last executing test programs: 10m24.601114421s ago: executing program 0 (id=1151): r0 = socket$kcm(0x29, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r2 = socket$kcm(0x2, 0x1, 0x0) sendmsg$inet(r2, &(0x7f0000000fc0)={0x0, 0x0, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r2, r1}) recvmsg$kcm(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1}, 0x10102) 10m24.335281893s ago: executing program 0 (id=1153): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000340)="25b096f681cd731c3f3a9badc4e3cf5edeae1f3b5082d7ab3a97c053df68744e7c7e24d0b59997bab4bccff8363b275de3510b0ebe4275d8d2f153395668e3d608e358fc2294263c03f8dc4f8bf194e4fde4600a2dec2f483a914e2fde0cbc344a2b9fc18dd198966045a6d4d4eb8571e8bb69e6724e37fcbaa6e4c64050b47256b9bb17f5c0aa5101e015ecdcb62fec46fc02", 0x93}], 0x1}, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$kcm(0x2, 0x922000000001, 0x106) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xeb5, 0x4}, 0x8000, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$kcm(0x23, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x541b, &(0x7f0000000000)={r0}) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x1, 0x7, @loopback, 0x2}, 0x80, 0x0}, 0xe07e872424dbef0e) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r1}, 0x10) bpf$MAP_CREATE(0x700000000000000, &(0x7f0000001a00)=@base={0x1d, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x50) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000100020400bf050005001201", 0x2e}], 0x1}, 0x0) 10m24.130348489s ago: executing program 0 (id=1156): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = socket$netlink(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0x4, &(0x7f0000000140)=0x6, 0x4) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="940000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000011c00028005000100000000003c0002802c00018014000300fe8000"/106], 0x94}}, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB], 0xdc}, 0x1, 0x0, 0x0, 0x20044804}, 0x40040) 10m23.156942828s ago: executing program 0 (id=1162): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 10m23.101334993s ago: executing program 0 (id=1165): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x4, 0x9, 0x4}, {0x10000002, 0x0, 0xe, 0x4}], 0x10, 0x4000000}, 0x94) r0 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xd, &(0x7f0000000000), 0x4) 10m23.101017203s ago: executing program 4 (id=1166): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5ff, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x3106, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1a, 0x0, 0x0, &(0x7f0000000180)='GPL\x00'}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 10m23.075397265s ago: executing program 0 (id=1168): sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) sched_setscheduler(0x0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x18, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r2}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f0000000180)={[{@grpid}, {@mblk_io_submit}, {@nodioread_nolock}, {@test_dummy_encryption}, {@inode_readahead_blks}, {@nodelalloc}, {@minixdf}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x40}}]}, 0x4, 0xbaf, &(0x7f00000017c0)="$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") r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) 10m22.88316153s ago: executing program 4 (id=1173): r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000440), 0x10) listen(r0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 10m21.888651941s ago: executing program 4 (id=1176): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 10m20.801308719s ago: executing program 4 (id=1182): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x4, 0x9, 0x4}, {0x10000002, 0x0, 0xe, 0x4}], 0x10, 0x4000000}, 0x94) r0 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xd, &(0x7f0000000000), 0x4) 10m20.695608807s ago: executing program 4 (id=1184): r0 = gettid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 10m19.512370173s ago: executing program 4 (id=1193): socket$inet6(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000005000000", @ANYBLOB], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) lchown(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0), 0x1, 0x4fa, &(0x7f00000005c0)="$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") 10m8.045762161s ago: executing program 32 (id=1168): sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) sched_setscheduler(0x0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x18, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r2}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f0000000180)={[{@grpid}, {@mblk_io_submit}, {@nodioread_nolock}, {@test_dummy_encryption}, {@inode_readahead_blks}, {@nodelalloc}, {@minixdf}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x40}}]}, 0x4, 0xbaf, &(0x7f00000017c0)="$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") r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) 10m4.197658672s ago: executing program 33 (id=1193): socket$inet6(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000005000000", @ANYBLOB], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) lchown(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0), 0x1, 0x4fa, &(0x7f00000005c0)="$eJzs3c9vG1kdAPCvnThx0uwmu+wBEOyW3YWCqjqJuxut9gDLCSFUCdEjSG1I3CiKHUexU5rQQ3rmikQlTnDkD+DcE3cuCG5cygGJHxGoQeLg1YwnqZvaTdQkdhR/PtJo3ps39fe9pvNe/U3iF8DQuhoRuxExFhF3I2I6u57LjvisfST3Pdt7uLS/93ApF63W7X/l0vbkWnT8mcSV7DWLEfGj70X8NPdy3Mb2ztpitVrZzOqzzdrGbGN758ZqbXGlslJZL5cX5hfmPrn5cfnMxvpebSwrffXpH3e/9fOkW1PZlc5xnKX20AuHcRKjEfGD8wg2ACPZeMYG3RFeSz4i3o6I99PnfzpG0q8mAHCZtVrT0ZrurAMAl10+zYHl8qUsFzAV+Xyp1M7hvROT+Wq90bx+r761vtzOlc1EIX9vtVqZy3KFM1HIJfX5tPy8Xj5SvxkRb0XEL8cn0nppqV5dHuR/fABgiF05sv7/d7y9/gMAl1xx0B0AAPrO+g8Aw8f6DwDDx/oPAMOnvf5PDLobAEAfef8PAMPH+g8AQ+WHt24lR2s/+/zr5fvbW2v1+zeWK421Um1rqbRU39wordTrK+ln9tSOe71qvb4x/1FsPZj59kajOdvY3rlTq2+tN++kn+t9p1JI79rtw8gAgF7eeu/JX3LJivzpRHpEx14OhYH2DDhv+UF3ABiYkUF3ABgYu33B8DrFe3zpAbgkumzR+4Jit18QarVarfPrEnDOrn1J/h+GVUf+308Bw5CR/4fhJf8Pw6vVyp10z/846Y0AwMUmxw/0+P7/29n5d9k3B36yfPSOx+fZKwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALjYDvb/LWV7gU9FPl8qRbwRETNRyN1brVbmIuLNiPjzeGE8qc8PuM8AwGnl/57L9v+6Nv3h1AtN7145LI5FxM9+fftXDxabzc0/RYzl/j1+cL35OLte7n/vAYDjHazT6bnjjfyzvYdLB0c/+/OP70ZEsR1/f28s9g/jj8Zoei5GISIm/5PL6m25jtzFaew+iogvdht/LqbSHEh759Oj8ZPYb/Q1fv6F+Pm0rX1O/i6+cAZ9gWHzJJl/Puv2/OXjanru/vwX0xnq9LL5L3mppf10Dnwe/2D+G+kx/109aYyP/vD9dmni5bZHEV8ejTiIvd8x/xzEz/WI/+EJ4//1K+++36ut9ZuIa9E9fmes2WZtY7axvXNjtba4UlmprJfLC/MLc5/c/Lg8m+aoZ3uvBv/89PqbvdqS8U/2iF88ZvxfP+H4f/v/uz/+2ivif/ODbvHz8c4r4idr4jdOGH9x8vfFXm1J/OUe4z/u63/9hPGf/m3npW3DAYDBaWzvrC1Wq5VNBYWLX0j+yV6AbnQtfKdfscaie9MvPmg/00eaWq3XitVrxjiLrBtwERw+9BHxv0F3BgAAAAAAAAAAAAAA6Kofv7E06DECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABweX0eAAD//19xzyM=") 8m13.968668163s ago: executing program 3 (id=1739): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newqdisc={0x54, 0x10, 0x1, 0x4000004, 0x10000000, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xd}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x4000000}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) 8m13.595365904s ago: executing program 3 (id=1741): socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000796400000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 8m13.02289347s ago: executing program 3 (id=1742): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE(0x0, 0x0, 0x48) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000", @ANYRES32], &(0x7f0000000080)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lsm=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, {0x800, 0x0, 0x6}}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x3}}, 0xe8) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000540)='system_u:object_r:restorecond_var_run_t:s0\x00', 0x2b, 0x0) unshare(0x62040200) 8m11.92305473s ago: executing program 3 (id=1746): r0 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f00000007c0), 0x1, 0x0) write$binfmt_register(r0, &(0x7f0000000800)={0x3a, 'syz3', 0x3a, 'M', 0x3a, 0x4, 0x3a, '(!', 0x3a, '\x00', 0x3a, './file0'}, 0x2a) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3800480, &(0x7f0000002200), 0x45, 0x786, &(0x7f00000007c0)="$eJzs3d9rW2UfAPDvSX93e9/2hRd0XhUELYyldtZNwYuJFyI4GOi1W0mzMps2o0nHWgpuiOCNoOKFoDe79se889Yft/pfeCEbU7vhxAupnDRZszXpkq1J5vb5wGme5zwnfZ5vnnOe8yTnkATwyJpI/2QiDkTEB0nEWHV9EhEDlVR/xLGt7W5urOfSJYnNzdd/Syrb3NhYz0Xdc1L7qpnHI+L7dyMOZnbWW1pdW5gtFPLL1fxUefHsVGl17dCZxdn5/Hx+6cj0zMzho88dPbJ3sf7x09r+qx++8vRXx/5657HL7/+QxLHYXy2rj2OvTMRE9TUZSF/C27y815X1WLJ7cYM9gAdB2jF9W0d5HIix6KukmhjpZssAgE55OyI2m+lrWgIA/Kslzc//AMBDqfY5wI2N9Vxt6e0nEt117aWIGN6Kv3Z9c6ukv3rNbrhyHXT0RnLblZEkIsb3oP6JiPjsmze/SJfo0HVIgEYuXIyIU+MTO8f/ZMc9C+16poVtJu7IG/+ge75N5z/PN5r/ZW7Nf6LB/GeowbF7L+5+/Geu7EE1TaXzvxfr7m27WRd/1XhfNfefypxvIDl9ppBPx7b/RsRkDAyl+eld6pi8/vf1ZmX187/fP3rr87T+9HF7i8yV/qHbnzM3W569n5jrXbsY8UR/o/iTW/2fNJn/nmixjldfeO/TZmVp/Gm8tWVn/J21eSniqYb9v31HW7Lr/YlTld1hqrZTNPD1z5+MNqu/vv/TJa2/9l6gG9L+H909/vGk/n7NUvt1/Hhp7LtmZXePv/H+P5i8UUkPVtedny2Xl6cjBpPXdq4/vP3cWr62fRr/5JONj//d9v/0PeGpFuPvv/rrl/cef2el8c+11f/tJy7fXOhrVn9r/T9TSU1W17Qy/rXawPt57QAAAAAAAAAAAAAAAAAAAAAAAACgVZmI2B9JJnsrnclks1u/4f3/GM0UiqXywdPFlaW5qPxW9ngMZGpfdTlW932o09Xvw6/lD9+RfzYi/hcRHw+NVPLZXLEw1+vgAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBqX5Pf/0/9MtTr1gEAHTPc1+sWAADdNtzf6xYAAN023NbWIx1rBwDQPe2d/wGAh4HzPwA8epz/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6LATx4+ny+afG+u5ND93bnVloXju0Fy+tJBdXMllc8Xls9n5YnG+kM/miotN/9GFrYdCsXh2JpZWzk+V86XyVGl17eRicWWpfPLM4ux8/mR+oGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDrSqtrC7OFQn5ZQkKi7URc2DqOHpT27F0iBrdHiZGejU8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD7p/AgAA//+mAybn") creat(0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) lseek(r1, 0xfffffffffffffffc, 0x2) set_robust_list(&(0x7f0000000380)={&(0x7f00000001c0)={&(0x7f0000000080)}, 0x9, &(0x7f0000000340)={&(0x7f0000000200)}}, 0x18) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff000000000000005df6e63fa9ee8ca068d6882b1790856c6a7744e3520254", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kmem_cache_free\x00', r3}, 0x10) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) sendmsg$netlink(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{0x0, 0x1b8}], 0x1}, 0x0) pselect6(0x40, &(0x7f00000005c0)={0xc, 0xe, 0x80000000, 0x1, 0x6, 0x0, 0xfffffffffffffffb, 0xc8d1}, &(0x7f0000000640)={0x2, 0x8, 0x0, 0xfffffffffffffff2, 0x7, 0x2, 0x8}, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x33, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x10) r7 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) timer_create(0x2, &(0x7f000049efa0)={0x0, 0x8000007}, &(0x7f0000044000)=0x0) timer_delete(r8) timer_settime(r8, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_gettime(r8, &(0x7f00000003c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x401, 0x0) write$binfmt_register(r7, &(0x7f0000000000)={0x3a, 'syz2', 0x3a, 'E', 0x3a, 0x7, 0x3a, 'M', 0x3a, 'M', 0x3a, './file2', 0x3a, [0x46]}, 0x2a) getdents(r1, 0x0, 0x58) 8m11.111591315s ago: executing program 3 (id=1750): syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./bus\x00', 0x2000082, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x25, 0x358, &(0x7f0000000480)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x101}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x3}]}, @ptr, @restrict={0x0, 0x0, 0x0, 0x4}]}}, 0x0, 0x4a}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_route(0x10, 0x3, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 8m10.956281018s ago: executing program 3 (id=1753): sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x18, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f0000000180)={[{@grpid}, {@mblk_io_submit}, {@nodioread_nolock}, {@test_dummy_encryption}, {@inode_readahead_blks}, {@nodelalloc}, {@minixdf}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x40}}]}, 0x4, 0xbaf, &(0x7f00000017c0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) 8m10.638937744s ago: executing program 34 (id=1753): sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x18, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f0000000180)={[{@grpid}, {@mblk_io_submit}, {@nodioread_nolock}, {@test_dummy_encryption}, {@inode_readahead_blks}, {@nodelalloc}, {@minixdf}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x40}}]}, 0x4, 0xbaf, &(0x7f00000017c0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) 54.4357218s ago: executing program 5 (id=3868): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r0}, 0x18) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) 54.077759527s ago: executing program 5 (id=3870): sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x400c4) r0 = socket$l2tp(0x2, 0x2, 0x73) recvfrom$l2tp(r0, 0x0, 0x0, 0x10100, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, 0x0, 0x0) syz_emit_ethernet(0x74, &(0x7f0000000000)={@link_local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x73, 0x0, @private=0x300, @multicast1}, {0x0, 0x0, 0xfffffe9a, 0x0, @gue={{0x2}}}}}}}, 0x0) 52.9384787s ago: executing program 5 (id=3880): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) 52.838135508s ago: executing program 5 (id=3881): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r0}, 0x18) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) 52.793864142s ago: executing program 5 (id=3882): socket$inet6(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000005000000", @ANYBLOB], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) lchown(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0), 0x1, 0x4fa, &(0x7f00000005c0)="$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") ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000280)=0x4) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000480)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0xfffffffc}) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) syz_open_procfs(0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x143142, 0x80) 49.654821865s ago: executing program 5 (id=3895): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ptrace(0x10, 0x1) 34.457375137s ago: executing program 35 (id=3895): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ptrace(0x10, 0x1) 9.129043051s ago: executing program 2 (id=4133): r0 = syz_open_dev$usbfs(&(0x7f0000000480), 0x76, 0x160341) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0xfffffffffffffdee, &(0x7f0000000000)=0x8000000000005) sched_setscheduler(0x0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) 7.673696828s ago: executing program 7 (id=4139): syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x200000, &(0x7f0000000200), 0x3, 0x570, &(0x7f0000000680)="$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") setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xeb38e000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ppoll(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000000)={0x13d, 0x9, 0x0, 0xffff, 0xc, "737b27e90e2947801cf3a246ada40a9fd86000"}) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000100)=0xd) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5bbf91a1e7f99074, &(0x7f0000000000)) fallocate(0xffffffffffffffff, 0x0, 0x4000, 0x1001f0) 6.917121s ago: executing program 1 (id=4145): r0 = socket(0x15, 0x5, 0x0) bind$inet6(r0, 0x0, 0x0) 6.91085599s ago: executing program 1 (id=4146): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 6.703055297s ago: executing program 7 (id=4148): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f00000003c0)="e02742042d1085849792762f86dd", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 6.628915883s ago: executing program 7 (id=4149): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000340)="25b096f681cd731c3f3a9badc4e3cf5edeae1f3b5082d7ab3a97c053df68744e7c7e24d0b59997bab4bccff8363b275de3510b0ebe4275d8d2f153395668e3d608e358fc2294263c03f8dc4f8bf194e4fde4600a2dec2f483a914e2fde0cbc344a2b9fc18dd198966045a6d4d4eb8571e8bb69e6724e37fcbaa6e4c64050b47256b9bb17f5c0aa5101e015ecdcb62fec46fc02", 0x93}], 0x1}, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$kcm(0x2, 0x922000000001, 0x106) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xeb5, 0x4}, 0x8000, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$kcm(0x23, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x541b, &(0x7f0000000000)={r0}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, 0x0, &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x1, 0x7, @loopback, 0x2}, 0x80, 0x0}, 0xe07e872424dbef0e) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xb, &(0x7f0000000640)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r2}, 0x10) bpf$MAP_CREATE(0x700000000000000, &(0x7f0000001a00)=@base={0x1d, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x50) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000100020400bf050005001201", 0x2e}], 0x1}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x400000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x118fa, 0x8, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xa, 0x0, 0x0, &(0x7f0000000980)='GPL\x00', 0x200, 0x0, 0x0, 0x41000, 0x4d, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r6, &(0x7f0000004d80)={0x0, 0x0, &(0x7f0000004d40)={&(0x7f0000004d00)={0x28, 0x3ea, 0x2, 0x70bd26, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}}, 0x28}, 0x1, 0x0, 0x0, 0x40004}, 0x20000800) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xe00, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000040000000000000000000000850000007b00000018010000756c6c2500000000002020207b1af8ff00000000bfa10000000000000701000002ffffffb702000008000000b703000007030000850000001700000095"], &(0x7f0000000040)='GPL\x00', 0xc, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r7, 0x0, 0xe, 0x27, &(0x7f00000000c0)="c1188e19b95d02ff4284860186dd", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x27) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0}}, 0x10) 6.495219544s ago: executing program 7 (id=4150): socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000045"], 0x48) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000180), 0x0, 0x26642) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket(0x80000000000000a, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r4, &(0x7f0000000480), &(0x7f0000000340)=@udp6=r0}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000380)={r5, r2, 0x25, 0x2, @val=@tcx}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000000c0)=ANY=[], 0x0) 5.425047301s ago: executing program 1 (id=4152): timer_create(0x7, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000001000010029bd7000ffdbdf", @ANYRES32=r2, @ANYBLOB="100804002010000024001280110001006272696467655f736c618c65000000000c000580050019"], 0x44}, 0x1, 0x0, 0x0, 0x404c1}, 0x40040d4) timer_create(0x7, 0x0, &(0x7f0000000080)) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x24044040) 5.082633248s ago: executing program 7 (id=4153): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x6) keyctl$setperm(0x5, 0x0, 