last executing test programs: 22.69229699s ago: executing program 2 (id=2398): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000d00)='kfree\x00', r0}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000208060001080006040002aaaaaaaaaa00f5b75eb8725f79d8aa00ac"], 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000100)="f257a8ea7bc273dfaeab96850806", 0x2a, 0x0, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) 22.69211132s ago: executing program 2 (id=2399): r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000640)='./file1\x00', 0x3000010, &(0x7f0000000000), 0x3e, 0x51b, &(0x7f0000001200)="$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") open(&(0x7f0000000040)='./bus\x00', 0x1ed37e, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, 0x0, 0x0, 0x1000, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x185102, 0x0) chdir(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000400)='./bus\x00', 0x0, &(0x7f00000007c0)=ANY=[@ANYRESHEX, @ANYRESOCT, @ANYRESOCT=0x0, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=0x0, @ANYRESHEX, @ANYRESDEC=r0, @ANYRES8=r1, @ANYBLOB="c9f01443b39ee97dc97717af6a444a87257769af378429ec9303fb1784190ab63c2fe49d4893ee8bd420379f9bd9c42aba7789233a8e4bbc5f1715554eeacc13e8e00de798715a6546f1ed936a398359dd3a4064f251fdb0a6f0d1f449a5af413f59435192f15df86391105e2c2b13ac5487e71c235b"], 0x1, 0x37f, &(0x7f0000000440)="$eJzs3c9rI2UYwPFn0jQ/umyTgygK0ge96GVoq2e1SBeEgkt3I+4Kwux2oiFjUmZCJCK2nryKN/8BwWUPHhY8LKj/QC/e1osXT9vLgqCLiCPzK8l0p0mTZmm6+/3Abt7kfZ/M+04m5XkCeXP4/tefNOueWbc6kivdF0NE5KFIVXKSMKKbgmTYl1cv/HnvxSvXrhdFZHNb9dLG1dfWVXV55adPPy/Hw+4W5aD64eGD9T8Onj14/vC/qx83PG142mp31NIb7d871g3H1p2G1zRVLzu25dnaaHm2G/W3o/66097d7anV2rm4tOvanqdWq6dNu6edtnbcnlofWY2WmqapF5eyphsrjug7r0pTxNRubW9bG1Me8OaUcZi1f3zfH9HtuhvWgohZDt+vw2q3HvvcAADA3Enn//ptkrBXJddPKI24FiiE7XQZEOT/SXtra3Nbg2JhkP/ffumXzoX37izH+f/dQlb+//pvUXwq/w+OPvP8//sj98uzO5HzYm+SwafK/zEfVtLvyPuDij0W5P/Bu6Ff0X/5we3VsEH+DwAAAAAAAAAAAAAAAAAAAADAefDQ9yu+71eS2+Tf4CsE8f2QsT/yi8Y4d3KS/foX4x0F+tcDnkhXrl2XUvjFvfyyiPNVt9atRbdxfzJwVSryb3g9xKINJ6L9BDRQlZ+dvW5tMQ5YCP/fKIiKI7asSUWqqfiwfemdrc01jUTx4fH3ujUjvxTE16URxq9LRZ7Jjl/PjC/IKy8PxZtSkV9vSlsc2Qmv60H8F2uqb7+7dSS+HI7L8ubjfUkAAAAAAJg5U7UUl8/VdP0b1e+mqZrVH9TyMlyfP/r5QL++Xs2sz/OVF/Jnu3YAAAAAAJ4WXuGzpuU4tuv1jm2UZdyY5Pc0Rj9PdiM/yeCgcS9sLI4aszC0wpM+cyH+BY0JJi+TrdRynL+Kknkyky1cU12lU5xVy0nWf4LBpUlfAtfLTb522/VWgvnoVMsZaiQfG0WPLDxy6uTyceE/GEnUZAdNds4dN/i5b777e7p1GfGuvcNdb9wppVZ6TLhx5JH9MRftA98fO5/F7L8WP07zIzMAAAAA5kSS9Je95JG3znZCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8hU63E9vJGme9RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGBe/B8AAP//Tuzx8g==") mount$overlay(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000000), 0x0, 0x0) 22.69187281s ago: executing program 2 (id=2401): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 22.6273545s ago: executing program 2 (id=2402): bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) io_uring_enter(0xffffffffffffffff, 0x2def, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file2\x00', 0x200000, &(0x7f00000000c0)={[{@dioread_lock}, {@noblock_validity}, {@lazytime}, {@noblock_validity}]}, 0xfc, 0x564, &(0x7f00000008c0)="$eJzs3c9rHFUcAPDvbJI2/aFJoRT1IIEerNRumsQfFTzUo2ixoPe6JNNQsumW7KY0sWB7sBcvUgQRC6J37x6L/4B/RUELRUrQg5eV2cym22Y32aSbJu1+PjDJezOzee+7M9+XNzu7bAB9ayz7UYh4NSK+TSJGWrYNRr5xbHW/lYfXp7MliXr9s7+TSPJ1zf2T/PehvPJKRPz+dcTJwvp2q0vLc6VyOV3I6+O1+Svj1aXlU5fmS7PpbHp5cmrqzDtTk++/927PYn3z/L8/fHr3ozPfHF/5/tf7R24ncTYO59ta43gKN1orYzGWPydDcfaJHSd60Nhekux2B9iWgTzPhyIbA0ZiIM/6tuojz7JrwA77KktroE8l8h/6VHMe0Ly279F18HPjwYerF0Dr4x9cfW0khhvXRgdXkseujLLr3dEetJ+18dtfd25nS/TudQiATd24GRGnBwfXj39JPv5t3+ku9nmyDeMfPDt3s/nPW+3mP4W1+U+0mf8capO727F5/hfu96CZjrL53wdt579rN61GB/LaS40531By8VI5zca2lyPiRAztz+ob3M/5orByr95pY+v8L1uy9ptzwbwf9wf3P/6YmVKt9FRBt3hwM+K1tvPfZO34J22Of/Z8nO+yjWPpndc7bds8/p1V/znijbbH/9EdrWTj+5PjjfNhvHlWrPfPrWN/dGp/t+PPjv/BjeMfTVrv11a33sZPw/+lnbZt9/zfl3zeKO/L110r1WoLExH7kk/Wr5989Nhmvbl/Fv+J4xuPf+3O/wNZYncZ/62jt1p3Hd5a/Dsri39mS8d/64V7H3/5Y6f2uzv+bzdKJ/I13Yx/3XbwaZ47AAAAAAAA2GsKEXE4kkJxrVwoFIur7+84GgcL5Uq1dvJiZfHyTDQ+KzsaQ4Xmne6RlvdDTOTvh23WJ5+oT0XEkYj4buBAo16crpRndjt4AAAAAAAAAAAAAAAAAAAA2CMORQy3+/x/5s+B3e4dsOM2+Mpv4AXXOf/zLb34pidgT/L/H/qX/If+Jf+hf8l/6F/yH/qX/If+Jf+hf20l/385t4MdAQAAAAAAAAAAAAAAAAAAAAAAAAAAgBfD+XPnsqW+8vD6dFafubq0OFe5emomrc4V5xeni9OVhSvF2UpltpwWpyvzm/29cqVyZWIyFq+N19Jqbby6tHxhvrJ4uXbh0nxpNr2QDj2TqAAAAAAAAAAAAAAAAAAAAOD5Ul1aniuVy+mCgsK2CoN7oxsKPS7s9sgEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAI/8HwAA///F1Dry") syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000140)='./bus\x00', 0x1a40cc4, &(0x7f00000002c0)=ANY=[@ANYRESDEC, @ANYBLOB="4ffef8a55db1feb44aa1befe63fea6a9121a07732b2882012d49596110d655b7eec0fafee369a481eef509cebe8a20c116fa2bd7900000000000000000000000e57028", @ANYRESOCT, @ANYRES8, @ANYBLOB="bab44e31f8deff1431e4636edd55f637aed9cafb33000084a7cb1b0eba595affa9bf118a3444c4520a835f62d434ace1ccb1260ab47dfca4666b9b6a9eb0708af98c10a39bea9e5f1a3d1796dc418aba8b0800be64a012c5fe91ae8558f6594ccc0c903163045e8699ece57e70d8b03f7f9acdad754bfb0d2fda181cfcc2b9270bfab8d1a5bf11dcffb41587b97fba268864cc697e5ac812657ead20fe2b57c4c6362910cfee7f936f06c9108967c96c2cf29723a9746c91490e63a16c4480dc70d0a7105d832fc334caadfae31a67edf1ac56ca4cc7b85ca295f89a346730ef87fc89443f397b16087ae9b53e13803b4dcba22cf6af052e86c22ce41332251938493c45a5419eaf9ffcb4ed18ad875ba11b64e471656c98d0677945f509f3704c5dd43a02e7d3a9240dfb090b6d843ce48a250f29acda15a369b29e328aa16c692823ad29fca897c88fbeef9a09d5b5c163cf7b", @ANYBLOB="1263a7b959383aa0a9fa10796416da755d29640e5041a395796348a83463470c07de0fe7c8e02a1a743587f58ffb22bbd585d0a5cbead9ca0823180dad88e609da79bbd442bddae537570748f21ac461994ea7754a096f9d50951ef0a07c555e2e53a20f4a407feef4892391f639afa0eccda43b87b58452d42073ba989bbdec9a81948e1f0c9cb8c0ad00fccafaefa58aadfc71bbd61088", @ANYRESDEC, @ANYRES64, @ANYBLOB="14a8d0ca3386858350717bda500a6e0d271cba7c24404f4fdd13b1b5922dc27fae2bb7656c2c9cf00076db74ad9da398465c271f3c99f9c8b75aa628562a36eae8e60442812741be1793c1486650f74ba8ad8536070000000000000065f3bc92da1e56d7ffa95c91b5c58ba55f9245a209ef24b8348e9ff4cb9b84333e1a13"], 0xde, 0x0, &(0x7f0000000000)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./bus/file0\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) renameat2(r0, &(0x7f00000001c0)='./bus/file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x4) 22.62700058s ago: executing program 2 (id=2404): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r4, 0x4b47, &(0x7f0000000200)={0x4, 0x3}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000500)={0x2, 0x9, 0x1, 0x9, 0x7, 0x0, 0x70bd25, 0x25dfdbff, [@sadb_address={0x5, 0x1b, 0x2b, 0x20, 0x0, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, '\x00', 0x3d}, 0x8000}}]}, 0x38}}, 0x20000000) read$FUSE(r5, &(0x7f0000000a40)={0x2020}, 0x2) syz_usb_connect$uac1(0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x3a) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, 0x0, 0x2, 0x0) 22.487322091s ago: executing program 2 (id=2410): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfb, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x240400, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r3, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) close_range(r2, 0xffffffffffffffff, 0x0) 22.442759381s ago: executing program 32 (id=2410): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfb, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x240400, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r3, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) close_range(r2, 0xffffffffffffffff, 0x0) 9.827886568s ago: executing program 0 (id=2459): tgkill(0x0, 0x0, 0x22) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@response={0x2, 0x0, 0x0, "82d18160f7d8dda36479a6b179161b4bbff2d0508977b3928ebd2dee05607d17", "0194bd7b1b0303c5ba7f602606a285b3", {"30da2d58da817f8a5f77a23de36a2164", "3b33cfa231a427159c7b9f0eceb155f0"}}}}}}}, 0x0) recvmmsg(r0, &(0x7f0000001040)=[{{0x0, 0x0, 0x0}, 0xf}], 0x1, 0x10001, 0x0) 9.827300598s ago: executing program 1 (id=2460): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000400)='./file0\x00', 0xe, &(0x7f0000000580)={[{@dioread_lock}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x80}}, {@barrier_val={'barrier', 0x3d, 0x3}}, {@stripe={'stripe', 0x3d, 0x4}}, {@block_validity}, {@debug}]}, 0x3, 0x43b, &(0x7f0000000e00)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x13, r2, 0x0) pwritev2(r2, &(0x7f0000000500)=[{&(0x7f0000000340)='\b', 0x1}, {&(0x7f00000011c0)='(', 0x1}], 0x2, 0x7, 0x0, 0x0) link(0x0, 0x0) 9.826927638s ago: executing program 3 (id=2461): openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "a05c7b5d00008023e9c5bcf5ff7700"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 9.826483508s ago: executing program 4 (id=2462): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b"], 0x30}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000010000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x218001, &(0x7f0000000340)={[{@jqfmt_vfsv1}, {}, {@barrier_val}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0x5}}, {@dioread_lock}]}, 0xfc, 0x573, &(0x7f0000000400)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r2}, 0x10) time(0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="1600000000000000040000000100000000400000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000200000000000000000000befbadddf9175dbe04b7a8be31148f85ab677820f64fea7e44dab3a227850285891795f99cf6f0e3a6c30a41302f0352b2ec39d441fedd81ecee79", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000b80)=ANY=[@ANYRESHEX=r2, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057000000950283cb5c571e2ecc1cda81745cdd0832e309ccf3026bba82984c50a453863e3b1388524efc8326afec7148d9a27c751d86269e50f475f33c03c23f8bbeef7d49becb13804ad7fb5410f2ca5e6e690b31754c597a779d9156fa77fc91372e5c92d2a6ef69c156083283f9e2b4b67e3f597a1dbf0c0cf7d608aba88afe4e8c315271ae8a88d491b893cc69af1352e82679d353644b647ef552"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) sendmsg$inet(r6, &(0x7f0000000300)={&(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000c80)=[@ip_ttl={{0x14, 0x0, 0x34, 0x80000000}}], 0x18}, 0x0) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="01000000040058060000000000001c000000490edb8e00e0000001080006001b000000"], 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x880) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4004400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="d4000000", @ANYRES16=r7, @ANYBLOB="00042cbd7000fcdbdf25010000002400068005000200070000000500020000000000060001000a00000006000100020000001c000180080003007f00000108000700", @ANYRES32=r1, @ANYBLOB="06000100020000001c0001800500020005000000080006000100000005000200100000040000000800020002000000380006801400040020010000000000000000000000000002060002007f0000000600010000000000080007000000000000", @ANYRES32=r1, @ANYBLOB="d500010002000000140006800600010002050005000600000030f58c052712c1df385f18ccf187ee6bc3bf92a1e72399a02773f102cbe9bc0f2649c42b9912433c1853cf713d59b56e5910c520d96528bfad7b0fbe71a1a37b3d9ad6cf6ec4cccfe520aa3e4060aa812bd4fd9700"/120], 0xd4}, 0x1, 0x0, 0x0, 0x4004}, 0x2400c045) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) nanosleep(&(0x7f0000000340)={0x0, 0x2faf080}, 0x0) 8.077053187s ago: executing program 0 (id=2463): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$BPF_PROG_QUERY(0x9, &(0x7f0000000000)={@ifindex, 0xf, 0x1, 0x0, &(0x7f0000000040)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) readv(r1, &(0x7f0000000200)=[{&(0x7f0000003140)=""/4096, 0x8}], 0xe) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006980c70000000001000000940001000000fcffc50000000f00000095"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) socket$inet(0x2, 0x4000000000000001, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) ioctl$TUNSETPERSIST(r5, 0x400454c9, 0x1) ioctl$TUNSETPERSIST(r5, 