={@random="b91cbcae396b", @dev={'\xaa\xaa\xaa\xaa\xaa', 0x34}, @val={@val={0x88a8, 0x2, 0x1, 0x4}, {0x8100, 0x3}}, {@mpls_uc={0x8847, {[{0x2}], @ipv6=@udp={0x9, 0x6, "c804d0", 0x10, 0x11, 0xff, @private1={0xfc, 0x1, '\x00', 0x1}, @loopback, {[], {0x4e24, 0x4e24, 0x10, 0x0, @gue={{0x2, 0x1, 0x3, 0x3, 0xb91d02da749e5692}}}}}}}}}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x26, 0xa, 0x0, 0x0, 0x20, 0x61, 0x11, 0x8c}, [@initr0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x2) 11m4.148712138s ago: executing program 33 (id=88): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x18) syz_emit_ethernet(0x52, &(0x7f00000003c0)={@random="b91cbcae396b", @dev={'\xaa\xaa\xaa\xaa\xaa', 0x34}, @val={@val={0x88a8, 0x2, 0x1, 0x4}, {0x8100, 0x3}}, {@mpls_uc={0x8847, {[{0x2}], @ipv6=@udp={0x9, 0x6, "c804d0", 0x10, 0x11, 0xff, @private1={0xfc, 0x1, '\x00', 0x1}, @loopback, {[], {0x4e24, 0x4e24, 0x10, 0x0, @gue={{0x2, 0x1, 0x3, 0x3, 0xb91d02da749e5692}}}}}}}}}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x26, 0xa, 0x0, 0x0, 0x20, 0x61, 0x11, 0x8c}, [@initr0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x2) 9m0.326689765s ago: executing program 2 (id=125): r0 = syz_usb_connect$uac1(0x0, 0xdc, &(0x7f00000001c0)=ANY=[@ANYBLOB="12010000000000106b1d01014000010203010902ca00030100700009040000000101"], 0x0) syz_usb_control_io(r0, &(0x7f0000000180)={0x2c, 0x0, &(0x7f0000000240)={0x0, 0x3, 0x19, @string={0x19, 0x3, "414cf3467be36e1b41977aa11baa35d3ef6713e4c0ef6c"}}, 0x0, 0x0, 0x0}, 0x0) 8m58.776576401s ago: executing program 2 (id=126): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000180)=@file={0x1}, 0x6e) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000000)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r3}, 0x10) syslog(0x3, &(0x7f00000004c0)=""/177, 0xb1) 8m57.009994873s ago: executing program 2 (id=127): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x500, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000004640)={&(0x7f0000000800)=@newqdisc={0x50, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x20, 0x2, {{}, [@TCA_NETEM_DELAY_DIST={0x4}]}}}]}, 0x50}}, 0x0) 8m54.938522535s ago: executing program 2 (id=130): r0 = syz_usb_connect$cdc_ncm(0x0, 0x7a, &(0x7f0000000140)=ANY=[@ANYBLOB="12010000020000402505a1a44000010203010902680002010040000904000001020e0000052406000105240000000d240f0100000000000000000006241a0000000c241b4800050000050080050905810300020000000904010000020d00000904010102020d0000090582"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000a00)={0x84, &(0x7f00000001c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) 8m54.410286111s ago: executing program 2 (id=131): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 8m53.336262423s ago: executing program 3 (id=133): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000008c0)='sys_enter\x00', r1}, 0x10) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 8m53.10835683s ago: executing program 2 (id=134): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000001340)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = socket$netlink(0x10, 0x3, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) 8m49.543149455s ago: executing program 3 (id=135): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r1}, 0x10) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 8m45.527556764s ago: executing program 3 (id=136): r0 = socket(0x2, 0x3, 0xff) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 8m44.438995447s ago: executing program 3 (id=137): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) 8m43.884862083s ago: executing program 3 (id=138): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() r1 = socket$inet6(0xa, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) r2 = syz_io_uring_setup(0x4b3e, &(0x7f0000000000)={0x0, 0xc4aa, 0x80, 0x0, 0x33a}, &(0x7f0000000180), &(0x7f0000000300)) io_uring_setup(0x61d3, &(0x7f0000000340)={0x0, 0x339d, 0x20, 0x2, 0x131, 0x0, r2}) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000739000/0x1000)=nil, 0x1000, 0xd, 0x80930, r1, 0xc377a000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x0, 0x40002102, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x9a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaaaa86dd6001070000000000000000000000ff02000000000000000000000000000100000e2200649078020000000200000004"], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x28de, 0x1142, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) r5 = openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0', [{0x20, 'GPL\x00'}, {0x20, '-*\'\''}, {0x20, '@#,'}, {0x20, '%#\xa3^'}], 0xa, "d3eeb860a783a0ff11e97c4e9b46d2c7e1ffdaf4d1d36d3d4f444bd19d3ba702d352af564c3288befc8e4734471a13d898cb8cad5c7541f6c6f1fa93dcc1720b27cc878127e7ce4a467a92c053f2589501d621f1fec2188dfcaceaafb351d753e10614a6854578f94f363f2145"}, 0x8b) timerfd_create(0x0, 0x0) 8m39.777730655s ago: executing program 3 (id=139): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r1}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r2, &(0x7f000000a2c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x44000, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 8m39.62279297s ago: executing program 34 (id=139): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r1}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r2, &(0x7f000000a2c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x44000, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 8m7.378750067s ago: executing program 35 (id=134): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000001340)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = socket$netlink(0x10, 0x3, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) 6m42.801088568s ago: executing program 4 (id=147): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000280)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000000000406c256d0000000000000109022400010000000009040000010300000009210000000122050009058103"], 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io(r1, &(0x7f0000000540)={0x2c, &(0x7f0000000380)=ANY=[@ANYBLOB="080005"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r1, &(0x7f00000002c0)={0x24, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0003020000000003"], 0x0, 0x0}, 0x0) syz_usb_control_io(r1, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_usb_control_io$hid(r1, &(0x7f0000000280)={0x24, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0003"], 0x0, 0x0}, 0x0) 6m40.355332172s ago: executing program 4 (id=148): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r3 = syz_clone(0x308000, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) wait4(r3, 0x0, 0x40000000, &(0x7f0000000200)) 6m3.859634275s ago: executing program 4 (id=155): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000001340)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sched_getparam(r0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{0x0, 0x9, 0x8, 0x8}, {0x3ff, 0x22, 0x6}, {0xa6, 0x7, 0x1, 0x3}]}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) 5m51.547182451s ago: executing program 4 (id=158): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x18) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004000000"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xf, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b700000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001ac0), &(0x7f0000000080), 0x1, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800"/15, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f0000000280)=0x2, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) 5m35.978301343s ago: executing program 4 (id=161): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x4, 0x2ffffffff}, 0x2e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) listen(r3, 0x2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x2, @local}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r5, &(0x7f0000000040)={0x2, 0x2, @local}, 0x10) close_range(r3, 0xffffffffffffffff, 0x0) 5m35.312072823s ago: executing program 4 (id=163): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = syz_clone(0x308000, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x40000000, 0x0) 4m49.458258674s ago: executing program 36 (id=163): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = syz_clone(0x308000, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace(0x8, r3) wait4(r3, 0x0, 0x40000000, 0x0) 2m13.67033833s ago: executing program 6 (id=199): bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$inet6(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYBLOB, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x9504, &(0x7f0000000100)=[{&(0x7f0000000000)="2b10", 0xffbd}], 0x1, 0x0, 0x0, 0x2c}, 0x4) 1m59.801507992s ago: executing program 6 (id=200): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000080)=0xfff, 0x4) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg(r0, &(0x7f0000000440)=[{{&(0x7f0000000700)=@xdp={0x2c, 0x0, r2}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000180)='O', 0x36}], 0x1}}], 0x1, 0x0) 1m54.650202406s ago: executing program 6 (id=202): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff"], 0x7c}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@empty}, &(0x7f0000000100)=0x14) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x14) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00', 0x3b}) ioctl$UI_DEV_CREATE(r0, 0x5501) write$input_event(r0, &(0x7f0000000000)={{0x77359400}}, 0xfe4f) 1m47.42032966s ago: executing program 6 (id=204): r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x1c0002, 0x0) write$vga_arbiter(r0, 0x0, 0xb) 1m45.899490256s ago: executing program 6 (id=205): r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'syz_tun\x00'}) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newqdisc={0xb8, 