0x30925) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ptrace$ARCH_SET_CPUID(0x1e, r0, 0x1, 0x1012) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x6}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000940)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x5}, 0x50) pipe(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r4}, 0x61) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x4, &(0x7f00000002c0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x6}}, {@i_version}]}, 0x6, 0x5fd, &(0x7f0000000c00)="$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") 5.06930045s ago: executing program 1 (id=4155): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000340)=[@sack_perm, @window={0x3, 0x6, 0x7}, @mss={0x2, 0x7}, @window={0x3, 0x0, 0x4}, @window={0x3, 0x8, 0x6}, @timestamp, @window={0x3, 0xfffe}, @sack_perm], 0x200000000000005e) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='veno\x00', 0x5) sendto$inet(r0, &(0x7f0000000800)="01", 0x1, 0x4004014, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r0, &(0x7f00000004c0)='<', 0xfdef, 0x805, 0x0, 0x0) 4.194298081s ago: executing program 1 (id=4159): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) r4 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r4, 0x0, 0x0) listen(r4, 0x5efe) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @local}, 0x10) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)='\\\\@[*#)\x00', 0xfffffffffffffffe) 4.056005352s ago: executing program 2 (id=4161): setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000140)=@req3={0x7813, 0x3, 0x0, 0x81, 0x1ff, 0x1, 0x1}, 0x1c) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x10b, 0x4, 0x0, &(0x7f0000048000), 0x0) 3.508683626s ago: executing program 6 (id=4165): timer_create(0x7, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000001000010029bd7000ffdbdf", @ANYRES32=r2, @ANYBLOB="100804002010000024001280110001006272696467655f736c618c65000000000c000580050019"], 0x44}, 0x1, 0x0, 0x0, 0x404c1}, 0x40040d4) timer_create(0x7, 0x0, &(0x7f0000000080)) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x24044040) 3.474111179s ago: executing program 6 (id=4167): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE(0x0, 0x0, 0x48) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, &(0x7f0000000540)='system_u:object_r:restorecond_var_run_t:s0\x00', 0x2b, 0x0) unshare(0x62040200) 3.284802364s ago: executing program 8 (id=4168): r0 = socket$key(0xf, 0x3, 0x2) sched_setscheduler(0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) socket$packet(0x11, 0x3, 0x300) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000880)=ANY=[@ANYBLOB="02030003200000002cbd7000fcdbdf2502000900080000000a0000000000000005000600000000000a0000000000000000000000000000000000000000000001020000000000000002000100000000000400030c0000000005000500000000000a0000000000000000000000000000000000000000000001070000000000000010000800b803000067328c217950d4ed0ce9fd283e7a39cddf91db11b8d33fe41b6225fa8075fb71275ea059e57dbe5ddb41c0ece4532edb885207438d8c8ccd0b4736f5a7f78c02c158f5c563524df4f34de949509868d522a81cd34a99546e74c7f8725419f8e1af17a281d0f7914e267c1fc4f70fee6200286b016552260043fbf846f44984a359d19aa206df754771f7d0ffe9b8e9f5be48c48849d497"], 0x100}, 0x1, 0x7}, 0x14) 3.169567444s ago: executing program 2 (id=4169): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000340)=[@sack_perm, @window={0x3, 0x6, 0x7}, @mss={0x2, 0x7}, @window={0x3, 0x0, 0x4}, @window={0x3, 0x8, 0x6}, @timestamp, @window={0x3, 0xfffe}, @sack_perm], 0x200000000000005e) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='veno\x00', 0x5) sendto$inet(r0, &(0x7f0000000800)="01", 0x1, 0x4004014, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r0, &(0x7f00000004c0)='<', 0xfdef, 0x805, 0x0, 0x0) 3.137637956s ago: executing program 8 (id=4170): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000d00)='sched_switch\x00', r4}, 0x10) syz_mount_image$vfat(&(0x7f0000000780), &(0x7f0000000000)='./file0\x00', 0x90, &(0x7f0000000140)=ANY=[@ANYBLOB='showexec,shortname=winnt,shortname=lower,utf8=1,iocharset=cp865,shortname=win95,uni_xlate=1,shortname=win95,check=strict,shortname=winnt,utf8=0,iocharset=iso8859-5,codepage=874,shortname=mixed,shortname=win95,shortname=mixed,nonumtail=0,shortname=mixed,shortname=mixed,uni_xlate=1,rodir,nnonuni_xlate=1,shortname=win95,shortname=win95,utf8=0,nnonumtail=1,shortname=win95,shortname=win95,nnonumtail=1,uni_xlate=1,nfs=nostale_ro,\x00'/444], 0x6, 0x2d7, &(0x7f0000000340)="$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") socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 2.372963498s ago: executing program 6 (id=4171): r0 = syz_open_dev$usbfs(&(0x7f0000000480), 0x76, 0x160341) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0xfffffffffffffdee, &(0x7f0000000000)=0x8000000000005) sched_setscheduler(0x0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) 2.23157989s ago: executing program 2 (id=4172): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000340)="25b096f681cd731c3f3a9badc4e3cf5edeae1f3b5082d7ab3a97c053df68744e7c7e24d0b59997bab4bccff8363b275de3510b0ebe4275d8d2f153395668e3d608e358fc2294263c03f8dc4f8bf194e4fde4600a2dec2f483a914e2fde0cbc344a2b9fc18dd198966045a6d4d4eb8571e8bb69e6724e37fcbaa6e4c64050b47256b9bb17f5c0aa5101e015ecdcb62fec46fc02", 0x93}], 0x1}, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$kcm(0x2, 0x922000000001, 0x106) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xeb5, 0x4}, 0x8000, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$kcm(0x23, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x541b, &(0x7f0000000000)={r0}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, 0x0, &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x1, 0x7, @loopback, 0x2}, 0x80, 0x0}, 0xe07e872424dbef0e) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r2}, 0x10) bpf$MAP_CREATE(0x700000000000000, &(0x7f0000001a00)=@base={0x1d, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x50) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000100020400bf050005001201", 0x2e}], 0x1}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x400000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x118fa, 0x8, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xa, 0x0, 0x0, &(0x7f0000000980)='GPL\x00', 0x200, 0x0, 0x0, 0x41000, 0x4d, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r6, &(0x7f0000004d80)={0x0, 0x0, &(0x7f0000004d40)={&(0x7f0000004d00)={0x28, 0x3ea, 0x2, 0x70bd26, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}}, 0x28}, 0x1, 0x0, 0x0, 0x40004}, 0x20000800) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xe00, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000040000000000000000000000850000007b00000018010000756c6c2500000000002020207b1af8ff00000000bfa10000000000000701000002ffffffb702000008000000b703000007030000850000001700000095"], &(0x7f0000000040)='GPL\x00', 0xc, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r7, 0x0, 0xe, 0x27, &(0x7f00000000c0)="c1188e19b95d02ff4284860186dd", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x27) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0}}, 0x10) 1.891114967s ago: executing program 2 (id=4173): syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x200000, &(0x7f0000000200), 0x3, 0x570, &(0x7f0000000680)="$eJzs3V1rHFUYAOB3Nkm/tSmUoiIS6IWV2k2T+FFBsF6KFgt6X5dkGmo23ZLdlCYW2l7YG2+kCCIWxB/gvZfFP+CvKGihSAl64U1kNrPtNtnN52q2zvPAtOfMzObM2TPv2Xd2dtkACmsk+6cU8WLcjK+TiMNt2wYj3ziyst/So+uT2ZLE8vInfySR5Ota+yf5/wfzygsR8cuXESdLa9utLyzOVKrVdC6vjzZmr4zWFxZPXZqtTKfT6eXxiYkzb06Mv/P2Wz3r62vn//ru43sfnPnq+NK3Pz04cieJs3Eo39bejx242V4ZiZH8ORmKs6t2HOtBY/0k2e0DYFsG8jgfimwOOBwDedQD/383ImIZKKhE/ENBtfKA1rV9j66DnxkP31+5AFrb/8GV90ZiX/Pa6MBS8tSVUXa9O9yD9rM2fv797p1siQ3eh7jRg/YAWm7eiojTg4Nr578kn/+273TzzeP1rW6jaK8/sJvuZfnP653yn9Lj/Cc65D8HO8Tudmwc/6UHPWimqyz/e7dj/vt46hoeyGvPNXO+oeTipWp6OiKej4gTMbQ3q693P+fM0v3lbtva879sydpv5YL5cTwY3Pv0Y6YqjcpO+tzu4a2Il57kv0msmf/3NXPd1eOfPR/nN9nGsfTuK922bdz/dr3PgJd/jHi14/g/uaOVrH9/crR5Poy2zoq1/rx97Ndu7W+t/72Xjf+B9fs/nLTfr61vvY0f9v2ddtu23fN/T/Jps7wnX3et0mjMjUXsST5au378yWNb9db+Wf9PHF9//ut0/u+PiM822f/bR2933bUfxn9qS+O/9cL9D7/4vlv7mxv/N5qlE/mazcx/mz3AnTx3AAAAAAAA0G9KEXEoklL5cblUKpdXPt9xNA6UqrV64+TF2vzlqWh+V3Y4hkqtO92H2z4PMZZ/HrZVH19Vn4iIIxHxzcD+Zr08WatO7XbnAQAAAAAAAAAAAAAAAAAAoE8c7PL9/8xvA7t9dMC/zk9+Q3FtGP+9+KUnoC95/Yfi6hL/pgUoAIEOxSX+objEPxSX+IfiEv9QXOIfAAAAAAAAAAAAAAAAAAAAAAAAAAAAeur8uXPZsrz06PpkVp+6ujA/U7t6aiqtz5Rn5yfLk7W5K+XpWm26mpYna7Mb/b1qrXZlbDzmr4020npjtL6weGG2Nn+5ceHSbGU6vZAO/Se9AgAAAAAAAAAAAAAAAAAAgGdLfWFxplKtpnMKXQvvxW4fxucv7+ThSedRTto6uGJbTQz2yzAp9LSwyxMTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALT5JwAA//821zOC") setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xeb38e000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ppoll(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000000)={0x13d, 0x9, 0x0, 0xffff, 0xc, "737b27e90e2947801cf3a246ada40a9fd86000"}) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000100)=0xd) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5bbf91a1e7f99074, &(0x7f0000000000)) fallocate(0xffffffffffffffff, 0x0, 0x4000, 0x1001f0) 1.204996153s ago: executing program 8 (id=4174): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ppoll(&(0x7f0000000080)=[{r1, 0x9381}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) capset(0x0, &(0x7f0000000040)={0x200000, 0x200000}) socket$netlink(0x10, 0x3, 0x10) syz_io_uring_submit(0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) read$msr(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.197425063s ago: executing program 6 (id=4175): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 940.397984ms ago: executing program 2 (id=4176): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) syz_io_uring_setup(0x116, &(0x7f0000000300)={0x0, 0x0, 0x1, 0x0, 0x3a6}, &(0x7f0000000000)=0x0, &(0x7f0000000200)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x4, &(0x7f0000000080)=0xfffffc00, 0x0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000001afc180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000090000850000000400000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r3, r2, 0x0, 0x4, &(0x7f0000000040)='GPL\x00'}, 0x30) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) r5 = syz_io_uring_setup(0x57a0, 0x0, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x84, @broadcast, 0x4e20, 0x3, 'wrr\x00', 0x1, 0x2, 0x6e}, 0x2c) prlimit64(r3, 0xe, &(0x7f00000004c0)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000400)=0x6) r6 = getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x15d74000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r8, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r6, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) 755.496089ms ago: executing program 6 (id=4177): timer_create(0x7, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000001000010029bd7000ffdbdf", @ANYRES32=r2, @ANYBLOB="100804002010000024001280110001006272696467655f736c618c65000000000c000580050019"], 0x44}, 0x1, 0x0, 0x0, 0x404c1}, 0x40040d4) timer_create(0x7, 0x0, &(0x7f0000000080)) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x24044040) 663.541277ms ago: executing program 6 (id=4178): r0 = syz_open_dev$usbfs(&(0x7f0000000480), 0x76, 0x160341) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0xfffffffffffffdee, &(0x7f0000000000)=0x8000000000005) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000200)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000040)) 637.774729ms ago: executing program 7 (id=4179): setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000140)=@req3={0x7813, 0x3, 0x0, 0x81, 0x1ff, 0x1, 0x1}, 0x1c) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x10b, 0x4, 0x0, &(0x7f0000048000), 0x0) 301.199316ms ago: executing program 8 (id=4180): r0 = socket$key(0xf, 0x3, 0x2) sched_setscheduler(0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) socket$packet(0x11, 0x3, 0x300) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x100}, 0x1, 0x7}, 0x14) 268.908589ms ago: executing program 8 (id=4181): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) close(r2) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000340)=ANY=[@ANYRES16=r0, @ANYRES32=r0]) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r3) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) 112.691251ms ago: executing program 1 (id=4182): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000100)=0x5) sched_setaffinity(0x0, 0xff43, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000007c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = dup(r1) r3 = open(&(0x7f0000000140)='./file1\x00', 0x10f0c2, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d1) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) 0s ago: executing program 8 (id=4183): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000340)="25b096f681cd731c3f3a9badc4e3cf5edeae1f3b5082d7ab3a97c053df68744e7c7e24d0b59997bab4bccff8363b275de3510b0ebe4275d8d2f153395668e3d608e358fc2294263c03f8dc4f8bf194e4fde4600a2dec2f483a914e2fde0cbc344a2b9fc18dd198966045a6d4d4eb8571e8bb69e6724e37fcbaa6e4c64050b47256b9bb17f5c0aa5101e015ecdcb62fec46fc02", 0x93}], 0x1}, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$kcm(0x2, 0x922000000001, 0x106) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xeb5, 0x4}, 0x8000, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$kcm(0x23, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x541b, &(0x7f0000000000)={r0}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, 0x0, &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x1, 0x7, @loopback, 0x2}, 0x80, 0x0}, 0xe07e872424dbef0e) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r2}, 0x10) bpf$MAP_CREATE(0x700000000000000, &(0x7f0000001a00)=@base={0x1d, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x50) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000100020400bf050005001201", 0x2e}], 0x1}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x400000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x118fa, 0x8, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xa, 0x0, 0x0, &(0x7f0000000980)='GPL\x00', 0x200, 0x0, 0x0, 0x41000, 0x4d, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r6, &(0x7f0000004d80)={0x0, 0x0, &(0x7f0000004d40)={&(0x7f0000004d00)={0x28, 0x3ea, 0x2, 0x70bd26, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}}, 0x28}, 0x1, 0x0, 0x0, 0x40004}, 0x20000800) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xe00, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000040000000000000000000000850000007b00000018010000756c6c2500000000002020207b1af8ff00000000bfa10000000000000701000002ffffffb702000008000000b703000007030000850000001700000095"], &(0x7f0000000040)='GPL\x00', 0xc, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r7, 0x0, 0xe, 0x27, &(0x7f00000000c0)="c1188e19b95d02ff4284860186dd", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x27) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0}}, 0x10) kernel console output (not intermixed with test programs): 9] audit: type=1400 audit(842.741:26584): avc: denied { execmem } for pid=13708 comm="syz.2.3381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 587.778819][ T29] audit: type=1400 audit(842.841:26585): avc: denied { name_bind } for pid=13705 comm="syz.7.3380" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 587.800128][ T29] audit: type=1400 audit(842.841:26586): avc: denied { node_bind } for pid=13705 comm="syz.7.3380" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 587.820511][ T29] audit: type=1400 audit(842.941:26587): avc: denied { create } for pid=13708 comm="syz.2.3381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 587.840556][ T29] audit: type=1400 audit(842.941:26588): avc: denied { write } for pid=13708 comm="syz.2.3381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 587.860575][ T29] audit: type=1400 audit(842.951:26589): avc: denied { read } for pid=13708 comm="syz.2.3381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 587.880424][ T29] audit: type=1400 audit(842.951:26590): avc: denied { create } for pid=13708 comm="syz.2.3381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 587.900991][ T29] audit: type=1400 audit(843.721:26591): avc: denied { execmem } for pid=13715 comm="syz.2.3383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 587.928203][T13717] lo: entered promiscuous mode [ 587.933031][T13717] lo: entered allmulticast mode [ 587.938694][T13717] tunl0: entered promiscuous mode [ 587.943821][T13717] tunl0: entered allmulticast mode [ 587.949790][T13717] gre0: entered promiscuous mode [ 587.954852][T13717] gre0: entered allmulticast mode [ 587.961414][T13717] gretap0: entered promiscuous mode [ 587.966628][T13717] gretap0: entered allmulticast mode [ 587.972755][T13717] erspan0: entered promiscuous mode [ 587.978016][T13717] erspan0: entered allmulticast mode [ 587.984197][T13717] ip_vti0: entered promiscuous mode [ 587.989418][T13717] ip_vti0: entered allmulticast mode [ 587.995432][T13717] ip6_vti0: entered promiscuous mode [ 588.000827][T13717] ip6_vti0: entered allmulticast mode [ 588.006947][T13717] sit0: entered promiscuous mode [ 588.011938][T13717] sit0: entered allmulticast mode [ 588.019250][T13717] ip6tnl0: entered promiscuous mode [ 588.024723][T13717] ip6tnl0: entered allmulticast mode [ 588.030951][T13717] ip6gre0: entered promiscuous mode [ 588.036232][T13717] ip6gre0: entered allmulticast mode [ 588.042576][T13717] syz_tun: entered promiscuous mode [ 588.047789][T13717] syz_tun: entered allmulticast mode [ 588.053909][T13717] ip6gretap0: entered promiscuous mode [ 588.059484][T13717] ip6gretap0: entered allmulticast mode [ 588.065944][T13717] bridge0: entered promiscuous mode [ 588.071215][T13717] bridge0: entered allmulticast mode [ 588.077277][T13717] vcan0: entered promiscuous mode [ 588.082380][T13717] vcan0: entered allmulticast mode [ 588.087997][T13717] bond0: entered promiscuous mode [ 588.093143][T13717] bond_slave_0: entered promiscuous mode [ 588.098949][T13717] bond_slave_1: entered promiscuous mode [ 588.105049][T13717] macvlan1: entered promiscuous mode [ 588.110472][T13717] bond0: entered allmulticast mode [ 588.115603][T13717] bond_slave_0: entered allmulticast mode [ 588.121355][T13717] bond_slave_1: entered allmulticast mode [ 588.127104][T13717] macvlan1: entered allmulticast mode [ 588.133034][T13717] 8021q: adding VLAN 0 to HW filter on device bond0 [ 588.141324][T13717] team0: entered promiscuous mode [ 588.146413][T13717] team_slave_0: entered promiscuous mode [ 588.152243][T13717] team_slave_1: entered promiscuous mode [ 588.158586][T13717] team0: entered allmulticast mode [ 588.163910][T13717] team_slave_0: entered allmulticast mode [ 588.169813][T13717] team_slave_1: entered allmulticast mode [ 588.175897][T13717] 8021q: adding VLAN 0 to HW filter on device team0 [ 588.184209][T13717] dummy0: entered promiscuous mode [ 588.189347][T13717] dummy0: entered allmulticast mode [ 588.197334][T13717] nlmon0: entered promiscuous mode [ 588.202512][T13717] nlmon0: entered allmulticast mode [ 588.209080][T13717] caif0: entered promiscuous