0x400454cb, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000037c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001800)=@newtaction={0x488, 0x30, 0x12f, 0x0, 0x0, {}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x80000000, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x3, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10001, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x10004, {0x7, 0x1, 0x0, 0x0, 0x0, 0x7}, {}, 0x2}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x1, 0x2}}}}]}]}, 0x488}}, 0x0) r7 = fsopen(0x0, 0x1) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) fsmount(r7, 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 8.076148347s ago: executing program 1 (id=2464): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x30, r3, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x19, {0x3, 0x1}}}}, 0x30}}, 0x0) 8.075740747s ago: executing program 3 (id=2465): connect$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffa84, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x530, 0x348, 0x18c, 0x203, 0x348, 0x19030000, 0x460, 0x2e0, 0x2e0, 0x460, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x300, 0x348, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x16}]}}, @common=@hl={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) 8.075505237s ago: executing program 4 (id=2466): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)={{0x14}, [@NFT_MSG_NEWRULE={0x18, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x4}]}], {0x14}}, 0x40}}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000000)='./file1\x00', 0x844, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1, 0x253, &(0x7f00000004c0)="$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") socket(0x2a, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) 6.225922567s ago: executing program 0 (id=2467): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01dfffffff0000000000210000000c00018008000100", @ANYRES32], 0x20}}, 0x0) 6.225589907s ago: executing program 1 (id=2468): unshare(0x2c020400) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) r4 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) r6 = dup3(r4, r5, 0x0) ioctl$MON_IOCX_GETX(r6, 0x40189206, &(0x7f0000000100)={&(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, 0x0, 0x43}) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r2, &(0x7f00000002c0)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 6.225408607s ago: executing program 3 (id=2469): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r4, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01dfffffff0000000000210000000c00018008000100", @ANYRES32=r3], 0x20}}, 0x0) 6.183271907s ago: executing program 4 (id=2470): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f0000000340)="01000722625a900ede290f00015b097ead85847837353d2dbad05d", 0x1b, r2) 4.253754507s ago: executing program 0 (id=2471): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x0, 0x0) syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000180)) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = syz_open_dev$usbmon(&(0x7f00000024c0), 0x1, 0x2c0) ioctl$MON_IOCX_MFETCH(r5, 0xc0109207, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r4, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) fstat(r3, &(0x7f0000000200)) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./bus\x00', 0x280008a, &(0x7f00000001c0)=ANY=[@ANYBLOB="616c6c6f775f7574696d653d30303030303030303030303030303030303030303030312c73686f72746e616d653d77696e39352c73686f72746e616d653d77696e6e742c696f636861727365743d64656661756c742c756e695f786c6174653d302c6e6f6e756d7461696c3d302c757466383d302c666c7573682c726f6469722c726f6469722c73686f72746e616d653d77696e6e742c73686f72746e616d653d6c6f7765722c636865636b3d7374726963742c756e695f786c6174653d302c757466383d302c73686f72746e616d653d6d697865642c756e695f786c6174653d312c73686f72746e616d653d77696e6e742c001762a07a915c8f6c3378b924fc250bdae45cd22bb33f29d72cf1c8410df88b83b9710b49374a748455718cc4af5f3ced9aa10632d595e9c8c3a89f41b650b9ebd4886ae65bf02b7c8ea4e76ef2cc241ac9f89f2753df98db0ba9558c753363f296424ec60e703fac2db7e9f31283852e115cf6acb8d77b3e5d68"], 0x97, 0x2a9, &(0x7f0000000500)="$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") syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f00000002c0)='./file2\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00631dda01aef2456795dd9b26209f1c0f624854ea3dd5a00bd6df44035f5c3ae796fec6d633a0ffad0569794acfef7da01767fd4175f2cd82df769aa2ee7bfe3640554507d2e660c9f9e222a72e1e3e71145c480657d2864e5e276f028d64701ae31cde0ceaf408fdb05c0f4142da00e900000100000149e6d308cbe315789f4baffe39bbced9b1d421d2e290e9fc563b62225f002ee310e1fa7321000000000000d6231001a4b2d467825f3abb0c167e129cf1fa0e7854103f4bf2d3a0194983bc86cbd3d75ccef3c8ac4516dac102"], 0x1, 0x28f, &(0x7f0000000300)="$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") r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000000000)={0x0, 0xaeae}) 4.253284618s ago: executing program 1 (id=2472): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x18, &(0x7f0000000540), 0x1, 0x4a3, &(0x7f0000000580)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000e80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = dup2(r1, r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r2}, 0x10) listxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 4.252938948s ago: executing program 3 (id=2473): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x4e25, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x10}}], 0x10}, 0x0) 4.252695998s ago: executing program 4 (id=2474): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x61680, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004"], 0xfe44, 0x0) 2.176110838s ago: executing program 0 (id=2475): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001a40)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f6873720000000058000000160a0101000b000000000000010000000900020073797a32000000000900010073797a30000000002c000380180003"], 0xf8}}, 0x0) 2.175645188s ago: executing program 1 (id=2476): capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200003, 0x0, 0x0, 0x3}) setrlimit(0x40000000000008, &(0x7f0000000000)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendmmsg$inet(r0, &(0x7f0000000780)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff0000000010000000000000000000000007"], 0x30}}], 0x1, 0x4008804) 2.175521899s ago: executing program 3 (id=2477): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000)=0xca9a3b, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 2.175418078s ago: executing program 4 (id=2478): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000003c0)='kfree\x00', r0}, 0x10) setreuid(0x0, 0xee00) r1 = inotify_init1(0x0) close_range(r1, 0xffffffffffffffff, 0x0) 853.18µs ago: executing program 0 (id=2479): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9e5ec999876ee567, @void, @value}, 0x28) 586.42µs ago: executing program 1 (id=2480): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0xfffffffffffffede, 0x11, 0x0, 0x3000137) 325.84µs ago: executing program 3 (id=2481): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r3}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 0s ago: executing program 4 (id=2482): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f00000003c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x12, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x90646}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x600}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.28' (ED25519) to the list of known hosts. [ 20.355925][ T28] audit: type=1400 audit(1732162928.002:66): avc: denied { mounton } for pid=280 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.357107][ T280] cgroup: Unknown subsys name 'net' [ 20.378399][ T28] audit: type=1400 audit(1732162928.002:67): avc: denied { mount } for pid=280 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.405314][ T28] audit: type=1400 audit(1732162928.032:68): avc: denied { unmount } for pid=280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.405468][ T280] cgroup: Unknown subsys name 'devices' [ 20.520868][ T280] cgroup: Unknown subsys name 'hugetlb' [ 20.526303][ T280] cgroup: Unknown subsys name 'rlimit' [ 20.631534][ T28] audit: type=1400 audit(1732162928.282:69): avc: denied { setattr } for pid=280 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.654499][ T28] audit: type=1400 audit(1732162928.282:70): avc: denied { mounton } for pid=280 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 20.675401][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.679522][ T28] audit: type=1400 audit(1732162928.282:71): avc: denied { mount } for pid=280 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.710306][ T280] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.710735][ T28] audit: type=1400 audit(1732162928.342:72): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.744404][ T28] audit: type=1400 audit(1732162928.342:73): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.769733][ T28] audit: type=1400 audit(1732162928.362:74): avc: denied { read } for pid=280 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.794989][ T28] audit: type=1400 audit(1732162928.362:75): avc: denied { open } for pid=280 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.823739][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.830764][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.838066][ T292] device bridge_slave_0 entered promiscuous mode [ 21.850147][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.856984][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.864295][ T292] device bridge_slave_1 entered promiscuous mode [ 21.880116][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.886958][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.894330][ T291] device bridge_slave_0 entered promiscuous mode [ 21.902636][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.909625][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.916794][ T291] device bridge_slave_1 entered promiscuous mode [ 22.050802][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.057661][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.065025][ T293] device bridge_slave_0 entered promiscuous mode [ 22.071501][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.078432][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.085608][ T294] device bridge_slave_0 entered promiscuous mode [ 22.102641][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.109618][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.116911][ T293] device bridge_slave_1 entered promiscuous mode [ 22.123314][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.130203][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.137363][ T294] device bridge_slave_1 entered promiscuous mode [ 22.205423][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.212316][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.219731][ T295] device bridge_slave_0 entered promiscuous mode [ 22.241704][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.248594][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.255714][ T295] device bridge_slave_1 entered promiscuous mode [ 22.321787][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.328661][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.335760][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.342560][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.361518][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.368383][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.375460][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.382277][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.448546][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.455486][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.462616][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.469387][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.490296][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.497145][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.504256][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.511044][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.522189][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.529070][ T295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.536169][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.542972][ T295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.558897][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.565929][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.573478][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.580771][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.587989][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.595095][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.602397][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.609470][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.616468][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.623627][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.631363][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.638989][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.664064][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.671761][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.679894][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.686714][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.694094][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.702630][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.709478][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.737638][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.745119][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.752980][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.761740][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.770337][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.777166][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.786273][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.794492][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.802568][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.809404][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.834427][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.842737][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.852587][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.859445][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.867072][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.874503][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.881833][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.889921][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.897834][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.904698][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.911929][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.920154][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.928062][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.934921][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.942293][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.950409][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.958532][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.965354][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.984762][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.992706][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.000597][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.009468][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.017241][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.025426][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.033365][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.041362][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.061246][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.069592][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.077677][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.086022][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.094136][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.102289][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.110276][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.117906][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.125975][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.133371][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.149013][ T291] device veth0_vlan entered promiscuous mode [ 23.157706][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.166310][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.174357][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.182166][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.189677][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.196885][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.204502][ T295] device veth0_vlan entered promiscuous mode [ 23.214151][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.222483][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.244173][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.252552][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.260764][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.267597][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.274943][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.283212][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.291419][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.298267][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.311312][ T295] device veth1_macvtap entered promiscuous mode [ 23.318558][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.326770][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.334826][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.343937][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.351770][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.362851][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.370251][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.377534][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.385500][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.393521][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.401656][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.410351][ T291] device veth1_macvtap entered promiscuous mode [ 23.427840][ T292] device veth0_vlan entered promiscuous mode [ 23.440254][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.447652][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.456130][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.464473][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.472590][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.480829][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.489265][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.497373][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.505569][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.513827][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.522118][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.537432][ T294] device veth0_vlan entered promiscuous mode [ 23.551901][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.563511][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.572070][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.585900][ T292] device veth1_macvtap entered promiscuous mode [ 23.594847][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.603171][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.611397][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.623192][ T294] device veth1_macvtap entered promiscuous mode [ 23.648861][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.670776][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.685477][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.694233][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.702955][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.711445][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.735622][ T293] device veth0_vlan entered promiscuous mode [ 23.742219][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.750477][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.759059][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.767209][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.775813][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.796973][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.804746][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.835195][ T293] device veth1_macvtap entered promiscuous mode [ 23.851585][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.862672][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.870850][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.886494][ T317] loop4: detected capacity change from 0 to 40427 [ 23.894095][ T317] ======================================================= [ 23.894095][ T317] WARNING: The mand mount option has been deprecated and [ 23.894095][ T317] and is ignored by this kernel. Remove the mand [ 23.894095][ T317] option from the mount to silence this warning. [ 23.894095][ T317] ======================================================= [ 23.936225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.944702][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.952918][ T19] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 23.961549][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.970250][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.983956][ T330] 9pnet: p9_errstr2errno: server reported unknown error õ1 g;-‡~ [ 24.025307][ T317] F2FS-fs (loop4): Found nat_bits in checkpoint [ 24.029426][ T336] loop1: detected capacity change from 0 to 512 [ 24.074367][ T336] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 24.090508][ T317] F2FS-fs (loop4): Mounted with checkpoint version = 48b305e5 [ 24.123078][ T336] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. [ 24.131949][ T336] ext4 filesystem being mounted at /2/file0 supports timestamps until 2038 (0x7fffffff) [ 24.133495][ T346] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 24.214683][ T294] EXT4-fs (loop1): unmounting filesystem. [ 24.301331][ T346] kvm: emulating exchange as write [ 24.370888][ T352] loop1: detected capacity change from 0 to 16 [ 24.381337][ T352] erofs: Unknown parameter 'ÿÿÿÿ' [ 24.388465][ T19] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 24.399358][ T321] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 24.427207][ T352] Zero length message leads to an empty skb [ 24.516504][ T19] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 24.585524][ T19] usb 3-1: New USB device found, idVendor=06cb, idProduct=73f5, bcdDevice= 0.00 [ 24.641966][ T19] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 24.650168][ T321] usb 4-1: Using ep0 maxpacket: 16 [ 24.720551][ T19] usb 3-1: config 0 descriptor?? [ 24.928903][ T321] usb 4-1: New USB device found, idVendor=05d1, idProduct=2001, bcdDevice=10.00 [ 24.952555][ T321] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 25.009989][ T321] usb 4-1: Product: syz [ 25.036536][ T321] usb 4-1: Manufacturer: syz [ 25.064421][ T321] usb 4-1: SerialNumber: syz [ 25.394286][ T321] usb 4-1: config 0 descriptor?? [ 25.448927][ T321] ftdi_sio 4-1:0.0: FTDI USB Serial Device converter detected [ 25.457191][ T321] usb 4-1: Detected FT-X [ 25.508986][ T295] syz-executor: attempt to access beyond end of device [ 25.508986][ T295] loop4: rw=2049, sector=45096, nr_sectors = 16 limit=40427 [ 25.533303][ T356] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.540397][ T356] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.582859][ T358] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.589738][ T358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.596842][ T358] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.603631][ T358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.613656][ T28] kauditd_printk_skb: 65 callbacks suppressed [ 25.613669][ T28] audit: type=1400 audit(1732162933.262:141): avc: denied { read } for pid=359 comm="syz.0.13" name="msr" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 25.658530][ T321] ftdi_sio ttyUSB0: Unable to read latency timer: -32 [ 25.670139][ T28] audit: type=1400 audit(1732162933.262:142): avc: denied { open } for pid=359 comm="syz.0.13" path="/dev/cpu/0/msr" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 25.688180][ T358] device bridge0 entered promiscuous mode [ 25.711043][ T344] xt_bpf: check failed: parse error [ 25.733161][ T28] audit: type=1400 audit(1732162933.352:143): avc: denied { create } for pid=359 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 25.759418][ T19] usbhid 3-1:0.0: can't add hid device: -71 [ 25.765308][ T19] usbhid: probe of 3-1:0.0 failed with error -71 [ 25.785428][ T19] usb 3-1: USB disconnect, device number 2 [ 25.808328][ T28] audit: type=1400 audit(1732162933.352:144): avc: denied { setopt } for pid=359 comm="syz.0.13" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 25.855547][ T28] audit: type=1404 audit(1732162933.412:145): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 25.871255][ T28] audit: type=1400 audit(1732162933.412:146): avc: denied { read write } for pid=294 comm="syz-executor" name="loop1" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 25.895764][ T28] audit: type=1400 audit(1732162933.442:147): avc: denied { bpf } for pid=364 comm="syz.1.14" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 25.917022][ T28] audit: type=1400 audit(1732162933.442:148): avc: denied { bpf } for pid=364 comm="syz.1.14" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 25.937168][ T368] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5 sclass=netlink_audit_socket pid=368 comm=syz.4.12 [ 25.949787][ T28] audit: type=1400 audit(1732162933.442:149): avc: denied { prog_load } for pid=364 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 25.969144][ T28] audit: type=1400 audit(1732162933.442:150): avc: denied { bpf } for pid=364 comm="syz.1.14" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 26.000641][ T368] Â: renamed from pim6reg1 [ 26.048352][ T321] ftdi_sio 4-1:0.0: GPIO initialisation failed: -71 [ 26.059655][ T321] usb 4-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 26.079436][ T321] usb 4-1: USB disconnect, device number 2 [ 26.090158][ T321] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 26.115602][ T321] ftdi_sio 4-1:0.0: device disconnected [ 27.629258][ T361] syz.0.13 (361) used greatest stack depth: 21928 bytes left [ 28.701200][ T441] syz.2.43 (441) used greatest stack depth: 20528 bytes left [ 29.676201][ T518] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.683165][ T518] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.743832][ T518] device bridge0 left promiscuous mode [ 29.757254][ T520] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.764259][ T520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.771388][ T520] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.778280][ T520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.806188][ T520] device bridge0 entered promiscuous mode [ 30.399031][ T553] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.406091][ T553] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.480686][ T554] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.487579][ T554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.494727][ T554] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.501782][ T554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.601739][ T554] device bridge0 entered promiscuous mode [ 30.618637][ T28] kauditd_printk_skb: 792 callbacks suppressed [ 30.618654][ T28] audit: type=1400 audit(1732162938.272:943): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 30.682085][ T28] audit: type=1400 audit(1732162938.332:944): avc: denied { read write } for pid=292 comm="syz-executor" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.707217][ T28] audit: type=1400 audit(1732162938.352:945): avc: denied { read write } for pid=294 comm="syz-executor" name="loop1" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.758295][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.790088][ T28] audit: type=1400 audit(1732162938.392:946): avc: denied { execmem } for pid=556 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 30.848187][ T28] audit: type=1400 audit(1732162938.392:947): avc: denied { bpf } for pid=556 comm="syz.0.89" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 30.918348][ T28] audit: type=1400 audit(1732162938.392:948): avc: denied { prog_load } for pid=556 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 30.956071][ T28] audit: type=1400 audit(1732162938.392:949): avc: denied { bpf } for pid=556 comm="syz.0.89" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 31.008236][ T28] audit: type=1400 audit(1732162938.392:950): avc: denied { bpf } for pid=556 comm="syz.0.89" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 31.039099][ T28] audit: type=1400 audit(1732162938.392:951): avc: denied { prog_load } for pid=556 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 31.068113][ T28] audit: type=1400 audit(1732162938.392:952): avc: denied { bpf } for pid=556 comm="syz.0.89" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 31.591191][ T579] process 'syz.2.97' launched './file0' with NULL argv: empty string added [ 31.809103][ T589] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.816163][ T589] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.566797][ T686] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=686 comm=syz.1.140 [ 34.581506][ T686] syz.1.140 (686) used greatest stack depth: 20264 bytes left [ 34.609316][ T690] device syzkaller0 entered promiscuous mode [ 35.100631][ T722] xt_bpf: check failed: parse error [ 35.128278][ T718] device syzkaller0 entered promiscuous mode [ 35.628139][ T28] kauditd_printk_skb: 862 callbacks suppressed [ 35.628154][ T28] audit: type=1400 audit(1732162943.272:1815): avc: denied { bpf } for pid=748 comm="syz.3.167" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 35.684648][ T28] audit: type=1400 audit(1732162943.272:1816): avc: denied { prog_load } for pid=748 comm="syz.3.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 35.717540][ T28] audit: type=1400 audit(1732162943.302:1817): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 35.760882][ T28] audit: type=1400 audit(1732162943.302:1818): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 35.807918][ T28] audit: type=1400 audit(1732162943.302:1819): avc: denied { bpf } for pid=748 comm="syz.3.167" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 35.848802][ T28] audit: type=1400 audit(1732162943.302:1820): avc: denied { prog_load } for pid=748 comm="syz.3.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 35.876773][ T28] audit: type=1326 audit(1732162943.302:1821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=740 comm="syz.1.164" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fda701757e7 code=0x7ffc0000 [ 35.926643][ T28] audit: type=1326 audit(1732162943.302:1822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=740 comm="syz.1.164" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fda7011a1a9 code=0x7ffc0000 [ 35.956711][ T28] audit: type=1326 audit(1732162943.302:1823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=740 comm="syz.1.164" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fda7017e819 code=0x7ffc0000 [ 35.980462][ T85] audit: audit_backlog=65 > audit_backlog_limit=64 [ 36.068533][ T758] device syzkaller0 entered promiscuous mode [ 37.183609][ T796] device syzkaller0 entered promiscuous mode [ 37.565374][ T817] binfmt_misc: register: failed to install interpreter file ./file0 [ 37.638179][ T823] device syzkaller0 entered promiscuous mode [ 38.510029][ T851] device syzkaller0 entered promiscuous mode [ 41.058092][ T28] kauditd_printk_skb: 957 callbacks suppressed [ 41.058108][ T28] audit: type=1400 audit(1732162948.325:2779): avc: denied { read write } for pid=294 comm="syz-executor" name="loop1" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.096776][ T28] audit: type=1400 audit(1732162948.325:2780): avc: denied { bpf } for pid=933 comm="syz.1.244" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 41.117806][ T28] audit: type=1400 audit(1732162948.325:2781): avc: denied { prog_load } for pid=933 comm="syz.1.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 41.138076][ T28] audit: type=1400 audit(1732162948.325:2782): avc: denied { bpf } for pid=933 comm="syz.1.244" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 41.158892][ T28] audit: type=1400 audit(1732162948.325:2783): avc: denied { map_create } for pid=933 comm="syz.1.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 41.178263][ T28] audit: type=1400 audit(1732162948.325:2784): avc: denied { bpf } for pid=933 comm="syz.1.244" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 41.208948][ T28] audit: type=1400 audit(1732162948.325:2785): avc: denied { prog_load } for pid=933 comm="syz.1.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 41.231384][ T28] audit: type=1400 audit(1732162948.325:2786): avc: denied { bpf } for pid=933 comm="syz.1.244" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 41.253324][ T28] audit: type=1400 audit(1732162948.325:2787): avc: denied { prog_load } for pid=933 comm="syz.1.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 41.273004][ T28] audit: type=1400 audit(1732162948.325:2788): avc: denied { bpf } for pid=933 comm="syz.1.244" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 42.912597][ T1002] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.919561][ T1002] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.926458][ T1002] device bridge0 left promiscuous mode [ 42.991178][ T1005] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.998059][ T1005] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.005214][ T1005] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.012063][ T1005] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.019307][ T1005] device bridge0 entered promiscuous mode [ 44.110453][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 46.496503][ T28] kauditd_printk_skb: 575 callbacks suppressed [ 46.496520][ T28] audit: type=1400 audit(1732162953.346:3364): avc: denied { bpf } for pid=1076 comm="syz.2.303" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 46.547607][ T28] audit: type=1400 audit(1732162953.364:3365): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 46.596986][ T28] audit: type=1400 audit(1732162953.364:3366): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 46.620957][ T28] audit: type=1400 audit(1732162953.364:3367): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 46.653255][ T28] audit: type=1400 audit(1732162953.364:3368): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 46.708674][ T28] audit: type=1400 audit(1732162953.364:3369): avc: denied { prog_load } for pid=1076 comm="syz.2.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 46.745359][ T28] audit: type=1400 audit(1732162953.364:3370): avc: denied { bpf } for pid=1076 comm="syz.2.303" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 46.787566][ T28] audit: type=1400 audit(1732162953.364:3371): avc: denied { bpf } for pid=1076 comm="syz.2.303" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 46.808459][ T28] audit: type=1400 audit(1732162953.364:3372): avc: denied { prog_load } for pid=1076 comm="syz.2.