0x24, 0x2, 0x0, 0x25dfdbfe, {0x60, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x94, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0x1, 0x2, 0x1000, 0x0, 0xfffffff7, 0x3}}, {0x4}}, {{0x1c, 0x1, {0xd7, 0x1, 0x2, 0x6, 0x1, 0x3, 0xfffeffff, 0x4}}, {0xc, 0x2, [0x5, 0x1, 0x6, 0x3]}}, {{0x1c, 0x1, {0x7, 0x8, 0x5, 0x6, 0x2, 0x2, 0x8}}, {0x4}}, {{0x1c, 0x1, {0x66, 0x5, 0x2, 0x8, 0x0, 0x7, 0x1, 0x4}}, {0xc, 0x2, [0xa, 0x4, 0x4, 0x6fde]}}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x200088c4}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003b80), 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r9 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r9, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x4, 0x7, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r9, 0x29, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000e0ff00000000000000bd0000000000000000000000e4ec010000000040000000000000000000000000000000000000013da51fd47aa2e2f70000000000000000000000000000000000000000000000000000000000000067ff0000000000000005"], 0x310) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet6(r1, &(0x7f0000000080)={&(0x7f00000000c0)={0xa, 0x4e21, 0x80000, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000300)=ANY=[], 0x28}, 0x40) syz_usb_connect$uac1(0x0, 0xa6, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000000000106b1d01014000010203010902940003010000000904000000010100000a24010000000201020c24020000000000000000000524050000082407000000009e0c2fff0724070100000001240300000000010009040100000102000009040101010102000009050109000000000007250100000000090402000001020000090402010101020000090582090000000000072501000000"], 0x0) 1m29.5852655s ago: executing program 6 (id=207): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = syz_clone(0x308000, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) wait4(r3, 0x0, 0x40000000, &(0x7f0000000200)) 1m3.262392852s ago: executing program 5 (id=209): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xffff, 0x0, 0x1c42}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_XFRM_IF_ID={0x8, 0x2, 0x2}]}}}, @IFLA_IFNAME={0x14, 0x3, 'xfrm0\x00'}]}, 0x50}}, 0x0) 1m2.679288698s ago: executing program 5 (id=210): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000002c0)={'batadv_slave_1\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000140)=0x1, 0x4) bind$xdp(r1, &(0x7f0000000100)={0x2c, 0x0, r3}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 58.910851691s ago: executing program 5 (id=211): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x9}, 0x1c) listen(r0, 0x3) syz_emit_ethernet(0x4a, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @local, {[], {{0x1, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x4, 0x5, 0x10, 0x79}}}}}}}, 0x0) 58.143120123s ago: executing program 5 (id=212): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000008c0)='sys_enter\x00', r5}, 0x10) 46.939962286s ago: executing program 5 (id=213): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000077c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000004200)={0x50, 0x0, r2, {0x7, 0x1f, 0x0, 0x207645a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x50) syz_fuse_handle_req(r1, &(0x7f0000009800)="000000000000000000000000000000000000000000000000000000000000000090c400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000542d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea8286a2fba523440000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000633956a1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007d6ab715107fa1820000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffffffffffff0000000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e1ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f4000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000286071480000000000b13bc1e6d970884f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3ffffffffffffff00", 0x2000, &(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 46.076299361s ago: executing program 5 (id=214): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@raw={'raw\x00', 0x8, 0x3, 0x528, 0xd0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x458, 0xffffffff, 0xffffffff, 0x458, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @multicast2}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x62}, 0x0, 0x358, 0x388, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_hsr\x00', {0x4, 0x8, 0x20, 0x5e1b2d47, 0xf91, 0x5, 0x4, 0x9f7, 0x18}, {0x8}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x588) socket$inet6(0xa, 0x3, 0x2c) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97004d88c19e9ace00000000000000002100000002ff02000000000000000000000000000104004e200023b0"], 0x0) 43.653329284s ago: executing program 37 (id=207): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = syz_clone(0x308000, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) wait4(r3, 0x0, 0x40000000, &(0x7f0000000200)) 0s ago: executing program 38 (id=214): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@raw={'raw\x00', 0x8, 0x3, 0x528, 0xd0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x458, 0xffffffff, 0xffffffff, 0x458, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @multicast2}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x62}, 0x0, 0x358, 0x388, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_hsr\x00', {0x4, 0x8, 0x20, 0x5e1b2d47, 0xf91, 0x5, 0x4, 0x9f7, 0x18}, {0x8}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x588) socket$inet6(0xa, 0x3, 0x2c) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97004d88c19e9ace00000000000000002100000002ff02000000000000000000000000000104004e200023b0"], 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:12948' (ED25519) to the list of known hosts. [ 190.858123][ T29] audit: type=1400 audit(190.380:58): avc: denied { name_bind } for pid=3273 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 191.260378][ T29] audit: type=1400 audit(190.780:59): avc: denied { execute } for pid=3275 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 191.264904][ T29] audit: type=1400 audit(190.790:60): avc: denied { execute_no_trans } for pid=3275 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 197.981963][ T29] audit: type=1400 audit(197.500:61): avc: denied { mounton } for pid=3275 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 198.001389][ T29] audit: type=1400 audit(197.520:62): avc: denied { mount } for pid=3275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 198.064667][ T3275] cgroup: Unknown subsys name 'net' [ 198.107132][ T29] audit: type=1400 audit(197.630:63): avc: denied { unmount } for pid=3275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 198.588190][ T3275] cgroup: Unknown subsys name 'cpuset' [ 198.672573][ T3275] cgroup: Unknown subsys name 'rlimit' [ 199.121856][ T29] audit: type=1400 audit(198.640:64): avc: denied { setattr } for pid=3275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 199.127145][ T29] audit: type=1400 audit(198.650:65): avc: denied { mounton } for pid=3275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 199.139079][ T29] audit: type=1400 audit(198.660:66): avc: denied { mount } for pid=3275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 199.748360][ T3277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 199.761612][ T29] audit: type=1400 audit(199.280:67): avc: denied { relabelto } for pid=3277 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 199.763722][ T29] audit: type=1400 audit(199.280:68): avc: denied { write } for pid=3277 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 199.887152][ T29] audit: type=1400 audit(199.410:69): avc: denied { read } for pid=3275 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 199.897810][ T29] audit: type=1400 audit(199.410:70): avc: denied { open } for pid=3275 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 199.904883][ T3275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 223.963674][ T29] audit: type=1400 audit(223.490:71): avc: denied { execmem } for pid=3278 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 224.080868][ T29] audit: type=1400 audit(223.600:72): avc: denied { read } for pid=3280 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 224.083516][ T29] audit: type=1400 audit(223.610:73): avc: denied { open } for pid=3280 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 224.115924][ T29] audit: type=1400 audit(223.640:74): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 224.185830][ T29] audit: type=1400 audit(223.710:75): avc: denied { module_request } for pid=3281 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 224.369125][ T29] audit: type=1400 audit(223.890:76): avc: denied { sys_module } for pid=3281 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 232.159024][ T3281] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.192242][ T3281] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.542010][ T3280] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.578347][ T3280] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 236.598462][ T3281] hsr_slave_0: entered promiscuous mode [ 236.659193][ T3281] hsr_slave_1: entered promiscuous mode [ 237.302312][ T3280] hsr_slave_0: entered promiscuous mode [ 237.342387][ T3280] hsr_slave_1: entered promiscuous mode [ 237.381295][ T3280] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 237.383044][ T3280] Cannot create hsr debugfs directory [ 239.554458][ T29] audit: type=1400 audit(239.080:77): avc: denied { create } for pid=3281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 239.563179][ T29] audit: type=1400 audit(239.080:78): avc: denied { write } for pid=3281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 