mode [ 588.214281][T13717] caif0: entered allmulticast mode [ 588.219673][T13717] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 588.241733][ T29] audit: type=1400 audit(843.731:26592): avc: denied { read } for pid=13714 comm="syz.5.3382" dev="nsfs" ino=4026533371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 588.262578][ T29] audit: type=1400 audit(843.731:26593): avc: denied { open } for pid=13714 comm="syz.5.3382" path="net:[4026533371]" dev="nsfs" ino=4026533371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 588.291250][T13723] SELinux: failed to load policy [ 589.894837][T13742] hub 8-0:1.0: USB hub found [ 590.019670][T13742] hub 8-0:1.0: 8 ports detected [ 591.958028][T13795] netlink: 56 bytes leftover after parsing attributes in process `syz.1.3407'. [ 592.948310][ T29] kauditd_printk_skb: 163 callbacks suppressed [ 592.948329][ T29] audit: type=1400 audit(848.921:26757): avc: denied { prog_load } for pid=13802 comm="syz.1.3409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 593.000484][ T29] audit: type=1400 audit(848.921:26758): avc: denied { bpf } for pid=13802 comm="syz.1.3409" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 593.048353][ T29] audit: type=1400 audit(849.021:26759): avc: denied { map_create } for pid=13805 comm="syz.7.3410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 593.067092][ T29] audit: type=1400 audit(849.021:26760): avc: denied { bpf } for pid=13805 comm="syz.7.3410" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 593.136282][ T29] audit: type=1400 audit(849.061:26761): avc: denied { map_read map_write } for pid=13805 comm="syz.7.3410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 593.155788][ T29] audit: type=1400 audit(849.071:26762): avc: denied { prog_load } for pid=13805 comm="syz.7.3410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 593.174444][ T29] audit: type=1400 audit(849.071:26763): avc: denied { bpf } for pid=13805 comm="syz.7.3410" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 593.194704][ T29] audit: type=1400 audit(849.081:26764): avc: denied { perfmon } for pid=13805 comm="syz.7.3410" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 593.215257][ T29] audit: type=1400 audit(849.081:26765): avc: denied { perfmon } for pid=13805 comm="syz.7.3410" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 593.235734][ T29] audit: type=1400 audit(849.081:26766): avc: denied { bpf } for pid=13805 comm="syz.7.3410" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 594.415411][T13836] lo: entered promiscuous mode [ 594.420453][T13836] lo: entered allmulticast mode [ 594.426345][T13836] tunl0: entered promiscuous mode [ 594.431419][T13836] tunl0: entered allmulticast mode [ 594.437240][T13836] gre0: entered promiscuous mode [ 594.442262][T13836] gre0: entered allmulticast mode [ 594.448516][T13836] gretap0: entered promiscuous mode [ 594.453739][T13836] gretap0: entered allmulticast mode [ 594.459859][T13836] erspan0: entered promiscuous mode [ 594.465093][T13836] erspan0: entered allmulticast mode [ 594.471462][T13836] ip_vti0: entered promiscuous mode [ 594.476759][T13836] ip_vti0: entered allmulticast mode [ 594.482982][T13836] ip6_vti0: entered promiscuous mode [ 594.488470][T13836] ip6_vti0: entered allmulticast mode [ 594.494817][T13836] sit0: entered promiscuous mode [ 594.499771][T13836] sit0: entered allmulticast mode [ 594.506738][T13836] ip6tnl0: entered promiscuous mode [ 594.512087][T13836] ip6tnl0: entered allmulticast mode [ 594.520193][T13836] ip6gre0: entered promiscuous mode [ 594.525544][T13836] ip6gre0: entered allmulticast mode [ 594.532001][T13836] syz_tun: entered promiscuous mode [ 594.537225][T13836] syz_tun: entered allmulticast mode [ 594.543451][T13836] ip6gretap0: entered promiscuous mode [ 594.548920][T13836] ip6gretap0: entered allmulticast mode [ 594.555602][T13836] bridge0: entered promiscuous mode [ 594.560895][T13836] bridge0: entered allmulticast mode [ 594.567087][T13836] vcan0: entered promiscuous mode [ 594.572141][T13836] vcan0: entered allmulticast mode [ 594.577741][T13836] bond0: entered promiscuous mode [ 594.582823][T13836] bond_slave_0: entered promiscuous mode [ 594.588555][T13836] bond_slave_1: entered promiscuous mode [ 594.594376][T13836] bond0: entered allmulticast mode [ 594.599538][T13836] bond_slave_0: entered allmulticast mode [ 594.605276][T13836] bond_slave_1: entered allmulticast mode [ 594.611753][T13836] 8021q: adding VLAN 0 to HW filter on device bond0 [ 594.620427][T13836] team0: entered promiscuous mode [ 594.625525][T13836] team_slave_0: entered promiscuous mode [ 594.631238][T13836] team_slave_1: entered promiscuous mode [ 594.636901][T13836] team0: entered allmulticast mode [ 594.642129][T13836] team_slave_0: entered allmulticast mode [ 594.647906][T13836] team_slave_1: entered allmulticast mode [ 594.653874][T13836] 8021q: adding VLAN 0 to HW filter on device team0 [ 594.662020][T13836] dummy0: entered promiscuous mode [ 594.667186][T13836] dummy0: entered allmulticast mode [ 594.673376][T13836] nlmon0: entered promiscuous mode [ 594.678494][T13836] nlmon0: entered allmulticast mode [ 594.685881][T13836] caif0: entered promiscuous mode [ 594.691439][T13836] caif0: entered allmulticast mode [ 594.696562][T13836] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 594.712235][T13838] lo: left promiscuous mode [ 594.716806][T13838] lo: left allmulticast mode [ 594.722441][T13838] tunl0: left promiscuous mode [ 594.727226][T13838] tunl0: left allmulticast mode [ 594.732727][T13838] gre0: left promiscuous mode [ 594.737418][T13838] gre0: left allmulticast mode [ 594.744582][T13838] gretap0: left promiscuous mode [ 594.749592][T13838] gretap0: left allmulticast mode [ 594.755336][T13838] erspan0: left promiscuous mode [ 594.760346][T13838] erspan0: left allmulticast mode [ 594.766191][T13838] ip_vti0: left promiscuous mode [ 594.771166][T13838] ip_vti0: left allmulticast mode [ 594.776707][T13838] ip6_vti0: left promiscuous mode [ 594.781937][T13838] ip6_vti0: left allmulticast mode [ 594.787720][T13838] sit0: left promiscuous mode [ 594.792445][T13838] sit0: left allmulticast mode [ 594.798532][T13838] ip6tnl0: left promiscuous mode [ 594.803539][T13838] ip6tnl0: left allmulticast mode [ 594.809197][T13838] ip6gre0: left promiscuous mode [ 594.814277][T13838] ip6gre0: left allmulticast mode [ 594.820509][T13838] bridge0: port 3(syz_tun) entered disabled state [ 594.827679][T13838] ip6gretap0: left promiscuous mode [ 594.833183][T13838] ip6gretap0: left allmulticast mode [ 594.839071][T13838] bridge0: left promiscuous mode [ 594.844082][T13838] bridge0: left allmulticast mode [ 594.849865][T13838] vcan0: left promiscuous mode [ 594.854682][T13838] vcan0: left allmulticast mode [ 594.859925][T13838] bond0: left promiscuous mode [ 594.864788][T13838] bond_slave_0: left promiscuous mode [ 594.870314][T13838] bond_slave_1: left promiscuous mode [ 594.875825][T13838] macvlan1: left promiscuous mode [ 594.881360][T13838] bond0: left allmulticast mode [ 594.886284][T13838] bond_slave_0: left allmulticast mode [ 594.891808][T13838] bond_slave_1: left allmulticast mode [ 594.897331][T13838] macvlan1: left allmulticast mode [ 594.903453][T13838] team0: left promiscuous mode [ 594.906624][T13844] hub 8-0:1.0: USB hub found [ 594.908231][T13838] team_slave_0: left promiscuous mode [ 594.908299][T13838] team_slave_1: left promiscuous mode [ 594.923860][T13838] team0: left allmulticast mode [ 594.928724][T13838] team_slave_0: left allmulticast mode [ 594.934226][T13838] team_slave_1: left allmulticast mode [ 594.939335][T13844] hub 8-0:1.0: 8 ports detected [ 594.940077][T13838] dummy0: left promiscuous mode [ 594.949483][T13838] dummy0: left allmulticast mode [ 594.956127][T13838] nlmon0: left promiscuous mode [ 594.961344][T13838] nlmon0: left allmulticast mode [ 594.966776][T13838] caif0: left promiscuous mode [ 594.971697][T13838] caif0: left allmulticast mode [ 594.976935][T13838] wg2: left promiscuous mode [ 594.981629][T13838] wg2: left allmulticast mode [ 596.456910][T13880] SELinux: failed to load policy [ 596.776525][T13887] lo: left promiscuous mode [ 596.781100][T13887] lo: left allmulticast mode [ 596.801293][T13887] tunl0: left promiscuous mode [ 596.806108][T13887] tunl0: left allmulticast mode [ 596.821458][T13887] gre0: left promiscuous mode [ 596.826192][T13887] gre0: left allmulticast mode [ 596.848231][T13887] gretap0: left promiscuous mode [ 596.853371][T13887] gretap0: left allmulticast mode [ 596.877104][T13887] erspan0: left promiscuous mode [ 596.882291][T13887] erspan0: left allmulticast mode [ 596.931226][T13887] ip_vti0: left promiscuous mode [ 596.936252][T13887] ip_vti0: left allmulticast mode [ 596.953514][T13887] ip6_vti0: left promiscuous mode [ 596.958644][T13887] ip6_vti0: left allmulticast mode [ 597.021140][T13887] sit0: left promiscuous mode [ 597.025905][T13887] sit0: left allmulticast mode [ 597.062088][T13887] ip6tnl0: left promiscuous mode [ 597.067075][T13887] ip6tnl0: left allmulticast mode [ 597.091206][T13887] ip6gre0: left promiscuous mode [ 597.096187][T13887] ip6gre0: left allmulticast mode [ 597.121065][T13887] syz_tun: left promiscuous mode [ 597.126133][T13887] syz_tun: left allmulticast mode [ 597.141005][T13887] ip6gretap0: left promiscuous mode [ 597.146237][T13887] ip6gretap0: left allmulticast mode [ 597.153663][T13890] netlink: 8 bytes leftover after parsing attributes in process `syz.6.3439'. [ 597.170970][T13887] bridge0: left promiscuous mode [ 597.175932][T13887] bridge0: left allmulticast mode [ 597.181675][T13887] vcan0: left promiscuous mode [ 597.186527][T13887] vcan0: left allmulticast mode [ 597.200820][T13887] bond0: left promiscuous mode [ 597.205671][T13887] bond_slave_0: left promiscuous mode [ 597.211168][T13887] bond_slave_1: left promiscuous mode [ 597.216605][T13887] macvlan1: left promiscuous mode [ 597.221721][T13887] bond0: left allmulticast mode [ 597.226592][T13887] bond_slave_0: left allmulticast mode [ 597.232160][T13887] bond_slave_1: left allmulticast mode [ 597.237637][T13887] macvlan1: left allmulticast mode [ 597.251245][T13887] team0: left promiscuous mode [ 597.256201][T13887] team_slave_0: left promiscuous mode [ 597.261857][T13887] team_slave_1: left promiscuous mode [ 597.267413][T13887] team0: left allmulticast mode [ 597.272361][T13887] team_slave_0: left allmulticast mode [ 597.277833][T13887] team_slave_1: left allmulticast mode [ 597.290816][T13887] dummy0: left promiscuous mode [ 597.295731][T13887] dummy0: left allmulticast mode [ 597.312375][T13887] nlmon0: left promiscuous mode [ 597.317279][T13887] nlmon0: left allmulticast mode [ 597.325764][T13887] caif0: left promiscuous mode [ 597.330623][T13887] caif0: left allmulticast mode [ 597.351093][T13887] wg2: left promiscuous mode [ 597.355716][T13887] wg2: left allmulticast mode [ 597.378488][T13890] bridge0: port 3(syz_tun) entered blocking state [ 597.384964][T13890] bridge0: port 3(syz_tun) entered forwarding state [ 597.412544][T13890] 8021q: adding VLAN 0 to HW filter on device bond0 [ 597.440744][T13890] 8021q: adding VLAN 0 to HW filter on device team0 [ 597.471373][T13890] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 598.097166][ T29] kauditd_printk_skb: 164 callbacks suppressed [ 598.097179][ T29] audit: type=1400 audit(854.071:26931): avc: denied { map_create } for pid=13899 comm="syz.6.3442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 598.460475][ T29] audit: type=1400 audit(854.101:26932): avc: denied { create } for pid=13898 comm="syz.7.3441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 598.480820][ T29] audit: type=1400 audit(854.101:26933): avc: denied { write } for pid=13898 comm="syz.7.3441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 598.500968][ T29] audit: type=1400 audit(854.181:26934): avc: denied { prog_load } for pid=13905 comm="syz.2.3443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 598.519589][ T29] audit: type=1400 audit(854.181:26935): avc: denied { bpf } for pid=13905 comm="syz.2.3443" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 598.539716][ T29] audit: type=1400 audit(854.181:26936): avc: denied { execmem } for pid=13905 comm="syz.2.3443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 598.558619][ T29] audit: type=1400 audit(854.321:26937): avc: denied { prog_load } for pid=13899 comm="syz.6.3442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 598.577265][ T29] audit: type=1400 audit(854.321:26938): avc: denied { bpf } for pid=13899 comm="syz.6.3442" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 598.597402][ T29] audit: type=1400 audit(854.321:26939): avc: denied { perfmon } for pid=13899 comm="syz.6.3442" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 598.618056][ T29] audit: type=1400 audit(854.331:26940): avc: denied { read } for pid=13899 comm="syz.6.3442" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 598.830209][T13918] SELinux: failed to load policy [ 599.204965][T13935] lo: entered promiscuous mode [ 599.209769][T13935] lo: entered allmulticast mode [ 599.215211][T13935] tunl0: entered promiscuous mode [ 599.220307][T13935] tunl0: entered allmulticast mode [ 599.225914][T13935] gre0: entered promiscuous mode [ 599.230887][T13935] gre0: entered allmulticast mode [ 599.236340][T13935] gretap0: entered promiscuous mode [ 599.241619][T13935] gretap0: entered allmulticast mode [ 599.247456][T13935] erspan0: entered promiscuous mode [ 599.252690][T13935] erspan0: entered allmulticast mode [ 599.258428][T13935] ip_vti0: entered promiscuous mode [ 599.263673][T13935] ip_vti0: entered allmulticast mode [ 599.269488][T13935] ip6_vti0: entered promiscuous mode [ 599.274820][T13935] ip6_vti0: entered allmulticast mode [ 599.280604][T13935] sit0: entered promiscuous mode [ 599.285710][T13935] sit0: entered allmulticast mode [ 599.291404][T13935] ip6tnl0: entered promiscuous mode [ 599.296705][T13935] ip6tnl0: entered allmulticast mode [ 599.302561][T13935] ip6gre0: entered promiscuous mode [ 599.307809][T13935] ip6gre0: entered allmulticast mode [ 599.315187][T13935] ip6gretap0: entered promiscuous mode [ 599.320700][T13935] ip6gretap0: entered allmulticast mode [ 599.326760][T13935] bridge0: entered promiscuous mode [ 599.332012][T13935] bridge0: entered allmulticast mode [ 599.337884][T13935] vcan0: entered promiscuous mode [ 599.342970][T13935] vcan0: entered allmulticast mode [ 599.348407][T13935] bond0: entered promiscuous mode [ 599.353503][T13935] bond_slave_0: entered promiscuous mode [ 599.359227][T13935] bond_slave_1: entered promiscuous mode [ 599.365003][T13935] macvlan1: entered promiscuous mode [ 599.370393][T13935] bond0: entered allmulticast mode [ 599.375518][T13935] bond_slave_0: entered allmulticast mode [ 599.381306][T13935] bond_slave_1: entered allmulticast mode [ 599.387148][T13935] macvlan1: entered allmulticast mode [ 599.393893][T13935] team0: entered promiscuous mode [ 599.398948][T13935] team_slave_0: entered promiscuous mode [ 599.404694][T13935] team_slave_1: entered promiscuous mode [ 599.410415][T13935] team0: entered allmulticast mode [ 599.415536][T13935] team_slave_0: entered allmulticast mode [ 599.421834][T13935] team_slave_1: entered allmulticast mode [ 599.428841][T13935] dummy0: entered promiscuous mode [ 599.434006][T13935] dummy0: entered allmulticast mode [ 599.440781][T13935] nlmon0: entered promiscuous mode [ 599.445912][T13935] nlmon0: entered allmulticast mode [ 599.451893][T13935] caif0: entered promiscuous mode [ 599.457007][T13935] caif0: entered allmulticast mode [ 599.462162][T13935] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 599.526652][T13944] hub 8-0:1.0: USB hub found [ 599.538322][T13934] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 599.575717][T13934] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 599.590055][T13944] hub 8-0:1.0: 8 ports detected [ 600.747516][T13960] A link change request failed with some changes committed already. Interface wg2 may have been left with an inconsistent configuration, please check. [ 603.255634][ T29] kauditd_printk_skb: 167 callbacks suppressed [ 603.255653][ T29] audit: type=1400 audit(858.851:27108): avc: denied { prog_load } for pid=13973 comm="syz.1.3465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 603.280898][ T29] audit: type=1400 audit(858.851:27109): avc: denied { bpf } for pid=13973 comm="syz.1.3465" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 603.301025][ T29] audit: type=1400 audit(858.851:27110): avc: denied { perfmon } for pid=13973 comm="syz.1.3465" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 603.535053][ T29] audit: type=1400 audit(859.351:27111): avc: denied { create } for pid=13978 comm="syz.6.3466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 603.554921][ T29] audit: type=1400 audit(859.351:27112): avc: denied { execmem } for pid=13978 comm="syz.6.3466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 603.640282][ T29] audit: type=1400 audit(859.611:27113): avc: denied { prog_load } for pid=13980 comm="syz.1.3467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 603.658985][ T29] audit: type=1400 audit(859.611:27114): avc: denied { bpf } for pid=13980 comm="syz.1.3467" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 603.716598][ T29] audit: type=1400 audit(859.671:27115): avc: denied { prog_load } for pid=13980 comm="syz.1.3467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 603.735404][ T29] audit: type=1400 audit(859.671:27116): avc: denied { bpf } for pid=13980 comm="syz.1.3467" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 603.755520][ T29] audit: type=1400 audit(859.671:27117): avc: denied { perfmon } for pid=13980 comm="syz.1.3467" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 604.330571][T13989] wg2: left promiscuous mode [ 604.335227][T13989] wg2: left allmulticast mode [ 604.343887][T13989] wg2: entered promiscuous mode [ 604.348779][T13989] wg2: entered allmulticast mode [ 607.667333][T14038] netlink: 40 bytes leftover after parsing attributes in process `syz.1.3485'. [ 607.778308][T14047] wg2: entered promiscuous mode [ 607.783272][T14047] wg2: entered allmulticast mode [ 608.623763][ T29] kauditd_printk_skb: 111 callbacks suppressed [ 608.623783][ T29] audit: type=1400 audit(864.181:27229): avc: denied { prog_load } for pid=14050 comm="syz.5.3491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 608.648810][ T29] audit: type=1400 audit(864.191:27230): avc: denied { bpf } for pid=14050 comm="syz.5.3491" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 608.668979][ T29] audit: type=1400 audit(864.191:27231): avc: denied { perfmon } for pid=14050 comm="syz.5.3491" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 608.689595][ T29] audit: type=1400 audit(864.191:27232): avc: denied { bpf } for pid=14050 comm="syz.5.3491" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 608.709802][ T29] audit: type=1400 audit(864.191:27233): avc: denied { prog_load } for pid=14050 