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 46.828040][ T28] audit: type=1400 audit(1732162953.410:3373): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 47.442639][ T1132] syz.3.326 uses obsolete (PF_INET,SOCK_PACKET) [ 49.350364][ T1222] netlink: 8 bytes leftover after parsing attributes in process `syz.3.366'. [ 50.572088][ T1259] Bluetooth: hci0: Frame reassembly failed (-84) [ 51.945354][ T28] kauditd_printk_skb: 803 callbacks suppressed [ 51.945370][ T28] audit: type=1400 audit(1732162958.376:4177): avc: denied { read write } for pid=1288 comm="syz.1.392" name="loop1" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.000503][ T28] audit: type=1400 audit(1732162958.376:4178): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 52.051818][ T28] audit: type=1400 audit(1732162958.404:4179): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 52.074309][ T28] audit: type=1400 audit(1732162958.404:4180): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 52.096886][ T28] audit: type=1400 audit(1732162958.404:4181): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 52.119526][ T28] audit: type=1400 audit(1732162958.450:4182): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 52.142204][ T28] audit: type=1400 audit(1732162958.496:4183): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 52.164372][ T28] audit: type=1400 audit(1732162958.496:4184): avc: denied { read write } for pid=1295 comm="syz.2.395" name="loop2" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.188359][ T28] audit: type=1400 audit(1732162958.496:4185): avc: denied { execmem } for pid=1288 comm="syz.1.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.218598][ T28] audit: type=1400 audit(1732162958.514:4186): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 52.767403][ T1261] Bluetooth: hci0: command 0x1003 tx timeout [ 52.773260][ T422] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 54.532799][ T1388] capability: warning: `syz.1.431' uses deprecated v2 capabilities in a way that may be insecure [ 56.947531][ T8] Bluetooth: hci0: Frame reassembly failed (-84) [ 57.397198][ T28] kauditd_printk_skb: 748 callbacks suppressed [ 57.397308][ T28] audit: type=1400 audit(1732162963.406:4935): avc: denied { read write } for pid=1487 comm="syz.2.472" name="loop2" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.448512][ T28] audit: type=1400 audit(1732162963.406:4936): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 57.484235][ T28] audit: type=1400 audit(1732162963.434:4937): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 57.527890][ T28] audit: type=1400 audit(1732162963.434:4938): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 57.570401][ T28] audit: type=1400 audit(1732162963.434:4939): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 57.613000][ T28] audit: type=1400 audit(1732162963.443:4940): avc: denied { read write } for pid=292 comm="syz-executor" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.659998][ T28] audit: type=1400 audit(1732162963.443:4941): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.698866][ T28] audit: type=1400 audit(1732162963.452:4942): avc: denied { bpf } for pid=1491 comm="syz.0.473" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 57.727362][ T28] audit: type=1400 audit(1732162963.452:4943): avc: denied { bpf } for pid=1491 comm="syz.0.473" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 57.762837][ T28] audit: type=1400 audit(1732162963.452:4944): avc: denied { prog_load } for pid=1491 comm="syz.0.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 59.058090][ T1526] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5 sclass=netlink_audit_socket pid=1526 comm=syz.0.486 [ 59.191612][ T1261] Bluetooth: hci0: command 0x1003 tx timeout [ 59.197498][ T422] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 61.814072][ T1618] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5 sclass=netlink_audit_socket pid=1618 comm=syz.0.523 [ 61.858228][ T1618] Â: renamed from pim6reg1 [ 62.822189][ T28] kauditd_printk_skb: 541 callbacks suppressed [ 62.822205][ T28] audit: type=1400 audit(1732162968.418:5486): avc: denied { bpf } for pid=1636 comm="syz.4.531" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 62.908093][ T28] audit: type=1400 audit(1732162968.437:5487): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 62.952795][ T28] audit: type=1400 audit(1732162968.437:5488): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 63.010117][ T28] audit: type=1400 audit(1732162968.437:5489): avc: denied { execmem } for pid=1633 comm="syz.0.530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.088881][ T28] audit: type=1400 audit(1732162968.437:5490): avc: denied { bpf } for pid=1633 comm="syz.0.530" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 63.161396][ T28] audit: type=1400 audit(1732162968.437:5491): avc: denied { map_create } for pid=1633 comm="syz.0.530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 63.202133][ T28] audit: type=1400 audit(1732162968.437:5492): avc: denied { bpf } for pid=1633 comm="syz.0.530" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 63.222996][ T28] audit: type=1400 audit(1732162968.437:5493): avc: denied { prog_load } for pid=1633 comm="syz.0.530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 63.242625][ T28] audit: type=1400 audit(1732162968.437:5494): avc: denied { bpf } for pid=1633 comm="syz.0.530" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 63.263517][ T28] audit: type=1400 audit(1732162968.437:5495): avc: denied { prog_load } for pid=1633 comm="syz.0.530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 63.303568][ T1657] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5 sclass=netlink_audit_socket pid=1657 comm=syz.3.537 [ 63.350584][ T1657] Â: renamed from pim6reg1 [ 64.421775][ T1690] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5 sclass=netlink_audit_socket pid=1690 comm=syz.3.549 [ 64.437273][ T1690] Â: renamed from pim6reg1 [ 65.197954][ T1727] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5 sclass=netlink_audit_socket pid=1727 comm=syz.1.563 [ 65.215109][ T1727] Â: renamed from pim6reg1 [ 66.440046][ T1737] syz.0.566 (1737) used greatest stack depth: 20168 bytes left [ 66.477831][ T1760] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5 sclass=netlink_audit_socket pid=1760 comm=syz.0.575 [ 66.493352][ T1760] Â: renamed from pim6reg1 [ 67.551458][ T1788] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5 sclass=netlink_audit_socket pid=1788 comm=syz.0.587 [ 67.566359][ T1788] Â: renamed from pim6reg1 [ 68.030703][ T1807] mmap: syz.4.595 (1807) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 68.341348][ T28] kauditd_printk_skb: 682 callbacks suppressed [ 68.341365][ T28] audit: type=1400 audit(1732162973.504:6178): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 68.369049][ T28] audit: type=1400 audit(1732162973.504:6179): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 68.390961][ T28] audit: type=1400 audit(1732162973.559:6180): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 68.413088][ T28] audit: type=1400 audit(1732162973.578:6181): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 68.435227][ T28] audit: type=1400 audit(1732162973.596:6182): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 68.457420][ T28] audit: type=1400 audit(1732162973.615:6183): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 68.479735][ T28] audit: type=1400 audit(1732162973.633:6184): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 68.501849][ T28] audit: type=1400 audit(1732162973.661:6185): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 68.523933][ T28] audit: type=1400 audit(1732162973.679:6186): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 68.546492][ T28] audit: type=1400 audit(1732162973.698:6187): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 69.857123][ T324] Bluetooth: hci0: Frame reassembly failed (-84) [ 70.086072][ T1873] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5 sclass=netlink_audit_socket pid=1873 comm=syz.4.620 [ 70.128388][ T1873] Â: renamed from pim6reg1 [ 71.763919][ T1923] Â: renamed from pim6reg1 [ 72.095181][ T45] Bluetooth: hci0: command 0x1003 tx timeout [ 72.095187][ T422] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 73.768695][ T28] kauditd_printk_skb: 690 callbacks suppressed [ 73.768712][ T28] audit: type=1400 audit(1732162978.516:6878): avc: denied { read write } for pid=292 comm="syz-executor" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.824581][ T28] audit: type=1400 audit(1732162978.544:6879): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 73.849218][ T2022] Â: renamed from pim6reg1 [ 73.853760][ T28] audit: type=1400 audit(1732162978.544:6880): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 73.895881][ T28] audit: type=1400 audit(1732162978.544:6881): avc: denied { read write } for pid=2019 comm="syz.0.680" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.944508][ T28] audit: type=1400 audit(1732162978.544:6882): avc: denied { bpf } for pid=2014 comm="syz.1.679" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 73.973111][ T28] audit: type=1400 audit(1732162978.544:6883): avc: denied { prog_load } for pid=2014 comm="syz.1.679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 74.011404][ T28] audit: type=1400 audit(1732162978.544:6884): avc: denied { bpf } for pid=2014 comm="syz.1.679" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 74.045919][ T28] audit: type=1400 audit(1732162978.553:6885): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 74.078152][ T28] audit: type=1400 audit(1732162978.553:6886): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 74.110559][ T28] audit: type=1400 audit(1732162978.553:6887): avc: denied { mounton } for pid=2019 comm="syz.0.680" path="/111/bus" dev="tmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 74.589323][ T2046] Â: renamed from pim6reg1 [ 75.525152][ T2086] Â: renamed from pim6reg1 [ 79.263523][ T28] kauditd_printk_skb: 647 callbacks suppressed [ 79.263538][ T28] audit: type=1400 audit(1732162984.581:7535): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 79.343350][ T28] audit: type=1400 audit(1732162984.600:7536): avc: denied { read write } for pid=295 comm="syz-executor" name="loop4" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 79.399965][ T28] audit: type=1400 audit(1732162984.618:7537): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 79.462726][ T28] audit: type=1400 audit(1732162984.618:7538): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 79.516626][ T28] audit: type=1400 audit(1732162984.627:7539): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 79.573357][ T28] audit: type=1400 audit(1732162984.627:7540): avc: denied { bpf } for pid=2194 comm="syz.4.746" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 79.616525][ T28] audit: type=1400 audit(1732162984.627:7541): avc: denied { bpf } for pid=2194 comm="syz.4.746" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 79.657432][ T28] audit: type=1400 audit(1732162984.627:7542): avc: denied { prog_load } for pid=2194 comm="syz.4.746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 79.692538][ T28] audit: type=1400 audit(1732162984.637:7543): avc: denied { bpf } for pid=2194 comm="syz.4.746" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 79.744115][ T28] audit: type=1400 audit(1732162984.646:7544): avc: denied { read } for pid=2194 comm="syz.4.746" name="msr" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 84.686515][ T28] kauditd_printk_skb: 430 callbacks suppressed [ 84.686531][ T28] audit: type=1400 audit(1732162989.593:7975): avc: denied { read write } for pid=295 comm="syz-executor" name="loop4" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.724207][ T28] audit: type=1400 audit(1732162989.602:7976): avc: denied { bpf } for pid=2346 comm="syz.4.802" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 84.761381][ T28] audit: type=1400 audit(1732162989.602:7977): avc: denied { map_create } for pid=2346 comm="syz.4.