last executing test programs: 5.372463852s ago: executing program 0 (id=14111): r0 = syz_usb_connect(0x0, 0x4d, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x102, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x20075, r2}, 0x38) openat(0xffffffffffffff9c, 0x0, 0x4000, 0x12c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x280000b, 0x28011, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10) bind$bt_hci(r1, &(0x7f0000000140)={0x1f, 0xffff, 0x2}, 0x6) syz_usb_control_io$hid(r0, &(0x7f0000001a80)={0x24, 0x0, &(0x7f00000008c0)={0x0, 0x3, 0x2, @string={0x2}}, 0x0, 0x0}, 0x0) 5.075637779s ago: executing program 1 (id=14112): syz_mount_image$ext4(&(0x7f0000000800)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2040d0, &(0x7f0000000c40)={[{@jqfmt_vfsv0}, {@abort}, {@barrier}, {@barrier}, {@test_dummy_encryption}, {@nomblk_io_submit}]}, 0xfb, 0x49f, &(0x7f0000001440)="$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") r0 = add_key$user(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, r0, 0x0) mkdir(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000cc0), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) syz_emit_ethernet(0x36, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaabb08"], 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) 4.72854244s ago: executing program 4 (id=14113): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001400010000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x2e, &(0x7f0000001000)={@local, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) 4.6181132s ago: executing program 4 (id=14114): bpf$MAP_CREATE(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r4, 0x0, 0x42, &(0x7f00000003c0)={'icmp\x00'}, &(0x7f0000000400)=0x1e) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f00000083c0)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000140)={0x0, 0x3, 0x3ff}) 4.227432326s ago: executing program 1 (id=14116): mkdir(&(0x7f0000002200)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 4.167508801s ago: executing program 1 (id=14117): getresgid(&(0x7f0000000c40), &(0x7f0000000140), &(0x7f0000000240)=0x0) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000200)='./file0\x00', 0x10814, &(0x7f0000000700)=ANY=[@ANYBLOB='umask=00000000000000000000000,flush,nodots,dots,gid=', @ANYRESHEX=r0, @ANYBLOB="00006b746769643d0092", @ANYRESDEC, @ANYBLOB="1500bba7d41fabba4332de3ca642acf6f8de847e3f21783608008708a887d30aaf0a14b0691d48445fe3b4d1ddde1b81337b2c3b5f88535d7f6fa931b84783704494cebe49ca9f6269b05edde0246c360d0566b4056f0f02ccab035d3d0a5cde0b31bd424949fe23c0a0a25691738006c5c6acdf101fecdb4f79abdfb95c6afaea03dd5903b5240565f31504c207a9a2aa6c8108fb973081e90412a3c6cfa3b2513693727fad9acd8108acb8b90fab033c9dac0dc3e5a61c513e7b5edc5d76320f0e54045ea2b7b8fb1f78d3d346e26ee5ed6926cea1ffe0a1"], 0x1, 0x1fa, &(0x7f0000000500)="$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") syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x4000, &(0x7f0000000380)={[{@test_dummy_encryption}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x84}}, {@stripe={'stripe', 0x3d, 0x7}}, {@commit={'commit', 0x3d, 0x5}}, {@orlov}, {@barrier_val={'barrier', 0x3d, 0x5}}, {@max_batch_time}, {@data_err_abort}]}, 0xd, 0x5d8, &(0x7f0000000c00)="$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") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(0x0, 0x1, &(0x7f0000000140)={0x8, 0x100000000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="12010000000000084c05e60c00000000000109022400010000000009040000010300000009210000000122070009058103"], 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="11b2000000000900000000000000000000000002", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000080b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) setitimer(0x0, &(0x7f0000000300)={{0x77359400}, {0x0, 0x2710}}, 0x0) mkdir(&(0x7f0000000140)='./control\x00', 0x9) r4 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) close(r4) fcntl$setstatus(r4, 0x4, 0x2c00) r5 = gettid() fcntl$setown(r4, 0x8, r5) fcntl$setsig(0xffffffffffffffff, 0xa, 0xe) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000040)={[0xffffffffffff7ff8]}, 0x0, 0x0, 0x8) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) 3.443499837s ago: executing program 3 (id=14118): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1900000004000000040000000800000000000000", @ANYRES32=0x0, @ANYRES32], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r2 = getpid() sched_setscheduler(r2, 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000005, 0x10010, 0xffffffffffffffff, 0xc4dc5000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f0000000800)=[{{&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000000400)=[{&(0x7f0000000000)=""/43, 0x2b}, {&(0x7f0000000380)=""/101, 0x65}, {&(0x7f0000000580)=""/251, 0xfb}], 0x3, &(0x7f00000014c0)=""/4096, 0x1000}, 0x6}, {{&(0x7f00000004c0)=@hci, 0x80, &(0x7f0000000700)=[{&(0x7f0000000680)=""/122, 0x7a}], 0x1, &(0x7f0000000780)=""/113, 0x71}, 0x3}], 0x2, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14967e, 0x0) gettid() prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000400", @ANYRES32, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='mm_page_alloc\x00', r5}, 0x10) syz_emit_ethernet(0x46, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/profiling', 0xa0042, 0x0) write$tcp_mem(r6, &(0x7f0000000280)={0x11, 0x2d, 0x0, 0x3a, 0xfffffffffffffffe, 0x2c}, 0x48) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) 3.443031537s ago: executing program 4 (id=14119): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000013007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000010c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001000)=@newlink={0x88, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x60, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x50, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x34, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}, @IFLA_VLAN_QOS_MAPPING={0xc}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0xb4}}]}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x88}, 0x1, 0xba01}, 0x0) 3.208941159s ago: executing program 2 (id=14120): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) openat$ppp(0xffffff9c, &(0x7f00000003c0), 0x284a40, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'ip6tnl0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000440)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x2d) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001000010700000000000000000a000028060001001a"], 0x1c}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r4) 3.067595302s ago: executing program 0 (id=14121): unshare(0x8000000) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r5, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="8d", 0x1, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0xf, "000000000f000000000f00000e00"}}}]}, 0x48}}, 0x0) 2.581757616s ago: executing program 4 (id=14122): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x21c916, &(0x7f0000000400), 0x1b, 0x4c5, &(0x7f0000000ec0)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e0000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r0}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @local, @private}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x9}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0xa, 0x0, 0x0, 0x2, 0x210, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r5, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007208", 0x39}], 0x1) 2.558326158s ago: executing program 3 (id=14123): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x1b) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fdffffff850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r3, @ANYBLOB="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"], 0x1c8}}, 0x0) 2.389526243s ago: executing program 2 (id=14124): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000140)=0x6, 0x4) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000), 0x4) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001100)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r3) 2.360675585s ago: executing program 2 (id=14125): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x21c916, &(0x7f0000000400), 0x1b, 0x4c5, &(0x7f0000000ec0)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e0000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r0}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @local, @private}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x9}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0xa, 0x0, 0x0, 0x2, 0x210, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007208", 0x39}], 0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013000318680907070000000f0000ff3f04000000170a001700000000040037000d00030001332564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) 2.318089479s ago: executing program 3 (id=14126): syz_mount_image$ext4(&(0x7f0000000800)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x2040d0, &(0x7f0000000c40)={[{@jqfmt_vfsv0}, {@abort}, {@barrier}, {@barrier}, {@test_dummy_encryption}, {@nomblk_io_submit}]}, 0xfb, 0x49f, &(0x7f0000001440)="$eJzs3E1oHFUcAPD/bJJW+5VY60dr1WgVix9Jm1bbg+AHCB5UBD3U45qmpXbbSBPBlGCjlHoRtCBeRfEiePbgyZOoJ8GLB71LoUgurZ5WZndm3Xzsh9tNNx+/H0znvcnbfe/NzJt5b15nA9iwhtN/kohtEfF7RAxGRGFxguHq6vr87Pjf87PjSZTLr/2VpB+La/Oz43nSJFtvrUb601XhYhLPLpPv1Mz508VSaeJcFh+dPvP26NTM+SdOnSmenDg5cXbs6NHDhw4eeWrsya7U87a0rHvem9y7+8U3Lr88fuzymz99k9QVur4e3TEQc3X7ZLGHu5tZz22vCyf9TZMWVrwwtG1zRKWhDlTa/2D0XdxR+9tgvPBBTwsHrKhyuVwea/znuTKwjiXR6xIAvZHf6K/NfzaejoG7Pw5e3a4+Vx0ApfW+ni3VQU9/baA6sGh8202zEXFs7p/P0yVW5DkEAMBC36f9n8er/Y6F/b9C3FmXbkc2NzSUzaXsjIjbI2JXRNwRUUl7V0Tc/T/zH14UX9r/KVzpqGJtSvt/T2dzW/mS5ZsnGerLYtsr9R9ITpwqTRzI9sn+GNicxg8u++1JVCaB4tePG+U/XNf/S5c0/7wvmJXjSv/mhZ85Xpwu3nDFM1ffj9jTv1z9swm8bA5rd0Ts6TCPU49+vXfhlr5aqHX9m2g+z9SW8hcRj1SP/1wsqn8uaT4/OXpLlCYOjOZnxVI//3Lp1Ub531D9uyA9/luWPf9r9R9K6udrp5Z8xaZWeVz648OGY5rhiGeig/N/U/L6gszfLU5PnzsYsSl5aen2ugfceTxPn9Z//77l2//O+G9P3BMR6Ul8b0TcFxH3Z8fugYh4MCL2Nan/j88/9FaT+vf0+Ed2hWrr+OfHoXoi1M6IVoG+0z981yjz9q5/hyuh/dmWdq5/7Raww30GAAAAa0ohIrZFUhiphQuFkZHq/+HfFVsKpcmp6cdOTL5z9nj1HYGhGCjkT7oGs3hkzz+HqvHK6Husso64kD0vPZQ9N/6079ZKfGR8snS815WHDW5rg/af+rOv16UDVlwX5tGANapZ+//yyE0sCHDTdX7/13OAta5FK/aDDbCOuYvDxrVc+7/Qg3IAN1/j+/+ErgGsc7VG/kkbiete91r88iaw9rjJw8bVuv2/slK/fwX0Tvtv8a+WQJIs2BJfRTT/VNL7MncQ+Gh1FKNxIAqrohgdB4qroxitAnlDnTl/ur/tX7WYKV8olkq/fXsjuff2ugQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANAt/wYAAP//73DflA==") r0 = add_key$user(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, r0, 0x0) mkdir(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000cc0), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) syz_emit_ethernet(0x36, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaabb08"], 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) 2.223328698s ago: executing program 0 (id=14127): r0 = socket(0x10, 0x400000000080803, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000480)=@ethtool_ringparam={0x4, 0x0, 0x5, 0x0, 0x8fc3, 0x1, 0x20000}}) 2.074126662s ago: executing program 0 (id=14128): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400), 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) fsmount(r2, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 1.660174199s ago: executing program 4 (id=14129): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) pipe(&(0x7f00000045c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000003c0)=[{&(0x7f00000000c0)="17e4f3ca3c05", 0x2b}, {&(0x7f0000000200)="abc46908b3df918fe61946b2a7d85cf473884b91c53b94d51db7a5918ed07847c392ee17a23d6fea6e8d3c0f5e15638daf629312107876c7f31ade70432bc5b43f642876bf7e04c45086b9b3695182eeff8243f87f8966baec1a670803eb8ca6b37342f9ea242f21e5726b6c501808457f85459c91ff1116eae79e54b5ec3544ebbb18ee617231e4bdb87424814565dfb6ebe0", 0x93}, {&(0x7f0000000580)="db56b84884ffc02c06bd0f01587a681de55a4df7714790716dddfa75831670014c811bd064f615db698adab368dafbf134b3d26a38503c3fe8a7c5ece07759b81233530ed432985e4feebb5d4ca49dcb8c490c015acacef99f7da736180800000000000000ba12b327f6b79ea0d90605040d84453eff84443a09ab5eeba1586f85c1e383f8095573726b1bf117d96c91d1349f4951ead7fd07838ce689e171c4bda933d8fc5c35ce2fcbc1c5bae12537482f023984c435e056b2e8a6613a841360d40172a17e494ae06d5af1305ffa1eb9cbcedd90b7de636015883d0d3473c4bdfd1f", 0xe0}, {&(0x7f0000000140)="d80a642bc17284b8945c0c21fcd2df4e9cf2a68e854560584ed04f62aebae0dab1e7c4", 0x2a}, {&(0x7f00000004c0)="67df3baec1ce766316819b76b14295d4f969f2095747039d8a9e01159fc171d6ab964bc50f5d66ab6bcdefa298582348a01ac90b6ecd3001c769cf58704f758dae3ecd02919b7e1eebc643c57afec3b45811ab935a8f893220c7329def2702370b371c3966c553ce13a625dfddbe8bc98f220a9ff6ac6a09165c1273ac580916e65995994307bb637dba5994702e22a333a3d48507689db92142d492c5ca788f11ff4a5c51adfcec8f7e15467d446025f37f9c", 0xb3}, {&(0x7f00000002c0)="2b4f2c23cd72e5f8c27c5125a38cc74027abf1994ab65ba7ca4e64b9ab8b357454e5abb6d754f1318dd05531dce7560e6e7d95526c4358848e67345b32b86de0ff15be80ddf3dab5b55443991f2b4d7276d4d6334a4385a70581c45a6926fc7874e38018387a2d6195df3281ba32a96811d4e9e40b1cf5b927", 0x2a}], 0x6, 0x8) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r4, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000080)=0xfffffffa, 0x4) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x8000, 0x0) 1.555823589s ago: executing program 4 (id=14130): bpf$MAP_CREATE(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r4, 0x0, 0x42, &(0x7f00000003c0)={'icmp\x00'}, &(0x7f0000000400)=0x1e) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f00000083c0)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000140)={0x0, 0x3, 0x3ff}) 1.342060798s ago: executing program 2 (id=14131): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 1.32914823s ago: executing program 2 (id=14132): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000013007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000010c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001000)=@newlink={0x88, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x60, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x50, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x34, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}, @IFLA_VLAN_QOS_MAPPING={0xc}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0xb4}}]}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x88}, 0x1, 0xba01}, 0x0) 1.239605338s ago: executing program 3 (id=14133): syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[], 0x9, 0x2a8, &(0x7f0000000500)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x2b442, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0xc, &(0x7f0000000000)=0xfffffbfb, 0x4) add_key$keyring(&(0x7f0000000180), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = dup(r4) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x13d, 0x0, 0x0, 0x204}}) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 1.158127165s ago: executing program 1 (id=14134): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x35) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket(0x1d, 0x3, 0x1) connect$unix(r4, &(0x7f0000000300)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_pts(r5, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, 0x0) 1.017854888s ago: executing program 0 (id=14135): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) openat$ppp(0xffffff9c, &(0x7f00000003c0), 