comm="syz.5.3491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 609.859029][ T29] audit: type=1400 audit(864.911:27234): avc: denied { prog_load } for pid=14054 comm="syz.5.3492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 609.877863][ T29] audit: type=1400 audit(864.911:27235): avc: denied { bpf } for pid=14054 comm="syz.5.3492" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 609.897974][ T29] audit: type=1400 audit(864.921:27236): avc: denied { execmem } for pid=14054 comm="syz.5.3492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 609.916854][ T29] audit: type=1400 audit(865.511:27237): avc: denied { name_bind } for pid=14054 comm="syz.5.3492" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 609.938095][ T29] audit: type=1400 audit(865.511:27238): avc: denied { node_bind } for pid=14054 comm="syz.5.3492" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 610.431901][T14084] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3500'. [ 610.711435][T14103] wg2: left promiscuous mode [ 610.716075][T14103] wg2: left allmulticast mode [ 610.724394][T14103] wg2: entered promiscuous mode [ 610.729288][T14103] wg2: entered allmulticast mode [ 611.352114][T14100] hub 8-0:1.0: USB hub found [ 611.358941][T14100] hub 8-0:1.0: 8 ports detected [ 611.661595][T14114] netlink: 32 bytes leftover after parsing attributes in process `syz.5.3512'. [ 612.791208][T14117] lo: entered promiscuous mode [ 612.796063][T14117] lo: entered allmulticast mode [ 612.801866][T14117] tunl0: entered promiscuous mode [ 612.807133][T14117] tunl0: entered allmulticast mode [ 612.812972][T14117] gre0: entered promiscuous mode [ 612.817910][T14117] gre0: entered allmulticast mode [ 612.824307][T14117] gretap0: entered promiscuous mode [ 612.829664][T14117] gretap0: entered allmulticast mode [ 612.835949][T14117] erspan0: entered promiscuous mode [ 612.841172][T14117] erspan0: entered allmulticast mode [ 612.847249][T14117] ip_vti0: entered promiscuous mode [ 612.852495][T14117] ip_vti0: entered allmulticast mode [ 612.858354][T14117] ip6_vti0: entered promiscuous mode [ 612.863710][T14117] ip6_vti0: entered allmulticast mode [ 612.870041][T14117] sit0: entered promiscuous mode [ 612.875379][T14117] sit0: entered allmulticast mode [ 612.882418][T14117] ip6tnl0: entered promiscuous mode [ 612.887644][T14117] ip6tnl0: entered allmulticast mode [ 612.991248][T14117] ip6gre0: entered promiscuous mode [ 612.996496][T14117] ip6gre0: entered allmulticast mode [ 613.002982][T14117] syz_tun: entered promiscuous mode [ 613.008197][T14117] syz_tun: entered allmulticast mode [ 613.014314][T14117] ip6gretap0: entered promiscuous mode [ 613.019782][T14117] ip6gretap0: entered allmulticast mode [ 613.026571][T14117] bridge0: entered promiscuous mode [ 613.031805][T14117] bridge0: entered allmulticast mode [ 613.037816][T14117] vcan0: entered promiscuous mode [ 613.042891][T14117] vcan0: entered allmulticast mode [ 613.048574][T14117] bond0: entered promiscuous mode [ 613.053623][T14117] bond_slave_0: entered promiscuous mode [ 613.059340][T14117] bond_slave_1: entered promiscuous mode [ 613.065158][T14117] bond0: entered allmulticast mode [ 613.070350][T14117] bond_slave_0: entered allmulticast mode [ 613.076087][T14117] bond_slave_1: entered allmulticast mode [ 613.082458][T14117] 8021q: adding VLAN 0 to HW filter on device bond0 [ 613.200485][T14117] team0: entered promiscuous mode [ 613.205544][T14117] team_slave_0: entered promiscuous mode [ 613.211480][T14117] team0: entered allmulticast mode [ 613.216689][T14117] team_slave_0: entered allmulticast mode [ 613.222692][T14117] 8021q: adding VLAN 0 to HW filter on device team0 [ 613.231076][T14117] dummy0: entered promiscuous mode [ 613.236238][T14117] dummy0: entered allmulticast mode [ 613.243961][T14117] nlmon0: entered promiscuous mode [ 613.249082][T14117] nlmon0: entered allmulticast mode [ 613.491575][T14117] caif0: entered promiscuous mode [ 613.497022][T14117] caif0: entered allmulticast mode [ 613.502198][T14117] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 613.548633][T14120] netlink: 56 bytes leftover after parsing attributes in process `syz.7.3513'. [ 613.631273][ T29] kauditd_printk_skb: 132 callbacks suppressed [ 613.631289][ T29] audit: type=1400 audit(869.611:27371): avc: denied { prog_load } for pid=14123 comm="syz.2.3515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 613.661365][ T29] audit: type=1400 audit(869.611:27372): avc: denied { bpf } for pid=14123 comm="syz.2.3515" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 613.681563][ T29] audit: type=1400 audit(869.611:27373): avc: denied { perfmon } for pid=14123 comm="syz.2.3515" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 613.703210][ T29] audit: type=1400 audit(869.611:27374): avc: denied { prog_run } for pid=14123 comm="syz.2.3515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 613.728487][ T29] audit: type=1400 audit(869.661:27375): avc: denied { map_create } for pid=14123 comm="syz.2.3515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 613.747356][ T29] audit: type=1400 audit(869.661:27376): avc: denied { prog_load } for pid=14123 comm="syz.2.3515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 613.766005][ T29] audit: type=1400 audit(869.661:27377): avc: denied { bpf } for pid=14123 comm="syz.2.3515" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 613.786347][ T29] audit: type=1400 audit(869.661:27378): avc: denied { prog_load } for pid=14123 comm="syz.2.3515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 613.805039][ T29] audit: type=1400 audit(869.661:27379): avc: denied { bpf } for pid=14123 comm="syz.2.3515" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 613.825213][ T29] audit: type=1400 audit(869.661:27380): avc: denied { execmem } for pid=14125 comm="syz.7.3516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 614.545920][T14152] netlink: 32 bytes leftover after parsing attributes in process `syz.5.3524'. [ 614.751296][T14156] wg2: entered promiscuous mode [ 614.756208][T14156] wg2: entered allmulticast mode [ 615.880921][T14160] lo: entered promiscuous mode [ 615.885730][T14160] lo: entered allmulticast mode [ 615.891750][T14160] tunl0: entered promiscuous mode [ 615.896866][T14160] tunl0: entered allmulticast mode [ 615.903417][T14160] gre0: entered promiscuous mode [ 615.908358][T14160] gre0: entered allmulticast mode [ 615.914299][T14160] gretap0: entered promiscuous mode [ 615.919523][T14160] gretap0: entered allmulticast mode [ 615.925950][T14160] erspan0: entered promiscuous mode [ 615.931537][T14160] erspan0: entered allmulticast mode [ 615.937737][T14160] ip_vti0: entered promiscuous mode [ 615.943054][T14160] ip_vti0: entered allmulticast mode [ 615.949453][T14160] ip6_vti0: entered promiscuous mode [ 615.954778][T14160] ip6_vti0: entered allmulticast mode [ 615.961494][T14160] sit0: entered promiscuous mode [ 615.966529][T14160] sit0: entered allmulticast mode [ 615.972724][T14160] ip6tnl0: entered promiscuous mode [ 615.977928][T14160] ip6tnl0: entered allmulticast mode [ 616.081243][T14160] ip6gre0: entered promiscuous mode [ 616.086481][T14160] ip6gre0: entered allmulticast mode [ 616.092855][T14160] syz_tun: entered promiscuous mode [ 616.098152][T14160] syz_tun: entered allmulticast mode [ 616.104563][T14160] ip6gretap0: entered promiscuous mode [ 616.110019][T14160] ip6gretap0: entered allmulticast mode [ 616.116861][T14160] bridge0: entered promiscuous mode [ 616.122122][T14160] bridge0: entered allmulticast mode [ 616.128556][T14160] vcan0: entered promiscuous mode [ 616.133679][T14160] vcan0: entered allmulticast mode [ 616.139065][T14160] bond0: entered promiscuous mode [ 616.144107][T14160] bond_slave_0: entered promiscuous mode [ 616.149911][T14160] bond_slave_1: entered promiscuous mode [ 616.155682][T14160] bond0: entered allmulticast mode [ 616.160926][T14160] bond_slave_0: entered allmulticast mode [ 616.166653][T14160] bond_slave_1: entered allmulticast mode [ 616.174227][T14160] team0: entered promiscuous mode [ 616.179604][T14160] team_slave_0: entered promiscuous mode [ 616.185610][T14160] team_slave_1: entered promiscuous mode [ 616.191419][T14160] team0: entered allmulticast mode [ 616.196545][T14160] team_slave_0: entered allmulticast mode [ 616.202323][T14160] team_slave_1: entered allmulticast mode [ 616.322163][T14160] dummy0: entered promiscuous mode [ 616.327366][T14160] dummy0: entered allmulticast mode [ 616.334254][T14160] nlmon0: entered promiscuous mode [ 616.339410][T14160] nlmon0: entered allmulticast mode [ 616.821157][T14160] caif0: entered promiscuous mode [ 616.826217][T14160] caif0: entered allmulticast mode [ 616.831364][T14160] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 617.145809][T14167] netlink: 56 bytes leftover after parsing attributes in process `syz.1.3528'. [ 618.910391][ T29] kauditd_printk_skb: 106 callbacks suppressed [ 618.910409][ T29] audit: type=1400 audit(874.021:27487): avc: denied { execmem } for pid=14176 comm="syz.1.3532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 618.935658][ T29] audit: type=1400 audit(874.161:27488): avc: denied { prog_load } for pid=14176 comm="syz.1.3532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 618.954421][ T29] audit: type=1400 audit(874.161:27489): avc: denied { bpf } for pid=14176 comm="syz.1.3532" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 618.974610][ T29] audit: type=1400 audit(874.161:27490): avc: denied { perfmon } for pid=14176 comm="syz.1.3532" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 618.995139][ T29] audit: type=1400 audit(874.161:27491): avc: denied { prog_load } for pid=14176 comm="syz.1.3532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 619.014009][ T29] audit: type=1400 audit(874.161:27492): avc: denied { prog_run } for pid=14176 comm="syz.1.3532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 619.033201][ T29] audit: type=1400 audit(874.161:27493): avc: denied { create } for pid=14176 comm="syz.1.3532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 619.052456][ T29] audit: type=1400 audit(874.161:27494): avc: denied { setopt } for pid=14176 comm="syz.1.3532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 619.071925][ T29] audit: type=1400 audit(874.171:27495): avc: denied { map_create } for pid=14173 comm="syz.7.3531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 619.090731][ T29] audit: type=1400 audit(874.171:27496): avc: denied { map_read map_write } for pid=14173 comm="syz.7.3531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 619.172931][T14187] netlink: 32 bytes leftover after parsing attributes in process `syz.7.3535'. [ 619.291854][T14191] lo: left promiscuous mode [ 619.296438][T14191] lo: left allmulticast mode [ 619.301877][T14191] tunl0: left promiscuous mode [ 619.306743][T14191] tunl0: left allmulticast mode [ 619.312172][T14191] gre0: left promiscuous mode [ 619.316900][T14191] gre0: left allmulticast mode [ 619.664810][T14191] gretap0: left promiscuous mode [ 619.669912][T14191] gretap0: left allmulticast mode [ 620.303207][T14191] erspan0: left promiscuous mode [ 620.308211][T14191] erspan0: left allmulticast mode [ 620.314249][T14191] ip_vti0: left promiscuous mode [ 620.319188][T14191] ip_vti0: left allmulticast mode [ 620.324822][T14191] ip6_vti0: left promiscuous mode [ 620.329926][T14191] ip6_vti0: left allmulticast mode [ 620.335732][T14191] sit0: left promiscuous mode [ 620.340486][T14191] sit0: left allmulticast mode [ 620.346315][T14191] ip6tnl0: left promiscuous mode [ 620.351343][T14191] ip6tnl0: left allmulticast mode [ 620.357000][T14191] ip6gre0: left promiscuous mode [ 620.362058][T14191] ip6gre0: left allmulticast mode [ 620.369773][T14191] syz_tun: left promiscuous mode [ 620.374848][T14191] syz_tun: left allmulticast mode [ 620.382257][T14191] ip6gretap0: left promiscuous mode [ 620.387488][T14191] ip6gretap0: left allmulticast mode [ 620.394454][T14191] bridge0: left promiscuous mode [ 620.399442][T14191] bridge0: left allmulticast mode [ 620.405042][T14191] vcan0: left promiscuous mode [ 620.409804][T14191] vcan0: left allmulticast mode [ 620.415229][T14191] bond0: left promiscuous mode [ 620.420165][T14191] bond_slave_0: left promiscuous mode [ 620.425878][T14191] bond_slave_1: left promiscuous mode [ 620.431315][T14191] bond0: left allmulticast mode [ 620.436164][T14191] bond_slave_0: left allmulticast mode [ 620.441669][T14191] bond_slave_1: left allmulticast mode [ 620.449453][T14191] team0: left promiscuous mode [ 620.454294][T14191] team_slave_0: left promiscuous mode [ 620.459857][T14191] team_slave_1: left promiscuous mode [ 620.465324][T14191] team0: left allmulticast mode [ 620.470294][T14191] team_slave_0: left allmulticast mode [ 620.475863][T14191] team_slave_1: left allmulticast mode [ 620.481828][T14191] dummy0: left promiscuous mode [ 620.486719][T14191] dummy0: left allmulticast mode [ 620.502998][T14191] nlmon0: left promiscuous mode [ 620.507899][T14191] nlmon0: left allmulticast mode [ 620.521514][T14191] caif0: left promiscuous mode [ 620.526389][T14191] caif0: left allmulticast mode [ 620.541592][T14195] wg2: left promiscuous mode [ 620.546217][T14195] wg2: left allmulticast mode [ 620.552717][T14198] wg2: entered promiscuous mode [ 620.557595][T14198] wg2: entered allmulticast mode [ 621.562894][T14211] lo: entered promiscuous mode [ 621.567721][T14211] lo: entered allmulticast mode [ 621.573596][T14211] tunl0: entered promiscuous mode [ 621.578647][T14211] tunl0: entered allmulticast mode [ 621.584463][T14211] gre0: entered promiscuous mode [ 621.589409][T14211] gre0: entered allmulticast mode [ 621.596009][T14211] gretap0: entered promiscuous mode [ 621.601305][T14211] gretap0: entered allmulticast mode [ 621.607366][T14211] erspan0: entered promiscuous mode [ 621.612619][T14211] erspan0: entered allmulticast mode [ 621.618752][T14211] ip_vti0: entered promiscuous mode [ 621.624003][T14211] ip_vti0: entered allmulticast mode [ 621.630000][T14211] ip6_vti0: entered promiscuous mode [ 621.635368][T14211] ip6_vti0: entered allmulticast mode [ 621.641528][T14211] sit0: entered promiscuous mode [ 621.646521][T14211] sit0: entered allmulticast mode [ 621.653691][T14211] ip6tnl0: entered promiscuous mode [ 621.658912][T14211] ip6tnl0: entered allmulticast mode [ 621.665295][T14211] ip6gre0: entered promiscuous mode [ 621.670540][T14211] ip6gre0: entered allmulticast mode [ 621.676775][T14211] syz_tun: entered promiscuous mode [ 621.682027][T14211] syz_tun: entered allmulticast mode [ 621.688468][T14211] ip6gretap0: entered promiscuous mode [ 621.693989][T14211] ip6gretap0: entered allmulticast mode [ 621.700352][T14211] bridge0: entered promiscuous mode [ 621.705555][T14211] bridge0: entered allmulticast mode [ 621.711611][T14211] vcan0: entered promiscuous mode [ 621.716645][T14211] vcan0: entered allmulticast mode [ 621.722313][T14211] bond0: entered promiscuous mode [ 621.727360][T14211] bond_slave_0: entered promiscuous mode [ 621.733247][T14211] bond_slave_1: entered promiscuous mode [ 621.738918][T14211] bond0: entered allmulticast mode [ 621.744123][T14211] bond_slave_0: entered allmulticast mode [ 621.749936][T14211] bond_slave_1: entered allmulticast mode [ 621.756291][T14211] 8021q: adding VLAN 0 to HW filter on device bond0 [ 621.764689][T14211] team0: entered promiscuous mode [ 621.769763][T14211] team_slave_0: entered promiscuous mode [ 621.775498][T14211] team_slave_1: entered promiscuous mode [ 621.781260][T14211] team0: entered allmulticast mode [ 621.786410][T14211] team_slave_0: entered allmulticast mode [ 621.792160][T14211] team_slave_1: entered allmulticast mode [ 621.798177][T14211] 8021q: adding VLAN 0 to HW filter on device team0 [ 621.806412][T14211] dummy0: entered promiscuous mode [ 621.811562][T14211] dummy0: entered allmulticast mode [ 621.819672][T14211] nlmon0: entered promiscuous mode [ 621.824865][T14211] nlmon0: entered allmulticast mode [ 621.836134][T14211] caif0: entered promiscuous mode [ 621.841238][T14211] caif0: entered allmulticast mode [ 621.846367][T14211] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 624.093255][ T29] kauditd_printk_skb: 101 callbacks suppressed [ 624.093273][ T29] audit: type=1400 audit(880.071:27598): avc: denied { create } for pid=14221 comm="syz.6.3545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 624.459947][ T29] audit: type=1400 audit(880.341:27599): avc: denied { execmem } for pid=14243 comm="syz.1.3553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 624.502176][ T29] audit: type=1400 audit(880.471:27600): avc: denied { map_create } for pid=14247 comm="syz.7.3554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 624.520969][ T29] audit: type=1400 audit(880.471:27601): avc: denied { bpf } for pid=14247 comm="syz.7.3554" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 624.541090][ T29] audit: type=1400 audit(880.471:27602): avc: denied { map_read map_write } for pid=14247 comm="syz.7.3554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 624.942847][ T29] audit: type=1400 audit(880.541:27603): avc: denied { prog_load } for pid=14247 comm="syz.7.3554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 624.961734][ T29] audit: type=1400 audit(880.541:27604): avc: denied { bpf } for pid=14247 comm="syz.7.3554" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 624.981894][ T29] audit: type=1400 audit(880.541:27605): avc: denied { perfmon } for pid=14247 comm="syz.7.3554" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 625.002641][ T29] audit: type=1400 audit(880.541:27606): avc: denied { bpf } for pid=14247 comm="syz.7.3554" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 625.023163][ T29] audit: type=1400 audit(880.551:27607): avc: denied { create } for pid=14247 comm="syz.7.3554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 625.050722][T14258] wg2: left promiscuous mode [ 625.055398][T14258] wg2: left allmulticast mode [ 625.108193][T14259] wg2: entered promiscuous mode [ 625.113213][T14259] wg2: entered allmulticast mode [ 625.859329][T14270] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 627.687830][T14300] random: crng reseeded on system resumption [ 627.727179][T14301] lo: left promiscuous mode [ 627.731794][T14301] lo: left allmulticast mode [ 627.737184][T14301] tunl0: left promiscuous mode [ 627.742099][T14301] tunl0: left allmulticast mode [ 627.747507][T14301] gre0: left promiscuous mode [ 627.752300][T14301] gre0: left allmulticast mode [ 627.758114][T14301] gretap0: left promiscuous mode [ 627.763526][T14301] gretap0: left allmulticast mode [ 627.769681][T14301] erspan0: left promiscuous mode [ 627.774689][T14301] erspan0: left allmulticast mode [ 627.780698][T14301] ip_vti0: left promiscuous mode [ 627.785669][T14301] ip_vti0: left allmulticast mode [ 627.791489][T14301] ip6_vti0: left promiscuous mode [ 627.796590][T14301] ip6_vti0: left allmulticast mode [ 627.802431][T14301] sit0: left promiscuous mode [ 627.807128][T14301] sit0: left allmulticast mode [ 627.813586][T14301] ip6tnl0: left promiscuous mode [ 627.818559][T14301] ip6tnl0: left allmulticast mode [ 627.824221][T14301] ip6gre0: left promiscuous mode [ 627.829390][T14301] ip6gre0: left allmulticast mode [ 627.836740][T14301] bridge0: port 3(syz_tun) entered disabled state [ 627.843812][T14301] ip6gretap0: left promiscuous mode [ 627.849029][T14301] ip6gretap0: left allmulticast mode [ 627.855300][T14301] bridge0: left promiscuous mode [ 627.860288][T14301] bridge0: left allmulticast mode [ 627.866054][T14301] vcan0: left promiscuous mode [ 627.870978][T14301] vcan0: left allmulticast mode [ 627.876441][T14301] bond0: left promiscuous mode [ 627.881243][T14301] bond_slave_0: left promiscuous mode [ 627.886756][T14301] bond_slave_1: left promiscuous mode [ 627.892320][T14301] macvlan1: left promiscuous mode [ 627.897416][T14301] bond0: left allmulticast mode [ 627.902345][T14301] bond_slave_0: left allmulticast mode [ 627.907904][T14301] bond_slave_1: left allmulticast mode [ 627.913574][T14301] macvlan1: left allmulticast mode [ 627.976633][T14301] team0: left promiscuous mode [ 627.981714][T14301] team_slave_0: left promiscuous mode [ 627.987248][T14301] team_slave_1: left promiscuous mode [ 627.992792][T14301] team0: left allmulticast mode [ 627.997710][T14301] team_slave_0: left allmulticast mode [ 628.003207][T14301] team_slave_1: left allmulticast mode [ 628.009091][T14301] dummy0: left promiscuous mode [ 628.013979][T14301] dummy0: left allmulticast mode [ 628.020903][T14301] nlmon0: left promiscuous mode [ 628.025803][T14301] nlmon0: left allmulticast mode [ 628.031256][T14301] caif0: left promiscuous mode [ 628.036047][T14301] caif0: left allmulticast mode [ 629.127364][ T29] kauditd_printk_skb: 106 callbacks suppressed [ 629.127383][ T29] audit: type=1400 audit(885.101:27714): avc: denied { map_create } for pid=14308 comm="syz.6.3571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 629.162371][T14310] hub 8-0:1.0: USB hub found [ 629.175781][ T29] audit: type=1400 audit(885.131:27715): avc: denied { relabelfrom } for pid=14313 comm="syz.2.3573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 629.177188][T14310] hub 8-0:1.0: 8 ports detected [ 629.195283][ T29] audit: type=1400 audit(885.131:27716): avc: denied { relabelto } for pid=14313 comm="syz.2.3573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 629.195318][ T29] audit: type=1400 audit(885.131:27717): avc: denied { prog_load } for pid=14308 comm="syz.6.3571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 629.238567][ T29] audit: type=1400 audit(885.131:27718): avc: denied { bpf } for pid=14308 comm="syz.6.3571" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 629.258855][ T29] audit: type=1400 audit(885.131:27719): avc: denied { perfmon } for pid=14308 comm="syz.6.3571" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 629.279945][ T29] audit: type=1400 audit(885.151:27720): avc: denied { execmem } for pid=14316 comm="syz.1.3574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 629.332837][ T29] audit: type=1400 audit(885.311:27721): avc: denied { prog_load } for pid=14318 comm="syz.7.3575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 629.351904][ T29] audit: type=1400 audit(885.311:27722): avc: denied { bpf } for pid=14318 comm="syz.7.3575" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 629.372171][ T29] audit: type=1400 audit(885.331:27723): avc: denied { execmem } for pid=14318 comm="syz.7.3575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 632.773766][T14374] veth0_to_team: entered promiscuous mode [ 632.779563][T14374] veth0_to_team: entered allmulticast mode [ 632.860051][T14364] hub 8-0:1.0: USB hub found [ 632.865453][T14364] hub 8-0:1.0: 8 ports detected [ 634.612502][ T29] kauditd_printk_skb: 145 callbacks suppressed [ 634.612520][ T29] audit: type=1400 audit(890.591:27869): avc: denied { map_create } for pid=14394 comm="syz.6.3598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 635.375383][ T29] audit: type=1400 audit(891.291:27870): avc: denied { map_create } for pid=14394 comm="syz.6.3598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 635.394300][ T29] audit: type=1400 audit(891.291:27871): avc: denied { map_read map_write } for pid=14394 comm="syz.6.3598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 635.413802][ T29] audit: type=1400 audit(891.291:27872): avc: denied { prog_load } for pid=14394 comm="syz.6.3598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 635.432420][ T29] audit: type=1400 audit(891.291:27873): avc: denied { bpf } for pid=14394 comm="syz.6.3598" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 635.452525][ T29] audit: type=1400 audit(891.291:27874): avc: denied { perfmon } for pid=14394 comm="syz.6.3598" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 635.472955][ T29] audit: type=1400 audit(891.341:27875): avc: denied { create } for pid=14396 comm="syz.5.3599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 635.582589][ T29] audit: type=1400 audit(891.471:27876): avc: denied { execmem } for pid=14396 comm="syz.5.3599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 635.601487][ T29] audit: type=1400 audit(891.551:27877): avc: denied { map_create } for pid=14398 comm="syz.6.3600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 635.620275][ T29] audit: type=1400 audit(891.551:27878): avc: denied { bpf } for pid=14398 comm="syz.6.3600" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 635.794990][T14404] lo: left promiscuous mode [ 635.799645][T14404] lo: left allmulticast mode [ 635.815500][T14404] tunl0: left promiscuous mode [ 635.820391][T14404] tunl0: left allmulticast mode [ 635.832281][T14404] gre0: left promiscuous mode [ 635.837026][T14404] gre0: left allmulticast mode [ 635.864848][T14404] gretap0: left promiscuous mode [ 635.869905][T14404] gretap0: left allmulticast mode [ 635.882163][T14404] erspan0: left promiscuous mode [ 635.887165][T14404] erspan0: left allmulticast mode [ 635.897717][T14404] ip_vti0: left promiscuous mode [ 635.902776][T14404] ip_vti0: left allmulticast mode [ 635.909893][T14404] ip6_vti0: left promiscuous mode [ 635.915059][T14404] ip6_vti0: left allmulticast mode [ 636.089960][T14404] sit0: left promiscuous mode [ 636.094769][T14404] sit0: left allmulticast mode [ 636.351152][T14404] ip6tnl0: left promiscuous mode [ 636.356297][T14404] ip6tnl0: left allmulticast mode [ 637.571282][T14404] ip6gre0: left promiscuous mode [ 637.576360][T14404] ip6gre0: left allmulticast mode [ 637.612034][T14404] syz_tun: left promiscuous mode [ 637.617084][T14404] syz_tun: left allmulticast mode [ 637.672409][T14404] ip6gretap0: left promiscuous mode [ 637.677720][T14404] ip6gretap0: left allmulticast mode [ 637.713327][T14404] bridge0: port 2(bridge_slave_1) entered disabled state [ 637.720532][T14404] bridge0: port 1(bridge_slave_0) entered disabled state [ 637.727991][T14404] bridge0: left promiscuous mode [ 637.733098][T14404] bridge0: left allmulticast mode [ 637.739827][T14404] vcan0: left promiscuous mode [ 637.744677][T14404] vcan0: left allmulticast mode [ 637.750644][T14404] bond0: left promiscuous mode [ 637.755469][T14404] bond_slave_0: left promiscuous mode [ 637.761116][T14404] bond_slave_1: left promiscuous mode [ 637.766623][T14404] bond0: left allmulticast mode [ 637.771514][T14404] bond_slave_0: left allmulticast mode [ 637.776977][T14404] bond_slave_1: left allmulticast mode [ 637.784205][T14404] team0: left promiscuous mode [ 637.788979][T14404] team_slave_0: left promiscuous mode [ 637.794799][T14404] team_slave_1: left promiscuous mode [ 637.800295][T14404] team0: left allmulticast mode [ 637.805155][T14404] team_slave_0: left allmulticast mode [ 637.810754][T14404] team_slave_1: left allmulticast mode [ 637.818075][T14404] dummy0: left promiscuous mode [ 637.822999][T14404] dummy0: left allmulticast mode [ 637.830470][T14404] nlmon0: left promiscuous mode [ 637.835369][T14404] nlmon0: left allmulticast mode [ 637.861253][T14404] caif0: left promiscuous mode [ 637.866109][T14404] caif0: left allmulticast mode [ 637.883043][T14404] wg2: left promiscuous mode [ 637.887669][T14404] wg2: left allmulticast mode [ 637.978470][T14404] bridge2: left promiscuous mode [ 638.070891][ T5664] netdevsim netdevsim7 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.079829][ T5664] netdevsim netdevsim7 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.123933][ T5664] netdevsim netdevsim7 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.142080][ T5664] netdevsim netdevsim7 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.297114][T14430] hub 8-0:1.0: USB hub found [ 638.380686][T14430] hub 8-0:1.0: 8 ports detected [ 639.093153][T14444] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 639.114007][T14444] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 640.131425][ T29] kauditd_printk_skb: 145 callbacks suppressed [ 640.131443][ T29] audit: type=1400 audit(896.111:28024): avc: denied { write } for pid=14461 comm="syz.7.3621" name="001" dev="devtmpfs" ino=168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 640.384312][ T29] audit: type=1400 audit(896.261:28025): avc: denied { prog_load } for pid=14464 comm="syz.1.3622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 640.403230][ T29] audit: type=1400 audit(896.261:28026): avc: denied { bpf } for pid=14464 comm="syz.1.3622" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 640.423467][ T29] audit: type=1400 audit(896.261:28027): avc: denied { map_create } for pid=14461 comm="syz.7.3621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 640.442166][ T29] audit: type=1400 audit(896.261:28028): avc: denied { map_read map_write } for pid=14461 comm="syz.7.3621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 640.461593][ T29] audit: type=1400 audit(896.261:28029): avc: denied { name_bind } for pid=14464 comm="syz.1.3622" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 640.482882][ T29] audit: type=1400 audit(896.271:28030): avc: denied { execmem } for pid=14464 comm="syz.1.3622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 640.502352][ T29] audit: type=1400 audit(896.311:28031): avc: denied { prog_load } for pid=14461 comm="syz.7.3621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 640.521702][ T29] audit: type=1400 audit(896.321:28032): avc: denied { bpf } for pid=14461 comm="syz.7.3621" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 640.541907][ T29] audit: type=1400 audit(896.321:28033): avc: denied { perfmon } for pid=14461 comm="syz.7.3621" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 641.164611][T14495] SELinux: failed to load policy [ 645.146528][ T29] kauditd_printk_skb: 214 callbacks suppressed [ 645.146543][ T29] audit: type=1400 audit(901.121:28248): avc: denied { prog_load } for pid=14564 comm="syz.5.3658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 645.171885][ T29] audit: type=1400 audit(901.121:28249): avc: denied { bpf } for pid=14564 comm="syz.5.3658" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 645.303952][ T29] audit: type=1400 audit(901.181:28250): avc: denied { execmem } for pid=14564 comm="syz.5.3658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 645.322916][ T29] audit: type=1400 audit(901.221:28251): avc: denied { prog_load } for pid=14570 comm="syz.7.3659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 645.341545][ T29] audit: type=1400 audit(901.221:28252): avc: denied { bpf } for pid=14570 comm="syz.7.3659" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 645.361807][ T29] audit: type=1400 audit(901.221:28253): avc: denied { prog_load } for pid=14570 comm="syz.7.3659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 645.380600][ T29] audit: type=1400 audit(901.221:28254): avc: denied { bpf } for pid=14570 comm="syz.7.3659" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 645.400860][ T29] audit: type=1400 audit(901.221:28255): avc: denied { perfmon } for pid=14570 comm="syz.7.3659" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 645.421378][ T29] audit: type=1400 audit(901.231:28256): avc: denied { prog_run } for pid=14570 comm="syz.7.3659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 645.440950][ T29] audit: type=1400 audit(901.231:28257): avc: denied { map_create } for pid=14570 comm="syz.7.3659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 646.586932][T14608] netlink: 12 bytes leftover after parsing attributes in process `syz.6.3671'. [ 649.497770][T14629] wg2: left promiscuous mode [ 649.502446][T14629] wg2: left allmulticast mode [ 649.508046][T14630] wg2: entered promiscuous mode [ 649.513032][T14630] wg2: entered allmulticast mode [ 649.827415][T14649] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 649.836572][T14650] lo: left promiscuous mode [ 649.841201][T14650] lo: left allmulticast mode [ 649.846640][T14650] tunl0: left promiscuous mode [ 649.850948][T14649] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 649.851536][T14650] tunl0: left allmulticast mode [ 649.865112][T14650] gre0: left promiscuous mode [ 649.869810][T14650] gre0: left allmulticast mode [ 649.875958][T14650] gretap0: left promiscuous mode [ 649.880997][T14650] gretap0: left allmulticast mode [ 649.886788][T14650] erspan0: left promiscuous mode [ 649.891832][T14650] erspan0: left allmulticast mode [ 649.897848][T14650] ip_vti0: left promiscuous mode [ 649.902878][T14650] ip_vti0: left allmulticast mode [ 649.908529][T14650] ip6_vti0: left promiscuous mode [ 649.913658][T14650] ip6_vti0: left allmulticast mode [ 649.919602][T14650] sit0: left promiscuous mode [ 649.924308][T14650] sit0: left allmulticast mode [ 649.930518][T14650] ip6tnl0: left promiscuous mode [ 649.935497][T14650] ip6tnl0: left allmulticast mode [ 649.941218][T14650] ip6gre0: left promiscuous mode [ 649.946170][T14650] ip6gre0: left allmulticast mode [ 649.952822][T14650] syz_tun: left promiscuous mode [ 649.957886][T14650] syz_tun: left allmulticast mode [ 649.966567][T14650] ip6gretap0: left promiscuous mode [ 649.971864][T14650] ip6gretap0: left allmulticast mode [ 650.023883][T14650] bridge0: left promiscuous mode [ 650.028994][T14650] bridge0: left allmulticast mode [ 650.034790][T14650] vcan0: left promiscuous mode [ 650.039567][T14650] vcan0: left allmulticast mode [ 650.045040][T14650] bond0: left promiscuous mode [ 650.049818][T14650] bond_slave_0: left promiscuous mode [ 650.055333][T14650] bond_slave_1: left promiscuous mode [ 650.060762][T14650] bond0: left allmulticast mode [ 650.065729][T14650] bond_slave_0: left allmulticast mode [ 650.071250][T14650] bond_slave_1: left allmulticast mode [ 650.096301][T14650] team0: left promiscuous mode [ 650.101164][T14650] team_slave_0: left promiscuous mode [ 650.106644][T14650] team0: left allmulticast mode [ 650.111537][T14650] team_slave_0: left allmulticast mode [ 650.117438][T14650] dummy0: left promiscuous mode [ 650.122516][T14650] dummy0: left allmulticast mode [ 650.130461][T14650] nlmon0: left promiscuous mode [ 650.135347][T14650] nlmon0: left allmulticast mode [ 650.304172][T14650] caif0: left promiscuous mode [ 650.309036][T14650] caif0: left allmulticast mode [ 650.314685][ T29] kauditd_printk_skb: 146 callbacks suppressed [ 650.314701][ T29] audit: type=1400 audit(906.221:28404): avc: denied { map_create } for pid=14646 comm="syz.6.3684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 650.339650][ T29] audit: type=1400 audit(906.221:28405): avc: denied { perfmon } for pid=14646 comm="syz.6.3684" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 650.360125][ T29] audit: type=1400 audit(906.221:28406): avc: denied { map_read map_write } for pid=14646 comm="syz.6.3684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 650.379579][ T29] audit: type=1400 audit(906.221:28407): avc: denied { prog_load } for pid=14646 comm="syz.6.3684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 650.398353][ T29] audit: type=1400 audit(906.221:28408): avc: denied { bpf } for pid=14646 comm="syz.6.3684" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 650.590321][T14656] netlink: 12 bytes leftover after parsing attributes in process `syz.7.3683'. [ 650.610262][T14650] wg2: left promiscuous mode [ 650.614910][T14650] wg2: left allmulticast mode [ 652.088635][ T29] audit: type=1400 audit(906.831:28409): avc: denied { write } for pid=14657 comm="syz.6.3687" name="001" dev="devtmpfs" ino=168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 652.111209][ T29] audit: type=1400 audit(906.861:28410): avc: denied { map_create } for pid=14658 comm="syz.2.3686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 652.130010][ T29] audit: type=1400 audit(906.861:28411): avc: denied { bpf } for pid=14658 comm="syz.2.3686" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 652.150293][ T29] audit: type=1400 audit(906.881:28412): avc: denied { map_read map_write } for pid=14658 comm="syz.2.3686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 652.169926][ T29] audit: type=1400 audit(906.881:28413): avc: denied { prog_load } for pid=14658 comm="syz.2.3686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 653.709637][T14679] wg2: entered promiscuous mode [ 653.714578][T14679] wg2: entered allmulticast mode [ 655.172619][T14706] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 655.172707][T14706] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 655.208855][T14705] wg2: left promiscuous mode [ 655.208924][T14705] wg2: left allmulticast mode [ 655.209394][T14705] veth0_to_team: left promiscuous mode [ 655.209412][T14705] veth0_to_team: left allmulticast mode [ 655.332657][ T29] kauditd_printk_skb: 95 callbacks suppressed [ 655.332672][ T29] audit: type=1400 audit(911.311:28509): avc: denied { map_create } for pid=14711 comm="syz.1.3699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 655.332696][ T29] audit: type=1400 audit(911.311:28510): avc: denied { bpf } for pid=14711 comm="syz.1.3699" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 655.332724][ T29] audit: type=1400 audit(911.311:28511): avc: denied { map_read map_write } for pid=14711 comm="syz.1.3699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 655.335673][ T29] audit: type=1400 audit(911.311:28512): avc: denied { prog_load } for pid=14711 comm="syz.1.3699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 655.335768][ T29] audit: type=1400 audit(911.311:28513): avc: denied { bpf } for pid=14711 comm="syz.1.3699" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 655.336217][ T29] audit: type=1400 audit(911.311:28514): avc: denied { prog_load } for pid=14711 comm="syz.1.3699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 655.336871][ T29] audit: type=1400 audit(911.311:28515): avc: denied { bpf } for pid=14711 comm="syz.1.3699" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 655.336903][ T29] audit: type=1400 audit(911.311:28516): avc: denied { perfmon } for pid=14711 comm="syz.1.3699" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 655.340809][ T29] audit: type=1400 audit(911.311:28517): avc: denied { prog_load } for pid=14711 comm="syz.1.3699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 655.340835][ T29] audit: type=1400 audit(911.311:28518): avc: denied { bpf } for pid=14711 comm="syz.1.3699" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 655.868822][T14723] wg2: left promiscuous mode [ 655.873536][T14723] wg2: left allmulticast mode [ 655.879958][T14723] wg2: entered promiscuous mode [ 655.884873][T14723] wg2: entered allmulticast mode [ 656.351751][T14739] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3708'. [ 658.372343][T14759] pim6reg: entered allmulticast mode [ 659.321272][T14779] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3719'. [ 660.747059][T14796] wg2: entered promiscuous mode [ 660.751994][T14796] wg2: entered allmulticast mode [ 660.943605][T14798] hub 8-0:1.0: USB hub found [ 660.974665][T14798] hub 8-0:1.0: 8 ports detected [ 661.026332][T14801] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 661.063576][T14801] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 661.435074][ T29] kauditd_printk_skb: 142 callbacks suppressed [ 661.435095][ T29] audit: type=1400 audit(916.121:28661): avc: denied { map_create } for pid=14787 comm="syz.2.3722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 661.460139][ T29] audit: type=1400 audit(916.121:28662): avc: denied { map_read map_write } for pid=14787 comm="syz.2.3722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 661.479569][ T29] audit: type=1400 audit(916.121:28663): avc: denied { prog_load } for pid=14787 comm="syz.2.3722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 661.498448][ T29] audit: type=1400 audit(916.121:28664): avc: denied { bpf } for pid=14787 comm="syz.2.3722" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 661.518581][ T29] audit: type=1400 audit(916.451:28665): avc: denied { write } for pid=14794 comm="syz.6.3723" name="001" dev="devtmpfs" ino=168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 661.540968][ T29] audit: type=1400 audit(916.661:28666): avc: denied { prog_load } for pid=14788 comm="syz.7.3721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 661.559654][ T29] audit: type=1400 audit(916.661:28667): avc: denied { bpf } for pid=14788 comm="syz.7.3721" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 661.579864][ T29] audit: type=1400 audit(916.661:28668): avc: denied { perfmon } for pid=14788 comm="syz.7.3721" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 661.600444][ T29] audit: type=1400 audit(916.661:28669): avc: denied { bpf } for pid=14788 comm="syz.7.3721" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 661.620618][ T29] audit: type=1400 audit(916.661:28670): avc: denied { prog_run } for pid=14788 comm="syz.7.3721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 663.577129][T14836] wg2: left promiscuous mode [ 663.581889][T14836] wg2: left allmulticast mode [ 664.586490][T14853] wg2: entered promiscuous mode [ 664.591554][T14853] wg2: entered allmulticast mode [ 665.790383][T14867] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 665.840426][T14867] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 666.530412][ T29] kauditd_printk_skb: 160 callbacks suppressed [ 666.530447][ T29] audit: type=1400 audit(922.501:28831): avc: denied { prog_load } for pid=14874 comm="syz.7.3748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 666.555363][ T29] audit: type=1400 audit(922.501:28832): avc: denied { bpf } for pid=14874 comm="syz.7.3748" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 666.575597][ T29] audit: type=1400 audit(922.501:28833): avc: denied { perfmon } for pid=14874 comm="syz.7.3748" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 666.891353][ T29] audit: type=1400 audit(922.581:28834): avc: denied { map_create } for pid=14874 comm="syz.7.3748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 666.910264][ T29] audit: type=1400 audit(922.581:28835): avc: denied { prog_load } for pid=14874 comm="syz.7.3748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 666.929535][ T29] audit: type=1400 audit(922.581:28836): avc: denied { bpf } for pid=14874 comm="syz.7.3748" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 666.949755][ T29] audit: type=1400 audit(922.581:28837): avc: denied { write } for pid=14874 comm="syz.7.3748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 666.968771][ T29] audit: type=1400 audit(922.591:28838): avc: denied { map_create } for pid=14871 comm="syz.5.3747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 666.987595][ T29] audit: type=1400 audit(922.591:28839): avc: denied { map_read map_write } for pid=14871 comm="syz.5.3747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 667.007085][ T29] audit: type=1400 audit(922.591:28840): avc: denied { prog_load } for pid=14871 comm="syz.5.3747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 667.450934][T14901] wg2: left promiscuous mode [ 667.455666][T14901] wg2: left allmulticast mode [ 667.466381][T14901] wg2: entered promiscuous mode [ 667.471418][T14901] wg2: entered allmulticast mode [ 668.063051][ T5664] nci: nci_add_new_protocol: the target found does not have the desired protocol [ 668.711806][T14917] hub 8-0:1.0: USB hub found [ 668.730478][T14917] hub 8-0:1.0: 8 ports detected [ 669.525340][T14936] tipc: Started in network mode [ 669.530317][T14936] tipc: Node identity 666e19149a48, cluster identity 4711 [ 669.537543][T14936] tipc: Enabled bearer , priority 0 [ 669.940393][T14936] syzkaller0: entered promiscuous mode [ 669.945924][T14936] syzkaller0: entered allmulticast mode [ 669.980479][T14936] tipc: Resetting bearer [ 669.996906][T14935] tipc: Resetting bearer [ 670.015278][T14935] tipc: Disabling bearer [ 670.766002][T14955] hub 8-0:1.0: USB hub found [ 670.770714][T14955] hub 8-0:1.0: 8 ports detected [ 671.116938][T14960] hub 8-0:1.0: USB hub found [ 671.140550][T14960] hub 8-0:1.0: 8 ports detected [ 671.616396][T14969] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 671.637502][ T29] kauditd_printk_skb: 135 callbacks suppressed [ 671.637519][ T29] audit: type=1400 audit(927.611:28976): avc: denied { create } for pid=14970 comm="syz.2.3778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 671.740453][ T29] audit: type=1400 audit(927.641:28977): avc: denied { create } for pid=14970 comm="syz.2.3778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 671.760132][ T29] audit: type=1400 audit(927.641:28978): avc: denied { prog_load } for pid=14970 comm="syz.2.3778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 671.778819][ T29] audit: type=1400 audit(927.641:28979): avc: denied { bpf } for pid=14970 comm="syz.2.3778" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 671.798974][ T29] audit: type=1400 audit(927.641:28980): avc: denied { perfmon } for pid=14970 comm="syz.2.3778" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 671.819599][ T29] audit: type=1400 audit(927.641:28981): avc: denied { open } for pid=14970 comm="syz.2.3778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 671.838579][ T29] audit: type=1400 audit(927.651:28982): avc: denied { perfmon } for pid=14970 comm="syz.2.3778" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 671.859049][ T29] audit: type=1400 audit(927.651:28983): avc: denied { kernel } for pid=14970 comm="syz.2.3778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 671.878029][ T29] audit: type=1400 audit(927.651:28984): avc: denied { prog_load } for pid=14970 comm="syz.2.3778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 671.896702][ T29] audit: type=1400 audit(927.651:28985): avc: denied { bpf } for pid=14970 comm="syz.2.3778" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 674.275502][T15009] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 674.300469][T15009] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 674.490784][T15016] wg2: left promiscuous mode [ 674.495452][T15016] wg2: left allmulticast mode [ 674.883297][T15024] netlink: 8 bytes leftover after parsing attributes in process `syz.6.3795'. [ 675.093388][T15031] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3798'. [ 675.102964][T15031] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3798'. [ 675.310678][T15038] netlink: 8 bytes leftover after parsing attributes in process `syz.7.3801'. [ 676.143311][T15048] hub 8-0:1.0: USB hub found [ 676.162294][T15048] hub 8-0:1.0: 8 ports detected [ 676.368061][T15061] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3810'. [ 676.377768][T15061] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3810'. [ 676.980442][ T29] kauditd_printk_skb: 187 callbacks suppressed [ 676.980572][ T29] audit: type=1400 audit(932.961:29173): avc: denied { read } for pid=15070 comm="syz.7.3813" dev="nsfs" ino=4026532380 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 677.007740][ T29] audit: type=1400 audit(932.961:29174): avc: denied { open } for pid=15070 comm="syz.7.3813" path="net:[4026532380]" dev="nsfs" ino=4026532380 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 677.097570][ T29] audit: type=1400 audit(933.011:29175): avc: denied { create } for pid=15070 comm="syz.7.3813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 677.311944][T15073] lo: entered promiscuous mode [ 677.316798][T15073] lo: entered allmulticast mode [ 677.333096][ T29] audit: type=1400 audit(933.281:29176): avc: denied { map_create } for pid=15070 comm="syz.7.3813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 677.351891][ T29] audit: type=1400 audit(933.281:29177): avc: denied { map_read map_write } for pid=15070 comm="syz.7.3813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 677.371333][ T29] audit: type=1400 audit(933.281:29178): avc: denied { prog_load } for pid=15070 comm="syz.7.3813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 677.389961][ T29] audit: type=1400 audit(933.281:29179): avc: denied { bpf } for pid=15070 comm="syz.7.3813" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 677.410108][ T29] audit: type=1400 audit(933.281:29180): avc: denied { perfmon } for pid=15070 comm="syz.7.3813" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 677.430652][ T29] audit: type=1400 audit(933.281:29181): avc: denied { prog_run } for pid=15070 comm="syz.7.3813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 677.636817][T15073] tunl0: entered promiscuous mode [ 677.642005][T15073] tunl0: entered allmulticast mode [ 678.161788][T15073] gre0: entered promiscuous mode [ 678.166798][T15073] gre0: entered allmulticast mode [ 678.508120][ T29] audit: type=1400 audit(933.481:29182): avc: denied { execmem } for pid=15074 comm="syz.2.3815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 678.610295][T15073] gretap0: entered promiscuous mode [ 678.615588][T15073] gretap0: entered allmulticast mode [ 678.860195][T15073] erspan0: entered promiscuous mode [ 678.865674][T15073] erspan0: entered allmulticast mode [ 678.921009][T15073] ip_vti0: entered promiscuous mode [ 678.926358][T15073] ip_vti0: entered allmulticast mode [ 678.960177][T15073] ip6_vti0: entered promiscuous mode [ 678.965583][T15073] ip6_vti0: entered allmulticast mode [ 679.003079][T15073] sit0: entered promiscuous mode [ 679.008119][T15073] sit0: entered allmulticast mode [ 679.043011][T15073] ip6tnl0: entered promiscuous mode [ 679.048331][T15073] ip6tnl0: entered allmulticast mode [ 679.081585][T15073] ip6gre0: entered promiscuous mode [ 679.087284][T15073] ip6gre0: entered allmulticast mode [ 679.122742][T15073] syz_tun: entered promiscuous mode [ 679.127993][T15073] syz_tun: entered allmulticast mode [ 679.165886][T15073] ip6gretap0: entered promiscuous mode [ 679.171479][T15073] ip6gretap0: entered allmulticast mode [ 679.198219][T15073] bridge0: entered promiscuous mode [ 679.203503][T15073] bridge0: entered allmulticast mode [ 679.245360][T15073] vcan0: entered promiscuous mode [ 679.250453][T15073] vcan0: entered allmulticast mode [ 679.285859][T15073] bond0: entered promiscuous mode [ 679.290996][T15073] bond_slave_0: entered promiscuous mode [ 679.296771][T15073] bond_slave_1: entered promiscuous mode [ 679.302502][T15073] bond0: entered allmulticast mode [ 679.307673][T15073] bond_slave_0: entered allmulticast mode [ 679.313447][T15073] bond_slave_1: entered allmulticast mode [ 679.490841][T15073] 8021q: adding VLAN 0 to HW filter on device bond0 [ 679.509624][T15073] team0: entered promiscuous mode [ 679.514727][T15073] team_slave_0: entered promiscuous mode [ 679.520570][T15073] team_slave_1: entered promiscuous mode [ 679.526344][T15073] team0: entered allmulticast mode [ 679.531490][T15073] team_slave_0: entered allmulticast mode [ 679.537251][T15073] team_slave_1: entered allmulticast mode [ 679.614509][T15073] 8021q: adding VLAN 0 to HW filter on device team0 [ 679.639303][T15073] dummy0: entered promiscuous mode [ 679.644554][T15073] dummy0: entered allmulticast mode [ 679.676286][T15073] nlmon0: entered promiscuous mode [ 679.681514][T15073] nlmon0: entered allmulticast mode [ 679.695536][T15073] caif0: entered promiscuous mode [ 679.700637][T15073] caif0: entered allmulticast mode [ 679.705773][T15073] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 679.735114][T15085] wg2: entered promiscuous mode [ 679.739993][T15085] wg2: entered allmulticast mode [ 680.199378][T15106] netlink: 36 bytes leftover after parsing attributes in process `syz.6.3824'. [ 680.505280][T15109] netlink: 36 bytes leftover after parsing attributes in process `syz.6.3824'. [ 681.990302][ T29] kauditd_printk_skb: 771 callbacks suppressed [ 681.990322][ T29] audit: type=1326 audit(937.801:29936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15122 comm="syz.7.3830" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f4d5152add9 code=0x7ffc0000 [ 682.019524][ T29] audit: type=1326 audit(937.801:29937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15122 comm="syz.7.3830" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f4d5152add9 code=0x7ffc0000 [ 682.042463][ T29] audit: type=1326 audit(937.801:29938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15122 comm="syz.7.3830" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f4d5152add9 code=0x7ffc0000 [ 682.065366][ T29] audit: type=1326 audit(937.801:29939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15122 comm="syz.7.3830" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f4d5152add9 code=0x7ffc0000 [ 682.088316][ T29] audit: type=1326 audit(937.801:29940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15122 comm="syz.7.3830" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f4d5152add9 code=0x7ffc0000 [ 682.111225][ T29] audit: type=1326 audit(937.801:29941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15122 comm="syz.7.3830" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f4d5152add9 code=0x7ffc0000 [ 682.134145][ T29] audit: type=1326 audit(937.801:29942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15122 comm="syz.7.3830" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f4d5152add9 code=0x7ffc0000 [ 682.157019][ T29] audit: type=1326 audit(937.801:29943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15122 comm="syz.7.3830" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f4d5152add9 code=0x7ffc0000 [ 682.179910][ T29] audit: type=1326 audit(937.801:29944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15122 comm="syz.7.3830" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f4d5152add9 code=0x7ffc0000 [ 682.202809][ T29] audit: type=1326 audit(937.801:29945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15122 comm="syz.7.3830" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f4d5152add9 code=0x7ffc0000 [ 682.278361][T15127] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 682.354156][T15127] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 682.552680][T15145] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3836'. [ 682.611338][T15145] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3836'. [ 683.486420][T15154] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 683.530498][T15154] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 684.884661][T15193] hub 8-0:1.0: USB hub found [ 684.889436][T15193] hub 8-0:1.0: 8 ports detected [ 684.939792][T15194] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 684.988190][T15194] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 686.055378][T15224] tipc: Enabled bearer , priority 0 [ 686.148331][T15216] tipc: Resetting bearer [ 686.161532][T15215] tipc: Disabling bearer [ 687.164331][ T29] kauditd_printk_skb: 1650 callbacks suppressed [ 687.164347][ T29] audit: type=1400 audit(943.141:31596): avc: denied { map_create } for pid=15238 comm="syz.5.3868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 687.189414][ T29] audit: type=1400 audit(943.141:31597): avc: denied { perfmon } for pid=15238 comm="syz.5.3868" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 687.209906][ T29] audit: type=1400 audit(943.141:31598): avc: denied { map_read map_write } for pid=15238 comm="syz.5.3868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 687.222126][T15241] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3869'. [ 687.229344][ T29] audit: type=1400 audit(943.141:31599): avc: denied { prog_load } for pid=15238 comm="syz.5.3868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 687.256935][ T29] audit: type=1400 audit(943.141:31600): avc: denied { bpf } for pid=15238 comm="syz.5.3868" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 687.275359][T15243] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3869'. [ 687.277121][ T29] audit: type=1400 audit(943.141:31601): avc: denied { create } for pid=15238 comm="syz.5.3868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 687.360276][ T29] audit: type=1400 audit(943.221:31602): avc: denied { module_request } for pid=15240 comm="syz.1.3869" kmod="rtnl-link-brid" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 687.381989][ T29] audit: type=1400 audit(943.271:31603): avc: denied { module_request } for pid=15240 comm="syz.1.3869" kmod="rtnl-link-brid" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 687.494033][ T29] audit: type=1400 audit(943.361:31604): avc: denied { create } for pid=15245 comm="syz.5.3870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 687.513407][ T29] audit: type=1400 audit(943.361:31605): avc: denied { read } for pid=15245 comm="syz.5.3870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 687.731642][T15254] 9pnet_fd: p9_fd_create_tcp (15254): problem connecting socket to 127.0.0.1 [ 692.339860][ T29] kauditd_printk_skb: 138 callbacks suppressed [ 692.339876][ T29] audit: type=1400 audit(948.311:31744): avc: denied { read } for pid=15323 comm="syz.1.3897" dev="nsfs" ino=4026532360 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 692.367044][ T29] audit: type=1400 audit(948.311:31745): avc: denied { open } for pid=15323 comm="syz.1.3897" path="net:[4026532360]" dev="nsfs" ino=4026532360 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 692.593748][ T29] audit: type=1400 audit(948.381:31746): avc: denied { create } for pid=15323 comm="syz.1.3897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 692.620550][ T29] audit: type=1400 audit(948.601:31747): avc: denied { create } for pid=15326 comm="syz.2.3898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 692.650326][ T29] audit: type=1400 audit(948.621:31748): avc: denied { write } for pid=15326 comm="syz.2.3898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 692.686520][ T29] audit: type=1400 audit(948.661:31749): avc: denied { prog_load } for pid=15328 comm="syz.2.3899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 692.717875][ T29] audit: type=1400 audit(948.661:31750): avc: denied { bpf } for pid=15328 comm="syz.2.3899" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 692.738125][ T29] audit: type=1400 audit(948.661:31751): avc: denied { perfmon } for pid=15328 comm="syz.2.3899" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 692.758846][ T29] audit: type=1400 audit(948.691:31752): avc: denied { create } for pid=15328 comm="syz.2.3899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 692.779837][ T29] audit: type=1400 audit(948.691:31753): avc: denied { setopt } for pid=15328 comm="syz.2.3899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 696.526187][T15381] hub 8-0:1.0: USB hub found [ 696.546691][T15381] hub 8-0:1.0: 8 ports detected [ 697.353345][ T29] kauditd_printk_skb: 101 callbacks suppressed [ 697.359681][ T29] audit: type=1400 audit(953.331:31855): avc: denied { create } for pid=15395 comm="syz.7.3921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 697.383561][ T29] audit: type=1400 audit(953.331:31856): avc: denied { write } for pid=15395 comm="syz.7.3921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 697.403696][ T29] audit: type=1400 audit(953.331:31857): avc: denied { read } for pid=15395 comm="syz.7.3921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 697.477420][ T29] audit: type=1400 audit(953.451:31858): avc: denied { prog_load } for pid=15398 comm="syz.7.3922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 697.582516][ T29] audit: type=1400 audit(953.451:31859): avc: denied { bpf } for pid=15398 comm="syz.7.3922" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 697.602931][ T29] audit: type=1400 audit(953.451:31860): avc: denied { perfmon } for pid=15398 comm="syz.7.3922" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 697.623608][ T29] audit: type=1400 audit(953.501:31861): avc: denied { prog_run } for pid=15385 comm="syz.2.3918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 697.642656][ T29] audit: type=1400 audit(953.541:31862): avc: denied { create } for pid=15385 comm="syz.2.3918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 697.710734][ T29] audit: type=1400 audit(953.691:31863): avc: denied { read } for pid=15398 comm="syz.7.3922" dev="nsfs" ino=4026532380 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 697.731684][ T29] audit: type=1400 audit(953.691:31864): avc: denied { open } for pid=15398 comm="syz.7.3922" path="net:[4026532380]" dev="nsfs" ino=4026532380 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 699.042945][T15419] netlink: 'syz.7.3928': attribute type 10 has an invalid length. [ 699.134304][T15419] dummy0: left promiscuous mode [ 699.139425][T15419] dummy0: left allmulticast mode [ 699.179778][T15419] dummy0: entered promiscuous mode [ 699.202082][T15419] dummy0: entered allmulticast mode [ 699.218069][T15419] team0: Port device dummy0 added [ 699.566725][T15444] hub 8-0:1.0: USB hub found [ 699.582521][T15444] hub 8-0:1.0: 8 ports detected [ 699.614393][T15449] hub 8-0:1.0: USB hub found [ 699.626141][T15449] hub 8-0:1.0: 8 ports detected [ 702.379728][ T29] kauditd_printk_skb: 196 callbacks suppressed [ 702.379745][ T29] audit: type=1400 audit(1214.350:32061): avc: denied { create } for pid=15506 comm="syz.6.3959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 702.436821][ T29] audit: type=1400 audit(1214.380:32062): avc: denied { prog_load } for pid=15506 comm="syz.6.3959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 702.455605][ T29] audit: type=1400 audit(1214.390:32063): avc: denied { bpf } for pid=15506 comm="syz.6.3959" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 702.475992][ T29] audit: type=1400 audit(1214.390:32064): avc: denied { perfmon } for pid=15506 comm="syz.6.3959" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 702.496609][ T29] audit: type=1400 audit(1214.390:32065): avc: denied { prog_run } for pid=15506 comm="syz.6.3959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 702.515511][ T29] audit: type=1400 audit(1214.390:32066): avc: denied { create } for pid=15506 comm="syz.6.3959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 702.535025][ T29] audit: type=1400 audit(1214.390:32067): avc: denied { write } for pid=15506 comm="syz.6.3959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 702.554178][ T29] audit: type=1400 audit(1214.400:32068): avc: denied { module_request } for pid=15508 comm="syz.1.3960" kmod=72746E6C2D6C696E6B2D6272696467655F736C618C65 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 702.581036][ T29] audit: type=1400 audit(1214.500:32069): avc: denied { prog_load } for pid=15510 comm="syz.2.3962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 702.599893][ T29] audit: type=1400 audit(1214.500:32070): avc: denied { bpf } for pid=15510 comm="syz.2.3962" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 702.737668][T15527] tipc: Enabled bearer , priority 0 [ 702.761340][T15527] syzkaller0: entered promiscuous mode [ 702.766838][T15527] syzkaller0: entered allmulticast mode [ 702.804051][T15527] tipc: Resetting bearer [ 702.821353][T15526] tipc: Resetting bearer [ 702.828084][T15526] tipc: Disabling bearer [ 703.198879][T15535] hub 8-0:1.0: USB hub found [ 703.267569][T15535] hub 8-0:1.0: 8 ports detected [ 705.910174][T15570] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 705.928586][T15570] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 707.444792][ T29] kauditd_printk_skb: 140 callbacks suppressed [ 707.444806][ T29] audit: type=1400 audit(1219.410:32211): avc: denied { map_create } for pid=15584 comm="syz.7.3986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 707.469843][ T29] audit: type=1400 audit(1219.410:32212): avc: denied { bpf } for pid=15584 comm="syz.7.3986" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 707.490016][ T29] audit: type=1400 audit(1219.410:32213): avc: denied { map_read map_write } for pid=15584 comm="syz.7.3986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 707.509536][ T29] audit: type=1400 audit(1219.410:32214): avc: denied { prog_load } for pid=15584 comm="syz.7.3986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 707.528366][ T29] audit: type=1400 audit(1219.410:32215): avc: denied { perfmon } for pid=15584 comm="syz.7.3986" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 707.829587][ T29] audit: type=1400 audit(1219.640:32216): avc: denied { sys_module } for pid=15585 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 707.850612][ T29] audit: type=1400 audit(1219.640:32217): avc: denied { module_request } for pid=15585 comm="syz-executor" kmod="nr8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 707.871592][ T29] audit: type=1400 audit(1219.650:32218): avc: denied { execmem } for pid=15590 comm="syz.1.3987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 707.890651][ T29] audit: type=1400 audit(1219.760:32219): avc: denied { prog_load } for pid=15592 comm="syz.6.3988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 707.909385][ T29] audit: type=1400 audit(1219.760:32220): avc: denied { bpf } for pid=15592 comm="syz.6.3988" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 709.329621][T15585] chnl_net:caif_netlink_parms(): no params data found [ 709.717472][T15585] bridge0: port 1(bridge_slave_0) entered blocking state [ 709.724673][T15585] bridge0: port 1(bridge_slave_0) entered disabled state [ 709.750631][T15585] bridge_slave_0: entered allmulticast mode [ 709.757242][T15585] bridge_slave_0: entered promiscuous mode [ 709.777830][T15585] bridge0: port 2(bridge_slave_1) entered blocking state [ 709.785001][T15585] bridge0: port 2(bridge_slave_1) entered disabled state [ 709.793337][T15585] bridge_slave_1: entered allmulticast mode [ 709.799754][T15585] bridge_slave_1: entered promiscuous mode [ 709.832198][T15585] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 709.845310][T15585] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 709.910587][T15585] team0: Port device team_slave_0 added [ 709.941969][T15585] team0: Port device team_slave_1 added [ 709.983711][T15585] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 709.990821][T15585] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 710.016976][T15585] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 710.030612][T15585] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 710.037693][T15585] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 710.052378][T15636] futex_wake_op: syz.7.3996 tries to shift op by 144; fix this program [ 710.063666][T15585] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 710.151525][T15636] usb usb8: usbfs: process 15636 (syz.7.3996) did not claim interface 0 before use [ 710.221561][T15585] hsr_slave_0: entered promiscuous mode [ 710.240805][T15585] hsr_slave_1: entered promiscuous mode [ 710.256830][T15585] debugfs: 'hsr0' already exists in 'hsr' [ 710.262778][T15585] Cannot create hsr debugfs directory [ 710.883856][T15585] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 710.893859][T15585] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 710.903462][T15585] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 710.913762][T15585] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 710.958054][T15585] 8021q: adding VLAN 0 to HW filter on device bond0 [ 710.971980][T15585] 8021q: adding VLAN 0 to HW filter on device team0 [ 710.983877][ T7394] bridge0: port 1(bridge_slave_0) entered blocking state [ 710.991115][ T7394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 711.069737][ T7394] bridge0: port 2(bridge_slave_1) entered blocking state [ 711.076886][ T7394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 711.181210][T15585] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 711.416175][T15585] veth0_vlan: entered promiscuous mode [ 711.425119][T15585] veth1_vlan: entered promiscuous mode [ 711.452120][T15585] veth0_macvtap: entered promiscuous mode [ 711.464525][T15585] veth1_macvtap: entered promiscuous mode [ 711.484281][T15585] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 711.496839][T15585] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 711.510978][ T6697] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 711.532330][ T6697] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 711.547807][ T6697] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 711.567007][ T6697] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 711.648590][T15690] netlink: 4 bytes leftover after parsing attributes in process `syz.8.3982'. [ 712.691881][ T29] kauditd_printk_skb: 223 callbacks suppressed [ 712.691899][ T29] audit: type=1400 audit(1224.670:32444): avc: denied { prog_load } for pid=15703 comm="syz.1.4011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 712.747380][ T29] audit: type=1400 audit(1224.670:32445): avc: denied { bpf } for pid=15703 comm="syz.1.4011" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 712.770032][ T29] audit: type=1400 audit(1224.670:32446): avc: denied { execmem } for pid=15703 comm="syz.1.4011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 712.788997][ T29] audit: type=1400 audit(1224.690:32447): avc: denied { map_create } for pid=15705 comm="syz.7.4010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 712.807976][ T29] audit: type=1400 audit(1224.700:32448): avc: denied { read } for pid=15705 comm="syz.7.4010" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 712.830297][ T29] audit: type=1400 audit(1224.700:32449): avc: denied { open } for pid=15705 comm="syz.7.4010" path="/dev/cpu/0/msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 713.028264][ T29] audit: type=1400 audit(1224.970:32450): avc: denied { create } for pid=15710 comm="syz.6.4012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 713.047867][ T29] audit: type=1400 audit(1224.980:32451): avc: denied { getopt } for pid=15710 comm="syz.6.4012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 713.067176][ T29] audit: type=1400 audit(1224.980:32452): avc: denied { connect } for pid=15710 comm="syz.6.4012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 713.086715][ T29] audit: type=1400 audit(1224.980:32453): avc: denied { name_connect } for pid=15710 comm="syz.6.4012" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 713.949717][T15732] netlink: 'syz.7.4020': attribute type 5 has an invalid length. [ 713.957566][T15732] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4020'. [ 713.971162][T15732] netlink: 'syz.7.4020': attribute type 5 has an invalid length. [ 713.978925][T15732] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4020'. [ 715.699637][T15771] bridge0: port 2(bridge_slave_1) entered disabled state [ 715.706816][T15771] bridge0: port 1(bridge_slave_0) entered disabled state [ 715.745518][T15771] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 715.756587][T15771] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 715.905255][ T7391] netdevsim netdevsim8 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 715.914288][ T7391] netdevsim netdevsim8 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 715.924405][ T7391] netdevsim netdevsim8 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 715.933654][ T7391] netdevsim netdevsim8 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 716.650988][T15786] tipc: Started in network mode [ 716.656004][T15786] tipc: Node identity 1a021ee8f65d, cluster identity 4711 [ 716.663273][T15786] tipc: Enabled bearer , priority 0 [ 716.835896][T15791] syzkaller0: entered promiscuous mode [ 716.841570][T15791] syzkaller0: entered allmulticast mode [ 716.966532][T15786] tipc: Resetting bearer [ 717.015812][T15785] tipc: Resetting bearer [ 717.037457][T15785] tipc: Disabling bearer [ 717.706419][ T29] kauditd_printk_skb: 131 callbacks suppressed [ 717.706434][ T29] audit: type=1400 audit(1229.680:32585): avc: denied { create } for pid=15796 comm="syz.1.4040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 717.820435][ T29] audit: type=1400 audit(1229.730:32586): avc: denied { execmem } for pid=15796 comm="syz.1.4040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 717.839588][ T29] audit: type=1400 audit(1229.770:32587): avc: denied { prog_load } for pid=15800 comm="syz.7.4042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 717.858535][ T29] audit: type=1400 audit(1229.770:32588): avc: denied { bpf } for pid=15800 comm="syz.7.4042" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 717.878934][ T29] audit: type=1400 audit(1229.770:32589): avc: denied { perfmon } for pid=15800 comm="syz.7.4042" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 717.899599][ T29] audit: type=1400 audit(1229.780:32590): avc: denied { recv } for pid=15780 comm="syz.2.4036" saddr=10.128.0.163 src=30036 daddr=10.128.1.82 dest=55830 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 718.032077][T15803] tipc: Started in network mode [ 718.037062][T15803] tipc: Node identity 56cd01e1ab51, cluster identity 4711 [ 718.044364][T15803] tipc: Enabled bearer , priority 0 [ 718.092715][T15804] syzkaller0: entered promiscuous mode [ 718.098231][T15804] syzkaller0: entered allmulticast mode [ 718.136773][T15803] tipc: Resetting bearer [ 718.181945][T15802] tipc: Resetting bearer [ 718.208112][ T29] audit: type=1400 audit(1229.940:32591): avc: denied { recv } for pid=15780 comm="syz.2.4036" saddr=10.128.0.163 src=30036 daddr=10.128.1.82 dest=55830 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 718.233319][ T29] audit: type=1400 audit(1230.000:32592): avc: denied { create } for pid=15802 comm="syz.7.4043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 718.253463][ T29] audit: type=1400 audit(1230.010:32593): avc: denied { write } for pid=15802 comm="syz.7.4043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 718.273649][ T29] audit: type=1400 audit(1230.010:32594): avc: denied { read } for pid=15802 comm="syz.7.4043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 718.494256][T15802] tipc: Disabling bearer [ 719.056466][T15816] hub 8-0:1.0: USB hub found [ 719.061248][T15816] hub 8-0:1.0: 8 ports detected [ 720.158432][T15837] netlink: 28 bytes leftover after parsing attributes in process `syz.8.4052'. [ 720.167544][T15837] netlink: 20 bytes leftover after parsing attributes in process `syz.8.4052'. [ 722.256773][T15869] hub 8-0:1.0: USB hub found [ 722.300907][T15869] hub 8-0:1.0: 8 ports detected [ 722.782592][ T29] kauditd_printk_skb: 160 callbacks suppressed [ 722.782660][ T29] audit: type=1400 audit(1234.760:32755): avc: denied { map_create } for pid=15879 comm="syz.8.4068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 722.909844][ T29] audit: type=1400 audit(1234.760:32756): avc: denied { bpf } for pid=15879 comm="syz.8.4068" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 722.930216][ T29] audit: type=1400 audit(1234.760:32757): avc: denied { map_read map_write } for pid=15879 comm="syz.8.4068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 722.949707][ T29] audit: type=1400 audit(1234.830:32758): avc: denied { recv } for pid=3294 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.82 dest=55830 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 722.975023][ T29] audit: type=1400 audit(1234.850:32759): avc: denied { create } for pid=15883 comm="syz.7.4070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 722.995349][ T29] audit: type=1400 audit(1234.870:32760): avc: denied { prog_load } for pid=15879 comm="syz.8.4068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 723.014158][ T29] audit: type=1400 audit(1234.870:32761): avc: denied { bpf } for pid=15879 comm="syz.8.4068" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 723.034328][ T29] audit: type=1400 audit(1234.870:32762): avc: denied { perfmon } for pid=15879 comm="syz.8.4068" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 723.054846][ T29] audit: type=1400 audit(1234.870:32763): avc: denied { read } for pid=15879 comm="syz.8.4068" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 723.078816][ T29] audit: type=1400 audit(1234.880:32764): avc: denied { open } for pid=15879 comm="syz.8.4068" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 724.208772][T15917] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 724.228985][T15917] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 726.045018][T15955] lo: left promiscuous mode [ 726.049643][T15955] lo: left allmulticast mode [ 726.064372][T15955] tunl0: left promiscuous mode [ 726.069207][T15955] tunl0: left allmulticast mode [ 726.074817][T15955] gre0: left promiscuous mode [ 726.079559][T15955] gre0: left allmulticast mode [ 726.150341][T15955] gretap0: left promiscuous mode [ 726.155357][T15955] gretap0: left allmulticast mode [ 726.163149][T15955] erspan0: left promiscuous mode [ 726.168207][T15955] erspan0: left allmulticast mode [ 726.174252][T15955] ip_vti0: left promiscuous mode [ 726.179206][T15955] ip_vti0: left allmulticast mode [ 726.185019][T15955] ip6_vti0: left promiscuous mode [ 726.190066][T15955] ip6_vti0: left allmulticast mode [ 726.196126][T15955] sit0: left promiscuous mode [ 726.200845][T15955] sit0: left allmulticast mode [ 726.207416][T15955] ip6tnl0: left promiscuous mode [ 726.212416][T15955] ip6tnl0: left allmulticast mode [ 726.218389][T15955] ip6gre0: left promiscuous mode [ 726.223375][T15955] ip6gre0: left allmulticast mode [ 726.230390][T15955] syz_tun: left promiscuous mode [ 726.235368][T15955] syz_tun: left allmulticast mode [ 726.241832][T15955] ip6gretap0: left promiscuous mode [ 726.247074][T15955] ip6gretap0: left allmulticast mode [ 726.253727][T15955] bridge0: left promiscuous mode [ 726.258725][T15955] bridge0: left allmulticast mode [ 726.264537][T15955] vcan0: left promiscuous mode [ 726.269331][T15955] vcan0: left allmulticast mode [ 726.275042][T15955] bond0: left promiscuous mode [ 726.279863][T15955] bond_slave_0: left promiscuous mode [ 726.285438][T15955] bond_slave_1: left promiscuous mode [ 726.290989][T15955] bond0: left allmulticast mode [ 726.295885][T15955] bond_slave_0: left allmulticast mode [ 726.301410][T15955] bond_slave_1: left allmulticast mode [ 726.308788][T15955] team0: left promiscuous mode [ 726.313682][T15955] team_slave_0: left promiscuous mode [ 726.319258][T15955] team_slave_1: left promiscuous mode [ 726.325072][T15955] team0: left allmulticast mode [ 726.329994][T15955] team_slave_0: left allmulticast mode [ 726.335518][T15955] team_slave_1: left allmulticast mode [ 726.341681][T15955] dummy0: left promiscuous mode [ 726.346566][T15955] dummy0: left allmulticast mode [ 726.354411][T15955] nlmon0: left promiscuous mode [ 726.359289][T15955] nlmon0: left allmulticast mode [ 726.365015][T15955] caif0: left promiscuous mode [ 726.369819][T15955] caif0: left allmulticast mode [ 726.375627][T15955] wg2: left promiscuous mode [ 726.380356][T15955] wg2: left allmulticast mode [ 726.450723][T15960] tipc: Enabled bearer , priority 0 [ 726.458149][T15960] syzkaller0: entered promiscuous mode [ 726.463781][T15960] syzkaller0: entered allmulticast mode [ 726.473744][T15960] tipc: Resetting bearer [ 726.480945][T15959] tipc: Resetting bearer [ 726.487272][T15959] tipc: Disabling bearer [ 727.059506][T15986] hub 8-0:1.0: USB hub found [ 727.140476][T15986] hub 8-0:1.0: 8 ports detected [ 727.801976][T15992] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 727.801975][ T29] kauditd_printk_skb: 229 callbacks suppressed [ 727.802010][ T29] audit: type=1400 audit(1239.780:32994): avc: denied { read write } for pid=15991 comm="syz.8.4108" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 727.839901][ T29] audit: type=1400 audit(1239.780:32995): avc: denied { open } for pid=15991 comm="syz.8.4108" path="/dev/raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 727.863597][ T29] audit: type=1400 audit(1239.780:32996): avc: denied { ioctl } for pid=15991 comm="syz.8.4108" path="/dev/raw-gadget" dev="devtmpfs" ino=142 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 727.870993][T15992] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 727.992764][ T29] audit: type=1400 audit(1239.970:32997): avc: denied { read } for pid=15991 comm="syz.8.4108" dev="nsfs" ino=4026532502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 728.013681][ T29] audit: type=1400 audit(1239.970:32998): avc: denied { open } for pid=15991 comm="syz.8.4108" path="net:[4026532502]" dev="nsfs" ino=4026532502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 728.036719][ T29] audit: type=1400 audit(1239.970:32999): avc: denied { create } for pid=15991 comm="syz.8.4108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 728.058225][ T29] audit: type=1400 audit(1239.980:33000): avc: denied { write } for pid=15991 comm="syz.8.4108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 728.078283][ T29] audit: type=1400 audit(1239.980:33001): avc: denied { read } for pid=15991 comm="syz.8.4108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 728.138695][ T29] audit: type=1400 audit(1240.080:33002): avc: denied { recv } for pid=15969 comm="syz.2.4102" saddr=10.128.0.163 src=30036 daddr=10.128.1.82 dest=55830 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 728.526515][ T29] audit: type=1400 audit(1240.500:33003): avc: denied { recv } for pid=15585 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.82 dest=55830 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 732.030951][T16058] tipc: Enabled bearer , priority 0 [ 732.051063][T16058] syzkaller0: entered promiscuous mode [ 732.056677][T16058] syzkaller0: entered allmulticast mode [ 732.191292][T16055] tipc: Resetting bearer [ 732.198320][T16055] tipc: Disabling bearer [ 732.818739][ T29] kauditd_printk_skb: 183 callbacks suppressed [ 732.818792][ T29] audit: type=1400 audit(1244.790:33187): avc: denied { map_create } for pid=16062 comm="syz.1.4132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 732.843902][ T29] audit: type=1400 audit(1244.790:33188): avc: denied { bpf } for pid=16062 comm="syz.1.4132" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 733.109780][ T29] audit: type=1400 audit(1244.860:33189): avc: denied { create } for pid=16073 comm="syz.8.4135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 733.129139][ T29] audit: type=1400 audit(1244.860:33190): avc: denied { map_read map_write } for pid=16062 comm="syz.1.4132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 733.149020][ T29] audit: type=1400 audit(1244.880:33191): avc: denied { prog_load } for pid=16062 comm="syz.1.4132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 733.167755][ T29] audit: type=1400 audit(1244.880:33192): avc: denied { perfmon } for pid=16062 comm="syz.1.4132" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 733.188350][ T29] audit: type=1400 audit(1244.880:33193): avc: denied { read } for pid=16062 comm="syz.1.4132" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 733.212316][ T29] audit: type=1400 audit(1244.880:33194): avc: denied { open } for pid=16062 comm="syz.1.4132" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 733.236611][ T29] audit: type=1400 audit(1244.890:33195): avc: denied { create } for pid=16073 comm="syz.8.4135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 733.256986][ T29] audit: type=1400 audit(1244.890:33196): avc: denied { ioctl } for pid=16062 comm="syz.1.4132" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 733.341335][T16072] hub 8-0:1.0: USB hub found [ 733.393955][T16072] hub 8-0:1.0: 8 ports detected [ 736.102015][T16121] wg2: entered promiscuous mode [ 736.106936][T16121] wg2: entered allmulticast mode [ 736.145433][T16124] netlink: 36 bytes leftover after parsing attributes in process `syz.1.4152'. [ 736.312034][T16124] netlink: 36 bytes leftover after parsing attributes in process `syz.1.4152'. [ 736.443159][T16133] netlink: 12 bytes leftover after parsing attributes in process `syz.6.4156'. [ 737.403428][T16144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 737.411717][T16144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 737.836004][ T29] kauditd_printk_skb: 226 callbacks suppressed [ 737.836019][ T29] audit: type=1400 audit(1249.810:33423): avc: denied { read } for pid=16157 comm="syz.8.4164" dev="nsfs" ino=4026532502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 737.863109][ T29] audit: type=1400 audit(1249.810:33424): avc: denied { open } for pid=16157 comm="syz.8.4164" path="net:[4026532502]" dev="nsfs" ino=4026532502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 737.907823][T16160] netlink: 36 bytes leftover after parsing attributes in process `syz.6.4165'. [ 737.921178][T16160] netlink: 36 bytes leftover after parsing attributes in process `syz.6.4165'. [ 737.956658][ T29] audit: type=1400 audit(1249.850:33425): avc: denied { create } for pid=16157 comm="syz.8.4164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 737.976442][ T29] audit: type=1400 audit(1249.860:33426): avc: denied { bind } for pid=16157 comm="syz.8.4164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 737.996088][ T29] audit: type=1400 audit(1249.860:33427): avc: denied { write } for pid=16157 comm="syz.8.4164" path="socket:[48248]" dev="sockfs" ino=48248 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 738.019527][ T29] audit: type=1400 audit(1249.890:33428): avc: denied { recv } for pid=16159 comm="syz.6.4165" saddr=10.128.0.163 src=30036 daddr=10.128.1.82 dest=55830 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 738.045207][ T29] audit: type=1400 audit(1249.890:33429): avc: denied { recv } for pid=16159 comm="syz.6.4165" saddr=10.128.0.163 src=30036 daddr=10.128.1.82 dest=55830 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 738.070300][ T29] audit: type=1400 audit(1249.920:33430): avc: denied { create } for pid=16161 comm="syz.8.4166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 738.090664][ T29] audit: type=1400 audit(1249.920:33431): avc: denied { write } for pid=16161 comm="syz.8.4166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 738.110967][ T29] audit: type=1400 audit(1249.930:33432): avc: denied { recv } for pid=6576 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.82 dest=55830 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 738.770873][T16175] wg2: left promiscuous mode [ 738.775618][T16175] wg2: left allmulticast mode [ 738.783172][T16175] wg2: entered promiscuous mode [ 738.788067][T16175] wg2: entered allmulticast mode [ 739.209692][T16178] hub 8-0:1.0: USB hub found [ 739.267700][T16178] hub 8-0:1.0: 8 ports detected [ 740.680327][ T5759] IPVS: starting estimator thread 0... [ 740.695670][T16197] netlink: 36 bytes leftover after parsing attributes in process `syz.6.4177'. [ 740.718969][T16197] netlink: 36 bytes leftover after parsing attributes in process `syz.6.4177'. [ 740.770355][T16195] IPVS: using max 2784 ests per chain, 139200 per kthread [ 741.191393][T16208] tipc: Enabled bearer , priority 0 [ 741.208280][T16208] syzkaller0: entered promiscuous mode [ 741.213807][T16208] syzkaller0: entered allmulticast mode [ 741.235371][T16207] tipc: Resetting bearer [ 741.250488][T16207] tipc: Disabling bearer [ 741.621398][T16213] ================================================================== [ 741.629595][T16213] BUG: KCSAN: data-race in mas_replace_node / mas_state_walk [ 741.636979][T16213] [ 741.639303][T16213] write to 0xffff88811e3e7800 of 8 bytes by task 16212 on cpu 1: [ 741.647019][T16213] mas_replace_node+0x1a6/0x410 [ 741.652069][T16213] mas_wr_store_entry+0x2406/0x2b50 [ 741.657303][T16213] mas_store_prealloc+0x74d/0x9e0 [ 741.662347][T16213] vma_iter_store_new+0x1c5/0x200 [ 741.667559][T16213] vma_complete+0x125/0x580 [ 741.674702][T16213] __split_vma+0x591/0x650 [ 741.679230][T16213] vma_modify+0x21e/0xc80 [ 741.683600][T16213] vma_modify_flags+0x101/0x130 [ 741.688581][T16213] mprotect_fixup+0x2cc/0x570 [ 741.693398][T16213] do_mprotect_pkey+0x6d6/0x980 [ 741.698285][T16213] __x64_sys_mprotect+0x48/0x60 [ 741.703155][T16213] x64_sys_call+0x274e/0x2ff0 [ 741.707848][T16213] do_syscall_64+0xd2/0x200 [ 741.712371][T16213] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 741.718274][T16213] [ 741.720605][T16213] read to 0xffff88811e3e7800 of 8 bytes by task 16213 on cpu 0: [ 741.728231][T16213] mas_state_walk+0x485/0x650 [ 741.732924][T16213] mas_walk+0x60/0x150 [ 741.737001][T16213] lock_vma_under_rcu+0x8d/0x160 [ 741.741951][T16213] do_user_addr_fault+0x233/0x1090 [ 741.747068][T16213] exc_page_fault+0x62/0xa0 [ 741.751568][T16213] asm_exc_page_fault+0x26/0x30 [ 741.756426][T16213] [ 741.758743][T16213] value changed: 0xffff888103f61f0e -> 0xffff88811e3e7800 [ 741.765836][T16213] [ 741.768240][T16213] Reported by Kernel Concurrency Sanitizer on: [ 741.774386][T16213] CPU: 0 UID: 0 PID: 16213 Comm: syz.8.4183 Tainted: G W 6.17.0-rc1-syzkaller-00111-g24ea63ea3877 #0 PREEMPT(voluntary) [ 741.788448][T16213] Tainted: [W]=WARN [ 741.792248][T16213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 741.802311][T16213] ================================================================== SYZFAIL: failed to send rpc fd=3 want=56 sent=0 n=-1 (errno 32: Broken pipe) [ 741.978195][ T6576] syz_tun (unregistering): left allmulticast mode [ 741.984744][ T6576] syz_tun (unregistering): left promiscuous mode [ 741.991145][ T6576] bridge0: port 3(syz_tun) entered disabled state [ 742.392522][ T2899] bridge_slave_1: left allmulticast mode [ 742.398205][ T2899] bridge_slave_1: left promiscuous mode [ 742.403874][ T2899] bridge0: port 2(bridge_slave_1) entered disabled state [ 742.415898][ T2899] bridge_slave_0: left allmulticast mode [ 742.421727][ T2899] bridge_slave_0: left promiscuous mode [ 742.427384][ T2899] bridge0: port 1(bridge_slave_0) entered disabled state [ 742.562129][ T2899] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 742.571413][ T2899] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 742.581178][ T2899] bond0 (unregistering): (slave macvlan1): Releasing backup interface [ 742.590025][ T2899] bond0 (unregistering): Released all slaves [ 742.622538][ T2899] tipc: Disabling bearer [ 742.627792][ T2899] tipc: Left network mode [ 742.637247][ T2899] hsr_slave_0: left promiscuous mode [ 742.643099][ T2899] hsr_slave_1: left promiscuous mode [ 742.649239][ T2899] pim6reg (unregistering): left allmulticast mode [ 742.684287][ T2899] team0 (unregistering): Port device team_slave_1 removed [ 742.695034][ T2899] team0 (unregistering): Port device team_slave_0 removed [ 742.843342][ T29] kauditd_printk_skb: 314 callbacks suppressed [ 742.843356][ T29] audit: type=1400 audit(1254.820:33747): avc: denied { search } for pid=16247 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 742.871432][ T29] audit: type=1400 audit(1254.820:33748): avc: denied { search } for pid=16247 comm="rm" name="dhcpcd" dev="tmpfs" ino=478 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 742.893215][ T29] audit: type=1400 audit(1254.820:33749): avc: denied { search } for pid=16247 comm="rm" name="hook-state" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 742.914965][ T29] audit: type=1400 audit(1254.820:33750): avc: denied { search } for pid=16235 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 742.937698][ T29] audit: type=1400 audit(1254.850:33751): avc: denied { search } for pid=16248 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 742.959603][ T29] audit: type=1400 audit(1254.880:33752): avc: denied { search } for pid=3033 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 742.980671][ T29] audit: type=1400 audit(1254.880:33753): avc: denied { search } for pid=3033 comm="dhcpcd" name="udev" dev="tmpfs" ino=9 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 743.001843][ T29] audit: type=1400 audit(1254.880:33754): avc: denied { search } for pid=3033 comm="dhcpcd" name="data" dev="tmpfs" ino=13 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 743.023105][ T29] audit: type=1400 audit(1254.880:33755): avc: denied { read } for pid=3033 comm="dhcpcd" name="n42" dev="tmpfs" ino=14069 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 743.041305][T16262] audit: audit_backlog=65 > audit_backlog_limit=64 [ 743.058221][ T2899] ------------[ cut here ]------------ [ 743.063968][ T2899] WARNING: CPU: 1 PID: 2899 at net/xfrm/xfrm_state.c:3303 xfrm_state_fini+0x179/0x1f0 [ 743.074413][ T2899] Modules linked in: [ 743.078368][ T2899] CPU: 1 UID: 0 PID: 2899 Comm: kworker/u8:8 Tainted: G W 6.17.0-rc1-syzkaller-00111-g24ea63ea3877 #0 PREEMPT(voluntary) [ 743.092661][ T2899] Tainted: [W]=WARN [ 743.096473][ T2899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 743.106638][ T2899] Workqueue: netns cleanup_net [ 743.111514][ T2899] RIP: 0010:xfrm_state_fini+0x179/0x1f0 [ 743.117121][ T2899] Code: 48 8d bb 30 0e 00 00 e8 05 0a bd fc 48 8b bb 30 0e 00 00 e8 c9 8a c9 fc 5b 41 5e 41 5f 5d e9 0e 8d b3 00 cc e8 58 4c a2 fc 90 <0f> 0b 90 e9 d9 fe ff ff e8 4a 4c a2 fc 90 0f 0b 90 4c 89 f7 e8 ce [ 743.136805][ T2899] RSP: 0018:ffffc900031c7c60 EFLAGS: 00010293 [ 743.143053][ T2899] RAX: ffffffff84b5ad58 RBX: ffff88811b5897c0 RCX: ffff8881029a6300 [ 743.151088][ T2899] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88811b58a5c0 [ 743.159121][ T2899] RBP: ffffffff86c8b7a0 R08: 0001ffff86847f7f R09: 0000000000000000 [ 743.167641][ T2899] R10: ffffc900031c7be8 R11: 0001c900031c7be8 R12: ffffffff86c8b7c0 [ 743.176120][ T2899] R13: ffff88811b5897e8 R14: ffff88811b58a5c0 R15: ffff88811b5897c0 [ 743.184148][ T2899] FS: 0000000000000000(0000) GS:ffff8882aef44000(0000) knlGS:0000000000000000 [ 743.193221][ T2899] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 743.199829][ T2899] CR2: 000055c9824efda8 CR3: 00000001028d0000 CR4: 00000000003506f0 [ 743.207846][ T2899] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 743.215858][ T2899] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 743.223883][ T2899] Call Trace: [ 743.227178][ T2899] [ 743.230223][ T2899] xfrm_net_exit+0x2d/0x60 [ 743.234676][ T2899] ops_undo_list+0x27b/0x410 [ 743.239336][ T2899] cleanup_net+0x2de/0x4d0 [ 743.243862][ T2899] process_scheduled_works+0x4cb/0x9d0 [ 743.249401][ T2899] worker_thread+0x582/0x770 [ 743.254582][ T2899] kthread+0x489/0x510 [ 743.258676][ T2899] ? finish_task_switch+0xad/0x2b0 [ 743.263824][ T2899] ? __pfx_worker_thread+0x10/0x10 [ 743.269053][ T2899] ? __pfx_kthread+0x10/0x10 [ 743.273790][ T2899] ret_from_fork+0xda/0x150 [ 743.278313][ T2899] ? __pfx_kthread+0x10/0x10 [ 743.282996][ T2899] ret_from_fork_asm+0x1a/0x30 [ 743.287808][ T2899] [ 743.290889][ T2899] ---[ end trace 0000000000000000 ]--- [ 743.519762][ T2899] bridge_slave_1: left allmulticast mode [ 743.525548][ T2899] bridge_slave_1: left promiscuous mode [ 743.531353][ T2899] bridge0: port 2(bridge_slave_1) entered disabled state [ 743.544005][ T2899] bridge_slave_0: left allmulticast mode [ 743.549777][ T2899] bridge_slave_0: left promiscuous mode [ 743.555441][ T2899] bridge0: port 1(bridge_slave_0) entered disabled state [ 743.592943][ T2899] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 743.602265][ T2899] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 743.611338][ T2899] bond0 (unregistering): Released all slaves [ 743.651911][ T2899] tipc: Left network mode [ 743.659122][ T2899] hsr_slave_0: left promiscuous mode [ 743.666398][ T2899] hsr_slave_1: left promiscuous mode [ 743.699640][ T2899] team0 (unregistering): Port device team_slave_1 removed [ 743.710087][ T2899] team0 (unregistering): Port device team_slave_0 removed