239.576706][ T29] audit: type=1400 audit(239.100:79): avc: denied { read } for pid=3281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 239.613329][ T3281] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 239.783155][ T3281] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 239.874221][ T3281] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 240.055950][ T3281] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 240.574433][ T3280] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 240.715351][ T3280] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 240.779119][ T3280] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 240.943052][ T3280] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 245.343529][ T3281] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.958960][ T3280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.521888][ T3280] veth0_vlan: entered promiscuous mode [ 254.599207][ T3280] veth1_vlan: entered promiscuous mode [ 255.015564][ T3281] veth0_vlan: entered promiscuous mode [ 255.214861][ T3280] veth0_macvtap: entered promiscuous mode [ 255.242343][ T3281] veth1_vlan: entered promiscuous mode [ 255.348283][ T3280] veth1_macvtap: entered promiscuous mode [ 256.337724][ T3280] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.339249][ T3280] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.353794][ T3280] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.355534][ T3280] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.475910][ T3281] veth0_macvtap: entered promiscuous mode [ 256.613381][ T3281] veth1_macvtap: entered promiscuous mode [ 257.095501][ T29] audit: type=1400 audit(256.610:80): avc: denied { mount } for pid=3280 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 257.118349][ T29] audit: type=1400 audit(256.640:81): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/syzkaller.o9UkIr/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 257.146177][ T29] audit: type=1400 audit(256.670:82): avc: denied { mount } for pid=3280 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 257.187226][ T29] audit: type=1400 audit(256.710:83): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/syzkaller.o9UkIr/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 257.253414][ T29] audit: type=1400 audit(256.770:84): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/syzkaller.o9UkIr/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2906 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 257.372493][ T29] audit: type=1400 audit(256.890:85): avc: denied { unmount } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 257.400922][ T29] audit: type=1400 audit(256.920:86): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 257.405476][ T3281] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 257.406106][ T3281] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 257.406497][ T3281] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 257.406943][ T3281] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 257.424613][ T29] audit: type=1400 audit(256.940:87): avc: denied { mount } for pid=3280 comm="syz-executor" name="/" dev="gadgetfs" ino=2909 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 257.536005][ T29] audit: type=1400 audit(257.020:88): avc: denied { mount } for pid=3280 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 257.538242][ T29] audit: type=1400 audit(257.030:89): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 258.065533][ T3280] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 262.942176][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 262.942295][ T29] audit: type=1400 audit(262.470:110): avc: denied { create } for pid=3429 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 262.982653][ T29] audit: type=1400 audit(262.510:111): avc: denied { getopt } for pid=3429 comm="syz.1.6" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 264.117590][ T29] audit: type=1400 audit(263.640:112): avc: denied { create } for pid=3435 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 264.160997][ T29] audit: type=1400 audit(263.660:113): avc: denied { setopt } for pid=3435 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 264.486101][ T29] audit: type=1400 audit(264.010:114): avc: denied { read } for pid=3437 comm="syz.1.10" name="card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 264.489123][ T29] audit: type=1400 audit(264.010:115): avc: denied { open } for pid=3437 comm="syz.1.10" path="/dev/dri/card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 264.564389][ T29] audit: type=1400 audit(264.090:116): avc: denied { ioctl } for pid=3437 comm="syz.1.10" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 265.514770][ T29] audit: type=1400 audit(265.040:117): avc: denied { create } for pid=3442 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 265.656370][ T29] audit: type=1400 audit(265.170:118): avc: denied { bind } for pid=3442 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 265.678572][ T29] audit: type=1400 audit(265.200:119): avc: denied { accept } for pid=3442 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 267.959775][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 267.959971][ T29] audit: type=1400 audit(267.480:121): avc: denied { read write } for pid=3446 comm="syz.0.14" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 267.968833][ T29] audit: type=1400 audit(267.490:122): avc: denied { open } for pid=3446 comm="syz.0.14" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 272.697508][ T29] audit: type=1400 audit(272.200:123): avc: denied { create } for pid=3446 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 272.698603][ T29] audit: type=1400 audit(272.210:124): avc: denied { write } for pid=3446 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 281.457057][ T29] audit: type=1326 audit(280.980:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3452 comm="syz.0.15" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9f952ba8 code=0x7ffc0000 [ 281.502813][ T29] audit: type=1326 audit(281.030:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3452 comm="syz.0.15" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9f952ba8 code=0x7ffc0000 [ 281.516432][ T29] audit: type=1326 audit(281.040:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3452 comm="syz.0.15" exe="/syz-executor" sig=0 arch=c00000b7 syscall=461 compat=0 ip=0xffff9f952ba8 code=0x7ffc0000 [ 281.518818][ T29] audit: type=1326 audit(281.040:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3452 comm="syz.0.15" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9f952ba8 code=0x7ffc0000 [ 285.942219][ T29] audit: type=1400 audit(285.380:129): avc: denied { write } for pid=3461 comm="syz.1.20" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 287.074948][ T29] audit: type=1400 audit(286.600:130): avc: denied { create } for pid=3468 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 287.147880][ T29] audit: type=1400 audit(286.670:131): avc: denied { write } for pid=3468 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 287.150117][ T29] audit: type=1400 audit(286.670:132): avc: denied { nlmsg_write } for pid=3468 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 292.526109][ T29] audit: type=1400 audit(292.030:133): avc: denied { map_create } for pid=3477 comm="syz.0.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 293.321801][ T29] audit: type=1400 audit(292.040:134): avc: denied { map_read map_write } for pid=3477 comm="syz.0.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 305.207677][ T29] audit: type=1400 audit(304.730:135): avc: denied { name_bind } for pid=3497 comm="syz.1.32" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 306.667405][ T29] audit: type=1400 audit(306.190:136): avc: denied { ioctl } for pid=3501 comm="syz.0.34" path="socket:[4102]" dev="sockfs" ino=4102 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 323.655526][ T29] audit: type=1400 audit(323.180:137): avc: denied { create } for pid=3530 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 326.490197][ T29] audit: type=1400 audit(325.910:138): avc: denied { create } for pid=3534 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 330.303227][ T29] audit: type=1400 audit(329.830:139): avc: denied { read } for pid=3537 comm="syz.0.44" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 330.305994][ T29] audit: type=1400 audit(329.830:140): avc: denied { open } for pid=3537 comm="syz.0.44" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 330.329022][ T29] audit: type=1400 audit(329.840:141): avc: denied { ioctl } for pid=3537 comm="syz.0.44" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x125f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 330.860338][ T29] audit: type=1400 audit(329.980:142): avc: denied { read write } for pid=3537 comm="syz.0.44" name="rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 330.866654][ T29] audit: type=1400 audit(330.000:143): avc: denied { open } for pid=3537 comm="syz.0.44" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 335.460747][ T29] audit: type=1400 audit(334.650:144): avc: denied { prog_run } for pid=3544 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 346.701572][ T29] audit: type=1400 audit(345.860:145): avc: denied { write } for pid=3555 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 355.664932][ T29] audit: type=1400 audit(355.190:146): avc: denied { bind } for pid=3571 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 355.666812][ T29] audit: type=1400 audit(355.190:147): avc: denied { node_bind } for pid=3571 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 355.695138][ T29] audit: type=1400 audit(355.220:148): avc: denied { read } for pid=3571 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 355.698357][ T29] audit: type=1400 audit(355.220:149): avc: denied { connect } for pid=3571 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 355.707402][ T29] audit: type=1400 audit(355.230:150): avc: denied { setopt } for pid=3571 comm="syz.1.56" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 355.713531][ T29] audit: type=1400 audit(355.240:151): avc: denied { write } for pid=3571 comm="syz.1.56" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 358.853323][ T29] audit: type=1400 audit(358.360:152): avc: denied { create } for pid=3576 comm="syz.1.