0x284a40, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'ip6tnl0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000440)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x2d) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001000010700000000000000000a000028060001001a"], 0x1c}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r4) 406.525063ms ago: executing program 3 (id=14136): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = socket$packet(0x11, 0x3, 0x300) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r1, &(0x7f0000002800)=[{&(0x7f0000002500)='\f7', 0x2}], 0x1) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x14) 162.795395ms ago: executing program 2 (id=14137): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x1b) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fdffffff850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r5, @ANYBLOB="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"], 0x1c8}}, 0x0) 162.290365ms ago: executing program 3 (id=14138): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="000079b520ee7ed309acccef0be82ab9e7ad100080000400000000f800e0ff00e0000000a0bc5dd200da63fff19a8a14e4b70f6e8814c9f76bd3e6fcc4ab908a026f6113fe35e343dc349533aba1b371fbbe49", @ANYRES32=0x0, @ANYBLOB='\x00'/25], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000000040000", @ANYRES32=0x0, @ANYBLOB, @ANYBLOB='\x00'/14], 0x48) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x32, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) faccessat(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r5}, 0x18) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000280)='./binderfs2/binder1\x00', 0x1002, 0x0) 137.067498ms ago: executing program 0 (id=14139): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r5 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000180)={0x0, r5}) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000013007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000010c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001000)=@newlink={0x88, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x60, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x50, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x34, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}, @IFLA_VLAN_QOS_MAPPING={0xc}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0xb4}}]}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x88}, 0x1, 0xba01}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)=@newlink={0x4c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x2}, @IFLA_GRE_ERSPAN_DIR={0x5}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x4c}}, 0x0) write(r0, &(0x7f0000000200)="240000001a005f0014f9f507000909000a08c200000000", 0x17) r10 = syz_open_dev$loop(&(0x7f0000000400), 0xb, 0x2000) ioctl$LOOP_SET_CAPACITY(r10, 0x4c07) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000080)='wg2\x00', 0x4) 408.52µs ago: executing program 1 (id=14140): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000280)=0xf) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x2c}}}, 0x1e) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x10) connect$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000280)="c021", 0x1700}], 0x1) 0s ago: executing program 1 (id=14141): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000002d00000095"], 0x0, 0x100000, 0x0, 0x0, 0xb75eec6f1021e6f6, 0x0, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008000000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x3, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507005c0ef5dcc0d6eb07000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) kernel console output (not intermixed with test programs): 94967295 subj=root:sysadm_r:sysadm_t pid=8937 comm="syz.0.13068" exe="/root/syz-executor" sig=0 arch=c000003e syscall=226 compat=0 ip=0x7f692f10dff9 code=0x7ffc0000 [ 861.017013][ T29] audit: type=1326 audit(1727564336.310:56856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8937 comm="syz.0.13068" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7ffc0000 [ 861.221647][ T8948] netlink: 40 bytes leftover after parsing attributes in process `syz.3.13072'. [ 861.524462][ T8950] netlink: 24 bytes leftover after parsing attributes in process `syz.0.13070'. [ 862.703371][ T29] audit: type=1326 audit(1727564338.137:56857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8973 comm="syz.0.13079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7ffc0000 [ 862.727282][ T29] audit: type=1326 audit(1727564338.137:56858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8973 comm="syz.0.13079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=226 compat=0 ip=0x7f692f10dff9 code=0x7ffc0000 [ 862.751128][ T29] audit: type=1326 audit(1727564338.137:56859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8973 comm="syz.0.13079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7ffc0000 [ 862.922990][ T8989] netlink: 40 bytes leftover after parsing attributes in process `syz.2.13084'. [ 862.934515][ T8990] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 862.950738][ T8990] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 863.167505][ T8995] syz.4.13085[8995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 863.167708][ T8995] syz.4.13085[8995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 863.179427][ T8995] syz.4.13085[8995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 863.283319][ T8996] sch_tbf: burst 53766 is lower than device lo mtu (65550) ! [ 863.353253][ T8997] lo speed is unknown, defaulting to 1000 [ 863.692147][ T9003] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 863.701354][ T9003] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 864.131348][ T29] audit: type=1326 audit(1727564339.638:56860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9007 comm="syz.2.13091" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 865.352978][ T9033] serio: Serial port ptm0 [ 865.432968][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 865.432983][ T29] audit: type=1326 audit(1727564340.993:56864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9038 comm="syz.3.13103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efd2dd3dff9 code=0x7ffc0000 [ 865.463019][ T29] audit: type=1326 audit(1727564340.993:56865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9038 comm="syz.3.13103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efd2dd3dff9 code=0x7ffc0000 [ 865.486673][ T29] audit: type=1326 audit(1727564340.993:56866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9038 comm="syz.3.13103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=226 compat=0 ip=0x7efd2dd3dff9 code=0x7ffc0000 [ 865.510732][ T29] audit: type=1326 audit(1727564340.993:56867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9038 comm="syz.3.13103" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efd2dd3dff9 code=0x7ffc0000 [ 865.517766][ T9045] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 865.566568][ T9044] sch_tbf: burst 53766 is lower than device lo mtu (65550) ! [ 865.570882][ T9045] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 865.580776][ T9047] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 865.599626][ T9047] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 865.664052][ T9050] lo speed is unknown, defaulting to 1000 [ 866.259116][ T29] audit: type=1400 audit(1727564341.801:56868): avc: denied { listen } for pid=9054 comm="syz.4.13107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 868.063165][ T28] bridge_slave_1: left allmulticast mode [ 868.070261][ T28] bridge_slave_1: left promiscuous mode [ 868.076058][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 868.084646][ T28] bridge_slave_0: left allmulticast mode [ 868.090459][ T28] bridge_slave_0: left promiscuous mode [ 868.096453][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 868.260162][ T9078] serio: Serial port ptm0 [ 868.313812][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 868.338427][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 868.358488][ T28] bond0 (unregistering): Released all slaves [ 868.436924][ T28] hsr_slave_0: left promiscuous mode [ 868.448619][ T28] hsr_slave_1: left promiscuous mode [ 868.454657][ T28] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 868.462225][ T28] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 868.470738][ T28] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 868.478415][ T28] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 868.489815][ T28] veth1_macvtap: left promiscuous mode [ 868.495419][ T28] veth0_macvtap: left promiscuous mode [ 868.500967][ T28] veth1_vlan: left promiscuous mode [ 868.506431][ T28] veth0_vlan: left promiscuous mode [ 869.073660][ T28] team0 (unregistering): Port device team_slave_1 removed [ 869.086250][ T28] team0 (unregistering): Port device team_slave_0 removed [ 869.291509][ T9111] serio: Serial port ptm0 [ 869.679815][ T28] IPVS: stop unused estimator thread 0... [ 869.811302][ T28] bridge_slave_1: left allmulticast mode [ 869.817156][ T28] bridge_slave_1: left promiscuous mode [ 869.822989][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 870.007030][ T28] bridge_slave_0: left allmulticast mode [ 870.012862][ T28] bridge_slave_0: left promiscuous mode [ 870.018663][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 870.347515][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 870.389219][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 870.424062][ T28] bond0 (unregistering): Released all slaves [ 870.450716][ T9131] netlink: 28 bytes leftover after parsing attributes in process `syz.3.13130'. [ 870.459879][ T9131] netlink: 28 bytes leftover after parsing attributes in process `syz.3.13130'. [ 870.529444][ T9130] netlink: 8 bytes leftover after parsing attributes in process `syz.1.13134'. [ 870.551470][ T28] hsr_slave_0: left promiscuous mode [ 870.558875][ T28] hsr_slave_1: left promiscuous mode [ 870.607432][ T28] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 870.615046][ T28] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 870.673328][ T28] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 870.681092][ T28] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 870.724480][ T28] veth1_macvtap: left promiscuous mode [ 870.730079][ T28] veth0_macvtap: left promiscuous mode [ 870.735812][ T28] veth1_vlan: left promiscuous mode [ 870.741105][ T28] veth0_vlan: left promiscuous mode [ 871.606248][ T28] team0 (unregistering): Port device team_slave_1 removed [ 871.617521][ T28] team0 (unregistering): Port device team_slave_0 removed [ 872.684181][ T9177] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 872.731739][ T9177] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 872.790686][ T9183] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 872.858124][ T9183] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 873.191954][ T9181] netlink: 28 bytes leftover after parsing attributes in process `syz.0.13149'. [ 873.201163][ T9181] netlink: 28 bytes leftover after parsing attributes in process `syz.0.13149'. [ 873.872928][ T29] audit: type=1326 audit(1727564349.863:56869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9209 comm="syz.1.13158" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7ffc0000 [ 874.034401][ T29] audit: type=1326 audit(1727564349.895:56870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9209 comm="syz.1.13158" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7ffc0000 [ 874.058318][ T29] audit: type=1326 audit(1727564349.895:56871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9209 comm="syz.1.13158" exe="/root/syz-executor" sig=0 arch=c000003e syscall=207 compat=0 ip=0x7f4e007cdff9 code=0x7ffc0000 [ 874.082226][ T29] audit: type=1326 audit(1727564349.895:56872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9209 comm="syz.1.13158" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7ffc0000 [ 874.106193][ T29] audit: type=1326 audit(1727564349.895:56873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9209 comm="syz.1.13158" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7ffc0000 [ 875.747282][ T9238] netlink: 12 bytes leftover after parsing attributes in process `syz.0.13165'. [ 875.753078][ T9240] serio: Serial port ptm0 [ 876.961927][ T9271] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 877.007196][ T9271] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 877.048310][ T9272] kernel profiling enabled (shift: 17) [ 877.657442][ T9284] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 877.666531][ T9284] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 877.784884][ T9287] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 877.793621][ T9287] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 877.818355][T19797] bridge_slave_1: left allmulticast mode [ 877.824516][T19797] bridge_slave_1: left promiscuous mode [ 877.830289][T19797] bridge0: port 2(bridge_slave_1) entered disabled state [ 877.888044][ T29] audit: type=1400 audit(1727564354.052:56874): avc: denied { read write } for pid=9283 comm="syz.2.13181" name="uhid" dev="devtmpfs" ino=228 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 877.911792][ T29] audit: type=1400 audit(1727564354.052:56875): avc: denied { open } for pid=9283 comm="syz.2.13181" path="/dev/uhid" dev="devtmpfs" ino=228 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 877.944284][T19797] bridge_slave_0: left allmulticast mode [ 877.949996][T19797] bridge_slave_0: left promiscuous mode [ 877.955756][T19797] bridge0: port 1(bridge_slave_0) entered disabled state [ 878.320562][T19797] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 878.334099][T19797] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 878.350963][T19797] bond0 (unregistering): Released all slaves [ 878.397661][T19797] hsr_slave_0: left promiscuous mode [ 878.407829][T19797] hsr_slave_1: left promiscuous mode [ 878.608136][T19797] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 878.615767][T19797] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 878.633420][T19797] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 878.641136][T19797] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 878.702993][T19797] veth1_macvtap: left promiscuous mode [ 878.708678][T19797] veth0_macvtap: left promiscuous mode [ 878.714200][T19797] veth1_vlan: left promiscuous mode [ 878.719503][T19797] veth0_vlan: left promiscuous mode [ 878.901880][T19797] team0 (unregistering): Port device team_slave_1 removed [ 878.914553][T19797] team0 (unregistering): Port device team_slave_0 removed [ 879.038940][ T9299] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 879.048157][ T9299] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 879.138922][ T9301] netlink: 8 bytes leftover after parsing attributes in process `syz.0.13186'. [ 880.585012][ T29] audit: type=1326 audit(1727564356.918:56876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9325 comm="syz.2.13194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 880.625166][ T29] audit: type=1326 audit(1727564356.939:56877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9325 comm="syz.2.13194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 880.648956][ T29] audit: type=1326 audit(1727564356.939:56878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9325 comm="syz.2.13194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=207 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 880.673269][ T29] audit: type=1326 audit(1727564356.939:56879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9325 