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 84.792911][ T28] audit: type=1400 audit(1732162989.612:7978): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 84.820446][ T28] audit: type=1400 audit(1732162989.621:7979): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 84.850313][ T28] audit: type=1400 audit(1732162989.621:7980): avc: denied { execmem } for pid=2346 comm="syz.4.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 84.876286][ T28] audit: type=1400 audit(1732162989.658:7981): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 84.908946][ T28] audit: type=1400 audit(1732162989.667:7982): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 84.968431][ T28] audit: type=1400 audit(1732162989.667:7983): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 85.001224][ T28] audit: type=1400 audit(1732162989.676:7984): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 90.119725][ T28] kauditd_printk_skb: 868 callbacks suppressed [ 90.119742][ T28] audit: type=1400 audit(1732162994.605:8853): avc: denied { create } for pid=2498 comm="syz.2.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 90.173547][ T28] audit: type=1400 audit(1732162994.633:8854): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 90.240803][ T28] audit: type=1400 audit(1732162994.633:8855): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 90.303441][ T28] audit: type=1400 audit(1732162994.679:8856): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 90.371698][ T28] audit: type=1400 audit(1732162994.697:8857): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 90.430516][ T28] audit: type=1400 audit(1732162994.697:8858): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 90.490521][ T28] audit: type=1400 audit(1732162994.697:8859): avc: denied { bpf } for pid=2498 comm="syz.2.855" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 90.543673][ T28] audit: type=1400 audit(1732162994.697:8860): avc: denied { prog_load } for pid=2498 comm="syz.2.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 90.621678][ T28] audit: type=1400 audit(1732162994.697:8861): avc: denied { bpf } for pid=2498 comm="syz.2.855" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 90.686144][ T28] audit: type=1400 audit(1732162994.697:8862): avc: denied { bpf } for pid=2498 comm="syz.2.855" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 95.568455][ T28] kauditd_printk_skb: 739 callbacks suppressed [ 95.568471][ T28] audit: type=1400 audit(1732162999.635:9602): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 95.671920][ T28] audit: type=1400 audit(1732162999.672:9603): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 95.735456][ T28] audit: type=1400 audit(1732162999.672:9604): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 95.792614][ T28] audit: type=1400 audit(1732162999.672:9605): avc: denied { write } for pid=2669 comm="syz.3.922" name="001" dev="devtmpfs" ino=181 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 95.846781][ T28] audit: type=1400 audit(1732162999.691:9606): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 95.935225][ T28] audit: type=1400 audit(1732162999.718:9607): avc: denied { bpf } for pid=2672 comm="syz.3.923" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 95.991344][ T2682] ªªªªªª: renamed from vlan0 [ 95.995853][ T28] audit: type=1400 audit(1732162999.718:9608): avc: denied { bpf } for pid=2672 comm="syz.3.923" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 96.060330][ T28] audit: type=1400 audit(1732162999.718:9609): avc: denied { prog_load } for pid=2672 comm="syz.3.923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 96.123583][ T28] audit: type=1400 audit(1732162999.718:9610): avc: denied { bpf } for pid=2672 comm="syz.3.923" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 96.145407][ T294] audit: audit_backlog=65 > audit_backlog_limit=64 [ 99.532308][ T2758] device syzkaller0 entered promiscuous mode [ 100.990159][ T28] kauditd_printk_skb: 504 callbacks suppressed [ 100.990175][ T28] audit: type=1400 audit(1732163004.647:10095): avc: denied { bpf } for pid=2793 comm="syz.1.968" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 101.018468][ T28] audit: type=1400 audit(1732163004.647:10096): avc: denied { prog_load } for pid=2793 comm="syz.1.968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 101.076746][ T28] audit: type=1400 audit(1732163004.666:10097): avc: denied { read write } for pid=292 comm="syz-executor" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 101.139030][ T28] audit: type=1400 audit(1732163004.666:10098): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 101.181258][ T28] audit: type=1400 audit(1732163004.666:10099): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 101.245849][ T28] audit: type=1400 audit(1732163004.666:10100): avc: denied { bpf } for pid=2793 comm="syz.1.968" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 101.307543][ T28] audit: type=1400 audit(1732163004.666:10101): avc: denied { map_create } for pid=2793 comm="syz.1.968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 101.353762][ T28] audit: type=1400 audit(1732163004.684:10102): avc: denied { bpf } for pid=2793 comm="syz.1.968" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 101.399228][ T28] audit: type=1400 audit(1732163004.684:10103): avc: denied { bpf } for pid=2795 comm="syz.0.969" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 101.427047][ T28] audit: type=1400 audit(1732163004.684:10104): avc: denied { prog_load } for pid=2793 comm="syz.1.968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 101.676214][ T2812] device syzkaller0 entered promiscuous mode [ 102.090506][ T2836] xt_bpf: check failed: parse error [ 102.917581][ T2867] device syzkaller0 entered promiscuous mode [ 103.009643][ T2870] -: renamed from syzkaller0 [ 105.420798][ T2988] device pim6reg1 entered promiscuous mode [ 105.492739][ T3000] device pim6reg1 entered promiscuous mode [ 106.152579][ T3020] device pim6reg1 entered promiscuous mode [ 106.420204][ T28] kauditd_printk_skb: 1055 callbacks suppressed [ 106.420219][ T28] audit: type=1400 audit(1732163009.659:11160): avc: denied { read write } for pid=294 comm="syz-executor" name="loop1" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 106.473669][ T28] audit: type=1400 audit(1732163009.687:11161): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 106.498553][ T28] audit: type=1400 audit(1732163009.687:11162): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 106.532211][ T28] audit: type=1400 audit(1732163009.687:11163): avc: denied { bpf } for pid=3045 comm="syz.3.1077" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 106.553373][ T28] audit: type=1400 audit(1732163009.687:11164): avc: denied { prog_load } for pid=3045 comm="syz.3.1077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 106.573859][ T28] audit: type=1400 audit(1732163009.687:11165): avc: denied { bpf } for pid=3045 comm="syz.3.1077" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 106.608868][ T28] audit: type=1400 audit(1732163009.687:11166): avc: denied { bpf } for pid=3045 comm="syz.3.1077" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 106.634865][ T28] audit: type=1400 audit(1732163009.687:11167): avc: denied { map_create } for pid=3045 comm="syz.3.1077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 106.658990][ T3060] audit: audit_backlog=65 > audit_backlog_limit=64 [ 106.662262][ T28] audit: type=1400 audit(1732163009.687:11168): avc: denied { bpf } for pid=3045 comm="syz.3.1077" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 107.560954][ T3105] device pim6reg1 entered promiscuous mode [ 108.373796][ T3146] ªªªªªª: renamed from vlan0 [ 111.256386][ T3265] device pim6reg1 entered promiscuous mode [ 111.923937][ T28] kauditd_printk_skb: 1954 callbacks suppressed [ 111.923953][ T28] audit: type=1400 audit(1732163014.736:13103): avc: denied { read write } for pid=292 comm="syz-executor" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.955128][ T28] audit: type=1400 audit(1732163014.745:13104): avc: denied { bpf } for pid=3292 comm="syz.0.1181" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 111.976299][ T28] audit: type=1400 audit(1732163014.745:13105): avc: denied { prog_load } for pid=3292 comm="syz.0.1181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 111.995347][ T28] audit: type=1400 audit(1732163014.745:13106): avc: denied { bpf } for pid=3292 comm="syz.0.1181" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 112.015895][ T28] audit: type=1400 audit(1732163014.745:13107): avc: denied { prog_load } for pid=3292 comm="syz.0.1181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 112.035021][ T28] audit: type=1400 audit(1732163014.745:13108): avc: denied { bpf } for pid=3292 comm="syz.0.1181" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 112.055869][ T28] audit: type=1400 audit(1732163014.745:13109): avc: denied { bpf } for pid=3292 comm="syz.0.1181" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 112.076877][ T28] audit: type=1400 audit(1732163014.745:13110): avc: denied { bpf } for pid=3292 comm="syz.0.1181" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 112.097650][ T28] audit: type=1400 audit(1732163014.745:13111): avc: denied { map_create } for pid=3292 comm="syz.0.1181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 112.137807][ T3306] device pim6reg1 entered promiscuous mode [ 112.143581][ T28] audit: type=1400 audit(1732163014.745:13112): avc: denied { bpf } for pid=3292 comm="syz.0.1181" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 112.423435][ T3320] device pim6reg1 entered promiscuous mode [ 114.200521][ T3380] device pim6reg1 entered promiscuous mode [ 117.350202][ T28] kauditd_printk_skb: 891 callbacks suppressed [ 117.350219][ T28] audit: type=1400 audit(1732163022.749:14004): avc: denied { execmem } for pid=3473 comm="syz.0.1250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 117.391123][ T28] audit: type=1400 audit(1732163022.767:14005): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 117.425597][ T28] audit: type=1400 audit(1732163022.767:14006): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 117.478444][ T28] audit: type=1400 audit(1732163022.767:14007): avc: denied { read write } for pid=294 comm="syz-executor" name="loop1" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 117.523262][ T28] audit: type=1400 audit(1732163022.777:14008): avc: denied { read } for pid=3475 comm="syz.1.1251" name="loop7" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 117.560606][ T28] audit: type=1400 audit(1732163022.804:14009): avc: denied { bpf } for pid=3473 comm="syz.0.1250" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 117.581750][ T28] audit: type=1400 audit(1732163022.804:14010): avc: denied { prog_load } for pid=3473 comm="syz.0.1250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 117.601341][ T28] audit: type=1400 audit(1732163022.804:14011): avc: denied { read write } for pid=294 comm="syz-executor" name="loop1" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 117.631617][ T28] audit: type=1400 audit(1732163022.804:14012): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 117.674761][ T28] audit: type=1400 audit(1732163022.804:14013): avc: denied { read write } for pid=295 comm="syz-executor" name="loop4" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 122.896927][ T28] kauditd_printk_skb: 485 callbacks suppressed [ 122.896944][ T28] audit: type=1400 audit(1732163028.854:14499): avc: denied { read write } for pid=295 comm="syz-executor" name="loop4" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 122.934309][ T28] audit: type=1400 audit(1732163028.863:14500): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 122.956629][ T28] audit: type=1400 audit(1732163028.891:14501): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 122.978644][ T28] audit: type=1400 audit(1732163028.891:14502): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 123.000990][ T28] audit: type=1400 audit(1732163028.891:14503): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 123.023030][ T28] audit: type=1400 audit(1732163028.891:14504): avc: denied { create } for pid=3638 comm="syz.4.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 123.042726][ T28] audit: type=1400 audit(1732163028.891:14505): avc: denied { execmem } for pid=3638 comm="syz.4.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 123.062158][ T28] audit: type=1400 audit(1732163028.919:14506): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 123.091107][ T28] audit: type=1400 audit(1732163028.937:14507): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 123.113983][ T28] audit: type=1400 audit(1732163028.937:14508): avc: denied { bpf } for pid=3638 comm="syz.4.1312" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 128.334384][ T28] kauditd_printk_skb: 463 callbacks suppressed [ 128.334419][ T28] audit: type=1400 audit(1732163037.877:14972): avc: denied { read write } for pid=3819 comm="syz.4.1385" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 128.405814][ T28] audit: type=1400 audit(1732163037.886:14973): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 128.464271][ T28] audit: type=1400 audit(1732163037.914:14974): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 128.524639][ T28] audit: type=1400 audit(1732163037.914:14975): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 128.578494][ T28] audit: type=1400 audit(1732163037.914:14976): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 128.643994][ T28] audit: type=1400 audit(1732163037.923:14977): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 128.719364][ T28] audit: type=1400 audit(1732163037.932:14978): avc: denied { mount } for pid=3847 comm="syz.2.1396" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=0 [ 128.778166][ T28] audit: type=1400 audit(1732163037.941:14979): avc: denied { mounton } for pid=3847 comm="syz.2.1396" path="/276/file0" dev="tmpfs" ino=1539 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 128.841799][ T28] audit: type=1400 audit(1732163037.969:14980): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 128.896389][ T28] audit: type=1400 audit(1732163037.969:14981): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 133.804910][ T28] kauditd_printk_skb: 348 callbacks suppressed [ 133.804927][ T28] audit: type=1400 audit(1732163042.926:15330): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 133.832823][ T28] audit: type=1400 audit(1732163042.926:15331): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 133.854617][ T28] audit: type=1400 audit(1732163042.935:15332): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 133.854651][ T28] audit: type=1400 audit(1732163042.935:15333): avc: denied { read write } for pid=4016 comm="syz.2.1470" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 133.902659][ T28] audit: type=1400 audit(1732163043.027:15334): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 133.924451][ T28] audit: type=1400 audit(1732163043.027:15335): avc: denied { read write } for pid=4005 comm="syz.3.1465" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 133.947816][ T28] audit: type=1400 audit(1732163043.027:15336): avc: denied { read write } for pid=4005 comm="syz.3.1465" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 133.971616][ T28] audit: type=1400 audit(1732163043.082:15337): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 133.993714][ T28] audit: type=1400 audit(1732163043.101:15338): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 134.015864][ T28] audit: type=1400 audit(1732163043.129:15339): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 136.761316][ T4060] serio: Serial port ptm0 [ 137.798290][ T4133] syz.2.1522 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 138.780495][ T4248] capability: warning: `syz.2.1576' uses 32-bit capabilities (legacy support in use) [ 139.224946][ T28] kauditd_printk_skb: 865 callbacks suppressed [ 139.224965][ T28] audit: type=1400 audit(1732163048.935:16205): avc: denied { bpf } for pid=4294 comm="syz.3.1598" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 139.258366][ T28] audit: type=1400 audit(1732163048.962:16206): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 139.291756][ T28] audit: type=1400 audit(1732163048.962:16207): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 139.315100][ T28] audit: type=1400 audit(1732163048.962:16208): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 139.343291][ T28] audit: type=1400 audit(1732163048.962:16209): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 139.372510][ T28] audit: type=1400 audit(1732163048.962:16210): avc: denied { read write } for pid=294 comm="syz-executor" name="loop1" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 139.405916][ T28] audit: type=1400 audit(1732163048.962:16211): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 139.428615][ T28] audit: type=1400 audit(1732163048.962:16212): avc: denied { bpf } for pid=4297 comm="syz.3.1599" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 139.449953][ T28] audit: type=1400 audit(1732163048.962:16213): avc: denied { map_create } for pid=4297 comm="syz.3.1599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 139.469829][ T28] audit: type=1400 audit(1732163048.962:16214): avc: denied { bpf } for pid=4297 comm="syz.3.1599" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 142.514335][ T4436] device pim6reg1 entered promiscuous mode [ 144.655309][ T28] kauditd_printk_skb: 860 callbacks suppressed [ 144.655325][ T28] audit: type=1400 audit(1732163053.946:17075): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 144.686292][ T28] audit: type=1400 audit(1732163053.946:17076): avc: denied { bpf } for pid=4565 comm="syz.2.1719" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 144.707362][ T28] audit: type=1400 audit(1732163053.946:17077): avc: denied { map_create } for pid=4565 comm="syz.2.1719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 144.737728][ T28] audit: type=1400 audit(1732163053.946:17078): avc: denied { bpf } for pid=4565 comm="syz.2.1719" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 144.758987][ T28] audit: type=1400 audit(1732163053.946:17079): avc: denied { prog_load } for pid=4565 comm="syz.2.1719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 144.778948][ T28] audit: type=1400 audit(1732163053.956:17080): avc: denied { bpf } for pid=4565 comm="syz.2.1719" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 144.810771][ T28] audit: type=1400 audit(1732163053.956:17081): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 144.835780][ T28] audit: type=1400 audit(1732163053.965:17082): avc: denied { bpf } for pid=4567 comm="syz.2.1720" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 144.857228][ T28] audit: type=1400 audit(1732163053.965:17083): avc: denied { prog_load } for pid=4567 comm="syz.2.1720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 144.881991][ T28] audit: type=1400 audit(1732163053.965:17084): avc: denied { bpf } for pid=4567 comm="syz.2.1720" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 144.938847][ T4585] binfmt_misc: register: failed to install interpreter file ./file0 [ 149.959822][ T28] kauditd_printk_skb: 2084 callbacks suppressed [ 149.959840][ T28] audit: type=1400 audit(1732163058.951:19169): avc: denied { read write } for pid=293 comm="syz-executor" name="loop3" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 150.001350][ T28] audit: type=1326 audit(1732163058.951:19170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5085 comm="syz.0.1962" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fbd57d757e7 code=0x7ffc0000 [ 150.063469][ T28] audit: type=1326 audit(1732163058.951:19171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5085 comm="syz.0.1962" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fbd57d1a1a9 code=0x7ffc0000 [ 150.070490][ T5099] audit: audit_backlog=65 > audit_backlog_limit=64 [ 150.093281][ T85] audit: audit_backlog=65 > audit_backlog_limit=64 [ 150.102174][ T85] audit: audit_lost=16 audit_rate_limit=0 audit_backlog_limit=64 [ 150.109869][ T28] audit: type=1326 audit(1732163058.951:19172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5085 comm="syz.0.1962" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fbd57d7e819 code=0x7ffc0000 [ 150.114026][ T85] audit: backlog limit exceeded [ 150.139724][ T5101] audit: audit_backlog=65 > audit_backlog_limit=64 [ 150.146640][ T5099] audit: audit_lost=17 audit_rate_limit=0 audit_backlog_limit=64 [ 151.105118][ T5193] tun0: tun_chr_ioctl cmd 1074025675 [ 151.120378][ T5193] tun0: persist enabled [ 153.977758][ T5414] tun0: tun_chr_ioctl cmd 1074025675 [ 153.986555][ T5414] tun0: persist enabled [ 154.012710][ T5418] binfmt_misc: register: failed to install interpreter file ./file0 [ 154.154049][ T5427] ip6t_rpfilter: unknown options [ 155.067847][ T28] kauditd_printk_skb: 2738 callbacks suppressed [ 155.067864][ T28] audit: type=1326 audit(1732163063.962:21905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5496 comm="syz.0.2151" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fbd57d757e7 code=0x7ffc0000 [ 155.104916][ T5524] tun1: tun_chr_ioctl cmd 1074025675 [ 155.118926][ T28] audit: type=1326 audit(1732163063.962:21906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5496 comm="syz.0.2151" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fbd57d1a1a9 code=0x7ffc0000 [ 155.126804][ T5524] tun1: persist enabled [ 155.159751][ T28] audit: type=1326 audit(1732163063.962:21907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5496 comm="syz.0.2151" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7fbd57d7e819 code=0x7ffc0000 [ 155.181750][ T5527] audit: audit_backlog=65 > audit_backlog_limit=64 [ 155.183469][ T85] audit: audit_backlog=65 > audit_backlog_limit=64 [ 155.189292][ T5527] audit: audit_lost=20 audit_rate_limit=0 audit_backlog_limit=64 [ 155.189309][ T5527] audit: backlog limit exceeded [ 155.219261][ T293] audit: audit_backlog=65 > audit_backlog_limit=64 [ 155.225712][ T28] audit: type=1326 audit(1732163063.962:21908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5496 comm="syz.0.2151" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fbd57d757e7 code=0x7ffc0000 [ 155.226896][ T85] audit: audit_lost=21 audit_rate_limit=0 audit_backlog_limit=64 [ 156.041092][ T5606] device pim6reg1 entered promiscuous mode [ 156.162542][ T5615] tun0: tun_chr_ioctl cmd 1074025675 [ 156.168723][ T5615] tun0: persist enabled [ 157.997431][ T5729] device pim6reg1 entered promiscuous mode [ 160.415403][ T28] kauditd_printk_skb: 2067 callbacks suppressed [ 160.415420][ T28] audit: type=1326 audit(1732163068.974:23973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5879 comm="syz.3.2321" exe="/root/syz-executor" sig=0 arch=c000003e syscall=332 compat=0 ip=0x7f54a4d7e819 code=0x7ffc0000 [ 160.479865][ T28] audit: type=1400 audit(1732163069.002:23974): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 160.518072][ T28] audit: type=1326 audit(1732163069.002:23975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5879 comm="syz.3.2321" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54a4d7e819 code=0x7ffc0000 [ 160.541913][ T28] audit: type=1326 audit(1732163069.002:23976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5879 comm="syz.3.2321" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f54a4d7e819 code=0x7ffc0000 [ 160.565286][ T28] audit: type=1400 audit(1732163069.002:23977): avc: denied { bpf } for pid=5879 