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 358.855118][ T29] audit: type=1400 audit(358.370:153): avc: denied { bind } for pid=3576 comm="syz.1.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 358.856545][ T29] audit: type=1400 audit(358.380:154): avc: denied { accept } for pid=3576 comm="syz.1.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 362.380048][ C0] hrtimer: interrupt took 1532384 ns [ 370.842648][ T3595] netlink: 12 bytes leftover after parsing attributes in process `syz.1.63'. [ 370.954640][ T3595] netlink: 12 bytes leftover after parsing attributes in process `syz.1.63'. [ 371.021368][ T3595] futex_wake_op: syz.1.63 tries to shift op by -1; fix this program [ 371.837064][ T29] audit: type=1400 audit(371.360:155): avc: denied { read } for pid=3086 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 371.902395][ T29] audit: type=1400 audit(371.400:156): avc: denied { append } for pid=3086 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 371.940404][ T29] audit: type=1400 audit(371.410:157): avc: denied { open } for pid=3086 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 371.942188][ T29] audit: type=1400 audit(371.430:158): avc: denied { getattr } for pid=3086 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 385.995359][ T3611] pim6reg1: entered promiscuous mode [ 385.998168][ T3611] pim6reg1: entered allmulticast mode [ 389.010815][ T29] audit: type=1400 audit(388.520:159): avc: denied { ioctl } for pid=3615 comm="syz.1.70" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 389.044944][ T3616] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 389.085019][ T3616] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 389.593747][ T3619] netlink: 80 bytes leftover after parsing attributes in process `syz.1.72'. [ 391.312954][ T29] audit: type=1400 audit(390.840:160): avc: denied { read write } for pid=3281 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 391.316174][ T29] audit: type=1400 audit(390.840:161): avc: denied { open } for pid=3281 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 391.318977][ T29] audit: type=1400 audit(390.840:162): avc: denied { ioctl } for pid=3281 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 391.347010][ T29] audit: type=1400 audit(390.860:163): avc: denied { read } for pid=3086 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 391.377810][ T29] audit: type=1400 audit(390.900:164): avc: denied { search } for pid=3086 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 391.396912][ T29] audit: type=1400 audit(390.920:165): avc: denied { append } for pid=3086 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 391.399059][ T29] audit: type=1400 audit(390.920:166): avc: denied { open } for pid=3086 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 391.425055][ T29] audit: type=1400 audit(390.950:167): avc: denied { getattr } for pid=3086 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 391.658349][ T3628] netlink: 'syz.1.76': attribute type 15 has an invalid length. [ 391.680208][ T29] audit: type=1400 audit(391.160:168): avc: denied { prog_load } for pid=3627 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 396.345574][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 396.345678][ T29] audit: type=1400 audit(395.870:173): avc: denied { create } for pid=3635 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 396.368888][ T29] audit: type=1400 audit(395.890:174): avc: denied { getopt } for pid=3635 comm="syz.0.79" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 397.135141][ T3638] capability: warning: `syz.0.80' uses 32-bit capabilities (legacy support in use) [ 398.235243][ T3640] wg2: entered promiscuous mode [ 398.236174][ T3640] wg2: entered allmulticast mode [ 401.283328][ T29] audit: type=1400 audit(400.800:175): avc: denied { create } for pid=3641 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 405.105062][ T29] audit: type=1400 audit(404.630:176): avc: denied { setopt } for pid=3644 comm="syz.0.83" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 405.178126][ T3645] xt_hashlimit: size too large, truncated to 1048576 [ 407.696852][ T29] audit: type=1400 audit(407.220:177): avc: denied { module_request } for pid=3644 comm="syz.0.83" kmod="ip6t_" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 437.925885][ T29] audit: type=1400 audit(437.440:178): avc: denied { execmem } for pid=3654 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 445.425481][ T29] audit: type=1400 audit(444.950:179): avc: denied { create } for pid=3654 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 445.536179][ T29] audit: type=1400 audit(445.060:180): avc: denied { create } for pid=3654 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 448.662683][ T29] audit: type=1400 audit(448.180:181): avc: denied { execute } for pid=3658 comm="syz-executor" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 448.691462][ T29] audit: type=1400 audit(448.210:182): avc: denied { execute_no_trans } for pid=3658 comm="syz-executor" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 449.548646][ T29] audit: type=1400 audit(449.070:183): avc: denied { read } for pid=3659 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 449.571114][ T29] audit: type=1400 audit(449.080:184): avc: denied { open } for pid=3659 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 449.577653][ T29] audit: type=1400 audit(449.100:185): avc: denied { mounton } for pid=3659 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 450.454377][ T29] audit: type=1400 audit(449.980:186): avc: denied { sys_module } for pid=3659 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 470.793593][ T3659] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 470.811927][ T3659] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 477.394083][ T3659] hsr_slave_0: entered promiscuous mode [ 477.494983][ T3659] hsr_slave_1: entered promiscuous mode [ 477.587520][ T3659] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 477.588235][ T3659] Cannot create hsr debugfs directory [ 481.603203][ T29] audit: type=1400 audit(481.090:187): avc: denied { write } for pid=3659 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 481.604930][ T29] audit: type=1400 audit(481.110:188): avc: denied { read } for pid=3659 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 481.657175][ T3659] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 481.947769][ T3659] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 482.202563][ T3659] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 482.376332][ T3659] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 486.145678][ T29] audit: type=1400 audit(485.670:189): avc: denied { search } for pid=3700 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 487.014084][ T29] audit: type=1400 audit(486.540:190): avc: denied { read } for pid=3702 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=634 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 487.055425][ T29] audit: type=1400 audit(486.580:191): avc: denied { open } for pid=3702 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=634 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 487.122469][ T29] audit: type=1400 audit(486.620:192): avc: denied { getattr } for pid=3702 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=634 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 488.164063][ T29] audit: type=1400 audit(487.660:193): avc: denied { write } for pid=3700 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=633 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 488.169213][ T29] audit: type=1400 audit(487.690:194): avc: denied { add_name } for pid=3700 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 488.212514][ T29] audit: type=1400 audit(487.720:195): avc: denied { create } for pid=3700 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 488.303358][ T29] audit: type=1400 audit(487.780:196): avc: denied { write open } for pid=3700 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1129 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 488.373461][ T29] audit: type=1400 audit(487.800:197): avc: denied { append } for pid=3700 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1129 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 488.522426][ T29] audit: type=1400 audit(488.040:198): avc: denied { getattr } for pid=3700 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 491.372045][ T29] audit: type=1400 audit(490.830:199): avc: denied { read } for pid=3704 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 493.293198][ T29] audit: type=1400 audit(492.810:200): avc: denied { remove_name } for pid=3707 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1129 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 493.310759][ T29] audit: type=1400 audit(492.830:201): avc: denied { unlink } for pid=3707 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1129 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 496.403080][ T3659] 8021q: adding VLAN 0 to HW filter on