comm="syz.2.13194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 880.697172][ T29] audit: type=1326 audit(1727564356.939:56880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9325 comm="syz.2.13194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 881.310018][ T9343] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 881.379046][ T9343] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 884.480131][ T9393] netlink: 8 bytes leftover after parsing attributes in process `syz.1.13214'. [ 884.620888][ T9401] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 885.051541][ T9401] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 885.079668][ T9405] netlink: 24 bytes leftover after parsing attributes in process `syz.2.13220'. [ 885.416025][ T9419] serio: Serial port ptm0 [ 885.515600][ T9425] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 885.540835][ T9425] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 887.015050][ T9433] netlink: 8 bytes leftover after parsing attributes in process `syz.2.13228'. [ 890.174329][ T9506] netlink: 24 bytes leftover after parsing attributes in process `syz.0.13250'. [ 890.440327][ T9515] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 890.506599][ T9515] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 891.268242][ T9531] netlink: 8 bytes leftover after parsing attributes in process `syz.2.13257'. [ 891.599854][ T9544] serio: Serial port ptm0 [ 892.123449][ T29] audit: type=1326 audit(1727564369.022:56881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9560 comm="syz.4.13267" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f702b18dff9 code=0x7fc00000 [ 892.507238][ T29] audit: type=1326 audit(1727564369.421:56882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9554 comm="syz.2.13265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7fc00000 [ 892.531010][ T29] audit: type=1326 audit(1727564369.421:56883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9554 comm="syz.2.13265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7d5988dff9 code=0x7fc00000 [ 892.554744][ T29] audit: type=1326 audit(1727564369.421:56884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9554 comm="syz.2.13265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7fc00000 [ 892.578589][ T29] audit: type=1326 audit(1727564369.421:56885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9554 comm="syz.2.13265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7fc00000 [ 892.602276][ T29] audit: type=1326 audit(1727564369.421:56886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9554 comm="syz.2.13265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7fc00000 [ 892.626080][ T29] audit: type=1326 audit(1727564369.421:56887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9554 comm="syz.2.13265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7fc00000 [ 892.650051][ T29] audit: type=1326 audit(1727564369.421:56888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9554 comm="syz.2.13265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7fc00000 [ 892.673824][ T29] audit: type=1326 audit(1727564369.421:56889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9554 comm="syz.2.13265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7fc00000 [ 892.697431][ T29] audit: type=1326 audit(1727564369.421:56890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9554 comm="syz.2.13265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7fc00000 [ 893.505717][ T9584] netlink: 8 bytes leftover after parsing attributes in process `syz.3.13274'. [ 894.602079][ T9618] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 894.630224][ T9618] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 894.779719][ T9620] netlink: 8 bytes leftover after parsing attributes in process `syz.1.13287'. [ 897.008438][ T9688] serio: Serial port ptm0 [ 897.715174][ T212] bridge_slave_1: left allmulticast mode [ 897.720927][ T212] bridge_slave_1: left promiscuous mode [ 897.726788][ T212] bridge0: port 2(bridge_slave_1) entered disabled state [ 897.735171][ T212] bridge_slave_0: left allmulticast mode [ 897.740909][ T212] bridge_slave_0: left promiscuous mode [ 897.746746][ T212] bridge0: port 1(bridge_slave_0) entered disabled state [ 898.203092][ T212] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 898.224845][ T212] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 898.411818][ T212] bond0 (unregistering): Released all slaves [ 898.581815][ T212] hsr_slave_0: left promiscuous mode [ 898.628536][ T212] hsr_slave_1: left promiscuous mode [ 898.651298][ T212] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 898.658987][ T212] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 898.726861][ T212] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 898.734531][ T212] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 898.765726][ T212] veth1_macvtap: left promiscuous mode [ 898.771600][ T212] veth0_macvtap: left promiscuous mode [ 898.777178][ T212] veth1_vlan: left promiscuous mode [ 898.782418][ T212] veth0_vlan: left promiscuous mode [ 899.621866][ T9739] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 899.640293][ T9739] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 899.751844][ T212] team0 (unregistering): Port device team_slave_1 removed [ 899.773256][ T212] team0 (unregistering): Port device team_slave_0 removed [ 899.827855][ T9759] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 899.842169][ T9759] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 899.981494][ T29] kauditd_printk_skb: 190 callbacks suppressed [ 899.981510][ T29] audit: type=1326 audit(1727564377.274:57081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9763 comm="syz.1.13336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7ffc0000 [ 900.060548][ T29] audit: type=1326 audit(1727564377.316:57082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9763 comm="syz.1.13336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4e007cdff9 code=0x7ffc0000 [ 900.084355][ T29] audit: type=1326 audit(1727564377.316:57083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9763 comm="syz.1.13336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7ffc0000 [ 900.108023][ T29] audit: type=1326 audit(1727564377.316:57084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9763 comm="syz.1.13336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7ffc0000 [ 900.131641][ T29] audit: type=1326 audit(1727564377.316:57085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9763 comm="syz.1.13336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4e007cdff9 code=0x7ffc0000 [ 900.155396][ T29] audit: type=1326 audit(1727564377.316:57086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9763 comm="syz.1.13336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7ffc0000 [ 900.179117][ T29] audit: type=1326 audit(1727564377.316:57087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9763 comm="syz.1.13336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4e007cdff9 code=0x7ffc0000 [ 900.202784][ T29] audit: type=1326 audit(1727564377.316:57088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9763 comm="syz.1.13336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7ffc0000 [ 900.226609][ T29] audit: type=1326 audit(1727564377.316:57089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9763 comm="syz.1.13336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=429 compat=0 ip=0x7f4e007cdff9 code=0x7ffc0000 [ 900.250513][ T29] audit: type=1326 audit(1727564377.316:57090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9763 comm="syz.1.13336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7ffc0000 [ 902.292605][ T9808] netlink: 8 bytes leftover after parsing attributes in process `syz.3.13350'. [ 903.720229][ T9842] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 903.729465][ T9842] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 903.890556][ T9850] netlink: 8 bytes leftover after parsing attributes in process `syz.3.13363'. [ 907.317855][ T9920] netlink: 24 bytes leftover after parsing attributes in process `syz.4.13382'. [ 907.442784][ T29] audit: type=1400 audit(1727564384.633:57091): avc: denied { bind } for pid=9909 comm="syz.3.13380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 907.586678][T19797] bridge_slave_1: left allmulticast mode [ 907.592727][T19797] bridge_slave_1: left promiscuous mode [ 907.598586][T19797] bridge0: port 2(bridge_slave_1) entered disabled state [ 907.644678][ T9929] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 907.658783][ T9928] serio: Serial port ptm0 [ 907.674557][T19797] bridge_slave_0: left allmulticast mode [ 907.680332][T19797] bridge_slave_0: left promiscuous mode [ 907.686207][T19797] bridge0: port 1(bridge_slave_0) entered disabled state [ 907.693464][ T9929] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 907.720952][T19797] bridge_slave_1: left allmulticast mode [ 907.726819][T19797] bridge_slave_1: left promiscuous mode [ 907.732563][T19797] bridge0: port 2(bridge_slave_1) entered disabled state [ 907.778976][T19797] bridge_slave_0: left allmulticast mode [ 907.784669][T19797] bridge_slave_0: left promiscuous mode [ 907.790593][T19797] bridge0: port 1(bridge_slave_0) entered disabled state [ 908.133383][ T9950] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 908.143612][ T9950] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 908.309028][T19797] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 908.332877][T19797] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 908.345326][T19797] bond0 (unregistering): Released all slaves [ 908.364535][T19797] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 908.489769][T19797] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 908.508791][T19797] bond0 (unregistering): Released all slaves [ 908.964320][T19797] tipc: Disabling bearer [ 908.969674][T19797] tipc: Left network mode [ 909.013094][T19797] hsr_slave_0: left promiscuous mode [ 909.025319][T19797] hsr_slave_1: left promiscuous mode [ 909.039277][T19797] batman_adv: batadv0: Interface deactivated: dummy0 [ 909.046290][T19797] batman_adv: batadv0: Removing interface: dummy0 [ 909.053897][T19797] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 909.061527][T19797] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 909.084476][T19797] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 909.092051][T19797] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 909.095186][ T9979] serio: Serial port ptm0 [ 909.121609][T19797] hsr_slave_0: left promiscuous mode [ 909.139390][T19797] hsr_slave_1: left promiscuous mode [ 909.175326][T19797] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 909.182973][T19797] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 909.199207][T19797] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 909.206825][T19797] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 909.244150][T19797] veth1_macvtap: left promiscuous mode [ 909.249793][T19797] veth0_macvtap: left promiscuous mode [ 909.255405][T19797] veth1_vlan: left promiscuous mode [ 909.260680][T19797] veth0_vlan: left promiscuous mode [ 909.293549][T19797] veth1_macvtap: left promiscuous mode [ 909.299196][T19797] veth0_macvtap: left promiscuous mode [ 909.304762][T19797] veth1_vlan: left promiscuous mode [ 909.310112][T19797] veth0_vlan: left promiscuous mode [ 909.646728][T19797] team0 (unregistering): Port device team_slave_1 removed [ 909.676021][T19797] team0 (unregistering): Port device team_slave_0 removed [ 909.861878][T19797] team0 (unregistering): Port device team_slave_1 removed [ 909.873617][T19797] team0 (unregistering): Port device team_slave_0 removed [ 910.233004][T10005] usb usb7: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 910.530892][T10020] serio: Serial port ptm0 [ 912.157527][T10056] serio: Serial port ptm1 [ 913.574757][T10095] netlink: 128 bytes leftover after parsing attributes in process `syz.3.13431'. [ 913.658642][T10100] serio: Serial port ptm0 [ 917.187009][ T29] audit: type=1326 audit(1727564395.330:57092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10167 comm="syz.4.13460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f702b18dff9 code=0x7fc00000 [ 917.210990][ T29] audit: type=1326 audit(1727564395.330:57093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10167 comm="syz.4.13460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f702b18dff9 code=0x7fc00000 [ 917.400184][T10178] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 917.485130][T10178] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 917.785795][ T29] audit: type=1326 audit(1727564395.960:57094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10167 comm="syz.4.13460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f702b18dff9 code=0x7fc00000 [ 918.484713][T10204] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 918.493512][T10204] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 918.810093][T10210] serio: Serial port ptm0 [ 920.963732][T10253] serio: Serial port ptm0 [ 921.726247][T10280] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 921.748654][T10280] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 923.543600][T10307] serio: Serial port ptm0 [ 923.634060][T10318] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 923.642771][T10318] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 926.493409][T10365] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 926.502291][T10365] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 927.098443][ T29] audit: type=1400 audit(1727564405.734:57095): avc: denied { recv } for pid=10366 comm="syz.0.13517" saddr=10.128.0.163 src=46572 daddr=10.128.1.28 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 928.390436][T10395] serio: Serial port ptm0 [ 928.946704][T10410] netlink: 8 bytes leftover after parsing attributes in process `syz.3.13529'. [ 929.830364][T10439] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 929.840202][T10439] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 930.344883][T10466] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 930.423823][T10466] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 932.215833][T10502] serio: Serial port ptm0 [ 932.878139][ T29] audit: type=1326 audit(1727564411.802:57096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10514 comm="syz.2.13564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 932.903223][ T29] audit: type=1326 audit(1727564411.802:57097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10514 comm="syz.2.13564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 932.927155][ T29] audit: type=1326 audit(1727564411.802:57098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10514 comm="syz.2.13564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 932.950951][ T29] audit: type=1326 audit(1727564411.802:57099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10514 comm="syz.2.13564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 932.974928][ T29] audit: type=1326 audit(1727564411.802:57100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10514 comm="syz.2.13564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 932.998931][ T29] audit: type=1326 audit(1727564411.802:57101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10514 comm="syz.2.13564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 933.022894][ T29] audit: type=1326 