comm="syz.3.2321" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 160.593724][ T28] audit: type=1326 audit(1732163069.002:23978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5879 comm="syz.3.2321" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f54a4d7e819 code=0x7ffc0000 [ 160.608100][ T5890] audit: audit_backlog=65 > audit_backlog_limit=64 [ 160.627554][ T85] audit: audit_backlog=65 > audit_backlog_limit=64 [ 160.634123][ T28] audit: type=1400 audit(1732163069.002:23979): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 160.634303][ T85] audit: audit_lost=23 audit_rate_limit=0 audit_backlog_limit=64 [ 160.737384][ T5892] tun1: tun_chr_ioctl cmd 1074025675 [ 160.742533][ T5892] tun1: persist enabled [ 161.210198][ T5928] device wg2 entered promiscuous mode [ 161.969254][ T5986] tun2: tun_chr_ioctl cmd 1074025675 [ 161.974451][ T5986] tun2: persist enabled [ 162.248696][ T6003] tun1: tun_chr_ioctl cmd 1074025675 [ 162.253866][ T6003] tun1: persist enabled [ 163.040763][ T6082] device pim6reg1 entered promiscuous mode [ 163.392021][ T324] device bridge_slave_1 left promiscuous mode [ 163.398155][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.406577][ T324] device bridge_slave_0 left promiscuous mode [ 163.412535][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.421660][ T324] device veth1_macvtap left promiscuous mode [ 163.602265][ T6098] tun2: tun_chr_ioctl cmd 1074025675 [ 163.607459][ T6098] tun2: persist enabled [ 164.811449][ T6118] tun3: tun_chr_ioctl cmd 1074025675 [ 164.816571][ T6118] tun3: persist enabled [ 166.041287][ T28] kauditd_printk_skb: 2567 callbacks suppressed [ 166.041305][ T28] audit: type=1400 audit(1732163074.188:26526): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 166.069166][ T28] audit: type=1400 audit(1732163074.188:26527): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 166.091295][ T28] audit: type=1400 audit(1732163074.225:26528): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 166.113677][ T28] audit: type=1400 audit(1732163074.253:26529): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 166.135752][ T28] audit: type=1400 audit(1732163074.272:26530): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 166.157784][ T28] audit: type=1400 audit(1732163074.281:26531): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 166.179865][ T28] audit: type=1400 audit(1732163074.309:26532): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 166.201968][ T28] audit: type=1400 audit(1732163074.336:26533): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 166.224180][ T28] audit: type=1400 audit(1732163074.355:26534): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 166.246347][ T28] audit: type=1400 audit(1732163074.373:26535): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 167.463805][ T6148] tun4: tun_chr_ioctl cmd 1074025675 [ 167.469063][ T6148] tun4: persist enabled [ 171.092441][ T6184] tun0: tun_chr_ioctl cmd 1074025675 [ 171.097831][ T6184] tun0: persist enabled [ 171.466040][ T28] kauditd_printk_skb: 704 callbacks suppressed [ 171.466058][ T28] audit: type=1326 audit(1732163079.195:27240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.3.2449" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f54a4d757e7 code=0x7ffc0000 [ 171.495287][ T28] audit: type=1326 audit(1732163079.195:27241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.3.2449" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f54a4d1a1a9 code=0x7ffc0000 [ 171.518441][ T28] audit: type=1326 audit(1732163079.195:27242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.3.2449" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f54a4d7e819 code=0x7ffc0000 [ 171.541888][ T28] audit: type=1326 audit(1732163079.204:27243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.3.2449" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f54a4d757e7 code=0x7ffc0000 [ 171.541918][ T28] audit: type=1326 audit(1732163079.204:27244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.3.2449" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f54a4d1a1a9 code=0x7ffc0000 [ 171.541946][ T28] audit: type=1326 audit(1732163079.204:27245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.3.2449" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f54a4d7e819 code=0x7ffc0000 [ 171.541975][ T28] audit: type=1326 audit(1732163079.214:27246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.3.2449" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f54a4d757e7 code=0x7ffc0000 [ 171.542005][ T28] audit: type=1326 audit(1732163079.214:27247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.3.2449" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f54a4d1a1a9 code=0x7ffc0000 [ 171.542033][ T28] audit: type=1326 audit(1732163079.214:27248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.3.2449" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f54a4d7e819 code=0x7ffc0000 [ 171.542063][ T28] audit: type=1400 audit(1732163079.214:27249): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 176.892625][ T28] kauditd_printk_skb: 480 callbacks suppressed [ 176.892643][ T28] audit: type=1400 audit(1732163084.208:27730): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 176.920525][ T28] audit: type=1400 audit(1732163084.208:27731): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 176.942752][ T28] audit: type=1400 audit(1732163084.245:27732): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 176.964850][ T28] audit: type=1400 audit(1732163084.273:27733): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 176.986996][ T28] audit: type=1400 audit(1732163084.291:27734): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 177.009065][ T28] audit: type=1400 audit(1732163084.319:27735): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 177.031128][ T28] audit: type=1400 audit(1732163084.337:27736): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 177.053248][ T28] audit: type=1400 audit(1732163084.356:27737): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 177.075344][ T28] audit: type=1400 audit(1732163084.374:27738): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 177.097384][ T28] audit: type=1400 audit(1732163084.393:27739): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 177.429828][ T6230] tun5: tun_chr_ioctl cmd 1074025675 [ 177.435269][ T6230] tun5: persist enabled [ 183.262969][ T28] kauditd_printk_skb: 419 callbacks suppressed [ 183.262986][ T28] audit: type=1400 audit(1732163090.088:28159): avc: denied { execmem } for pid=6256 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 183.303308][ T28] audit: type=1400 audit(1732163090.088:28160): avc: denied { bpf } for pid=6257 comm="syz.3.2477" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 183.323915][ T28] audit: type=1400 audit(1732163090.088:28161): avc: denied { prog_load } for pid=6257 comm="syz.3.2477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 183.343399][ T28] audit: type=1400 audit(1732163090.106:28162): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 183.365185][ T28] audit: type=1400 audit(1732163090.106:28163): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 183.365216][ T28] audit: type=1400 audit(1732163090.106:28164): avc: denied { bpf } for pid=6259 comm="syz.4.2478" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 183.365241][ T28] audit: type=1400 audit(1732163090.106:28165): avc: denied { prog_load } for pid=6259 comm="syz.4.2478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 183.365266][ T28] audit: type=1400 audit(1732163090.106:28166): avc: denied { bpf } for pid=6259 comm="syz.4.2478" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 183.365292][ T28] audit: type=1400 audit(1732163090.106:28167): avc: denied { create } for pid=6260 comm="syz.0.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 183.365318][ T28] audit: type=1400 audit(1732163090.115:28168): avc: denied { bpf } for pid=6260 comm="syz.0.2475" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 186.153895][ T8] device bridge_slave_1 left promiscuous mode [ 186.159825][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.167095][ T8] device bridge_slave_0 left promiscuous mode [ 186.173070][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.180926][ T8] device veth1_macvtap left promiscuous mode [ 186.186794][ T8] device veth0_vlan left promiscuous mode [ 187.020985][ T8] device bridge_slave_1 left promiscuous mode [ 187.026916][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.034323][ T8] device bridge_slave_0 left promiscuous mode [ 187.040286][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.048339][ T8] device bridge_slave_1 left promiscuous mode [ 187.054327][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.061472][ T8] device bridge_slave_0 left promiscuous mode [ 187.067443][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.075346][ T8] device bridge_slave_1 left promiscuous mode [ 187.081289][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.088776][ T8] device bridge_slave_0 left promiscuous mode [ 187.094720][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.103378][ T8] device veth1_macvtap left promiscuous mode [ 187.109264][ T8] device veth0_vlan left promiscuous mode [ 187.114935][ T8] device veth1_macvtap left promiscuous mode [ 187.121105][ T8] device veth1_macvtap left promiscuous mode [ 187.127054][ T8] device veth0_vlan left promiscuous mode [ 188.826939][ T28] kauditd_printk_skb: 87 callbacks suppressed [ 188.826954][ T28] audit: type=1400 audit(1732163095.220:28256): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 188.854695][ T28] audit: type=1400 audit(1732163095.220:28257): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 188.876700][ T28] audit: type=1400 audit(1732163095.266:28258): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 188.898729][ T28] audit: type=1400 audit(1732163095.284:28259): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 188.920806][ T28] audit: type=1400 audit(1732163095.312:28260): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 188.942844][ T28] audit: type=1400 audit(1732163095.330:28261): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 188.965016][ T28] audit: type=1400 audit(1732163095.349:28262): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 188.987257][ T28] audit: type=1400 audit(1732163095.367:28263): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 189.009377][ T28] audit: type=1400 audit(1732163095.386:28264): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 189.031425][ T28] audit: type=1400 audit(1732163095.404:28265): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 194.250437][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 194.250453][ T28] audit: type=1400 audit(1732163100.222:28277): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 194.278702][ T28] audit: type=1400 audit(1732163100.222:28278): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 194.300745][ T28] audit: type=1400 audit(1732163100.278:28279): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 194.322822][ T28] audit: type=1400 audit(1732163100.296:28280): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 194.344939][ T28] audit: type=1400 audit(1732163100.315:28281): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 194.366996][ T28] audit: type=1400 audit(1732163100.333:28282): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 194.389119][ T28] audit: type=1400 audit(1732163100.361:28283): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 194.411242][ T28] audit: type=1400 audit(1732163100.379:28284): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 194.433288][ T28] audit: type=1400 audit(1732163100.398:28285): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 194.455358][ T28] audit: type=1400 audit(1732163100.416:28286): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0