device bond0 [ 500.795781][ T54] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 501.138055][ T54] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 501.447302][ T54] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 501.859094][ T54] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 503.763037][ T29] audit: type=1400 audit(503.260:202): avc: denied { read } for pid=3131 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 508.026281][ T54] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 508.161607][ T54] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 508.245050][ T54] bond0 (unregistering): Released all slaves [ 509.651558][ T54] hsr_slave_0: left promiscuous mode [ 509.726053][ T54] hsr_slave_1: left promiscuous mode [ 510.120923][ T54] veth1_macvtap: left promiscuous mode [ 510.123653][ T54] veth0_macvtap: left promiscuous mode [ 510.125852][ T54] veth1_vlan: left promiscuous mode [ 510.129297][ T54] veth0_vlan: left promiscuous mode [ 522.777771][ T54] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 523.168665][ T54] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 523.843107][ T54] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 524.204450][ T54] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 529.838917][ T54] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 529.954855][ T54] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 530.048630][ T54] bond0 (unregistering): Released all slaves [ 531.454934][ T54] hsr_slave_0: left promiscuous mode [ 531.663117][ T54] hsr_slave_1: left promiscuous mode [ 531.867590][ T54] veth1_macvtap: left promiscuous mode [ 531.870355][ T54] veth0_macvtap: left promiscuous mode [ 531.873108][ T54] veth1_vlan: left promiscuous mode [ 531.874837][ T54] veth0_vlan: left promiscuous mode [ 544.603325][ T3659] veth0_vlan: entered promiscuous mode [ 544.974960][ T3659] veth1_vlan: entered promiscuous mode [ 545.932417][ T3659] veth0_macvtap: entered promiscuous mode [ 545.978873][ T3659] veth1_macvtap: entered promiscuous mode [ 546.462178][ T3727] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 546.526602][ T3727] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 547.844711][ T3659] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 547.845880][ T3659] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 547.846681][ T3659] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 547.847510][ T3659] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 548.616227][ T29] audit: type=1400 audit(548.140:203): avc: denied { mounton } for pid=3659 comm="syz-executor" path="/syzkaller.Thgoft/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 548.661692][ T29] audit: type=1400 audit(548.180:204): avc: denied { mount } for pid=3659 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 548.761839][ T29] audit: type=1400 audit(548.280:205): avc: denied { mounton } for pid=3659 comm="syz-executor" path="/syzkaller.Thgoft/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 548.832381][ T29] audit: type=1400 audit(548.350:206): avc: denied { mount } for pid=3659 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 548.916147][ T29] audit: type=1400 audit(548.440:207): avc: denied { mounton } for pid=3659 comm="syz-executor" path="/syzkaller.Thgoft/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 548.955520][ T29] audit: type=1400 audit(548.450:208): avc: denied { mounton } for pid=3659 comm="syz-executor" path="/syzkaller.Thgoft/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 549.071785][ T29] audit: type=1400 audit(548.510:209): avc: denied { unmount } for pid=3659 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 549.088548][ T29] audit: type=1400 audit(548.610:210): avc: denied { mounton } for pid=3659 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 549.255765][ T29] audit: type=1400 audit(548.660:211): avc: denied { mount } for pid=3659 comm="syz-executor" name="/" dev="gadgetfs" ino=4616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 549.256719][ T29] audit: type=1400 audit(548.680:212): avc: denied { mount } for pid=3659 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 552.602712][ T3727] hsr_slave_0: entered promiscuous mode [ 552.722086][ T3727] hsr_slave_1: entered promiscuous mode [ 555.138987][ T3727] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 555.359316][ T3727] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 555.575286][ T3727] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 555.713665][ T3727] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 556.658162][ T3832] pim6reg: entered allmulticast mode [ 556.677076][ T3832] pim6reg: left allmulticast mode [ 557.573312][ T3838] netlink: 96 bytes leftover after parsing attributes in process `syz.2.94'. [ 559.482899][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 559.483107][ T29] audit: type=1400 audit(559.000:221): avc: denied { relabelfrom } for pid=3842 comm="syz.2.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 559.491983][ T29] audit: type=1400 audit(559.020:222): avc: denied { relabelto } for pid=3842 comm="syz.2.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 562.180892][ T3727] 8021q: adding VLAN 0 to HW filter on device bond0 [ 562.396624][ T29] audit: type=1400 audit(561.920:223): avc: denied { read } for pid=3852 comm="syz.2.97" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 562.400059][ T29] audit: type=1400 audit(561.920:224): avc: denied { open } for pid=3852 comm="syz.2.97" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 562.448760][ T29] audit: type=1400 audit(561.970:225): avc: denied { ioctl } for pid=3852 comm="syz.2.97" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 570.195662][ T3871] netlink: 7 bytes leftover after parsing attributes in process `syz.2.99'. [ 570.619089][ T29] audit: type=1400 audit(570.140:226): avc: denied { read write } for pid=3874 comm="syz.2.100" name="vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 570.623550][ T29] audit: type=1400 audit(570.140:227): avc: denied { open } for pid=3874 comm="syz.2.100" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 570.924235][ T29] audit: type=1400 audit(570.240:228): avc: denied { ioctl } for pid=3874 comm="syz.2.100" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 578.524350][ T29] audit: type=1400 audit(578.020:229): avc: denied { create } for pid=3902 comm="syz.2.103" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 578.556446][ T29] audit: type=1400 audit(578.080:230): avc: denied { ioctl } for pid=3902 comm="syz.2.103" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4861 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 584.164521][ T3727] veth0_vlan: entered promiscuous mode [ 584.212225][ T3727] veth1_vlan: entered promiscuous mode [ 584.898141][ T3727] veth0_macvtap: entered promiscuous mode [ 584.998791][ T3727] veth1_macvtap: entered promiscuous mode [ 586.165253][ T3727] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.166460][ T3727] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.167388][ T3727] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.168343][ T3727] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 590.661946][ T29] audit: type=1400 audit(590.180:231): avc: denied { create } for pid=3940 comm="syz.3.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 590.745375][ T29] audit: type=1400 audit(590.270:232): avc: denied { write } for pid=3940 comm="syz.3.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 590.773404][ T3941] netlink: 16 bytes leftover after parsing attributes in process `syz.3.89'. [ 590.776752][ T3941] netlink: 16 bytes leftover after parsing attributes in process `syz.3.89'. [ 590.778952][ T3941] netlink: 'syz.3.89': attribute type 1 has an invalid length. [ 590.837896][ T3941] netlink: 4 bytes leftover after parsing attributes in process `syz.3.89'. [ 591.413874][ T3942] fuse: Bad value for 'fd' [ 594.031367][ T29] audit: type=1400 audit(593.210:233): avc: denied { create } for pid=3948 comm="syz.2.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 594.062587][ T3946] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 594.066873][ T3946] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 599.327487][ T29] audit: type=1326 audit(598.570:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3945 comm="syz.3.109" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa2b52ba8 code=0x7ffc0000 [ 599.356711][ T29] audit: type=1326 audit(598.570:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3945 comm="syz.3.109" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa2b52ba8 code=0x7ffc0000 [ 599.383311][ T29] audit: type=1326 audit(598.570:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3945 comm="syz.3.109" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa2b52ba8 code=0x7ffc0000 [ 599.385502][ T29] audit: type=1326 audit(598.580:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3945 comm="syz.3.109" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa2b52ba8 code=0x7ffc0000 [ 599.387468][ T29] audit: type=1326 audit(598.580:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3945 comm="syz.3.109" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa2b52ba8 code=0x7ffc0000 [ 599.403398][ T29] audit: type=1326 audit(598.590:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3945 comm="syz.3.109" exe="/syz-executor" sig=0 arch=c00000b7 syscall=211 compat=0 ip=0xffffa2b52ba8 code=0x7ffc0000 [ 599.405394][ T29] audit: type=1326 audit(598.590:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3945 comm="syz.3.109" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa2b52ba8 code=0x7ffc0000 [ 599.407380][ T29] audit: type=1326 