audit(1727564411.844:57102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10514 comm="syz.2.13564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 933.046821][ T29] audit: type=1326 audit(1727564411.844:57103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10514 comm="syz.2.13564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 933.118358][ T29] audit: type=1326 audit(1727564411.844:57104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10514 comm="syz.2.13564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=63 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 933.142163][ T29] audit: type=1326 audit(1727564411.844:57105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10514 comm="syz.2.13564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 933.290423][T10522] netlink: 8 bytes leftover after parsing attributes in process `syz.3.13567'. [ 933.382353][T10531] serio: Serial port ptm0 [ 933.916976][T10542] netlink: 9 bytes leftover after parsing attributes in process `syz.3.13572'. [ 933.964467][T10542] gretap0: entered promiscuous mode [ 933.975556][T10542] netlink: 5 bytes leftover after parsing attributes in process `syz.3.13572'. [ 933.984696][T10542] 0ªX¹¦D: renamed from gretap0 [ 934.036642][T10542] 0ªX¹¦D: left promiscuous mode [ 934.041618][T10542] 0ªX¹¦D: entered allmulticast mode [ 934.048625][T10542] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 935.117879][T10566] serio: Serial port ptm0 [ 935.822033][T10595] syz.3.13593[10595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 935.822200][T10595] syz.3.13593[10595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 935.833854][T10595] syz.3.13593[10595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 936.320525][T10603] serio: Serial port ptm0 [ 937.286258][T10626] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 937.294945][T10626] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 937.650975][ T29] kauditd_printk_skb: 144 callbacks suppressed [ 937.650993][ T29] audit: type=1326 audit(1727564416.820:57250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10617 comm="syz.3.13600" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7efd2dd3dff9 code=0x7fc00000 [ 938.342206][T10727] serio: Serial port ptm0 [ 938.747747][ T29] audit: type=1326 audit(1727564417.974:57251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10792 comm="syz.1.13612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 939.344222][ T29] audit: type=1326 audit(1727564418.594:57252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10792 comm="syz.1.13612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 939.368081][ T29] audit: type=1326 audit(1727564418.594:57253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10792 comm="syz.1.13612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 939.391990][ T29] audit: type=1326 audit(1727564418.594:57254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10792 comm="syz.1.13612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 939.557455][ T29] audit: type=1326 audit(1727564418.825:57255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10831 comm="syz.1.13616" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 940.216097][ T29] audit: type=1326 audit(1727564419.507:57256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10831 comm="syz.1.13616" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 940.240061][ T29] audit: type=1326 audit(1727564419.507:57257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10831 comm="syz.1.13616" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 940.263822][ T29] audit: type=1326 audit(1727564419.507:57258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10831 comm="syz.1.13616" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 940.287526][ T29] audit: type=1326 audit(1727564419.507:57259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10831 comm="syz.1.13616" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 940.416226][T10850] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 940.425578][T10850] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 942.593835][ T29] kauditd_printk_skb: 62 callbacks suppressed [ 942.593855][ T29] audit: type=1326 audit(1727564421.932:57322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10879 comm="syz.3.13631" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efd2dd3dff9 code=0x7fc00000 [ 943.262586][T10907] netlink: 9 bytes leftover after parsing attributes in process `syz.4.13641'. [ 943.272479][T10907] gretap0: entered promiscuous mode [ 943.280539][T10907] netlink: 5 bytes leftover after parsing attributes in process `syz.4.13641'. [ 943.290444][T10907] 0ªX¹¦D: renamed from gretap0 [ 943.308304][T10907] 0ªX¹¦D: left promiscuous mode [ 943.313438][T10907] 0ªX¹¦D: entered allmulticast mode [ 943.324609][T10907] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 944.600023][T10937] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 944.622549][T10937] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 944.786367][T10939] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 944.902424][ T29] audit: type=1326 audit(1727564424.368:57323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10925 comm="syz.2.13646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7fc00000 [ 944.926412][T10939] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 945.278621][T10948] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 945.288476][T10948] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 947.033982][T10986] serio: Serial port ptm0 [ 947.359944][T10997] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 947.381280][T10997] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 948.563269][T11012] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 948.592633][T11012] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 950.072719][T11044] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 950.091601][T11044] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 950.130831][ T29] audit: type=1326 audit(1727564429.921:57324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11040 comm="syz.1.13684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 950.739085][ T29] audit: type=1326 audit(1727564430.541:57325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11040 comm="syz.1.13684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 950.811970][T11053] syz.3.13688[11053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 950.812099][T11053] syz.3.13688[11053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 950.823890][T11053] syz.3.13688[11053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 951.374458][T11065] netlink: 5 bytes leftover after parsing attributes in process `syz.1.13689'. [ 951.395039][T11065] 0ªX¹¦D: renamed from gretap0 (while UP) [ 951.520684][T11065] 0ªX¹¦D: entered allmulticast mode [ 951.526686][T11065] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 953.697549][T11103] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 953.731974][T11103] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 954.964510][T11118] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 954.981220][T11118] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 955.523487][T11136] netlink: 24 bytes leftover after parsing attributes in process `syz.0.13713'. [ 956.409523][ T29] audit: type=1400 audit(1727564436.377:57326): avc: denied { connect } for pid=11139 comm="syz.1.13715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 956.429560][ T29] audit: type=1400 audit(1727564436.377:57327): avc: denied { write } for pid=11139 comm="syz.1.13715" laddr=fe80::11 lport=4 faddr=ff01::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 958.321667][ T29] audit: type=1326 audit(1727564438.519:57328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11174 comm="syz.0.13726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 958.345552][ T29] audit: type=1326 audit(1727564438.519:57329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11174 comm="syz.0.13726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 958.503791][T11185] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 958.521598][T11185] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 958.922970][ T29] audit: type=1326 audit(1727564439.159:57330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11174 comm="syz.0.13726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 959.457889][T11200] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 959.470327][T11200] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 960.084710][ T29] audit: type=1326 audit(1727564440.377:57331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11195 comm="syz.4.13733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f702b18dff9 code=0x7fc00000 [ 960.700054][T11218] netlink: 9 bytes leftover after parsing attributes in process `syz.3.13738'. [ 960.710752][T11218] 0ªX¹¦D: entered promiscuous mode [ 960.715968][T11218] 0ªX¹¦D: left allmulticast mode [ 961.703320][ T29] audit: type=1326 audit(1727564442.046:57332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11223 comm="syz.1.13741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 961.727439][ T29] audit: type=1326 audit(1727564442.046:57333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11223 comm="syz.1.13741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 962.332077][ T29] audit: type=1326 audit(1727564442.729:57334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11223 comm="syz.1.13741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 962.355988][ T29] audit: type=1326 audit(1727564442.729:57335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11223 comm="syz.1.13741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=144 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 962.379734][ T29] audit: type=1326 audit(1727564442.729:57336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11223 comm="syz.1.13741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 962.403668][ T29] audit: type=1326 audit(1727564442.729:57337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11223 comm="syz.1.13741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 962.427985][ T29] audit: type=1326 audit(1727564442.729:57338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11223 comm="syz.1.13741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 962.452838][ T29] audit: type=1326 audit(1727564442.729:57339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11223 comm="syz.1.13741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 962.476852][ T29] audit: type=1326 audit(1727564442.729:57340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11223 comm="syz.1.13741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 962.500891][ T29] audit: type=1326 audit(1727564442.729:57341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11223 comm="syz.1.13741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 962.768274][T11259] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 962.777314][T11259] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 962.941842][T11265] netlink: 24 bytes leftover after parsing attributes in process `syz.1.13755'. [ 965.230627][T11316] serio: Serial port ptm0 [ 965.257691][T11313] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11313 comm=syz.4.13770 [ 966.103926][T11338] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 966.113027][T11338] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 966.759261][T11349] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 966.773812][T11349] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 966.775568][T11351] serio: Serial port ptm0 [ 966.864863][T11357] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 966.873671][T11357] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 967.064469][T11355] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11355 comm=syz.0.13784 [ 967.385757][ T29] kauditd_printk_skb: 128 callbacks suppressed [ 967.385775][ T29] audit: type=1326 audit(1727564448.030:57470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11371 comm="syz.0.13790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 967.939166][ T29] audit: type=1326 audit(1727564448.618:57471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11383 comm="syz.2.13794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 967.975593][ T29] audit: type=1326 audit(1727564448.618:57472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11383 comm="syz.2.13794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 967.999643][ T29] audit: type=1326 audit(1727564448.618:57473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11383 comm="syz.2.13794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 968.023443][ T29] audit: type=1326 audit(1727564448.618:57474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11383 comm="syz.2.13794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 968.047304][ T29] audit: type=1326 audit(1727564448.618:57475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11383 comm="syz.2.13794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 968.071108][ T29] audit: type=1326 audit(1727564448.650:57476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11383 comm="syz.2.13794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 968.095043][ T29] audit: type=1326 audit(1727564448.650:57477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11383 comm="syz.2.13794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 968.118754][ T29] audit: type=1326 audit(1727564448.650:57478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11371 comm="syz.0.13790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 968.142657][ T29] audit: type=1326 audit(1727564448.650:57479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11383 comm="syz.2.13794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=141 compat=0 ip=0x7f7d5988dff9 code=0x7ffc0000 [ 968.812028][T11403] serio: Serial port ptm0 [ 968.993399][T11401] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11401 comm=syz.3.13799 [ 969.011883][T11415] IPv4: Oversized IP packet from 136.202.26.0 [ 970.632483][T11471] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 970.640943][T11474] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 970.649442][T11471] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 970.657263][T11474] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 971.502704][T11496] serio: Serial port ptm0 [ 972.783886][T11524] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 972.792873][T11524] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 973.453639][T11533] netlink: 300 bytes leftover after parsing attributes in process `syz.4.13844'. [ 973.860252][T11540] serio: Serial port ptm0 [ 973.876202][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 973.876221][ T29] audit: type=1326 audit(1727564454.843:57505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11537 comm="syz.3.13848" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efd2dd3dff9 code=0x7ffc0000 [ 973.906306][ T29] audit: type=1326 audit(1727564454.843:57506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11537 comm="syz.3.13848" exe="/root/syz-executor" sig=0 arch=c000003e syscall=195 compat=0 ip=0x7efd2dd3dff9 code=0x7ffc0000 [ 973.930047][ T29] audit: type=1326 audit(1727564454.843:57507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11537 comm="syz.3.13848" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efd2dd3dff9 code=0x7ffc0000 [ 974.565189][T11559] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 974.638882][T11559] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 975.136226][T11575] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 975.146102][T11575] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 975.700188][T11578] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 975.709339][T11578] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 977.818299][T11613] syzkaller0: entered promiscuous mode [ 977.823958][T11613] syzkaller0: entered allmulticast mode [ 978.423406][T11619] netlink: 9 bytes leftover after parsing attributes in process `syz.2.13871'. [ 978.433141][T11619] gretap0: entered promiscuous mode [ 978.439840][T11619] netlink: 5 bytes leftover after parsing attributes in process `syz.2.13871'. [ 978.448948][T11619] 0ªX¹¦D: renamed from gretap0 [ 978.523426][T11619] 0ªX¹¦D: left promiscuous mode [ 978.528411][T11619] 0ªX¹¦D: entered allmulticast mode [ 978.535304][T11619] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 978.571855][T11622] SELinux: security_context_str_to_sid () failed with errno=-22 [ 978.648699][ T29] audit: type=1326 audit(1727564459.830:57508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11620 comm="syz.0.13872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7ffc0000 [ 978.672766][ T29] audit: type=1326 audit(1727564459.830:57509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11620 comm="syz.0.13872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7ffc0000 [ 978.696554][ T29] audit: type=1326 audit(1727564459.830:57510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11620 comm="syz.0.13872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7f692f10dff9 code=0x7ffc0000 [ 978.720229][ T29] audit: type=1326 audit(1727564459.830:57511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11620 comm="syz.0.13872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7ffc0000 [ 978.744179][ T29] audit: type=1326 audit(1727564459.830:57512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11620 comm="syz.0.13872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7ffc0000 [ 978.767999][ T29] audit: type=1326 audit(1727564459.830:57513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11620 comm="syz.0.13872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=221 compat=0 ip=0x7f692f10dff9 code=0x7ffc0000 [ 978.791869][ T29] audit: type=1326 audit(1727564459.830:57514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11620 comm="syz.0.13872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7ffc0000 [ 978.815748][ T29] audit: type=1326 audit(1727564459.830:57515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11620 comm="syz.0.13872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7ffc0000 [ 978.996113][ T29] audit: type=1326 audit(1727564460.229:57516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11628 comm="syz.4.13876" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f702b18dff9 code=0x0 [ 979.603695][T11639] netlink: 8 bytes leftover after parsing attributes in process `syz.2.13879'. [ 979.629757][T11647] netlink: 24 bytes leftover after parsing attributes in process `syz.3.13880'. [ 979.849984][T11653] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 979.897283][T11653] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 980.132548][ T29] audit: type=1326 audit(1727564461.415:57517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11657 comm="syz.0.13885" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7ffc0000 [ 980.184650][T11660] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 980.196496][T11660] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 980.881853][T11674] netlink: 8 bytes leftover after parsing attributes in process `syz.4.13891'. [ 981.843661][T11697] netlink: 24 bytes leftover after parsing attributes in process `syz.2.13898'. [ 983.668012][T11740] dummy0: entered promiscuous mode [ 983.674992][T11740] dummy0: left promiscuous mode [ 984.201246][T11754] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 984.215295][ T29] kauditd_printk_skb: 70 callbacks suppressed [ 984.215329][ T29] audit: type=1326 audit(1727564465.709:57588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11747 comm="syz.1.13916" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 984.245317][ T29] audit: type=1326 audit(1727564465.709:57589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11747 comm="syz.1.13916" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 984.277765][T11754] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 984.372104][T11758] netlink: 9 bytes leftover after parsing attributes in process `syz.0.13917'. [ 984.382114][T11758] gretap0: entered promiscuous mode [ 984.392645][T11758] netlink: 5 bytes leftover after parsing attributes in process `syz.0.13917'. [ 984.401692][T11758] 0ªX¹¦D: renamed from gretap0 [ 984.408770][T11758] 0ªX¹¦D: left promiscuous mode [ 984.413716][T11758] 0ªX¹¦D: entered allmulticast mode [ 984.420555][T11758] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 984.872032][ T29] audit: type=1326 audit(1727564466.328:57590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11747 comm="syz.1.13916" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4e007cdff9 code=0x7fc00000 [ 986.712788][ T29] audit: type=1326 audit(1727564468.323:57591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11795 comm="syz.4.13932" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f702b18dff9 code=0x7fc00000 [ 986.772553][ T29] audit: type=1326 audit(1727564468.354:57592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11795 comm="syz.4.13932" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f702b18dff9 code=0x7fc00000 [ 987.314380][ T29] audit: type=1326 audit(1727564468.953:57593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11795 comm="syz.4.13932" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f702b18dff9 code=0x7fc00000 [ 988.025412][T11832] serio: Serial port ptm0 [ 988.275922][T11839] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 988.327336][T11839] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 988.622316][ T4589] unregister_netdevice: waiting for vxcan0 to become free. Usage count = 3 [ 988.921491][T11846] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 988.946952][T11846] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 989.118266][ T29] audit: type=1326 audit(1727564470.853:57594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11849 comm="syz.4.13951" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f702b18dff9 code=0x7fc00000 [ 989.142161][ T29] audit: type=1326 audit(1727564470.853:57595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11849 comm="syz.4.13951" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f702b18dff9 code=0x7fc00000 [ 989.721262][ T29] audit: type=1326 audit(1727564471.483:57596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11849 comm="syz.4.13951" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f702b18dff9 code=0x7fc00000 [ 991.189600][T11886] netlink: 9 bytes leftover after parsing attributes in process `syz.3.13962'. [ 991.200810][T11886] netlink: 5 bytes leftover after parsing attributes in process `syz.3.13962'. [ 991.210057][T11886] 1ªX¹¦D: renamed from 30ªX¹¦D [ 991.217571][T11886] 1ªX¹¦D: left promiscuous mode [ 991.222538][T11886] 1ªX¹¦D: entered allmulticast mode [ 991.229523][T11886] A link change request failed with some changes committed already. Interface 31ªX¹¦D may have been left with an inconsistent configuration, please check. [ 991.782839][ T29] audit: type=1326 audit(1727564473.645:57597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.0.13966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 991.806756][ T29] audit: type=1326 audit(1727564473.645:57598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.0.13966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 992.387721][ T29] audit: type=1326 audit(1727564474.275:57599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.0.13966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 992.411605][ T29] audit: type=1326 audit(1727564474.275:57600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.0.13966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 992.435584][ T29] audit: type=1326 audit(1727564474.275:57601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.0.13966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 992.459323][ T29] audit: type=1326 audit(1727564474.275:57602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.0.13966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 992.483316][ T29] audit: type=1326 audit(1727564474.275:57603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.0.13966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 992.722001][T11933] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 992.731602][T11933] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 992.963907][T11939] syzkaller0: entered promiscuous mode [ 992.969584][T11939] syzkaller0: entered allmulticast mode [ 993.472320][T11948] netlink: 9 bytes leftover after parsing attributes in process `syz.4.13980'. [ 993.494056][T11948] 0ªX¹¦D: entered promiscuous mode [ 993.499226][T11948] 0ªX¹¦D: left allmulticast mode [ 993.509033][T11948] netlink: 5 bytes leftover after parsing attributes in process `syz.4.13980'. [ 993.518094][T11948] 1ªX¹¦D: renamed from 30ªX¹¦D [ 993.978537][T11948] 1ªX¹¦D: left promiscuous mode [ 993.983573][T11948] 1ªX¹¦D: entered allmulticast mode [ 993.990590][T11948] A link change request failed with some changes committed already. Interface 31ªX¹¦D may have been left with an inconsistent configuration, please check. [ 995.160152][ T29] kauditd_printk_skb: 61 callbacks suppressed [ 995.160169][ T29] audit: type=1326 audit(1727564477.194:57665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11979 comm="syz.0.13992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 995.190669][ T29] audit: type=1326 audit(1727564477.225:57666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11979 comm="syz.0.13992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 995.222580][ T29] audit: type=1326 audit(1727564477.257:57667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11979 comm="syz.0.13992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 995.246358][ T29] audit: type=1326 audit(1727564477.257:57668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11979 comm="syz.0.13992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 995.270573][ T29] audit: type=1326 audit(1727564477.257:57669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11979 comm="syz.0.13992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 995.294290][ T29] audit: type=1326 audit(1727564477.257:57670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11979 comm="syz.0.13992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 995.318000][ T29] audit: type=1326 audit(1727564477.257:57671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11979 comm="syz.0.13992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 995.341717][ T29] audit: type=1326 audit(1727564477.257:57672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11979 comm="syz.0.13992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 995.365645][ T29] audit: type=1326 audit(1727564477.257:57673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11979 comm="syz.0.13992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 995.389583][ T29] audit: type=1326 audit(1727564477.257:57674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11979 comm="syz.0.13992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f692f10dff9 code=0x7fc00000 [ 995.801971][T12003] netlink: 9 bytes leftover after parsing attributes in process `syz.2.13997'. [ 995.823824][T12003] 0ªX¹¦D: entered promiscuous mode [ 995.829153][T12003] 0ªX¹¦D: left allmulticast mode [ 996.520447][T12019] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 996.538403][T12019] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 996.549377][T12017] netlink: 24 bytes leftover after parsing attributes in process `syz.0.14004'. [ 996.583306][T12020] xt_CT: No such helper "snmp_trap" [ 1000.979207][T12103] netlink: 8 bytes leftover after parsing attributes in process `syz.2.14033'. [ 1001.035307][ T29] kauditd_printk_skb: 58 callbacks suppressed [ 1001.035325][ T29] audit: type=1326 audit(1727564483.366:57733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12088 comm="syz.3.14028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efd2dd3dff9 code=0x7fc00000 [ 1001.065557][ T29] audit: type=1326 audit(1727564483.366:57734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12088 comm="syz.3.14028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7efd2dd3dff9 code=0x7fc00000 [ 1001.124620][T12110] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1001.135043][T12110] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1001.272371][ T29] audit: type=1326 audit(1727564483.524:57735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12088 comm="syz.3.14028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efd2dd3dff9 code=0x7fc00000 [ 1003.334219][T12142] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1003.343372][T12142] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1003.549234][T12151] serio: Serial port ptm0 [ 1004.126633][ T29] audit: type=1326 audit(1727564486.600:57736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12162 comm="syz.4.14050" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f702b18dff9 code=0x7fc00000 [ 1004.818809][T12174] syzkaller0: entered promiscuous mode [ 1004.824400][T12174] syzkaller0: entered allmulticast mode [ 1004.857436][ T29] audit: type=1326 audit(1727564487.345:57737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12162 comm="syz.4.14050" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f702b18dff9 code=0x7fc00000 [ 1006.626635][ T29] audit: type=1326 audit(1727564489.235:57738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12206 comm="syz.2.14065" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7fc00000 [ 1006.689987][ T29] audit: type=1326 audit(1727564489.256:57739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12206 comm="syz.2.14065" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7d5988dff9 code=0x7fc00000 [ 1007.212319][ T29] audit: type=1326 audit(1727564489.833:57740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12206 comm="syz.2.14065" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d5988dff9 code=0x7fc00000 [ 1008.003800][T12230] netlink: 9 bytes leftover after parsing attributes in process `syz.4.14069'. [ 1008.014568][T12230] 1ªX¹¦D: entered promiscuous mode [ 1008.019809][T12230] 1ªX¹¦D: left allmulticast mode [ 1008.032244][T12230] netlink: 5 bytes leftover after parsing attributes in process `syz.4.14069'. [ 1008.041356][T12230] 0ªX¹¦D: renamed from 31ªX¹¦D [ 1008.048418][T12230] 0ªX¹¦D: left promiscuous mode [ 1008.053301][T12230] 0ªX¹¦D: entered allmulticast mode [ 1008.060766][T12230] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 1008.635166][T12242] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1008.679941][T12242] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1011.288367][T12291] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1011.297702][T12291] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1011.552575][ T29] audit: type=1326 audit(1727564494.400:57741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12293 comm="syz.4.14089" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f702b18dff9 code=0x7fc00000 [ 1012.198760][T12315] netlink: 9 bytes leftover after parsing attributes in process `syz.3.14096'. [ 1012.209957][T12315] 1ªX¹¦D: entered promiscuous mode [ 1012.215102][T12315] 1ªX¹¦D: left allmulticast mode [ 1012.224225][T12315] netlink: 5 bytes leftover after parsing attributes in process `syz.3.14096'. [ 1012.233383][T12315] 0ªX¹¦D: renamed from 31ªX¹¦D [ 1012.240874][T12315] 0ªX¹¦D: left promiscuous mode [ 1012.245766][T12315] 0ªX¹¦D: entered allmulticast mode [ 1012.252819][T12315] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 1012.277993][ T29] audit: type=1326 audit(1727564495.093:57742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12293 comm="syz.4.14089" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f702b18dff9 code=0x7fc00000 [ 1012.778519][T12324] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1012.787642][T12324] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1012.864873][T12324] syz.0.14100[12324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1012.865112][T12324] syz.0.14100[12324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1012.922556][T12324] syz.0.14100[12324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1013.817082][T12343] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1013.839302][T12343] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1014.947761][T12364] bridge0: port 3(erspan0) entered blocking state [ 1014.954456][T12364] bridge0: port 3(erspan0) entered disabled state [ 1014.978288][T12364] erspan0: entered allmulticast mode [ 1014.996957][T12364] erspan0: entered promiscuous mode [ 1016.081123][T12380] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1016.100000][T12380] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1017.756384][T12403] netlink: 9 bytes leftover after parsing attributes in process `syz.4.14122'. [ 1017.766406][T12403] 0ªX¹¦D: entered promiscuous mode [ 1017.771615][T12403] 0ªX¹¦D: left allmulticast mode [ 1017.963311][T12412] bridge0: port 3(erspan0) entered blocking state [ 1017.969984][T12412] bridge0: port 3(erspan0) entered disabled state [ 1017.978981][T12412] erspan0: entered allmulticast mode [ 1017.986706][T12412] erspan0: entered promiscuous mode [ 1017.994328][T12412] bridge0: port 3(erspan0) entered blocking state [ 1018.000876][T12412] bridge0: port 3(erspan0) entered forwarding state [ 1018.410017][T12415] netlink: 5 bytes leftover after parsing attributes in process `syz.2.14125'. [ 1018.419260][T12415] 1ªX¹¦D: renamed from 30ªX¹¦D [ 1018.482837][T12415] 1ªX¹¦D: left promiscuous mode [ 1018.487926][T12415] 1ªX¹¦D: entered allmulticast mode [ 1018.494166][T12415] A link change request failed with some changes committed already. Interface 31ªX¹¦D may have been left with an inconsistent configuration, please check. [ 1018.759081][T12414] netlink: 9 bytes leftover after parsing attributes in process `syz.2.14125'. [ 1018.768903][T12414] 1ªX¹¦D: entered promiscuous mode [ 1018.774081][T12414] 1ªX¹¦D: left allmulticast mode [ 1019.874646][ T29] audit: type=1404 audit(1727564503.134:57743): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Sep 28 23:01:43 syzkaller kern.notice kernel: [ 1019.874646][ T29] audit: type=1404 audit(1727564503.134:57743[ 1019.930610][ T29] audit: type=1400 audit(1727564503.155:57744): avc: denied { write } for pid=12446 comm="syz.3.14136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 ): enforcing=1 o[ 1019.951376][ T29] audit: type=1400 audit(1727564503.176:57745): avc: denied { recv } for pid=12436 comm="syz.1.14134" saddr=10.128.0.163 src=30030 daddr=10.128.1.28 dest=55378 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 ld_enforcing=0 a[ 1019.978166][ T29] audit: type=1400 audit(1727564503.187:57746): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 uid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Sep 28 23:01:43 [ 1020.011540][ T29] audit: type=1400 audit(1727564503.229:57747): avc: denied { map_create } for pid=12450 comm="syz.3.14138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 syzkaller kern.n[ 1020.031331][ T29] audit: type=1400 audit(1727564503.229:57748): avc: denied { map_create } for pid=12450 comm="syz.3.14138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 otice kernel: [ [ 1020.052677][ T29] audit: type=1400 audit(1727564503.229:57749): avc: denied { execmem } for pid=12450 comm="syz.3.14138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 1019.930610][ [ 1020.072839][ T29] audit: type=1400 audit(1727564503.229:57750): avc: denied { map_create } for pid=12450 comm="syz.3.14138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 T29] audit: type[ 1020.093651][ T29] audit: type=1400 audit(1727564503.229:57751): avc: denied { prog_load } for pid=12450 comm="syz.3.14138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 =1400 audit(1727[ 1020.114242][ T29] audit: type=1400 audit(1727564503.229:57752): avc: denied { prog_load } for pid=12450 comm="syz.3.14138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 564503.155:57744): avc: denied { write } for pid=12446 comm="syz.3.14136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Sep 28 23:01:43 syzkaller kern.notice kernel: [ 1019.951376][ T29] audit: type=1400 audit(1727564503.176:57745): avc: denied { recv } for pid=12436 comm="syz.1.14134" saddr=10.128.0.163 src=30030 daddr=10.128.1.28 dest=55378 netif=eth0 scontext=root:sysadm_r:sysadm_t t Sep 28 23:01:43 syzkaller kern.notice kernel: [ 1019.978166][ T29] audit: type=1400 audit(1727564503.187:57746): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:43 syzkaller kern.notice kernel: [ 1020.011540][ T29] audit: type=1400 audit(1727564503.229:57747): avc: denied { map_create } for pid=12450 comm="syz.3.14138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Sep 28 23:01:43 syzkaller kern.notice kernel: [ 1020.031331][ T29] audit: type=1400 audit(1727564503.229:57748): avc: denied { map_create } for pid=12450 comm="syz.3.14138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Sep 28 23:01:43 syzkaller kern.notice kernel: [ 1020.052677][ T29] audit: type=1400 audit(1727564503.229:57749): avc: denied { execmem } for pid=12450 comm="syz.3.14138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Sep 28 23:01:43 syzkaller kern.notice kernel: [ 1020.072839][ T29] audit: type=1400 audit(1727564503.229:57750): avc: denied { map_create } for pid=12450 comm="syz.3.14138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Sep 28 23:01:43 syzkaller kern.notice kernel: [ 1020.093651][ T29] audit: type=1400 audit(1727564503.229:57751): avc: denied { prog_load } for pid=12450 comm="syz.3.14138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Sep 28 23:01:43 syzkaller kern.notice kernel: [ 1020.114242][ T29] audit: type=1400 audit(1727564503.229:57752): avc: denied { prog_load } for pid=12450 comm="syz.3.14138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Sep 28 23:01:45 syzkaller daemon.err dhcpcd[3004]: ps_sendpsmmsg: Connection refused Sep 28 23:01:45 syzkaller daemon.err dhcpcd[3004]: ps_root_recvmsgcb: failed to send message to pid 11226: Connection refused [ 1024.970754][ T29] kauditd_printk_skb: 83 callbacks suppressed Sep 28 23:01:48 [ 1024.970778][ T29] audit: type=1400 audit(1727564508.488:57836): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller daemon[ 1025.001276][ T29] audit: type=1400 audit(1727564508.520:57837): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[3004[ 1025.023970][ T29] audit: type=1400 audit(1727564508.520:57838): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_sendpsmmsg[ 1025.024006][ T29] audit: type=1400 audit(1727564508.520:57839): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : Connection ref[ 1025.071896][ T29] audit: type=1400 audit(1727564508.530:57840): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 used Sep 28 23:[ 1025.095197][ T29] audit: type=1400 audit(1727564508.625:57841): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 01:48 syzkaller [ 1025.118043][ T29] audit: type=1400 audit(1727564508.625:57842): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 daemon.err dhcpc[ 1025.141766][ T29] audit: type=1400 audit(1727564508.625:57843): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d[3004]: ps_root[ 1025.165112][ T29] audit: type=1400 audit(1727564508.646:57844): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 _recvmsgcb: fail[ 1025.188557][ T29] audit: type=1400 audit(1727564508.677:57845): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ed to send message to pid 11284: Connection refused Sep 28 23:01:48 syzkaller kern.warn kernel: [ 1024.970754][ T29] kauditd_printk_skb: 83 callbacks suppressed Sep 28 23:01:48 syzkaller kern.notice kernel: [ 1024.970778][ T29] audit: type=1400 audit(1727564508.488:57836): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:48 syzkaller kern.notice kernel: [ 1025.001276][ T29] audit: type=1400 audit(1727564508.520:57837): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:48 syzkaller kern.notice kernel: [ 1025.023970][ T29] audit: type=1400 audit(1727564508.520:57838): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:48 syzkaller kern.notice kernel: [ 1025.024006][ T29] audit: type=1400 audit(1727564508.520:57839): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:48 syzkaller kern.notice kernel: [ 1025.071896][ T29] audit: type=1400 audit(1727564508.530:57840): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:48 syzkaller kern.notice kernel: [ 1025.095197][ T29] audit: type=1400 audit(1727564508.625:57841): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:48 syzkaller kern.notice kernel: [ 1025.118043][ T29] audit: type=1400 audit(1727564508.625:57842): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:48 syzkaller kern.notice kernel: [ 1025.141766][ T29] audit: type=1400 audit(1727564508.625:57843): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:48 syzkaller kern.notice kernel: [ 1025.165112][ T29] audit: type=1400 audit(1727564508.646:57844): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:48 syzkaller kern.notice kernel: [ 1025.188557][ T29] audit: type=1400 audit(1727564508.677:57845): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:48 syzkaller daemon.err dhcpcd[3004]: ps_sendpsmmsg: Connection refused Sep 28 23:01:48 syzkaller daemon.err dhcpcd[3004]: ps_root_recvmsgcb: failed to send message to pid 11304: Connection refused Sep 28 23:01:50 syzkaller daemon.err dhcpcd[12474]: ps_bpf_start_bpf: bpf_open: Invalid argument Sep 28 23:01:50 syzkaller daemon.err dhcpcd[12474]: ps_root_recvmsg: Invalid argument [ 1033.248108][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 1033.248121][ T29] audit: type=1400 audit(1727564517.170:57855): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.1.28 dest=55378 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 1033.279468][ T29] audit: type=1400 audit(1727564517.191:57856): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 1033.292311][ T29] audit: type=1400 audit(1727564517.212:57857): avc: denied { recv } for pid=10750 comm="kworker/u8:12" saddr=10.128.0.163 src=30030 daddr=10.128.1.28 dest=55378 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 Sep 28 23:01:57 [ 1033.330397][ T29] audit: type=1400 audit(1727564517.265:57858): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 1033.353203][ T29] audit: type=1400 audit(1727564517.265:57859): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 10[ 1033.353236][ T29] audit: type=1400 audit(1727564517.265:57860): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 33.248108][ T2[ 1033.353392][ T29] audit: type=1400 audit(1727564517.265:57861): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 1033.423916][ T29] audit: type=1400 audit(1727564517.369:57862): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 9 callbacks suppressed S[ 1033.448789][ T29] audit: type=1400 audit(1727564517.390:57863): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ep 28 23:01:57 s[ 1033.472380][ T29] audit: type=1400 audit(1727564517.390:57864): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 1033.248121][ T29] audit: type=1400 audit(1727564517.170:57855): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.1.28 dest=55378 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontex Sep 28 23:01:57 syzkaller kern.notice kernel: [ 1033.279468][ T29] audit: type=1400 audit(1727564517.191:57856): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:57 syzkaller kern.notice kernel: [ 1033.292311][ T29] audit: type=1400 audit(1727564517.212:57857): avc: denied { recv } for pid=10750 comm="kworker/u8:12" saddr=10.128.0.163 src=30030 daddr=10.128.1.28 dest=55378 netif=eth0 scontext=root:sysadm_r:sysadm_t Sep 28 23:01:57 syzkaller kern.notice kernel: [ 1033.330397][ T29] audit: type=1400 audit(1727564517.265:57858): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:57 syzkaller kern.notice kernel: [ 1033.353203][ T29] audit: type=1400 audit(1727564517.265:57859): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:57 syzkaller kern.notice kernel: [ 1033.353236][ T29] audit: type=1400 audit(1727564517.265:57860): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:57 syzkaller kern.notice kernel: [ 1033.353392][ T29] audit: type=1400 audit(1727564517.265:57861): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:57 syzkaller kern.notice kernel: [ 1033.423916][ T29] audit: type=1400 audit(1727564517.369:57862): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:57 syzkaller kern.notice kernel: [ 1033.448789][ T29] audit: type=1400 audit(1727564517.390:57863): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:01:57 syzkaller kern.notice kernel: [ 1033.472380][ T29] audit: type=1400 audit(1727564517.390:57864): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 1046.558780][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 1046.558795][ T29] audit: type=1400 audit(1727564531.153:57868): avc: denied { recv } for pid=8 comm="kworker/0:0" saddr=10.128.0.163 src=30030 daddr=10.128.1.28 dest=55378 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 1046.590255][ T29] audit: type=1400 audit(1727564531.185:57869): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 23:02:11 syzkaller kern.w[ 1046.613904][ T29] audit: type=1400 audit(1727564531.216:57870): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 10[ 1046.637942][ T29] audit: type=1400 audit(1727564531.216:57871): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 46.558780][ T2[ 1046.661017][ T29] audit: type=1400 audit(1727564531.237:57872): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 1046.661163][ T29] audit: type=1400 audit(1727564531.248:57873): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 3 callbac[ 1046.686086][ T29] audit: type=1400 audit(1727564531.290:57874): avc: denied { recv } for pid=8819 comm="kworker/0:5" saddr=10.128.0.163 src=30030 daddr=10.128.1.28 dest=55378 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 ks suppressed S[ 1046.735894][ T29] audit: type=1400 audit(1727564531.342:57875): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ep 28 23:02:11 s[ 1046.758727][ T29] audit: type=1400 