audit(598.590:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3945 comm="syz.3.109" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa2b52ba8 code=0x7ffc0000 [ 599.417224][ T29] audit: type=1326 audit(598.600:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3945 comm="syz.3.109" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa2b52ba8 code=0x7ffc0000 [ 599.420062][ T29] audit: type=1326 audit(598.600:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3945 comm="syz.3.109" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa2b52ba8 code=0x7ffc0000 [ 608.013437][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 608.013649][ T29] audit: type=1400 audit(607.480:261): avc: denied { ioctl } for pid=3957 comm="syz.2.112" path="/dev/uinput" dev="devtmpfs" ino=706 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 608.415631][ T3958] input: syz0 as /devices/virtual/input/input2 [ 614.465360][ T3970] fuse: Bad value for 'fd' [ 614.532213][ T29] audit: type=1400 audit(613.990:262): avc: denied { mounton } for pid=3962 comm="syz.3.113" path="/2/file0" dev="tmpfs" ino=27 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 615.738478][ T3969] fuse: Bad value for 'fd' [ 619.531956][ T3977] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 619.548808][ T3977] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 625.642090][ T29] audit: type=1400 audit(625.160:263): avc: denied { read write } for pid=3987 comm="syz.3.119" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 625.644327][ T29] audit: type=1400 audit(625.160:264): avc: denied { open } for pid=3987 comm="syz.3.119" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 627.400572][ T29] audit: type=1400 audit(626.810:265): avc: denied { setopt } for pid=3993 comm="syz.2.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 627.402090][ T29] audit: type=1400 audit(626.840:266): avc: denied { name_bind } for pid=3993 comm="syz.2.121" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 630.562067][ T29] audit: type=1400 audit(630.090:267): avc: denied { append } for pid=4000 comm="syz.2.123" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 634.386123][ T4007] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 634.388476][ T4007] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 637.983677][ T29] audit: type=1400 audit(637.470:268): avc: denied { ioctl } for pid=4012 comm="syz.2.127" path="socket:[5065]" dev="sockfs" ino=5065 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 638.055251][ T4013] netem: change failed [ 638.267541][ T4016] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4016 comm=syz.3.128 [ 639.063873][ T4019] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 639.065979][ T4019] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 640.120367][ T29] audit: type=1400 audit(639.640:269): avc: denied { ioctl } for pid=4026 comm="syz.3.132" path="socket:[6240]" dev="sockfs" ino=6240 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 640.123452][ T29] audit: type=1400 audit(639.650:270): avc: denied { bind } for pid=4026 comm="syz.3.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 640.135901][ T29] audit: type=1400 audit(639.650:271): avc: denied { write } for pid=4026 comm="syz.3.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 641.516046][ T29] audit: type=1326 audit(641.040:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4030 comm="syz.2.134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb0d52ba8 code=0x7ffc0000 [ 641.536908][ T29] audit: type=1326 audit(641.060:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4030 comm="syz.2.134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb0d52ba8 code=0x7ffc0000 [ 641.549138][ T29] audit: type=1326 audit(641.070:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4030 comm="syz.2.134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffb0d52ba8 code=0x7ffc0000 [ 641.562207][ T29] audit: type=1326 audit(641.080:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4030 comm="syz.2.134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb0d52ba8 code=0x7ffc0000 [ 641.570444][ T29] audit: type=1326 audit(641.090:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4030 comm="syz.2.134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb0d52ba8 code=0x7ffc0000 [ 641.615926][ T29] audit: type=1326 audit(641.140:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4030 comm="syz.2.134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb0d52ba8 code=0x7ffc0000 [ 645.589095][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 645.589215][ T29] audit: type=1326 audit(645.110:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4030 comm="syz.2.134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb0d52ba8 code=0x7ffc0000 [ 645.602501][ T29] audit: type=1326 audit(645.120:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4030 comm="syz.2.134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb0d52ba8 code=0x7ffc0000 [ 645.630706][ T29] audit: type=1326 audit(645.150:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4030 comm="syz.2.134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=203 compat=0 ip=0xffffb0d52ba8 code=0x7ffc0000 [ 645.634557][ T29] audit: type=1326 audit(645.160:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4030 comm="syz.2.134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb0d52ba8 code=0x7ffc0000 [ 645.655764][ T29] audit: type=1326 audit(645.180:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4030 comm="syz.2.134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=269 compat=0 ip=0xffffb0d52ba8 code=0x7ffc0000 [ 646.813498][ T29] audit: type=1400 audit(646.330:298): avc: denied { bind } for pid=4030 comm="syz.2.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 646.815337][ T29] audit: type=1400 audit(646.330:299): avc: denied { setopt } for pid=4030 comm="syz.2.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 648.913125][ T29] audit: type=1400 audit(648.370:300): avc: denied { bind } for pid=4046 comm="syz.3.136" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 648.914877][ T29] audit: type=1400 audit(648.370:301): avc: denied { node_bind } for pid=4046 comm="syz.3.136" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 649.730615][ T4051] ======================================================= [ 649.730615][ T4051] WARNING: The mand mount option has been deprecated and [ 649.730615][ T4051] and is ignored by this kernel. Remove the mand [ 649.730615][ T4051] option from the mount to silence this warning. [ 649.730615][ T4051] ======================================================= [ 649.825629][ T29] audit: type=1400 audit(649.350:302): avc: denied { unmount } for pid=3727 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 654.886978][ T3711] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 655.381878][ T3711] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 655.968983][ T3711] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 656.888112][ T3711] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 663.595192][ T3711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 663.785699][ T3711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 663.948168][ T3711] bond0 (unregistering): Released all slaves [ 665.092702][ T3711] hsr_slave_0: left promiscuous mode [ 665.500235][ T3711] hsr_slave_1: left promiscuous mode [ 665.853578][ T3711] veth1_macvtap: left promiscuous mode [ 665.854766][ T3711] veth0_macvtap: left promiscuous mode [ 665.855990][ T3711] veth1_vlan: left promiscuous mode [ 665.857034][ T3711] veth0_vlan: left promiscuous mode [ 689.744578][ T4058] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 690.081396][ T1125] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 690.354303][ T4058] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 691.131780][ T1125] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 691.868883][ T1125] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 692.522463][ T1125] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 697.228742][ T1125] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 697.353863][ T1125] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 697.422180][ T1125] bond0 (unregistering): Released all slaves [ 698.196538][ T1125] hsr_slave_0: left promiscuous mode [ 698.257813][ T1125] hsr_slave_1: left promiscuous mode [ 698.527421][ T1125] veth1_macvtap: left promiscuous mode [ 698.529075][ T1125] veth0_macvtap: left promiscuous mode [ 698.563493][ T1125] veth1_vlan: left promiscuous mode [ 698.565703][ T1125] veth0_vlan: left promiscuous mode [ 709.163349][ T4058] hsr_slave_0: entered promiscuous mode [ 709.214956][ T4058] hsr_slave_1: entered promiscuous mode [ 713.807575][ T4058] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 714.068868][ T4058] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 714.157725][ T4058] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 714.266257][ T4058] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 716.014794][ T4105] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 716.177953][ T4105] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 721.273801][ T4058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 722.758606][ T4105] hsr_slave_0: entered promiscuous mode [ 722.822896][ T4105] hsr_slave_1: entered promiscuous mode [ 722.870798][ T4105] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 722.871589][ T4105] Cannot create hsr debugfs directory [ 725.592730][ T4105] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 725.756785][ T4105] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 725.986995][ T4105] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 726.166516][ T4105] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 