audit(1727564531.342:57876): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 1046.782272][ T29] audit: type=1400 audit(1727564531.342:57877): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 1046.558795][ T29] audit: type=1400 audit(1727564531.153:57868): avc: denied { recv } for pid=8 comm="kworker/0:0" saddr=10.128.0.163 src=30030 daddr=10.128.1.28 dest=55378 netif=eth0 scontext=root:sysadm_r:sysadm_t tcont Sep 28 23:02:11 syzkaller kern.notice kernel: [ 1046.590255][ T29] audit: type=1400 audit(1727564531.185:57869): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:11 syzkaller kern.notice kernel: [ 1046.613904][ T29] audit: type=1400 audit(1727564531.216:57870): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:11 syzkaller kern.notice kernel: [ 1046.637942][ T29] audit: type=1400 audit(1727564531.216:57871): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:11 syzkaller kern.notice kernel: [ 1046.661017][ T29] audit: type=1400 audit(1727564531.237:57872): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:11 syzkaller kern.notice kernel: [ 1046.661163][ T29] audit: type=1400 audit(1727564531.248:57873): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:11 syzkaller kern.notice kernel: [ 1046.686086][ T29] audit: type=1400 audit(1727564531.290:57874): avc: denied { recv } for pid=8819 comm="kworker/0:5" saddr=10.128.0.163 src=30030 daddr=10.128.1.28 dest=55378 netif=eth0 scontext=root:sysadm_r:sysadm_t tc Sep 28 23:02:11 syzkaller kern.notice kernel: [ 1046.735894][ T29] audit: type=1400 audit(1727564531.342:57875): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:11 syzkaller kern.notice kernel: [ 1046.758727][ T29] audit: type=1400 audit(1727564531.342:57876): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:11 syzkaller kern.notice kernel: [ 1046.782272][ T29] audit: type=1400 audit(1727564531.342:57877): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 1058.265738][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 1058.265757][ T29] audit: type=1400 audit(1727564543.447:57881): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Sep 28 23:02:23 [ 1058.296249][ T29] audit: type=1400 audit(1727564543.478:57882): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.warn kernel: [ 10[ 1058.321573][ T29] audit: type=1400 audit(1727564543.499:57883): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 58.265738][ T2[ 1058.344492][ T29] audit: type=1400 audit(1727564543.510:57884): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 1058.368535][ T29] audit: type=1400 audit(1727564543.541:57885): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 3 callbac[ 1058.391319][ T29] audit: type=1400 audit(1727564543.541:57886): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed S[ 1058.415117][ T29] audit: type=1400 audit(1727564543.593:57887): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ep 28 23:02:23 syzkaller kern.no[ 1058.439932][ T29] audit: type=1400 audit(1727564543.625:57888): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 1[ 1058.463833][ T29] audit: type=1400 audit(1727564543.656:57889): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 058.265757][ T[ 1058.486653][ T29] audit: type=1400 audit(1727564543.656:57890): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 29] audit: type=1400 audit(1727564543.447:57881): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obj Sep 28 23:02:23 syzkaller kern.notice kernel: [ 1058.296249][ T29] audit: type=1400 audit(1727564543.478:57882): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:23 syzkaller kern.notice kernel: [ 1058.321573][ T29] audit: type=1400 audit(1727564543.499:57883): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:23 syzkaller kern.notice kernel: [ 1058.344492][ T29] audit: type=1400 audit(1727564543.510:57884): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:23 syzkaller kern.notice kernel: [ 1058.368535][ T29] audit: type=1400 audit(1727564543.541:57885): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:23 syzkaller kern.notice kernel: [ 1058.391319][ T29] audit: type=1400 audit(1727564543.541:57886): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:23 syzkaller kern.notice kernel: [ 1058.415117][ T29] audit: type=1400 audit(1727564543.593:57887): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:23 syzkaller kern.notice kernel: [ 1058.439932][ T29] audit: type=1400 audit(1727564543.625:57888): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:23 syzkaller kern.notice kernel: [ 1058.463833][ T29] audit: type=1400 audit(1727564543.656:57889): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:23 syzkaller kern.notice kernel: [ 1058.486653][ T29] audit: type=1400 audit(1727564543.656:57890): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 1068.021272][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 1068.021290][ T29] audit: type=1400 audit(1727564553.682:57893): avc: denied { egress } for pid=10764 comm="kworker/u8:18" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 1068.051612][ T29] audit: type=1400 audit(1727564553.714:57894): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 23:02:33 [ 1068.074309][ T29] audit: type=1400 audit(1727564553.735:57895): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 1068.098349][ T29] audit: type=1400 audit(1727564553.766:57896): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 10[ 1068.121363][ T29] audit: type=1400 audit(1727564553.766:57897): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 68.021272][ T2[ 1068.145364][ T29] audit: type=1400 audit(1727564553.819:57898): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 1068.168247][ T29] audit: type=1400 audit(1727564553.819:57899): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 2 callbac[ 1068.192463][ T29] audit: type=1400 audit(1727564553.861:57900): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed S[ 1068.215283][ T29] audit: type=1400 audit(1727564553.861:57901): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ep 28 23:02:33 s[ 1068.239448][ T29] audit: type=1400 audit(1727564553.913:57902): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 1068.021290][ T29] audit: type=1400 audit(1727564553.682:57893): avc: denied { egress } for pid=10764 comm="kworker/u8:18" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_ Sep 28 23:02:33 syzkaller kern.notice kernel: [ 1068.051612][ T29] audit: type=1400 audit(1727564553.714:57894): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:33 syzkaller kern.notice kernel: [ 1068.074309][ T29] audit: type=1400 audit(1727564553.735:57895): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:33 syzkaller kern.notice kernel: [ 1068.098349][ T29] audit: type=1400 audit(1727564553.766:57896): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:33 syzkaller kern.notice kernel: [ 1068.121363][ T29] audit: type=1400 audit(1727564553.766:57897): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:33 syzkaller kern.notice kernel: [ 1068.145364][ T29] audit: type=1400 audit(1727564553.819:57898): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:33 syzkaller kern.notice kernel: [ 1068.168247][ T29] audit: type=1400 audit(1727564553.819:57899): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:33 syzkaller kern.notice kernel: [ 1068.192463][ T29] audit: type=1400 audit(1727564553.861:57900): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:33 syzkaller kern.notice kernel: [ 1068.215283][ T29] audit: type=1400 audit(1727564553.861:57901): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:33 syzkaller kern.notice kernel: [ 1068.239448][ T29] audit: type=1400 audit(1727564553.913:57902): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 1072.898068][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 1072.898084][ T29] audit: type=1400 audit(1727564558.805:57905): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.1.28 dest=55378 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 Sep 28 23:02:38 [ 1072.930141][ T29] audit: type=1400 audit(1727564558.837:57906): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 1072.953351][ T29] audit: type=1400 audit(1727564558.837:57907): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 10[ 1072.977270][ T29] audit: type=1400 audit(1727564558.889:57908): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 72.898068][ T2[ 1073.000375][ T29] audit: type=1400 audit(1727564558.889:57909): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 1073.023829][ T29] audit: type=1400 audit(1727564558.889:57910): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 2 callbac[ 1073.047262][ T29] audit: type=1400 audit(1727564558.942:57911): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed S[ 1073.071648][ T29] audit: type=1400 audit(1727564558.984:57912): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ep 28 23:02:38 s[ 1073.094383][ T29] audit: type=1400 audit(1727564558.984:57913): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 1073.118335][ T29] audit: type=1400 audit(1727564559.036:57914): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 1072.898084][ T29] audit: type=1400 audit(1727564558.805:57905): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.1.28 dest=55378 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontex Sep 28 23:02:38 syzkaller kern.notice kernel: [ 1072.930141][ T29] audit: type=1400 audit(1727564558.837:57906): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:38 syzkaller kern.notice kernel: [ 1072.953351][ T29] audit: type=1400 audit(1727564558.837:57907): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:38 syzkaller kern.notice kernel: [ 1072.977270][ T29] audit: type=1400 audit(1727564558.889:57908): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:38 syzkaller kern.notice kernel: [ 1073.000375][ T29] audit: type=1400 audit(1727564558.889:57909): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:38 syzkaller kern.notice kernel: [ 1073.023829][ T29] audit: type=1400 audit(1727564558.889:57910): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:38 syzkaller kern.notice kernel: [ 1073.047262][ T29] audit: type=1400 audit(1727564558.942:57911): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:39 syzkaller kern.notice kernel: [ 1073.071648][ T29] audit: type=1400 audit(1727564558.984:57912): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:39 syzkaller kern.notice kernel: [ 1073.094383][ T29] audit: type=1400 audit(1727564558.984:57913): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:39 syzkaller kern.notice kernel: [ 1073.118335][ T29] audit: type=1400 audit(1727564559.036:57914): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:49 [ 1082.705045][ T29] kauditd_printk_skb: 3 callbacks suppressed syzkaller daemon[ 1082.705059][ T29] audit: type=1400 audit(1727564569.093:57918): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[1247[ 1082.735918][ T29] audit: type=1400 audit(1727564569.093:57919): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 5]: ps_bpf_start[ 1082.735967][ T29] audit: type=1400 audit(1727564569.104:57920): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 _bpf: bpf_open: [ 1082.782966][ T29] audit: type=1400 audit(1727564569.177:57921): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Invalid argument Sep 28 23:02:4[ 1082.807720][ T29] audit: type=1400 audit(1727564569.209:57922): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9 syzkaller daem[ 1082.831413][ T29] audit: type=1400 audit(1727564569.230:57923): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 on.err dhcpcd[12[ 1082.855140][ T29] audit: type=1400 audit(1727564569.261:57924): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 475]: ps_root_re[ 1082.878140][ T29] audit: type=1400 audit(1727564569.261:57925): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 cvmsg: Invalid a[ 1082.901783][ T29] audit: type=1400 audit(1727564569.282:57926): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 rgument Sep 28 [ 1082.925250][ T29] audit: type=1400 audit(1727564569.314:57927): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 23:02:49 syzkaller kern.warn kernel: [ 1082.705045][ T29] kauditd_printk_skb: 3 callbacks suppressed Sep 28 23:02:49 syzkaller kern.notice kernel: [ 1082.705059][ T29] audit: type=1400 audit(1727564569.093:57918): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:49 syzkaller kern.notice kernel: [ 1082.735918][ T29] audit: type=1400 audit(1727564569.093:57919): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:49 syzkaller kern.notice kernel: [ 1082.735967][ T29] audit: type=1400 audit(1727564569.104:57920): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:49 syzkaller kern.notice kernel: [ 1082.782966][ T29] audit: type=1400 audit(1727564569.177:57921): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:49 syzkaller kern.notice kernel: [ 1082.807720][ T29] audit: type=1400 audit(1727564569.209:57922): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:49 syzkaller kern.notice kernel: [ 1082.831413][ T29] audit: type=1400 audit(1727564569.230:57923): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:49 syzkaller kern.notice kernel: [ 1082.855140][ T29] audit: type=1400 audit(1727564569.261:57924): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:49 syzkaller kern.notice kernel: [ 1082.878140][ T29] audit: type=1400 audit(1727564569.261:57925): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:49 syzkaller kern.notice kernel: [ 1082.901783][ T29] audit: type=1400 audit(1727564569.282:57926): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:49 syzkaller kern.notice kernel: [ 1082.925250][ T29] audit: type=1400 audit(1727564569.314:57927): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:52 syzkaller daemon.err dhcpcd[12476]: ps_bpf_start_bpf: bpf_open: Invalid argument Sep 28 23:02:52 syzkaller daemon.err dhcpcd[12476]: ps_root_recvmsg: Invalid argument Sep 28 23:02:52 syzkaller daemon.err dhcpcd[12477]: ps_bpf_start_bpf: bpf_open: Invalid argument Sep 28 23:02:52 syzkaller daemon.err dhcpcd[12477]: ps_root_recvmsg: Invalid argument [ 1087.635269][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 1087.635285][ T29] audit: type=1400 audit(1727564574.279:57935): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 23:02:54 [ 1087.664128][ T29] audit: type=1400 audit(1727564574.311:57936): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller daemon[ 1087.687389][ T29] audit: type=1400 audit(1727564574.311:57937): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[3004[ 1087.711102][ T29] audit: type=1400 audit(1727564574.353:57938): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_sendpsmmsg[ 1087.734399][ T29] audit: type=1400 audit(1727564574.353:57939): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : Connection ref[ 1087.758246][ T29] audit: type=1400 audit(1727564574.405:57940): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 used Sep 28 23:[ 1087.782334][ T29] audit: type=1400 audit(1727564574.437:57941): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 02:54 syzkaller [ 1087.804857][ T29] audit: type=1400 audit(1727564574.437:57942): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 daemon.err dhcpc[ 1087.828274][ T29] audit: type=1400 audit(1727564574.437:57943): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d[3004]: ps_root[ 1087.852142][ T29] audit: type=1400 audit(1727564574.479:57944): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 _recvmsgcb: failed to send