731.768489][ T4105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 744.915381][ T4058] veth0_vlan: entered promiscuous mode [ 745.067129][ T4058] veth1_vlan: entered promiscuous mode [ 745.595802][ T4058] veth0_macvtap: entered promiscuous mode [ 745.720944][ T4058] veth1_macvtap: entered promiscuous mode [ 746.327982][ T4058] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 746.328649][ T4058] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 746.329189][ T4058] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 746.345447][ T4058] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 752.194137][ T4105] veth0_vlan: entered promiscuous mode [ 752.388207][ T4105] veth1_vlan: entered promiscuous mode [ 752.767149][ T4105] veth0_macvtap: entered promiscuous mode [ 752.837443][ T4105] veth1_macvtap: entered promiscuous mode [ 754.012057][ T29] audit: type=1400 audit(753.520:303): avc: denied { name_bind } for pid=4293 comm="syz.4.143" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 754.013218][ T29] audit: type=1400 audit(753.520:304): avc: denied { node_bind } for pid=4293 comm="syz.4.143" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 757.714153][ T4105] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.714835][ T4105] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.715256][ T4105] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.715672][ T4105] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 761.755373][ T4312] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 761.757526][ T4312] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 762.855331][ T29] audit: type=1400 audit(762.380:305): avc: denied { write } for pid=4314 comm="syz.5.144" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 765.042275][ T4318] netlink: 16 bytes leftover after parsing attributes in process `syz.4.145'. [ 765.043428][ T4318] netlink: 44 bytes leftover after parsing attributes in process `syz.4.145'. [ 765.081747][ T4318] gre0: entered allmulticast mode [ 767.097034][ T4324] netlink: 4 bytes leftover after parsing attributes in process `syz.5.144'. [ 767.127423][ T4324] netlink: 12 bytes leftover after parsing attributes in process `syz.5.144'. [ 772.802074][ T4333] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 772.911077][ T4333] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 780.335747][ T4339] ptrace attach of "/syz-executor exec"[4340] was attempted by "/syz-executor exec"[4339] [ 802.737517][ T29] audit: type=1400 audit(802.260:306): avc: denied { connect } for pid=4348 comm="syz.5.150" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 802.794951][ T29] audit: type=1400 audit(802.320:307): avc: denied { write } for pid=4348 comm="syz.5.150" path="socket:[7981]" dev="sockfs" ino=7981 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 804.543621][ T4353] pim6reg1: entered promiscuous mode [ 804.544188][ T4353] pim6reg1: entered allmulticast mode [ 806.498224][ T4357] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 806.513074][ T4357] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 808.905158][ T4361] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 808.922717][ T29] audit: type=1400 audit(808.440:308): avc: denied { ioctl } for pid=4360 comm="syz.5.153" path="socket:[6813]" dev="sockfs" ino=6813 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 810.570153][ T29] audit: type=1326 audit(810.070:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4365 comm="syz.4.155" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9d352ba8 code=0x7ffc0000 [ 810.663738][ T29] audit: type=1326 audit(810.150:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4365 comm="syz.4.155" exe="/syz-executor" sig=0 arch=c00000b7 syscall=261 compat=0 ip=0xffff9d352ba8 code=0x7ffc0000 [ 810.664763][ T29] audit: type=1326 audit(810.150:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4365 comm="syz.4.155" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9d352ba8 code=0x7ffc0000 [ 810.665642][ T29] audit: type=1326 audit(810.150:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4365 comm="syz.4.155" exe="/syz-executor" sig=0 arch=c00000b7 syscall=119 compat=0 ip=0xffff9d352ba8 code=0x7ffc0000 [ 810.666496][ T29] audit: type=1326 audit(810.160:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4365 comm="syz.4.155" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9d352ba8 code=0x7ffc0000 [ 810.667331][ T29] audit: type=1326 audit(810.160:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4365 comm="syz.4.155" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9d352ba8 code=0x7ffc0000 [ 810.668184][ T29] audit: type=1326 audit(810.170:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4365 comm="syz.4.155" exe="/syz-executor" sig=0 arch=c00000b7 syscall=122 compat=0 ip=0xffff9d352ba8 code=0x7ffc0000 [ 810.668995][ T29] audit: type=1326 audit(810.170:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4365 comm="syz.4.155" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9d352ba8 code=0x7ffc0000 [ 810.671251][ T29] audit: type=1326 audit(810.170:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4365 comm="syz.4.155" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9d352ba8 code=0x7ffc0000 [ 820.720955][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 820.721062][ T29] audit: type=1400 audit(819.750:331): avc: denied { write } for pid=4373 comm="syz.5.157" name="fib_trie" dev="proc" ino=4026532758 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 827.954027][ T29] audit: type=1326 audit(827.150:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4379 comm="syz.4.158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9d352ba8 code=0x7ffc0000 [ 827.955956][ T29] audit: type=1326 audit(827.150:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4379 comm="syz.4.158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9d352ba8 code=0x7ffc0000 [ 827.959152][ T29] audit: type=1326 audit(827.160:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4379 comm="syz.4.158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff9d3510d4 code=0x7ffc0000 [ 827.961866][ T29] audit: type=1326 audit(827.160:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4379 comm="syz.4.158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9d352ba8 code=0x7ffc0000 [ 827.963303][ T29] audit: type=1326 audit(827.160:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4379 comm="syz.4.158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9d352ba8 code=0x7ffc0000 [ 838.261050][ T29] audit: type=1400 audit(837.650:337): avc: denied { bind } for pid=4394 comm="syz.4.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 849.992821][ T4407] ptrace attach of "/syz-executor exec"[4408] was attempted by "/syz-executor exec"[4407] [ 861.793443][ T4421] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 861.795784][ T4421] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 863.006224][ T4425] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 863.008386][ T4425] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 864.610890][ T29] audit: type=1400 audit(864.020:338): avc: denied { mount } for pid=4427 comm="syz.5.169" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 865.266222][ T29] audit: type=1400 audit(864.580:339): avc: denied { unmount } for pid=4105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 866.408028][ T4434] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 866.412314][ T4434] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 890.760859][ T11] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 891.746851][ T11] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 892.244986][ T29] audit: type=1400 audit(891.770:340): avc: denied { name_bind } for pid=4459 comm="syz.5.177" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 894.514846][ T11] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 895.559150][ T11] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 914.825185][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 914.992603][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 915.010776][ T29] audit: type=1400 audit(914.530:341): avc: denied { write } for pid=3086 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 915.057617][ T29] audit: type=1400 audit(914.560:342): avc: denied { remove_name } for pid=3086 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 915.096011][ T29] audit: type=1400 audit(914.600:343): avc: denied { rename } for pid=3086 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 915.097903][ T29] audit: type=1400 audit(914.600:344): avc: denied { add_name } for pid=3086 comm="syslogd" name="messages.0" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 915.100134][ T29] audit: type=1400 audit(914.610:345): avc: denied { create } for pid=3086 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 915.165291][ T11] bond0 (unregistering): Released all slaves [ 918.527836][ T11] hsr_slave_0: left promiscuous mode [ 918.771483][ T29] audit: type=1400 audit(918.230:346): avc: denied { create } for pid=4499 comm="syz.5.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 918.871907][ T11] hsr_slave_1: left promiscuous mode [ 919.307810][ T11] veth1_macvtap: left promiscuous mode [ 919.309118][ T11] veth0_macvtap: left promiscuous mode [ 919.316673][ T11] veth1_vlan: left promiscuous mode [ 919.317690][ T11] veth0_vlan: left promiscuous mode [ 947.145598][ T4453] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 947.216422][ T4453] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 953.827038][ T29] audit: type=1400 audit(953.350:347): avc: denied { create } for pid=4542 comm="syz.5.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 953.865260][ T29] audit: type=1400 audit(953.390:348): avc: denied { connect } for pid=4542 comm="syz.5.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 956.279119][ T4453] hsr_slave_0: entered promiscuous mode [ 956.448484][ T4453] hsr_slave_1: entered promiscuous mode [ 967.447262][ T4453] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 967.573389][ T4453] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 967.607127][ T4453] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 967.795218][ T4453] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 973.122721][ T29] audit: type=1400 audit(972.480:349): avc: denied { block_suspend } for pid=4571 comm="syz.5.188" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 978.226061][ T4453] 8021q: adding VLAN 0 to HW filter on device bond0 [ 982.751705][ T29] audit: type=1400 audit(982.260:350): avc: denied { load_policy } for pid=4590 comm="syz.5.189" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 982.766165][ T4591] SELinux: policydb version 0 does not match my version range 15-33 [ 982.818714][ T4591] SELinux: failed to load policy [ 1020.266354][ T4660] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1020.276058][ T4660] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1030.427438][ T4453] veth0_vlan: entered promiscuous mode [ 1030.675116][ T4453] veth1_vlan: entered promiscuous mode [ 1031.525791][ T4453] veth0_macvtap: entered promiscuous mode [ 1031.945974][ T4453] veth1_macvtap: entered promiscuous mode [ 1033.508155][ T4453] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1033.509023][ T4453] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1033.561324][ T4453] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1033.562298][ T4453] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1059.084030][ T4704] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1059.086227][ T4704] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1062.246704][ T4709] input: syz1 as /devices/virtual/input/input3 [ 1067.575465][ T29] audit: type=1400 audit(1067.100:351): avc: denied { read write } for pid=4712 comm="syz.6.204" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1067.598400][ T29] audit: type=1400 audit(1067.120:352): avc: denied { open } for pid=4712 comm="syz.6.204" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1073.672697][ T4717] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1073.676656][ T4717] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1096.306333][ T4730] ptrace attach of "/syz-executor exec"[4731] was attempted by "/syz-executor exec"[4730] [ 1111.403974][ T29] audit: type=1400 audit(1110.930:353): avc: denied { create } for pid=4739 comm="syz.5.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1111.443956][ T29] audit: type=1400 audit(1110.960:354): avc: denied { setopt } for pid=4739 comm="syz.5.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1113.345316][ T4740] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 1113.430935][ T29] audit: type=1400 audit(1112.950:355): avc: denied { bind } for pid=4739 comm="syz.5.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1127.567361][ T4750] fuse: Bad value for 'user_id' [ 1127.568091][ T4750] fuse: Bad value for 'user_id' [ 1128.552476][ T4752] xt_hashlimit: size too large, truncated to 1048576 [ 1167.175836][ T4756] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1167.218452][ T4756] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1175.198518][ T4756] hsr_slave_0: entered promiscuous mode [ 1175.322242][ T4756] hsr_slave_1: entered promiscuous mode [ 1175.384762][ T4756] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1175.385382][ T4756] Cannot create hsr debugfs directory [ 1186.413894][ T4756] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 1186.569362][ T4756] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 1186.901107][ T4756] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 1186.997157][ T4756] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 1191.003361][ T4723] unregister_netdevice: waiting for syz_tun to become free. Usage count = 3 [ 1191.009723][ T4723] ref_tracker: syz_tun@0000000080f3519b has 1/2 users at [ 1191.009723][ T4723] netdev_get_by_index+0x5c/0xa4 [ 1191.009723][ T4723] fib6_nh_init+0x4b0/0x1470 [ 1191.009723][ T4723] ip6_route_info_create+0xbc0/0x1230 [ 1191.009723][ T4723] ip6_route_add+0x20/0x180 [ 1191.009723][ T4723] addrconf_add_mroute+0x184/0x260 [ 1191.009723][ T4723] addrconf_add_dev+0xd8/0x130 [ 1191.009723][ T4723] addrconf_init_auto_addrs+0x15c/0x568 [ 1191.009723][ T4723] addrconf_notify+0x980/0x1144 [ 1191.009723][ T4723] notifier_call_chain+0x118/0x49c [ 1191.009723][ T4723] raw_notifier_call_chain+0x18/0x24 [ 1191.009723][ T4723] call_netdevice_notifiers_info+0x88/0xe8 [ 1191.009723][ T4723] __dev_notify_flags+0xbc/0x20c [ 1191.009723][ T4723] dev_change_flags+0xe0/0x150 [ 1191.009723][ T4723] do_setlink.constprop.0+0x6fc/0x2ccc [ 1191.009723][ T4723] rtnl_newlink+0xd08/0x15b4 [ 1191.009723][ T4723] rtnetlink_rcv_msg+0x65c/0x8d4 [ 1191.009723][ T4723] [ 1191.017023][ T4723] ref_tracker: syz_tun@0000000080f3519b has 1/2 users at [ 1191.017023][ T4723] fib_create_info+0x290c/0x3ef8 [ 1191.017023][ T4723] fib_table_insert+0x148/0x1c3c [ 1191.017023][ T4723] fib_magic+0x380/0x44c [ 1191.017023][ T4723] fib_add_ifaddr+0x14c/0x43c [ 1191.017023][ T4723] fib_inetaddr_event+0xbc/0x264 [ 1191.017023][ T4723] notifier_call_chain+0x118/0x49c [ 1191.017023][ T4723] blocking_notifier_call_chain+0x68/0x9c [ 1191.017023][ T4723] __inet_insert_ifa+0x684/0x954 [ 1191.017023][ T4723] inet_rtm_newaddr+0xba4/0x10c0 [ 1191.017023][ T4723] rtnetlink_rcv_msg+0x65c/0x8d4 [ 1191.017023][ T4723] netlink_rcv_skb+0x190/0x334 [ 1191.017023][ T4723] rtnetlink_rcv+0x18/0x24 [ 1191.017023][ T4723] netlink_unicast+0x3c4/0x674 [ 1191.017023][ T4723] netlink_sendmsg+0x654/0xa4c [ 1191.017023][ T4723] __sock_sendmsg+0xc8/0x168 [ 1191.017023][ T4723] __sys_sendto+0x1d8/0x26c [ 1191.017023][ T4723] SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1191.290793][ T29] audit: type=1400 audit(1190.800:356): avc: denied { write } for pid=3275 comm="syz-executor" path="pipe:[3447]" dev="pipefs" ino=3447 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 1208.018505][ T311] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1208.493878][ T311] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1208.914712][ T311] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1209.237599][ T311] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1214.764262][ T311] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1214.966182][ T311] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1215.065035][ T311] bond0 (unregistering): Released all slaves [ 1216.688214][ T311] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1216.757353][ T311] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1216.874052][ T311] bond0 (unregistering): Released all slaves [ 1217.408872][ T311] hsr_slave_0: left promiscuous mode [ 1217.475000][ T311] hsr_slave_1: left promiscuous mode [ 1217.677532][ T311] hsr_slave_0: left promiscuous mode [ 1217.735133][ T311] hsr_slave_1: left promiscuous mode [ 1217.978788][ T311] veth1_macvtap: left promiscuous mode [ 1217.980690][ T311] veth0_macvtap: left promiscuous mode [ 1217.981804][ T311] veth1_vlan: left promiscuous mode [ 1217.982618][ T311] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 15:36:19 Registers: info registers vcpu 0 CPU#0 PC=ffff80008044db58 X00=ffff80008437f9f4 X01=ffff8000a1a16e40 X02=ffff8000a1a16e20 X03=ffff8000a1a16de0 X04=ffff8000a1a16e00 X05=ffff8000a1a16f30 X06=00000000f2f2f200 X07=00000000f3f3f300 X08=dfff800000000000 X09=0000000041b58ab3 X10=ffff700014342e39 X11=1ffff00014342e39 X12=ffff700014342e3a X13=0000000000000006 X14=ffff8000801a6694 X15=ffff8000801a83c0 X16=0000000000000000 X17=206567617355202e X18=00000000ce96cd96 X19=ffff000018451005 X20=1ffff00014342db8 X21=ffff8000a1a16f30 X22=0000000000000000 X23=ffff80008437f9f4 X24=0000000000000001 X25=0000000000000400 X26=00000000ffffffff X27=ffff8000853c6a85 X28=ffff000018451005 X29=ffff8000a1a16d80 X30=ffff80008044ddf0 SP=ffff8000a1a16d80 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000000000000000:000000000000000a Q02=0000aaaada76b468:0000aaaada76b360 Q03=0000ffffd080f020:0000ffffd080ed88 Q04=0000000000000000:0000000000000000 Q05=0000ffffd080ece0:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:000001f40000000a Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd080f0f0:0000ffffd080f0f0 Q17=ffffff80ffffffd0:0000ffffd080f0c0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000803090a0 X00=1fffe00002a0f51c X01=0000000000000003 X02=0000000000000001 X03=1fffe00002a0f3ca X04=00000000f204f1f1 X05=ffff70001433ee82 X06=dfff800000000000 X07=00000000f1f1f1f1 X08=ffff8000a800104b X09=dfff800000000000 X10=ffff700015000209 X11=1ffff00015000209 X12=ffff70001500020a X13=ffff00001507a8c0 X14=1ffff000110e6918 X15=1fffe00002a0f514 X16=ffff80008cf50000 X17=ffff7fffe3248000 X18=00000000ffffffff X19=0000000000000050 X20=ffff8000a19f7390 X21=ffff80008053a12c X22=ffff800085677700 X23=000000000008a98b X24=ffff8000a8001048 X25=ffff8000a8001000 X26=000000000000000a X27=1ffff0001433eecc X28=dfff800000000000 X29=ffff8000a19f72c0 X30=ffff80008053a69c SP=ffff8000a19f73e0 PSTATE=00000005 ---- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=ffffffffffffffff:ffffffffff000000 Q02=0000000000000000:fffffffffffff000 Q03=00ff000000000000:ffffffff00ff0000 Q04=0000000000000000:0f000000ffff0f00 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffde184250:0000ffffde184250 Q17=ffffff80ffffffd0:0000ffffde184220 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000