message to pid 12474: Connection refused Sep 28 23:02:54 syzkaller kern.warn kernel: [ 1087.635269][ T29] kauditd_printk_skb: 7 callbacks suppressed Sep 28 23:02:54 syzkaller kern.notice kernel: [ 1087.635285][ T29] audit: type=1400 audit(1727564574.279:57935): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:54 syzkaller kern.notice kernel: [ 1087.664128][ T29] audit: type=1400 audit(1727564574.311:57936): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:54 syzkaller kern.notice kernel: [ 1087.687389][ T29] audit: type=1400 audit(1727564574.311:57937): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:54 syzkaller kern.notice kernel: [ 1087.711102][ T29] audit: type=1400 audit(1727564574.353:57938): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:54 syzkaller kern.notice kernel: [ 1087.734399][ T29] audit: type=1400 audit(1727564574.353:57939): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:54 syzkaller kern.notice kernel: [ 1087.758246][ T29] audit: type=1400 audit(1727564574.405:57940): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:54 syzkaller kern.notice kernel: [ 1087.782334][ T29] audit: type=1400 audit(1727564574.437:57941): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:54 syzkaller kern.notice kernel: [ 1087.804857][ T29] audit: type=1400 audit(1727564574.437:57942): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:54 syzkaller kern.notice kernel: [ 1087.828274][ T29] audit: type=1400 audit(1727564574.437:57943): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:02:54 syzkaller kern.notice kernel: [ 1087.852142][ T29] audit: type=1400 audit(1727564574.479:57944): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 1107.038883][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 1107.038903][ T29] audit: type=1400 audit(1727564594.645:57948): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Sep 28 23:03:14 [ 1107.068784][ T29] audit: type=1400 audit(1727564594.677:57949): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 1107.092627][ T29] audit: type=1400 audit(1727564594.677:57950): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 11[ 1107.116134][ T29] audit: type=1400 audit(1727564594.729:57951): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 07.038883][ T2[ 1107.140279][ T29] audit: type=1400 audit(1727564594.740:57952): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 1107.162833][ T29] audit: type=1400 audit(1727564594.740:57953): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 3 callbac[ 1107.187030][ T29] audit: type=1400 audit(1727564594.803:57954): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed S[ 1107.210614][ T29] audit: type=1400 audit(1727564594.824:57955): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ep 28 23:03:14 s[ 1107.233607][ T29] audit: type=1400 audit(1727564594.824:57956): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 1[ 1107.259036][ T29] audit: type=1400 audit(1727564594.876:57957): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 107.038903][ T29] audit: type=1400 audit(1727564594.645:57948): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obj Sep 28 23:03:14 syzkaller kern.notice kernel: [ 1107.068784][ T29] audit: type=1400 audit(1727564594.677:57949): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:03:14 syzkaller kern.notice kernel: [ 1107.092627][ T29] audit: type=1400 audit(1727564594.677:57950): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:03:14 syzkaller kern.notice kernel: [ 1107.116134][ T29] audit: type=1400 audit(1727564594.729:57951): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:03:14 syzkaller kern.notice kernel: [ 1107.140279][ T29] audit: type=1400 audit(1727564594.740:57952): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:03:14 syzkaller kern.notice kernel: [ 1107.162833][ T29] audit: type=1400 audit(1727564594.740:57953): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:03:14 syzkaller kern.notice kernel: [ 1107.187030][ T29] audit: type=1400 audit(1727564594.803:57954): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:03:14 syzkaller kern.notice kernel: [ 1107.210614][ T29] audit: type=1400 audit(1727564594.824:57955): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:03:14 syzkaller kern.notice kernel: [ 1107.233607][ T29] audit: type=1400 audit(1727564594.824:57956): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:03:14 syzkaller kern.notice kernel: [ 1107.259036][ T29] audit: type=1400 audit(1727564594.876:57957): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 1118.542828][ C0] ================================================================== [ 1118.550943][ C0] BUG: KCSAN: data-race in __tmigr_cpu_activate / tmigr_handle_remote [ 1118.559131][ C0] [ 1118.561443][ C0] write to 0xffff888237d205dc of 1 bytes by task 0 on cpu 1: [ 1118.568888][ C0] __tmigr_cpu_activate+0x55/0x200 [ 1118.573997][ C0] tmigr_cpu_activate+0x8a/0xc0 [ 1118.578842][ C0] timer_clear_idle+0x28/0x100 [ 1118.583603][ C0] tick_nohz_restart_sched_tick+0x22/0x110 [ 1118.589415][ C0] tick_nohz_idle_exit+0xfe/0x1d0 [ 1118.594442][ C0] do_idle+0x1ee/0x230 [ 1118.598514][ C0] cpu_startup_entry+0x25/0x30 [ 1118.603295][ C0] start_secondary+0x96/0xa0 [ 1118.607900][ C0] common_startup_64+0x12c/0x137 [ 1118.612847][ C0] [ 1118.615160][ C0] read to 0xffff888237d205dc of 1 bytes by interrupt on cpu 0: [ 1118.622724][ C0] tmigr_handle_remote+0x26e/0x940 [ 1118.627831][ C0] run_timer_softirq+0x5f/0x70 [ 1118.632595][ C0] handle_softirqs+0xbf/0x280 [ 1118.637286][ C0] irq_exit_rcu+0x3e/0x90 [ 1118.641610][ C0] sysvec_apic_timer_interrupt+0x73/0x80 [ 1118.647247][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1118.653238][ C0] acpi_safe_halt+0x21/0x30 [ 1118.657745][ C0] acpi_idle_do_entry+0x1d/0x30 [ 1118.662593][ C0] acpi_idle_enter+0x96/0xb0 [ 1118.667300][ C0] cpuidle_enter_state+0xc5/0x260 [ 1118.672361][ C0] cpuidle_enter+0x40/0x70 [ 1118.676800][ C0] do_idle+0x195/0x230 [ 1118.680870][ C0] cpu_startup_entry+0x25/0x30 [ 1118.685660][ C0] rest_init+0xef/0xf0 [ 1118.689813][ C0] start_kernel+0x586/0x5e0 [ 1118.694310][ C0] x86_64_start_reservations+0x2a/0x30 [ 1118.699772][ C0] x86_64_start_kernel+0x9a/0xa0 [ 1118.704714][ C0] common_startup_64+0x12c/0x137 [ 1118.709661][ C0] [ 1118.711975][ C0] value changed: 0x00 -> 0x01 [ 1118.716647][ C0] [ 1118.718966][ C0] Reported by Kernel Concurrency Sanitizer on: [ 1118.725115][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G W 6.11.0-syzkaller-11728-gad46e8f95e93 #0 [ 1118.736723][ C0] Tainted: [W]=WARN [ 1118.740536][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1118.750595][ C0] ================================================================== Sep 28 23:03:26 syzkaller kern.e[ 1118.761424][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 1118.761442][ T29] audit: type=1400 audit(1727564606.949:57960): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 rr kernel: [ 111[ 1118.790381][ T29] audit: type=1400 audit(1727564606.949:57961): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 8.542828][ C0[ 1118.790414][ T29] audit: type=1400 audit(1727564606.949:57962): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ] ==============[ 1118.790443][ T29] audit: type=1400 audit(1727564606.949:57963): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ================[ 1118.790468][ T29] audit: type=1400 audit(1727564606.949:57964): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ================[ 1118.790612][ T29] audit: type=1400 audit(1727564606.949:57965): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ================[ 1118.790669][ T29] audit: type=1400 audit(1727564606.949:57966): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ==== Sep 28 23:[ 1118.790693][ T29] audit: type=1400 audit(1727564606.949:57967): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 03:26 syzkaller [ 1118.790720][ T29] audit: type=1400 audit(1727564606.949:57968): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 kern.err kernel:[ 1118.790748][ T29] audit: type=1400 audit(1727564606.949:57969): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 1118.550943][ C0] BUG: KCSAN: data-race in __tmigr_cpu_activate / tmigr_handle_remote Sep 28 23:03:26 syzkaller kern.err kernel: [ 1118.559131][ C0] Sep 28 23:03:26 syzkaller kern.err kernel: [ 1118.561443][ C0] write to 0xffff888237d205dc of 1 bytes by task 0 on cpu 1: Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.568888][ C0] __tmigr_cpu_activate+0x55/0x200 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.573997][ C0] tmigr_cpu_activate+0x8a/0xc0 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.578842][ C0] timer_clear_idle+0x28/0x100 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.583603][ C0] tick_nohz_restart_sched_tick+0x22/0x110 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.589415][ C0] tick_nohz_idle_exit+0xfe/0x1d0 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.594442][ C0] do_idle+0x1ee/0x230 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.598514][ C0] cpu_startup_entry+0x25/0x30 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.603295][ C0] start_secondary+0x96/0xa0 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.607900][ C0] common_startup_64+0x12c/0x137 Sep 28 23:03:26 syzkaller kern.err kernel: [ 1118.612847][ C0] Sep 28 23:03:26 syzkaller kern.err kernel: [ 1118.615160][ C0] read to 0xffff888237d205dc of 1 bytes by interrupt on cpu 0: Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.622724][ C0] tmigr_handle_remote+0x26e/0x940 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.627831][ C0] run_timer_softirq+0x5f/0x70 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.632595][ C0] handle_softirqs+0xbf/0x280 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.637286][ C0] irq_exit_rcu+0x3e/0x90 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.641610][ C0] sysvec_apic_timer_interrupt+0x73/0x80 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.647247][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.653238][ C0] acpi_safe_halt+0x21/0x30 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.657745][ C0] acpi_idle_do_entry+0x1d/0x30 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.662593][ C0] acpi_idle_enter+0x96/0xb0 Sep 28 23:03:26 syzkaller kern.warn kernel: [ 1118.667300][ C0] cpuidle_enter_state+0xc5/0x260 Sep 28 23:03:27 syzkaller kern.warn kernel: [ 1118.672361][ C0] cpuidle_enter+0x40/0x70 Sep 28 23:03:27 syzkaller kern.warn kernel: [ 1118.676800][ C0] do_idle+0x195/0x230 Sep 28 23:03:27 syzkaller kern.warn kernel: [ 1118.680870][ C0] cpu_startup_entry+0x25/0x30 Sep 28 23:03:27 syzkaller kern.warn kernel: [ 1118.685660][ C0] rest_init+0xef/0xf0 Sep 28 23:03:27 syzkaller kern.warn kernel: [ 1118.689813][ C0] start_kernel+0x586/0x5e0 Sep 28 23:03:27 syzkaller kern.warn kernel: [ 1118.694310][ C0] x86_64_start_reservations+0x2a/0x30 Sep 28 23:03:27 syzkaller kern.warn kernel: [ 1118.699772][ C0] x86_64_start_kernel+0x9a/0xa0 Sep 28 23:03:27 syzkaller kern.warn kernel: [ 1118.704714][ C0] common_startup_64+0x12c/0x137 Sep 28 23:03:27 syzkaller kern.err kernel: [ 1118.709661][ C0] Sep 28 23:03:27 syzkaller kern.err kernel: [ 1118.711975][ C0] value changed: 0x00 -> 0x01 Sep 28 23:03:27 syzkaller kern.err kernel: [ 1118.716647][ C0] Sep 28 23:03:27 syzkaller kern.err kernel: [ 1118.718966][ C0] Reported by Kernel Concurrency Sanitizer on: Sep 28 23:03:27 syzkaller kern.warn kernel: [ 1118.725115][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G W 6.11.0-syzkaller-11728-gad46e8f95e93 #0 Sep 28 23:03:27 syzkaller kern.warn kernel: [ 1118.736723][ C0] Tainted: [W]=WARN Sep 28 23:03:27 syzkaller kern.warn kernel: [ 1118.740536][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Sep 28 23:03:27 syzkaller kern.err kernel: [ 1118.750595][ C0] ================================================================== Sep 28 23:03:27 syzkaller kern.warn kernel: [ 1118.761424][ T29] kauditd_printk_skb: 2 callbacks suppressed Sep 28 23:03:27 syzkaller kern.notice kernel: [ 1118.761442][ Sep 28 23:03:27 [ 1122.230578][ T4589] unregister_netdevice: waiting for vxcan0 to become free. Usage count = 3 Sep 28 23:03:30 syzkaller kern.emerg kernel: [ 1122.230578][ T4589] unregister_netdevice: waiting for vxcan0 to become free. Usage count = 3 [ 1126.555663][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 1126.555683][ T29] audit: type=1400 audit(1727564615.137:58013): avc: denied { recv } for pid=3291 comm="kworker/u8:6" saddr=10.128.0.163 src=30030 daddr=10.128.1.28 dest=55378 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 Sep 28 23:03:35 [ 1126.587761][ T29] audit: type=1400 audit(1727564615.169:58014): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 1126.611800][ T29] audit: type=1400 audit(1727564615.200:58015): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 11[ 1126.634938][ T29] audit: type=1400 audit(1727564615.200:58016): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 26.555663][ T29] kauditd_print[ 1126.659895][ T29] audit: type=1400 audit(1727564615.221:58017): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 43 callba[ 1126.683709][ T29] audit: type=1400 audit(1727564615.274:58018): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 cks suppressed [ 1126.706739][ T29] audit: type=1400 audit(1727564615.274:58019): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 23:03:35 [ 1126.730862][ T29] audit: type=1400 audit(1727564615.316:58020): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.n[ 1126.753535][ T29] audit: type=1400 audit(1727564615.316:58021): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 otice kernel: [ [ 1126.777284][ T29] audit: type=1400 audit(1727564615.368:58022): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1126.555683][ T29] audit: type=1400 audit(1727564615.137:58013): avc: denied { recv } for pid=3291 comm="kworker/u8:6" saddr=10.128.0.163 src=30030 daddr=10.128.1.28 dest=55378 netif=eth0 scontext=root:sysadm_r:sysadm_t t Sep 28 23:03:35 syzkaller kern.notice kernel: [ 1126.587761][ T29] audit: type=1400 audit(1727564615.169:58014): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:03:35 syzkaller kern.notice kernel: [ 1126.611800][ T29] audit: type=1400 audit(1727564615.200:58015): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:03:35 syzkaller kern.notice kernel: [ 1126.634938][ T29] audit: type=1400 audit(1727564615.200:58016): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:03:35 syzkaller kern.notice kernel: [ 1126.659895][ T29] audit: type=1400 audit(1727564615.221:58017): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:03:35 syzkaller kern.notice kernel: [ 1126.683709][ T29] audit: type=1400 audit(1727564615.274:58018): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:03:35 syzkaller kern.notice kernel: [ 1126.706739][ T29] audit: type=1400 audit(1727564615.274:58019): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:03:35 syzkaller kern.notice kernel: [ 1126.730862][ T29] audit: type=1400 audit(1727564615.316:58020): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:03:35 syzkaller kern.notice kernel: [ 1126.753535][ T29] audit: type=1400 audit(1727564615.316:58021): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Sep 28 23:03:35 syzkaller kern.notice kernel: [ 1126.777284][ T29] audit: type=1400 audit(1727564615.368:58022): avc: denied { read } for pid=2948 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass