last executing test programs: 2.062788711s ago: executing program 2 (id=4545): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x9e, 0x17, 0x36, 0x10, 0x17ef, 0x721e, 0xde06, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6}}]}}]}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r4}, 0x10) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002540)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000002380)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x2000}}) 1.478375423s ago: executing program 2 (id=4554): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) connect$inet(r0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 1.477905203s ago: executing program 2 (id=4555): sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000140)={0x0, 0x0}) write(r1, &(0x7f0000000000)="fa", 0xfffffdef) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x8a, &(0x7f00000004c0)={[{@jqfmt_vfsold}, {@usrjquota, 0x22}, {@errors_continue}, {@grpquota}, {@data_err_ignore}, {@grpjquota, 0x22}, {@nodiscard}, {@errors_remount}, {@nodelalloc}]}, 0xfe, 0x455, &(0x7f0000000d80)="$eJzs3M1PXFUbAPBnZhha2vLCW2u12CpajcQPKPTDLtzUaOJCExNd1LhCoA12WkzBxDZE0QUuTRP3xqWJf4Eb68aoKxO3ujcmxLCxuhpzZ+6FKcwAAwNTnd8vue05cy4557n3nplnzp2ZADrWYPJPLuJQRPwSEX3V6t07DFb/u7M8P/HX8vxELsrl1//IVfb7c3l+Its1+7uD1Uq5vEG/i29FjJdKU9fT+sjc1XdHZm/cfHb66vjlqctT18bOnz9z+kT3ubGzLYmzNxnrwAczx4+9/OatVycu3nr7h6+S8R5K22vjaJXB6tGt64lWd9ZmvTXlXFcbB0JTChGRnK5iZf73RSF6Vtr64qWP2zo4YFeVy/nyvsbNC2XgPyxJ1IFOlL3QJ+9/s22PUo97wtKFWFnHuJNu1ZauyKf7FNP3SLthMCIuLvz9ebLFLq1DAADUun0hIp6pl//l4+j+1f3+l94b6o+I/0fE4Yi4LyKORMT9EXE0Ih6IiAeb7H/tHZL1+U+5b3uRbU2S/z2f3tu6O//Lsr/oL6S13kr8xdyl6dLUqfSYDEVxX1If3aCPb1/8+dNGbbX5X7Il/We5YDqO37vWLNBNjs+N7yTmWksfRQx01Ys/t5LzJvnxsYgY2GYf0099ebxR2+bxb6AFSXn5i4gnq+d/IdbEn8k1vD85+ty5sbMj+6M0dWokuyrW+/Gnxdca9b+j+Ftg6XY5DtS9/lfi78/tj5i9cfNK5X7tbPN9LP76ScP3NNu9/rtzb1TK3elj74/PzV0fjejOvbL+8bHVv83q2f7J9T90sv78PxyrR+KhiEgu4hMR8XBEPJKO/dGIeCwiTm4Q//cvPP5O8/FvsCrfQkn8k5ud/6g9/80XCle++7r5+DPJ+T9TKQ2lj2zl+W+rA9zJsQMAAIB/i3zlM/C5/PBKOZ8fHq5+hv9IHMiXZmbnnr408961yepn5fujmM9Wuvpq1kNH07XhrD62pn46XTf+rNBTqQ9PzJQm2x08dLiDDeZ/4rdCu0cH7Drf14LOZf5D5zL/oXOZ/9C5zH/oXPXm/4dtGAew9zZ5/e/Zq3EAe0/+D53L/IfOZf5DR2r43fj8jr7yr9CmwjfdO/uthq0XIn+PhLzrhWJE7EVfxajb1LXlH7PYZmFf3aZ2PzMBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0xj8BAAD//37l4X0=") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) socket$inet6_tcp(0xa, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x74, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 1.436210654s ago: executing program 4 (id=4556): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=@migrate={0xec, 0x21, 0x1, 0x0, 0x0, {{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, [@migrate={0x9c, 0x11, [{@in6=@loopback, @in=@broadcast, @in=@rand_addr=0x64010101, @in=@private=0xa010100, 0x0, 0x0, 0x0, 0x3506, 0x0, 0xa}, {@in6=@loopback, @in=@broadcast, @in, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}]}, 0xec}}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x3, 0x4, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = socket(0xa, 0x3, 0x4) sendmmsg$unix(r2, &(0x7f0000001340)=[{{&(0x7f0000000440)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000b80)=[@rights={{0x10, 0x1, 0x41}}], 0x10}}], 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_genetlink_get_family_id$nl80211(&(0x7f0000000c00), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wlan0\x00'}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[], 0x44}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0xfffff002, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x26c2}, 0x28) r4 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000002c0)={'veth0_to_team\x00', &(0x7f0000000280)=@ethtool_channels={0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_FLUSH(r4, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000680)={0x44, 0x4, 0x6, 0x201, 0x0, 0x0, {0xa, 0x0, 0x4}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000040}, 0x408a0) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@setneightbl={0x24, 0x43, 0x1, 0x0, 0x0, {}, [@NDTA_NAME={0xf, 0x1, '\xaa\xaa\xaa\xaa\xaa\xc47\xa5m\"0'}]}, 0x24}}, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)="a0c5a89ce60256f499e2a69653cbcb71f5961280e94fba6b7b06abd038230909c9a4a90c70b020c59fb623e6633657c21edea9d5292d66e45ee0a0460125002e15b900090d430b486ec3116bff1aec6164b8cfdab145be25441f855f64b93b0bb7a8f020901fc1ac5669430c339329f3d349d2566b678a39657d5c25f71679f0a9765956ebf3f086f005a52f9e93a048b145db0cb94b72c4b07c12c6c6111f2dc16621bd89e5f05202d7b537bb93e26fb72ef066952869238c204b0bce5b4753b1e903950fa9c83ca1bad20e56ed68f7c82e17a1c5652fd6de39b6cce68f635c411c51e6", 0xe4) 1.382876694s ago: executing program 4 (id=4557): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r4}, 0x18) connect$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 1.234909855s ago: executing program 4 (id=4558): io_setup(0x6c, &(0x7f0000000440)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r2}, 0x10) eventfd(0x3ff) openat2(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x40, 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='kvm_fpu\x00'}, 0x10) eventfd(0x8001) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fgetxattr(r3, &(0x7f0000000180)=@random={'user.', '\x84\x95\xcf\x81{aXi\xb2\xbdh\x9c#\xab\x9fd\xdb\xc8h\x0f<\x17\x1a\xabsB{\xca\x87\x90\x19T\xfeZ\x01\xa7\x1c\xe1|\xa0\xad\xd2p\x91\x9e\xe3\x8b\xfbN\x1eF\xac\xb2\x95\xb67B.\x9f\n\xf8\f3y\x10\xd8\xb0M\x84\x95\xbd%\x1e\x02j\xddH\xa5h\v\xdc\xfb\xb3<\xfbm\x82r\x1bm\x9c\x90M\xfb/\xe9?\xd1\xb95\x15L\x8a\xaf\xf2C\xcb\xf7\x12;C\xd3t\xcc_\xfbEU\xf2\xce\xefq\x17\x9c\xcf\xc4[\xd6\xd5R&J\x82\x85\vZW\xcf\x8c\x16O\xd4\xba \x80W<\xd9Q?\xce\xeem\xb9o ]\x06\xbe\xd4\xa5w\xa0S\x9cRD\xd6?|e\xe6_j(\xd3{z\x91\vs\x10\x94\x1f?a %\x05\x15\x82\x9a\x9b\x9b1\xaa\xdd\xa8\xbcJ\xa5x_\x02\x9c\x1e\xaa\xaewa\xa4\x8fI\x1dw\xc0.\xdc4\xc8f\b\xa6`N\xcam\xb5!A.j\x95\xc4m\xd4h+\x9c\x03\x81[\x19\x1e\x9f\xb9\x8b23\x8b=,\xeai\xf2`\xe5IfH\xc4\v\xd1mF}\xa5\x7f\xe9X\xfd\xec\x06r\x8e\x9d\x9a\xd1L\x88\xca\xdd\x9dP-\x1d=\xf8[nK\xd3.\a\xad\x86\xf3\xb6\xacA\xb3\x06\xc7z\xbf\x9f\x9a\xacct\xe1u\x1a\x1a\t\x00h\x1e\xf4\v\x89vH:I\xab\xfddY\xf8P\xa4\x92\xc3uR\x97\xaa\xbd\x97L1\xe6B\xe1\x93\x1e\xec\xf7}^\xbcb\xfa\x93\xc1\xbaV\xd9\xdd\xdd\xab\xbc\xf1'}, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x1c, &(0x7f0000000480)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xeb}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000003c0)='GPL\x00', 0x9a7e, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x3, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x2f947, 0xffffffffffffffff, 0x2, &(0x7f0000000580)=[0x1, 0x1], &(0x7f00000005c0)=[{0x3, 0x2, 0x10, 0xa}, {0x1, 0x3, 0xb}], 0x10, 0x3, @void, @value}, 0x90) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000700), 0x80100, 0x0) epoll_create1(0x80000) r4 = open_tree(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x80000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) read$eventfd(r4, &(0x7f0000000cc0), 0x8) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xb) 1.122978555s ago: executing program 4 (id=4561): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={0x0, 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) connect$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 1.022282946s ago: executing program 4 (id=4563): close(0xffffffffffffffff) close(0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) r3 = dup3(r2, r1, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) accept$packet(r3, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2800480, &(0x7f00000001c0), 0x1, 0x774, &(0x7f00000007c0)="$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") r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0x660c, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 951.497446ms ago: executing program 1 (id=4564): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="02070009"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) connect$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 941.537026ms ago: executing program 3 (id=4565): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) connect$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 813.265896ms ago: executing program 1 (id=4566): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) connect$inet(r0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 776.552407ms ago: executing program 1 (id=4567): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x9e, 0x17, 0x36, 0x10, 0x17ef, 0x721e, 0xde06, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6}}]}}]}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r4}, 0x10) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002540)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000002380)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x2000}}) 775.899777ms ago: executing program 3 (id=4568): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r4}, 0x18) connect$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 682.356428ms ago: executing program 0 (id=4569): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x18, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b00000000001b000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000006ffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x3ffffffffffffda, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x10, &(0x7f0000000740), 0xfe, 0x499, &(0x7f0000001780)="$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") bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280000001e00431b00", @ANYBLOB], 0x28}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f00000008c0)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@grpjquota}, {@orlov}, {@abort}, {@nombcache}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x1}}]}, 0x64, 0x50a, &(0x7f0000000200)="$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") syz_mount_image$msdos(&(0x7f0000000f40), &(0x7f0000000140)='.\x00', 0x1a4a438, &(0x7f00000008c0)=ANY=[], 0xb, 0x0, &(0x7f0000000000)) 611.001888ms ago: executing program 3 (id=4570): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x1) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x8002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) ioctl$SIOCSIFHWADDR(r3, 0x8924, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_freezer_state(r4, &(0x7f0000000140), 0x2, 0x0) read(r5, &(0x7f00000000c0)=""/29, 0x1d) 561.657058ms ago: executing program 2 (id=4571): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) connect$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 558.902178ms ago: executing program 0 (id=4572): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r4}, 0x18) connect$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 532.006088ms ago: executing program 2 (id=4573): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) connect$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 470.974039ms ago: executing program 0 (id=4574): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={0x0, 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) connect$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 408.622509ms ago: executing program 2 (id=4575): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x9e, 0x17, 0x36, 0x10, 0x17ef, 0x721e, 0xde06, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6}}]}}]}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r4}, 0x10) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002540)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000002380)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x2000}}) 353.845489ms ago: executing program 3 (id=4576): syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000140)='./bus\x00', 0xa0440e, &(0x7f0000000440)={[{@i_version}, {@nobh}, {@commit={'commit', 0x3d, 0xe}}, {@nolazytime}, {@init_itable_val={'init_itable', 0x3d, 0x4}}, {@acl}], [{@hash}]}, 0x1, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0/file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) mmap$KVM_VCPU(&(0x7f000023a000/0x3000)=nil, 0x0, 0xa, 0x4080011, 0xffffffffffffffff, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) keyctl$clear(0x3, 0xfffffffffffffffd) 340.618539ms ago: executing program 0 (id=4577): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) connect$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 339.704009ms ago: executing program 3 (id=4578): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) connect$inet(r0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 331.590869ms ago: executing program 0 (id=4579): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000006000000000000000061105c000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socket$nl_netfilter(0x10, 0x3, 0xc) socket$packet(0x11, 0x3, 0x300) r0 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x16, 0x0, @void}, 0x10) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe2$watch_queue(&(0x7f00000005c0)={0xffffffffffffffff}, 0x80) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000280)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000100)={@local, @multicast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {0x1, 0x0, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "569b3993f7246574a067dcfa2e3d7910b5cff57fcbbef46d", "4eabe6ad207ba640b03b73cea7e17e3a5719c47a95680d3a8f1e3502a3bf2b71"}}}}}}, 0x0) syz_emit_ethernet(0xae, &(0x7f0000000000)={@broadcast, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0xa0, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}, @dest_unreach={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x21, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32, 0x0, @dev, @local, {[@noop, @generic={0x0, 0xd, "c045d45768dc37efa0fc58"}, @timestamp_prespec={0x44, 0x4}, @ssrr={0x89, 0xf, 0x0, [@private, @broadcast, @broadcast]}, @timestamp_addr={0x44, 0x44, 0x0, 0x1, 0x0, [{@initdev={0xac, 0x1e, 0x0, 0x0}}, {@private}, {@local}, {@local}, {@private}, {@multicast1}, {@multicast2}, {@broadcast}]}, @timestamp={0x44, 0x8, 0x0, 0x0, 0x0, [0x0]}]}}}}}}}, 0x0) 316.949289ms ago: executing program 3 (id=4580): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x9e, 0x17, 0x36, 0x10, 0x17ef, 0x721e, 0xde06, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6}}]}}]}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r4}, 0x10) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002540)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000002380)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x2000}}) 316.256249ms ago: executing program 0 (id=4581): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) syz_usb_connect$hid(0x0, 0x6c, 0x0, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)=r1) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000009c0)) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1, r1}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000180)=""/53, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, 0x0, &(0x7f0000000680)=""/93, &(0x7f0000000700)=""/83}) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f00000002c0)=&(0x7f0000000200)) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000001c0)=0x1) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x49) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) listen(0xffffffffffffffff, 0x0) 222.91282ms ago: executing program 1 (id=4582): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f0000005c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r3}, 0x18) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000002c0)=0x2000000) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000000)={'veth0_to_bond\x00', &(0x7f00000004c0)=@ethtool_rxnfc={0x32, 0x6, 0x9d65, {0xc, @esp_ip6_spec={@empty, @dev={0xfe, 0x80, '\x00', 0x2f}, 0x9, 0x4}, {0x0, @link_local, 0xfff, 0x5, [0x81cf, 0x400]}, @udp_ip4_spec={@dev={0xac, 0x14, 0x14, 0x40}, @private=0xa010101, 0x4e24, 0x4e24, 0x8}, {0x0, @random="591e6f66219d", 0x7fff, 0x3, [0xfff, 0x1000]}, 0x0, 0x3}, 0x1, [0x2e9]}}) 158.84273ms ago: executing program 4 (id=4583): openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$FIBMAP(r4, 0x1, 0x0) 64.069241ms ago: executing program 1 (id=4584): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r4}, 0x18) connect$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 0s ago: executing program 1 (id=4585): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) connect$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.175' (ED25519) to the list of known hosts. [ 21.471126][ T28] audit: type=1400 audit(1731505646.775:66): avc: denied { mounton } for pid=280 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.472397][ T280] cgroup: Unknown subsys name 'net' [ 21.493608][ T28] audit: type=1400 audit(1731505646.775:67): avc: denied { mount } for pid=280 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.520521][ T28] audit: type=1400 audit(1731505646.805:68): avc: denied { unmount } for pid=280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.520681][ T280] cgroup: Unknown subsys name 'devices' [ 21.662459][ T280] cgroup: Unknown subsys name 'hugetlb' [ 21.667880][ T280] cgroup: Unknown subsys name 'rlimit' [ 21.768139][ T28] audit: type=1400 audit(1731505647.065:69): avc: denied { setattr } for pid=280 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.791148][ T28] audit: type=1400 audit(1731505647.065:70): avc: denied { mounton } for pid=280 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.815798][ T28] audit: type=1400 audit(1731505647.065:71): avc: denied { mount } for pid=280 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.845483][ T283] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.854141][ T28] audit: type=1400 audit(1731505647.165:72): avc: denied { relabelto } for pid=283 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.879397][ T28] audit: type=1400 audit(1731505647.165:73): avc: denied { write } for pid=283 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.911396][ T28] audit: type=1400 audit(1731505647.215:74): avc: denied { read } for pid=280 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.936848][ T28] audit: type=1400 audit(1731505647.215:75): avc: denied { open } for pid=280 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.936908][ T280] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.532392][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.539251][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.546670][ T290] device bridge_slave_0 entered promiscuous mode [ 22.553675][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.560577][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.567731][ T290] device bridge_slave_1 entered promiscuous mode [ 22.643802][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.650707][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.657975][ T294] device bridge_slave_0 entered promiscuous mode [ 22.668386][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.675388][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.682647][ T294] device bridge_slave_1 entered promiscuous mode [ 22.727140][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.734054][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.741321][ T291] device bridge_slave_0 entered promiscuous mode [ 22.751516][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.758363][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.765788][ T293] device bridge_slave_0 entered promiscuous mode [ 22.778259][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.785200][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.792408][ T291] device bridge_slave_1 entered promiscuous mode [ 22.802840][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.809687][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.817115][ T293] device bridge_slave_1 entered promiscuous mode [ 22.845445][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.852340][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.859491][ T292] device bridge_slave_0 entered promiscuous mode [ 22.878920][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.885869][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.893118][ T292] device bridge_slave_1 entered promiscuous mode [ 23.072488][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.079350][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.086541][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.093389][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.101581][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.108452][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.115658][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.122439][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.138406][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.145290][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.152390][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.159149][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.170996][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.177851][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.184994][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.191753][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.230184][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.237051][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.244205][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.251064][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.277767][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.285145][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.292950][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.300495][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.307606][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.314778][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.321796][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.328766][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.335888][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.342922][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.350913][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.358176][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.381188][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.388584][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.395980][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.404351][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.411203][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.419137][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.427404][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.434271][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.451856][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.459976][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.466832][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.484296][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.492364][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.499191][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.506912][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.515115][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.521976][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.529103][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.537249][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.544106][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.571586][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.578958][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.587134][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.595374][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.604401][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.611287][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.618682][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.626784][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.634735][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.642942][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.651165][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.658024][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.665503][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.673812][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.681750][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.689575][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.697581][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.704944][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.712377][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.720337][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.728305][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.736701][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.744935][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.751804][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.758961][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.767263][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.775327][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.782185][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.804852][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.812934][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.820973][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.828847][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.836983][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.845442][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.853441][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.861495][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.890879][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.898871][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.906864][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.916297][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.924190][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.932329][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.940634][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.948720][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.956983][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.964755][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.972816][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.980241][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.992035][ T291] device veth0_vlan entered promiscuous mode [ 24.002902][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.011688][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.023630][ T290] device veth0_vlan entered promiscuous mode [ 24.030900][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.039160][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.046975][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.062199][ T292] device veth0_vlan entered promiscuous mode [ 24.069609][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.077638][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.085139][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.093393][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.100963][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.108237][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.116774][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.128488][ T294] device veth0_vlan entered promiscuous mode [ 24.138033][ T293] device veth0_vlan entered promiscuous mode [ 24.144278][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.152136][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.159972][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.168260][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.175921][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.183462][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.190969][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.207458][ T291] device veth1_macvtap entered promiscuous mode [ 24.216607][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.229501][ T290] device veth1_macvtap entered promiscuous mode [ 24.242120][ T293] device veth1_macvtap entered promiscuous mode [ 24.248982][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.257307][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.265487][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.273794][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.281977][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.290570][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.298609][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.308437][ T292] device veth1_macvtap entered promiscuous mode [ 24.318155][ T294] device veth1_macvtap entered promiscuous mode [ 24.331465][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.339607][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.348081][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.356445][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.367507][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.375669][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.389405][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.397729][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.406439][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.415015][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.423517][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.431796][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.451304][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.459465][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.467880][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.476251][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.484695][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.493031][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.501470][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.509524][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.574462][ T318] loop1: detected capacity change from 0 to 128 [ 24.615162][ T324] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 24.926169][ T324] kvm: emulating exchange as write [ 25.337609][ T327] loop0: detected capacity change from 0 to 40427 [ 25.375609][ T327] F2FS-fs (loop0): Invalid SB checksum offset: 0 [ 25.404644][ T327] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 25.477559][ T327] F2FS-fs (loop0): Disable nat_bits due to incorrect cp_ver (10241045589465957861, 585327988383614437) [ 25.534017][ T327] F2FS-fs (loop0): Try to recover 2th superblock, ret: 0 [ 25.543691][ T327] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5 [ 25.868234][ T291] syz-executor: attempt to access beyond end of device [ 25.868234][ T291] loop0: rw=2049, sector=45096, nr_sectors = 8 limit=40427 [ 25.963192][ T358] loop1: detected capacity change from 0 to 16 [ 26.080673][ T364] loop0: detected capacity change from 0 to 1024 [ 26.101448][ T366] kernel profiling enabled (shift: 17) [ 26.135103][ T364] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 26.149502][ T364] ext4 filesystem being mounted at /1/file1 supports timestamps until 2038 (0x7fffffff) [ 26.187211][ T372] device veth0_vlan left promiscuous mode [ 26.204541][ T372] device veth0_vlan entered promiscuous mode [ 26.239150][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.252631][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.270490][ T367] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.283552][ T364] capability: warning: `syz.0.11' uses deprecated v2 capabilities in a way that may be insecure [ 26.352422][ T377] device syzkaller0 entered promiscuous mode [ 26.495732][ T28] kauditd_printk_skb: 69 callbacks suppressed [ 26.495747][ T28] audit: type=1326 audit(1731505651.795:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=380 comm="syz.2.19" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f47a237e719 code=0x7ffc0000 [ 26.527634][ T28] audit: type=1326 audit(1731505651.795:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=380 comm="syz.2.19" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f47a237e719 code=0x7ffc0000 [ 26.550692][ T28] audit: type=1326 audit(1731505651.815:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=380 comm="syz.2.19" exe="/root/syz-executor" sig=0 arch=c000003e syscall=299 compat=0 ip=0x7f47a237e719 code=0x7ffc0000 [ 26.574592][ T28] audit: type=1326 audit(1731505651.815:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=380 comm="syz.2.19" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f47a237e719 code=0x7ffc0000 [ 26.598275][ T28] audit: type=1326 audit(1731505651.815:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=380 comm="syz.2.19" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f47a237e719 code=0x7ffc0000 [ 26.621477][ T28] audit: type=1326 audit(1731505651.815:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=380 comm="syz.2.19" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f47a237e719 code=0x7ffc0000 [ 26.640284][ T298] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 26.644680][ T28] audit: type=1326 audit(1731505651.815:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=380 comm="syz.2.19" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f47a237e719 code=0x7ffc0000 [ 26.679604][ T384] x_tables: ip6_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 26.680765][ T28] audit: type=1326 audit(1731505651.815:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=380 comm="syz.2.19" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f47a237e719 code=0x7ffc0000 [ 26.713121][ T28] audit: type=1326 audit(1731505651.815:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=380 comm="syz.2.19" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f47a237e719 code=0x7ffc0000 [ 26.736445][ T28] audit: type=1326 audit(1731505651.815:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=380 comm="syz.2.19" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f47a237e719 code=0x7ffc0000 [ 26.969424][ T354] syz.3.10 (354) used greatest stack depth: 21480 bytes left [ 27.060561][ T298] usb 1-1: unable to get BOS descriptor or descriptor too short [ 27.094066][ T388] syz.1.22 (388) used greatest stack depth: 20360 bytes left [ 27.100274][ T298] usb 1-1: not running at top speed; connect to a high speed hub [ 27.113298][ T396] futex_wake_op: syz.2.25 tries to shift op by -1; fix this program [ 27.259589][ T403] loop4: detected capacity change from 0 to 8192 [ 27.265939][ T298] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid maxpacket 512, setting to 64 [ 27.312698][ T403] FAT-fs (loop4): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 27.323166][ T298] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid maxpacket 1024, setting to 64 [ 27.516792][ T403] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 27.532031][ T403] FAT-fs (loop4): Filesystem has been set read-only [ 27.542370][ T403] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 27.551656][ T403] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 27.562538][ T403] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 27.571601][ T403] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 27.580755][ T403] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 27.589425][ T403] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 27.598376][ T403] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 27.607300][ T403] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 27.616937][ T403] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 27.625852][ T298] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 27.636577][ T298] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 27.644756][ T298] usb 1-1: Product: syz [ 27.648909][ T298] usb 1-1: Manufacturer: ᣱ䨞辟늀ݏ엗삼䗥ꊓ鉰觑ኤ㘞螘셑舜핽嫠苁᪊矮㊎᧺﫰ㄅ궿枼 [ 27.660939][ T298] usb 1-1: SerialNumber: syz [ 28.060421][ T298] cdc_ncm 1-1:1.0: bind() failure [ 28.066271][ T298] cdc_ncm 1-1:1.1: CDC Union missing and no IAD found [ 28.081751][ T298] cdc_ncm 1-1:1.1: bind() failure [ 28.100819][ T298] usb 1-1: USB disconnect, device number 2 [ 28.193339][ T418] xt_TPROXY: Can be used only with -p tcp or -p udp [ 28.811155][ T291] EXT4-fs (loop0): unmounting filesystem. [ 29.770548][ T428] usb 3-1: new full-speed USB device number 2 using dummy_hcd [ 29.806039][ T449] loop4: detected capacity change from 0 to 256 [ 29.888262][ T449] FAT-fs (loop4): Directory bread(block 64) failed [ 29.902764][ T449] FAT-fs (loop4): Directory bread(block 65) failed [ 29.915957][ T449] FAT-fs (loop4): Directory bread(block 66) failed [ 29.929991][ T449] FAT-fs (loop4): Directory bread(block 67) failed [ 29.947383][ T449] FAT-fs (loop4): Directory bread(block 68) failed [ 29.961474][ T449] FAT-fs (loop4): Directory bread(block 69) failed [ 29.969072][ T449] FAT-fs (loop4): Directory bread(block 70) failed [ 29.975671][ T449] FAT-fs (loop4): Directory bread(block 71) failed [ 29.983922][ T449] FAT-fs (loop4): Directory bread(block 72) failed [ 29.990344][ T449] FAT-fs (loop4): Directory bread(block 73) failed [ 30.155681][ T463] loop4: detected capacity change from 0 to 1024 [ 30.174642][ T463] EXT4-fs: Ignoring removed orlov option [ 30.180922][ T463] EXT4-fs (loop4): Test dummy encryption mode enabled [ 30.211743][ T463] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 30.222249][ T463] EXT4-fs (loop4): unmounting filesystem. [ 30.225949][ T472] Zero length message leads to an empty skb [ 30.240305][ T428] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 30.253273][ T428] usb 3-1: config 0 has 1 interface, different from the descriptor's value: 2 [ 30.262189][ T428] usb 3-1: New USB device found, idVendor=05d8, idProduct=810a, bcdDevice=92.b8 [ 30.271133][ T428] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 30.285153][ T428] usb 3-1: config 0 descriptor?? [ 30.514791][ T485] device syzkaller0 entered promiscuous mode [ 30.565036][ T489] device syzkaller0 entered promiscuous mode [ 30.760264][ T428] usb 3-1: can't set config #0, error -71 [ 30.776160][ T428] usb 3-1: USB disconnect, device number 2 [ 30.962639][ T514] device pim6reg1 entered promiscuous mode [ 31.601638][ T28] kauditd_printk_skb: 289 callbacks suppressed [ 31.601654][ T28] audit: type=1400 audit(1731505656.905:444): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.680436][ T28] audit: type=1400 audit(1731505656.935:445): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 31.707795][ T559] mmap: syz.4.83 (559) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 31.740906][ T556] device syzkaller0 entered promiscuous mode [ 31.746808][ T28] audit: type=1400 audit(1731505656.935:446): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 31.773280][ T28] audit: type=1400 audit(1731505656.945:447): avc: denied { read write } for pid=293 comm="syz-executor" name="loop4" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.823204][ T28] audit: type=1400 audit(1731505656.955:448): avc: denied { read } for pid=553 comm="syz.2.80" name="kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 31.845415][ T28] audit: type=1400 audit(1731505656.955:449): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.871614][ T28] audit: type=1400 audit(1731505656.965:450): avc: denied { read } for pid=552 comm="syz.4.81" name="loop1" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.895601][ T28] audit: type=1400 audit(1731505656.965:451): avc: denied { read } for pid=552 comm="syz.4.81" name="kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 31.920222][ T28] audit: type=1400 audit(1731505656.985:452): avc: denied { read write } for pid=293 comm="syz-executor" name="loop4" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.962166][ T28] audit: type=1400 audit(1731505656.995:453): avc: denied { bpf } for pid=558 comm="syz.4.83" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 34.864771][ T692] process 'syz.3.133' launched '/dev/fd/3' with NULL argv: empty string added [ 36.623177][ T28] kauditd_printk_skb: 588 callbacks suppressed [ 36.623193][ T28] audit: type=1400 audit(1731505661.925:1042): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.663700][ T28] audit: type=1400 audit(1731505661.935:1043): avc: denied { read write } for pid=293 comm="syz-executor" name="loop4" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.688468][ T28] audit: type=1400 audit(1731505661.955:1044): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 36.711665][ T28] audit: type=1400 audit(1731505661.955:1045): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 36.734692][ T28] audit: type=1400 audit(1731505661.955:1046): avc: denied { read write } for pid=291 comm="syz-executor" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.787233][ T28] audit: type=1400 audit(1731505661.985:1047): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 36.809557][ T28] audit: type=1400 audit(1731505662.015:1048): avc: denied { read } for pid=751 comm="syz.3.154" name="kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 36.832664][ T28] audit: type=1400 audit(1731505662.015:1049): avc: denied { bpf } for pid=745 comm="syz.2.153" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 36.853674][ T28] audit: type=1400 audit(1731505662.015:1050): avc: denied { prog_load } for pid=745 comm="syz.2.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 36.872990][ T28] audit: type=1400 audit(1731505662.015:1051): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 38.524342][ T823] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x800 phys_seg 1 prio class 2 [ 38.992899][ T843] bridge0: port 3(syz_tun) entered blocking state [ 38.999521][ T843] bridge0: port 3(syz_tun) entered disabled state [ 39.009924][ T843] device syz_tun entered promiscuous mode [ 39.017962][ T843] bridge0: port 3(syz_tun) entered blocking state [ 39.024263][ T843] bridge0: port 3(syz_tun) entered forwarding state [ 39.032740][ T843] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 41.709204][ T28] kauditd_printk_skb: 431 callbacks suppressed [ 41.709220][ T28] audit: type=1400 audit(1731505667.005:1483): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.739202][ T28] audit: type=1400 audit(1731505667.025:1484): avc: denied { create } for pid=929 comm="syz.3.221" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 41.761309][ T28] audit: type=1400 audit(1731505667.025:1485): avc: denied { read } for pid=929 comm="syz.3.221" dev="nsfs" ino=4026532382 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 41.782646][ T28] audit: type=1400 audit(1731505667.025:1486): avc: denied { execmem } for pid=929 comm="syz.3.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 41.802162][ T28] audit: type=1400 audit(1731505667.025:1487): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 41.824414][ T28] audit: type=1400 audit(1731505667.045:1488): avc: denied { read write } for pid=292 comm="syz-executor" name="loop1" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.848665][ T28] audit: type=1400 audit(1731505667.065:1489): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 41.870493][ T28] audit: type=1400 audit(1731505667.065:1490): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 41.892388][ T28] audit: type=1400 audit(1731505667.085:1491): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 41.914113][ T28] audit: type=1400 audit(1731505667.105:1492): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 42.035852][ T940] device pim6reg1 entered promiscuous mode [ 44.124180][ T1036] tap0: tun_chr_ioctl cmd 1074025680 [ 46.879747][ T28] kauditd_printk_skb: 543 callbacks suppressed [ 46.879764][ T28] audit: type=1400 audit(1731505672.175:2036): avc: denied { read write } for pid=1125 comm="syz.0.294" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.935512][ T28] audit: type=1400 audit(1731505672.185:2037): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 47.004438][ T28] audit: type=1400 audit(1731505672.215:2038): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 47.068297][ T28] audit: type=1400 audit(1731505672.255:2039): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 47.140403][ T28] audit: type=1400 audit(1731505672.325:2040): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 47.178892][ T28] audit: type=1400 audit(1731505672.405:2041): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 47.205510][ T28] audit: type=1400 audit(1731505672.445:2042): avc: denied { bpf } for pid=1125 comm="syz.0.294" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 47.250270][ T28] audit: type=1400 audit(1731505672.445:2043): avc: denied { map_create } for pid=1125 comm="syz.0.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 47.289900][ T28] audit: type=1400 audit(1731505672.465:2044): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 47.350191][ T28] audit: type=1400 audit(1731505672.505:2045): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 49.085192][ T1192] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x800 phys_seg 1 prio class 2 [ 49.946166][ T1230] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x800 phys_seg 1 prio class 2 [ 51.881976][ T28] kauditd_printk_skb: 461 callbacks suppressed [ 51.881993][ T28] audit: type=1400 audit(1731505677.185:2507): avc: denied { bpf } for pid=1302 comm="syz.2.353" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 51.946078][ T28] audit: type=1400 audit(1731505677.205:2508): avc: denied { read write } for pid=291 comm="syz-executor" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.002111][ T28] audit: type=1400 audit(1731505677.205:2509): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 52.033193][ T1312] device syzkaller0 entered promiscuous mode [ 52.051648][ T28] audit: type=1400 audit(1731505677.205:2510): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 52.110242][ T28] audit: type=1400 audit(1731505677.215:2511): avc: denied { prog_load } for pid=1302 comm="syz.2.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 52.140195][ T28] audit: type=1400 audit(1731505677.215:2512): avc: denied { bpf } for pid=1302 comm="syz.2.353" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 52.190216][ T28] audit: type=1400 audit(1731505677.215:2513): avc: denied { execmem } for pid=1302 comm="syz.2.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 52.238606][ T28] audit: type=1400 audit(1731505677.215:2514): avc: denied { read write } for pid=1302 comm="syz.2.353" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=0 [ 52.288507][ T28] audit: type=1400 audit(1731505677.225:2515): avc: denied { bpf } for pid=1305 comm="syz.0.355" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 52.330198][ T28] audit: type=1400 audit(1731505677.225:2516): avc: denied { map_create } for pid=1305 comm="syz.0.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 53.258271][ T1368] device syzkaller0 entered promiscuous mode [ 54.084680][ T1401] device pim6reg1 entered promiscuous mode [ 54.814991][ T1438] device pim6reg1 entered promiscuous mode [ 56.468487][ T1501] bridge0: port 3(syz_tun) entered disabled state [ 56.474918][ T1501] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.481949][ T1501] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.232477][ T28] kauditd_printk_skb: 593 callbacks suppressed [ 57.232492][ T28] audit: type=1400 audit(1731505682.535:3107): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.269887][ T28] audit: type=1400 audit(1731505682.535:3108): avc: denied { read write } for pid=291 comm="syz-executor" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.296914][ T28] audit: type=1400 audit(1731505682.535:3109): avc: denied { bpf } for pid=1529 comm="syz.2.444" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 57.367911][ T28] audit: type=1400 audit(1731505682.535:3110): avc: denied { prog_load } for pid=1529 comm="syz.2.444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 57.386936][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 57.390748][ T1552] audit: audit_backlog=65 > audit_backlog_limit=64 [ 57.399624][ T84] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 57.410235][ T1553] audit: audit_backlog=65 > audit_backlog_limit=64 [ 57.412632][ T1552] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 57.416770][ T1553] audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 [ 60.004363][ T1658] netlink: 'syz.4.488': attribute type 29 has an invalid length. [ 60.012252][ T1658] netlink: 8 bytes leftover after parsing attributes in process `syz.4.488'. [ 60.021033][ T1658] netlink: 'syz.4.488': attribute type 29 has an invalid length. [ 60.028794][ T1658] netlink: 8 bytes leftover after parsing attributes in process `syz.4.488'. [ 61.323361][ T1709] ICMPv6: NA: fd:f9:a6:84:a5:1b advertised our address fe80::aa on syz_tun! [ 62.080608][ T1729] device pim6reg1 entered promiscuous mode [ 62.322542][ T28] kauditd_printk_skb: 591 callbacks suppressed [ 62.322558][ T28] audit: type=1400 audit(1731505687.625:3681): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 62.350489][ T28] audit: type=1400 audit(1731505687.625:3682): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 62.372323][ T28] audit: type=1400 audit(1731505687.655:3683): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 62.396239][ T28] audit: type=1400 audit(1731505687.685:3684): avc: denied { write } for pid=1733 comm="syz.3.515" name="001" dev="devtmpfs" ino=178 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 62.418902][ T28] audit: type=1400 audit(1731505687.685:3685): avc: denied { read write } for pid=1733 comm="syz.3.515" name="uhid" dev="devtmpfs" ino=263 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=0 [ 62.442560][ T28] audit: type=1400 audit(1731505687.685:3686): avc: denied { create } for pid=1733 comm="syz.3.515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 62.442592][ T28] audit: type=1400 audit(1731505687.685:3687): avc: denied { create } for pid=1733 comm="syz.3.515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 62.442616][ T28] audit: type=1400 audit(1731505687.685:3688): avc: denied { bpf } for pid=1733 comm="syz.3.515" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 62.442640][ T28] audit: type=1400 audit(1731505687.685:3689): avc: denied { prog_load } for pid=1733 comm="syz.3.515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 62.442665][ T28] audit: type=1400 audit(1731505687.685:3690): avc: denied { bpf } for pid=1733 comm="syz.3.515" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 65.372103][ T1855] serio: Serial port ptm0 [ 65.902882][ T1882] binfmt_misc: register: failed to install interpreter file ./file0 [ 67.354285][ T28] kauditd_printk_skb: 829 callbacks suppressed [ 67.354302][ T28] audit: type=1400 audit(1731505692.655:4520): avc: denied { read write } for pid=291 comm="syz-executor" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 67.441014][ T28] audit: type=1400 audit(1731505692.655:4521): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 67.481820][ T28] audit: type=1400 audit(1731505692.685:4522): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 67.531937][ T1944] audit: audit_backlog=65 > audit_backlog_limit=64 [ 67.535114][ T1946] audit: audit_backlog=65 > audit_backlog_limit=64 [ 67.538655][ T28] audit: type=1400 audit(1731505692.685:4523): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 67.566630][ T1944] audit: audit_lost=11 audit_rate_limit=0 audit_backlog_limit=64 [ 67.573260][ T1946] audit: audit_lost=12 audit_rate_limit=0 audit_backlog_limit=64 [ 67.574660][ T1944] audit: backlog limit exceeded [ 67.586902][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 71.481929][ T2108] device bridge0 entered promiscuous mode [ 72.370172][ T28] kauditd_printk_skb: 697 callbacks suppressed [ 72.370189][ T28] audit: type=1400 audit(2000000004.700:5209): avc: denied { read write } for pid=2143 comm="syz.0.667" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 72.454050][ T28] audit: type=1400 audit(2000000004.710:5210): avc: denied { bpf } for pid=2145 comm="syz.2.668" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 72.513644][ T28] audit: type=1400 audit(2000000004.710:5211): avc: denied { prog_load } for pid=2145 comm="syz.2.668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 72.572600][ T28] audit: type=1400 audit(2000000004.710:5212): avc: denied { bpf } for pid=2145 comm="syz.2.668" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 72.636376][ T28] audit: type=1400 audit(2000000004.740:5213): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 72.702917][ T28] audit: type=1400 audit(2000000004.740:5214): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 72.748510][ T28] audit: type=1400 audit(2000000004.740:5215): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 72.806715][ T28] audit: type=1400 audit(2000000004.740:5216): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 72.863222][ T28] audit: type=1400 audit(2000000004.780:5217): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.922040][ T28] audit: type=1400 audit(2000000004.810:5218): avc: denied { mounton } for pid=2136 comm="syz.4.664" path="/149/bus" dev="tmpfs" ino=828 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 75.987610][ T43] Bluetooth: hci0: received HCILL_GO_TO_SLEEP_ACK in state 0 [ 75.996347][ T374] Bluetooth: hci0: Frame reassembly failed (-84) [ 76.234377][ T2294] device wg2 entered promiscuous mode [ 77.426400][ T28] kauditd_printk_skb: 584 callbacks suppressed [ 77.426417][ T28] audit: type=1400 audit(2000000009.760:5803): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 77.478210][ T28] audit: type=1400 audit(2000000009.810:5804): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 77.501593][ T28] audit: type=1400 audit(2000000009.840:5805): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 77.538950][ T28] audit: type=1400 audit(2000000009.840:5806): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 77.561383][ T28] audit: type=1400 audit(2000000009.870:5807): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 77.583456][ T28] audit: type=1400 audit(2000000009.870:5808): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 77.583486][ T28] audit: type=1400 audit(2000000009.870:5809): avc: denied { read write } for pid=292 comm="syz-executor" name="loop1" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.583513][ T28] audit: type=1400 audit(2000000009.900:5810): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 77.583539][ T28] audit: type=1400 audit(2000000009.920:5811): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 77.590687][ T28] audit: type=1400 audit(2000000009.920:5812): avc: denied { module_request } for pid=2335 comm="syz.1.736" kmod="netdev-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 77.828306][ T2343] serio: Serial port ptm1 [ 77.906325][ T2346] device syzkaller0 entered promiscuous mode [ 78.010279][ T2284] Bluetooth: hci0: command 0x1003 tx timeout [ 78.012113][ T1830] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 81.734093][ T2494] device syzkaller0 entered promiscuous mode [ 82.071132][ T2503] device veth0_vlan left promiscuous mode [ 82.077012][ T2503] device veth0_vlan entered promiscuous mode [ 82.085392][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 82.094499][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 82.103001][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 82.119340][ T2506] device pim6reg1 entered promiscuous mode [ 82.488621][ T28] kauditd_printk_skb: 590 callbacks suppressed [ 82.488637][ T28] audit: type=1400 audit(2000000014.820:6403): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 82.516688][ T28] audit: type=1400 audit(2000000014.830:6404): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 82.538691][ T28] audit: type=1400 audit(2000000014.850:6405): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 82.560681][ T28] audit: type=1400 audit(2000000014.900:6406): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 82.583976][ T28] audit: type=1400 audit(2000000014.920:6407): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 82.606021][ T28] audit: type=1400 audit(2000000014.920:6408): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 82.628488][ T28] audit: type=1400 audit(2000000014.920:6409): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 82.651171][ T28] audit: type=1400 audit(2000000014.940:6410): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 82.678226][ T28] audit: type=1400 audit(2000000014.970:6411): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 82.700889][ T28] audit: type=1400 audit(2000000014.990:6412): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 84.669356][ T2611] xt_ecn: cannot match TCP bits for non-tcp packets [ 87.493649][ T28] kauditd_printk_skb: 511 callbacks suppressed [ 87.493666][ T28] audit: type=1400 audit(87.482:6924): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 87.550491][ T28] audit: type=1400 audit(87.512:6925): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 87.578721][ T28] audit: type=1400 audit(87.512:6926): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 87.625226][ T28] audit: type=1400 audit(87.562:6927): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 87.673889][ T28] audit: type=1400 audit(87.562:6928): avc: denied { read write } for pid=291 comm="syz-executor" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 87.717839][ T28] audit: type=1400 audit(87.562:6929): avc: denied { bpf } for pid=2720 comm="syz.0.877" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 87.755759][ T28] audit: type=1400 audit(87.562:6930): avc: denied { prog_load } for pid=2720 comm="syz.0.877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 87.795087][ T28] audit: type=1400 audit(87.562:6931): avc: denied { bpf } for pid=2720 comm="syz.0.877" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 87.834071][ T28] audit: type=1400 audit(87.562:6932): avc: denied { map_create } for pid=2720 comm="syz.0.877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 87.875542][ T28] audit: type=1400 audit(87.562:6933): avc: denied { bpf } for pid=2720 comm="syz.0.877" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 89.056605][ T2779] device pim6reg1 entered promiscuous mode [ 90.310632][ T2831] block device autoloading is deprecated and will be removed. [ 90.371849][ T2842] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.378954][ T2842] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.540389][ T2846] can0: slcan on ptm0. [ 90.590377][ T2846] can0 (unregistered): slcan off ptm0. [ 92.500301][ T28] kauditd_printk_skb: 4579 callbacks suppressed [ 92.500317][ T28] audit: type=1400 audit(92.482:11513): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 92.556446][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.563056][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.569511][ T140] audit: audit_lost=17 audit_rate_limit=0 audit_backlog_limit=64 [ 92.570221][ T28] audit: type=1400 audit(92.502:11514): avc: denied { read write } for pid=291 comm="syz-executor" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 92.582727][ T84] audit: audit_lost=18 audit_rate_limit=0 audit_backlog_limit=64 [ 92.608076][ T84] audit: backlog limit exceeded [ 92.613344][ T2895] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.621913][ T140] audit: backlog limit exceeded [ 92.627484][ T294] audit: audit_backlog=65 > audit_backlog_limit=64 [ 95.741862][ T3017] xt_ecn: cannot match TCP bits for non-tcp packets [ 97.510705][ T28] kauditd_printk_skb: 10777 callbacks suppressed [ 97.510723][ T28] audit: type=1400 audit(97.492:22285): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 97.564338][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.564343][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.564357][ T140] audit: audit_lost=22 audit_rate_limit=0 audit_backlog_limit=64 [ 97.577265][ T84] audit: audit_lost=23 audit_rate_limit=0 audit_backlog_limit=64 [ 97.600208][ T3061] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.603403][ T28] audit: type=1400 audit(97.532:22286): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.620179][ T3061] audit: audit_lost=24 audit_rate_limit=0 audit_backlog_limit=64 [ 97.634340][ T84] audit: backlog limit exceeded [ 97.639247][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 99.729275][ T3126] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 99.749189][ T3126] device pim6reg1 entered promiscuous mode [ 102.504282][ T3212] device syzkaller0 entered promiscuous mode [ 102.520289][ T28] kauditd_printk_skb: 10681 callbacks suppressed [ 102.520305][ T28] audit: type=1400 audit(102.512:32796): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 102.576409][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.583001][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.589393][ T140] audit: audit_lost=82 audit_rate_limit=0 audit_backlog_limit=64 [ 102.600752][ T84] audit: audit_lost=83 audit_rate_limit=0 audit_backlog_limit=64 [ 102.608409][ T84] audit: backlog limit exceeded [ 102.608551][ T140] audit: backlog limit exceeded [ 102.623231][ T3217] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.631580][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.635724][ T292] audit: audit_backlog=65 > audit_backlog_limit=64 [ 104.325294][ T3257] serio: Serial port ptm0 [ 107.055081][ T3348] ICMPv6: NA: fd:f9:a6:84:a5:1b advertised our address fe80::aa on syz_tun! [ 107.530385][ T28] kauditd_printk_skb: 10863 callbacks suppressed [ 107.530400][ T28] audit: type=1400 audit(107.522:43654): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 107.583031][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 107.589368][ T140] audit: audit_lost=87 audit_rate_limit=0 audit_backlog_limit=64 [ 107.591958][ T293] audit: audit_backlog=65 > audit_backlog_limit=64 [ 107.600221][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 107.619881][ T140] audit: backlog limit exceeded [ 107.624615][ T84] audit: audit_lost=88 audit_rate_limit=0 audit_backlog_limit=64 [ 107.628310][ T293] audit: audit_lost=89 audit_rate_limit=0 audit_backlog_limit=64 [ 107.632289][ T84] audit: backlog limit exceeded [ 107.640816][ T28] audit: type=1400 audit(107.522:43655): avc: denied { bpf } for pid=3358 comm="syz.2.1102" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 107.985691][ T3380] ICMPv6: NA: fd:f9:a6:84:a5:1b advertised our address fe80::aa on syz_tun! [ 108.272914][ T3387] syz.3.1113 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 108.650513][ T10] Bluetooth: hci0: Frame reassembly failed (-84) [ 108.662038][ T45] Bluetooth: hci0: Received unexpected HCI Event 0x00 [ 110.632395][ T3444] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1132'. [ 110.730228][ T45] Bluetooth: hci0: command 0x1003 tx timeout [ 110.740215][ T1830] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 112.540646][ T28] kauditd_printk_skb: 13870 callbacks suppressed [ 112.540663][ T28] audit: type=1400 audit(112.532:57276): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.582913][ T28] audit: type=1400 audit(112.532:57277): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 112.609608][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 112.615006][ T28] audit: type=1326 audit(112.562:57278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3495 comm="syz.2.1152" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f47a23756e7 code=0x7ffc0000 [ 112.626169][ T84] audit: audit_lost=173 audit_rate_limit=0 audit_backlog_limit=64 [ 112.652093][ T3502] audit: audit_backlog=65 > audit_backlog_limit=64 [ 112.655397][ T28] audit: type=1326 audit(112.562:57279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3495 comm="syz.2.1152" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f47a231a099 code=0x7ffc0000 [ 112.678757][ T3502] audit: audit_lost=174 audit_rate_limit=0 audit_backlog_limit=64 [ 112.688638][ T3502] audit: backlog limit exceeded [ 112.693217][ T28] audit: type=1326 audit(112.562:57280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3495 comm="syz.2.1152" exe="/root/syz-executor" sig=0 arch=c000003e syscall=73 compat=0 ip=0x7f47a237e719 code=0x7ffc0000 [ 112.721600][ T3502] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 112.722407][ T3502] device pim6reg1 entered promiscuous mode [ 117.550190][ T28] kauditd_printk_skb: 11254 callbacks suppressed [ 117.550207][ T28] audit: type=1400 audit(117.532:68445): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 117.626411][ T140] audit: audit_backlog=66 > audit_backlog_limit=64 [ 117.626422][ T84] audit: audit_backlog=66 > audit_backlog_limit=64 [ 117.626436][ T84] audit: audit_lost=205 audit_rate_limit=0 audit_backlog_limit=64 [ 117.635520][ T140] audit: audit_lost=206 audit_rate_limit=0 audit_backlog_limit=64 [ 117.654257][ T28] audit: type=1400 audit(117.532:68444): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.654470][ T3636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 117.681182][ T84] audit: backlog limit exceeded [ 117.687977][ T291] audit: audit_backlog=65 > audit_backlog_limit=64 [ 117.690205][ T3637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 121.460186][ T2284] Bluetooth: hci0: command 0x1003 tx timeout [ 121.461390][ T1830] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 122.560183][ T28] kauditd_printk_skb: 12638 callbacks suppressed [ 122.560199][ T28] audit: type=1400 audit(122.542:81005): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 122.625000][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 122.635971][ T28] audit: type=1400 audit(122.582:81006): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 122.641181][ T84] audit: audit_lost=234 audit_rate_limit=0 audit_backlog_limit=64 [ 122.698530][ T84] audit: backlog limit exceeded [ 122.702807][ T28] audit: type=1400 audit(122.582:81007): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 122.725734][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 122.737517][ T291] audit: audit_backlog=65 > audit_backlog_limit=64 [ 122.740185][ T84] audit: audit_lost=235 audit_rate_limit=0 audit_backlog_limit=64 [ 122.750156][ T291] audit: audit_lost=236 audit_rate_limit=0 audit_backlog_limit=64 [ 127.521827][ T3878] device pim6reg1 entered promiscuous mode [ 127.570327][ T28] kauditd_printk_skb: 11992 callbacks suppressed [ 127.570343][ T28] audit: type=1400 audit(127.562:92938): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 127.637405][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 127.644457][ T3884] audit: audit_backlog=65 > audit_backlog_limit=64 [ 127.650223][ T28] audit: type=1400 audit(127.582:92939): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 127.652454][ T140] audit: audit_lost=257 audit_rate_limit=0 audit_backlog_limit=64 [ 127.680472][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 127.693977][ T84] audit: audit_lost=258 audit_rate_limit=0 audit_backlog_limit=64 [ 127.703328][ T3884] audit: audit_lost=259 audit_rate_limit=0 audit_backlog_limit=64 [ 127.703367][ T3885] audit: audit_backlog=65 > audit_backlog_limit=64 [ 127.715385][ T84] audit: backlog limit exceeded [ 132.581501][ T28] kauditd_printk_skb: 15026 callbacks suppressed [ 132.581517][ T28] audit: type=1400 audit(132.572:107947): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 132.623030][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 132.623029][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 132.623047][ T140] audit: audit_lost=266 audit_rate_limit=0 audit_backlog_limit=64 [ 132.629489][ T84] audit: audit_lost=267 audit_rate_limit=0 audit_backlog_limit=64 [ 132.651090][ T84] audit: backlog limit exceeded [ 132.653205][ T140] audit: backlog limit exceeded [ 132.655856][ T28] audit: type=1400 audit(132.572:107948): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 132.683584][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 132.683588][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 137.592500][ T28] kauditd_printk_skb: 12721 callbacks suppressed [ 137.592516][ T28] audit: type=1400 audit(137.582:120666): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.619431][ T28] audit: type=1400 audit(137.582:120667): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 137.647277][ T28] audit: type=1400 audit(137.632:120668): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 137.668602][ T28] audit: type=1400 audit(137.632:120669): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 137.690029][ T28] audit: type=1400 audit(137.632:120670): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 137.690061][ T28] audit: type=1400 audit(137.632:120671): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 137.732682][ T28] audit: type=1400 audit(137.632:120672): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 137.732718][ T28] audit: type=1400 audit(137.632:120673): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 137.774997][ T28] audit: type=1400 audit(137.632:120674): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 137.796310][ T28] audit: type=1400 audit(137.632:120675): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 138.593277][ T4195] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1388'. [ 142.365929][ T4300] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 142.605344][ T28] kauditd_printk_skb: 12936 callbacks suppressed [ 142.605412][ T28] audit: type=1400 audit(142.582:133611): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 142.660664][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 142.667129][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 142.673646][ T140] audit: audit_lost=270 audit_rate_limit=0 audit_backlog_limit=64 [ 142.681498][ T84] audit: audit_lost=271 audit_rate_limit=0 audit_backlog_limit=64 [ 142.682672][ T28] audit: type=1400 audit(142.622:133613): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 142.689160][ T140] audit: backlog limit exceeded [ 142.720358][ T84] audit: backlog limit exceeded [ 142.720403][ T4313] audit: audit_backlog=65 > audit_backlog_limit=64 [ 142.728741][ T28] audit: type=1400 audit(142.622:133614): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 143.449296][ T2284] Bluetooth: hci1: Received unexpected HCI Event 0x00 [ 143.850208][ T4326] Bluetooth: hci0: command 0x1003 tx timeout [ 143.850222][ T1830] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 145.057745][ T4358] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 145.450172][ T45] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 145.450272][ T4332] Bluetooth: hci1: command 0x1003 tx timeout [ 147.165494][ T4411] ip6t_rpfilter: unknown options [ 147.612569][ T28] kauditd_printk_skb: 16984 callbacks suppressed [ 147.612586][ T28] audit: type=1400 audit(147.602:150066): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 147.671434][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 147.671436][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 147.671454][ T140] audit: audit_lost=450 audit_rate_limit=0 audit_backlog_limit=64 [ 147.688312][ T84] audit: audit_lost=451 audit_rate_limit=0 audit_backlog_limit=64 [ 147.713304][ T291] audit: audit_backlog=65 > audit_backlog_limit=64 [ 147.719802][ T28] audit: type=1400 audit(147.602:150067): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 147.740638][ T140] audit: backlog limit exceeded [ 147.744219][ T84] audit: backlog limit exceeded [ 147.753623][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 152.242416][ T4539] syz.0.1499 (4539): /proc/4538/oom_adj is deprecated, please use /proc/4538/oom_score_adj instead. [ 152.570178][ T45] Bluetooth: hci0: command 0x1003 tx timeout [ 152.576043][ T4332] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 152.620304][ T28] kauditd_printk_skb: 11538 callbacks suppressed [ 152.620321][ T28] audit: type=1400 audit(152.612:161407): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 152.659751][ T140] audit: audit_backlog=66 > audit_backlog_limit=64 [ 152.659775][ T84] audit: audit_backlog=66 > audit_backlog_limit=64 [ 152.668208][ T4553] audit: audit_backlog=66 > audit_backlog_limit=64 [ 152.672625][ T84] audit: audit_lost=519 audit_rate_limit=0 audit_backlog_limit=64 [ 152.679633][ T140] audit: audit_lost=520 audit_rate_limit=0 audit_backlog_limit=64 [ 152.686525][ T28] audit: type=1400 audit(152.612:161408): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 152.696329][ T292] audit: audit_backlog=65 > audit_backlog_limit=64 [ 152.715950][ T28] audit: type=1400 audit(152.612:161409): avc: denied { read write } for pid=4551 comm="syz.1.1503" name="loop1" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 152.728204][ T4553] audit: audit_lost=521 audit_rate_limit=0 audit_backlog_limit=64 [ 157.088454][ T4663] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1538'. [ 157.630647][ T28] kauditd_printk_skb: 11449 callbacks suppressed [ 157.630664][ T28] audit: type=1400 audit(157.622:172854): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 157.697177][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 157.707474][ T28] audit: type=1400 audit(157.652:172855): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 157.720229][ T84] audit: audit_lost=523 audit_rate_limit=0 audit_backlog_limit=64 [ 157.767274][ T28] audit: type=1400 audit(157.652:172856): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 157.782557][ T84] audit: backlog limit exceeded [ 157.798289][ T4678] audit: audit_backlog=65 > audit_backlog_limit=64 [ 157.814791][ T4678] audit: audit_lost=524 audit_rate_limit=0 audit_backlog_limit=64 [ 157.818925][ T290] audit: audit_backlog=65 > audit_backlog_limit=64 [ 157.830647][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 162.640648][ T28] kauditd_printk_skb: 12487 callbacks suppressed [ 162.640684][ T28] audit: type=1400 audit(162.632:185339): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 162.691308][ T28] audit: type=1400 audit(162.682:185340): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 162.735366][ T4829] audit: audit_backlog=66 > audit_backlog_limit=64 [ 162.737584][ T28] audit: type=1400 audit(162.682:185341): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 162.742743][ T4829] audit: audit_lost=527 audit_rate_limit=0 audit_backlog_limit=64 [ 162.763312][ T28] audit: type=1400 audit(162.702:185342): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 162.774782][ T4829] audit: backlog limit exceeded [ 162.797109][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 162.800323][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 162.805240][ T4830] audit: audit_backlog=65 > audit_backlog_limit=64 [ 164.521498][ T4882] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 167.650601][ T28] kauditd_printk_skb: 12418 callbacks suppressed [ 167.650618][ T28] audit: type=1400 audit(167.642:197687): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 167.702356][ T28] audit: type=1400 audit(167.642:197688): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 167.723973][ T28] audit: type=1400 audit(167.662:197689): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 167.745260][ T28] audit: type=1400 audit(167.662:197690): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 167.766636][ T28] audit: type=1400 audit(167.662:197691): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 167.787875][ T28] audit: type=1400 audit(167.662:197692): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 167.809079][ T28] audit: type=1400 audit(167.662:197693): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 167.830276][ T28] audit: type=1400 audit(167.662:197694): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 167.851583][ T28] audit: type=1400 audit(167.662:197695): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 167.872981][ T28] audit: type=1400 audit(167.672:197696): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 172.405098][ T5119] netlink: 17 bytes leftover after parsing attributes in process `syz.4.1683'. [ 172.426320][ T5119] netlink: 17 bytes leftover after parsing attributes in process `syz.4.1683'. [ 172.660359][ T28] kauditd_printk_skb: 12011 callbacks suppressed [ 172.660377][ T28] audit: type=1400 audit(172.652:209708): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 172.709185][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 172.716302][ T291] audit: audit_backlog=65 > audit_backlog_limit=64 [ 172.716566][ T28] audit: type=1400 audit(172.652:209709): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 172.724044][ T140] audit: audit_lost=554 audit_rate_limit=0 audit_backlog_limit=64 [ 172.750403][ T291] audit: audit_lost=555 audit_rate_limit=0 audit_backlog_limit=64 [ 172.759259][ T291] audit: backlog limit exceeded [ 172.764296][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 172.770797][ T84] audit: audit_lost=556 audit_rate_limit=0 audit_backlog_limit=64 [ 172.778439][ T84] audit: backlog limit exceeded [ 177.505532][ T5254] syz.2.1728 (5254) used greatest stack depth: 20168 bytes left [ 177.670761][ T28] kauditd_printk_skb: 16813 callbacks suppressed [ 177.670777][ T28] audit: type=1400 audit(177.662:226522): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 177.712210][ T28] audit: type=1400 audit(177.662:226523): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 177.736592][ T140] audit: audit_backlog=66 > audit_backlog_limit=64 [ 177.736602][ T84] audit: audit_backlog=66 > audit_backlog_limit=64 [ 177.736616][ T84] audit: audit_lost=557 audit_rate_limit=0 audit_backlog_limit=64 [ 177.743660][ T140] audit: audit_lost=558 audit_rate_limit=0 audit_backlog_limit=64 [ 177.756989][ T84] audit: backlog limit exceeded [ 177.769659][ T84] audit: audit_backlog=66 > audit_backlog_limit=64 [ 177.777904][ T84] audit: audit_lost=559 audit_rate_limit=0 audit_backlog_limit=64 [ 177.782312][ T28] audit: type=1400 audit(177.692:226524): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 182.596881][ T5443] xt_policy: neither incoming nor outgoing policy selected [ 182.680503][ T28] kauditd_printk_skb: 15167 callbacks suppressed [ 182.680521][ T28] audit: type=1400 audit(182.672:241564): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 182.721206][ T5449] audit: audit_backlog=65 > audit_backlog_limit=64 [ 182.727707][ T5449] audit: audit_lost=602 audit_rate_limit=0 audit_backlog_limit=64 [ 182.730840][ T28] audit: type=1400 audit(182.672:241565): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 182.737136][ T5449] audit: backlog limit exceeded [ 182.762843][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 182.765925][ T5449] audit: audit_backlog=65 > audit_backlog_limit=64 [ 182.769169][ T84] audit: audit_lost=603 audit_rate_limit=0 audit_backlog_limit=64 [ 182.769185][ T84] audit: backlog limit exceeded [ 182.769325][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 187.123555][ T5621] device pim6reg1 entered promiscuous mode [ 187.701074][ T28] kauditd_printk_skb: 13716 callbacks suppressed [ 187.701100][ T28] audit: type=1400 audit(187.692:255260): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 187.751362][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 187.758778][ T293] audit: audit_backlog=65 > audit_backlog_limit=64 [ 187.765506][ T84] audit: audit_lost=612 audit_rate_limit=0 audit_backlog_limit=64 [ 187.773373][ T84] audit: backlog limit exceeded [ 187.778149][ T293] audit: audit_lost=613 audit_rate_limit=0 audit_backlog_limit=64 [ 187.786346][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 187.792912][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 187.799274][ T140] audit: audit_lost=614 audit_rate_limit=0 audit_backlog_limit=64 [ 187.806814][ T5625] audit: audit_backlog=65 > audit_backlog_limit=64 [ 192.545051][ T5831] netlink: 17 bytes leftover after parsing attributes in process `syz.3.1944'. [ 192.571427][ T5831] netlink: 17 bytes leftover after parsing attributes in process `syz.3.1944'. [ 192.711072][ T28] kauditd_printk_skb: 11140 callbacks suppressed [ 192.711088][ T28] audit: type=1400 audit(192.702:266395): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 192.769786][ T28] audit: type=1400 audit(192.732:266396): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 192.803564][ T28] audit: type=1400 audit(192.732:266397): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 192.822411][ T5847] audit: audit_backlog=65 > audit_backlog_limit=64 [ 192.827836][ T5848] audit: audit_backlog=65 > audit_backlog_limit=64 [ 192.835655][ T5847] audit: audit_lost=617 audit_rate_limit=0 audit_backlog_limit=64 [ 192.837650][ T5850] audit: audit_backlog=65 > audit_backlog_limit=64 [ 192.845226][ T5847] audit: backlog limit exceeded [ 192.851714][ T5848] audit: audit_lost=618 audit_rate_limit=0 audit_backlog_limit=64 [ 192.856431][ T5847] audit: audit_backlog=65 > audit_backlog_limit=64 [ 197.720401][ T28] kauditd_printk_skb: 11694 callbacks suppressed [ 197.720420][ T28] audit: type=1400 audit(197.712:278000): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 197.765550][ T28] audit: type=1400 audit(197.712:278001): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 197.789922][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 197.796574][ T140] audit: audit_lost=650 audit_rate_limit=0 audit_backlog_limit=64 [ 197.796597][ T140] audit: backlog limit exceeded [ 197.796762][ T140] audit: audit_backlog=66 > audit_backlog_limit=64 [ 197.796777][ T140] audit: audit_lost=651 audit_rate_limit=0 audit_backlog_limit=64 [ 197.796790][ T140] audit: backlog limit exceeded [ 197.796834][ T140] audit: audit_backlog=66 > audit_backlog_limit=64 [ 197.796846][ T140] audit: audit_lost=652 audit_rate_limit=0 audit_backlog_limit=64 [ 202.730404][ T28] kauditd_printk_skb: 14257 callbacks suppressed [ 202.730422][ T28] audit: type=1400 audit(202.722:292252): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 202.772691][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 202.772706][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 202.788799][ T28] audit: type=1400 audit(202.722:292253): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 202.792388][ T140] audit: audit_lost=655 audit_rate_limit=0 audit_backlog_limit=64 [ 202.814588][ T84] audit: audit_lost=656 audit_rate_limit=0 audit_backlog_limit=64 [ 202.825350][ T84] audit: backlog limit exceeded [ 202.832368][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 202.838789][ T28] audit: type=1400 audit(202.752:292254): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 202.860657][ T84] audit: audit_lost=657 audit_rate_limit=0 audit_backlog_limit=64 [ 207.746402][ T28] kauditd_printk_skb: 13680 callbacks suppressed [ 207.746420][ T28] audit: type=1400 audit(207.732:305684): avc: denied { read write } for pid=293 comm="syz-executor" name="loop4" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 207.760237][ T28] audit: type=1400 audit(207.752:305685): avc: denied { bpf } for pid=6382 comm="syz.4.2158" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 207.760346][ T28] audit: type=1400 audit(207.752:305686): avc: denied { prog_load } for pid=6382 comm="syz.4.2158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 207.784073][ T28] audit: type=1400 audit(207.752:305687): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 207.784847][ T28] audit: type=1400 audit(207.772:305688): avc: denied { bpf } for pid=6384 comm="syz.3.2159" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 207.784878][ T28] audit: type=1400 audit(207.772:305689): avc: denied { prog_load } for pid=6384 comm="syz.3.2159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 207.785024][ T28] audit: type=1400 audit(207.772:305690): avc: denied { create } for pid=6382 comm="syz.4.2158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 207.785513][ T28] audit: type=1400 audit(207.772:305691): avc: denied { create } for pid=6384 comm="syz.3.2159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 207.785705][ T28] audit: type=1400 audit(207.772:305692): avc: denied { create } for pid=6382 comm="syz.4.2158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 207.785851][ T28] audit: type=1400 audit(207.772:305693): avc: denied { create } for pid=6384 comm="syz.3.2159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 211.976725][ T6537] capability: warning: `syz.1.2216' uses 32-bit capabilities (legacy support in use) [ 212.750371][ T28] kauditd_printk_skb: 15734 callbacks suppressed [ 212.750387][ T28] audit: type=1400 audit(212.742:321428): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 212.777792][ T28] audit: type=1400 audit(212.742:321429): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 212.802483][ T28] audit: type=1400 audit(212.782:321430): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 212.822964][ T28] audit: type=1400 audit(212.782:321431): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 212.844267][ T28] audit: type=1400 audit(212.782:321432): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 212.844297][ T28] audit: type=1400 audit(212.792:321433): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 212.887646][ T28] audit: type=1400 audit(212.792:321434): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 212.911669][ T28] audit: type=1400 audit(212.792:321435): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 212.947378][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 212.949863][ T6587] audit: audit_backlog=65 > audit_backlog_limit=64 [ 213.577955][ T6617] xt_policy: neither incoming nor outgoing policy selected [ 217.456536][ T6761] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 217.760131][ T28] kauditd_printk_skb: 14827 callbacks suppressed [ 217.760147][ T28] audit: type=1400 audit(217.742:335857): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 217.788494][ T28] audit: type=1400 audit(217.772:335858): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 217.810328][ T28] audit: type=1400 audit(217.772:335859): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 217.835497][ T28] audit: type=1400 audit(217.822:335860): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 217.857042][ T28] audit: type=1400 audit(217.822:335861): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 217.857089][ T28] audit: type=1400 audit(217.822:335862): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 217.898959][ T28] audit: type=1400 audit(217.822:335863): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 217.920323][ T28] audit: type=1400 audit(217.822:335864): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 217.951601][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 217.951752][ T28] audit: type=1400 audit(217.822:335865): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 222.770246][ T28] kauditd_printk_skb: 17005 callbacks suppressed [ 222.770263][ T28] audit: type=1400 audit(222.752:352810): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 222.801578][ T28] audit: type=1400 audit(222.752:352809): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 222.830118][ T28] audit: type=1400 audit(222.762:352811): avc: denied { read write } for pid=6965 comm="syz.0.2383" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 222.853577][ T28] audit: type=1400 audit(222.792:352812): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 222.874702][ T28] audit: type=1400 audit(222.792:352813): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 222.895922][ T28] audit: type=1400 audit(222.792:352814): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 222.917097][ T28] audit: type=1400 audit(222.792:352815): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 222.938338][ T28] audit: type=1400 audit(222.792:352816): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 222.938374][ T28] audit: type=1400 audit(222.792:352817): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 222.938399][ T28] audit: type=1400 audit(222.792:352818): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 227.780259][ T28] kauditd_printk_skb: 16307 callbacks suppressed [ 227.780276][ T28] audit: type=1400 audit(227.772:369126): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 227.818282][ T28] audit: type=1400 audit(227.772:369127): avc: denied { bpf } for pid=7134 comm="syz.4.2448" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 227.840013][ T28] audit: type=1400 audit(227.772:369128): avc: denied { prog_load } for pid=7134 comm="syz.4.2448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 227.859851][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 227.860872][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 227.870151][ T84] audit: audit_lost=899 audit_rate_limit=0 audit_backlog_limit=64 [ 227.880298][ T84] audit: backlog limit exceeded [ 227.885319][ T28] audit: type=1400 audit(227.802:369129): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 227.907196][ T140] audit: audit_lost=900 audit_rate_limit=0 audit_backlog_limit=64 [ 227.909152][ T7138] audit: audit_backlog=65 > audit_backlog_limit=64 [ 232.790505][ T28] kauditd_printk_skb: 17130 callbacks suppressed [ 232.790521][ T28] audit: type=1400 audit(232.782:386258): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 232.818669][ T28] audit: type=1400 audit(232.782:386259): avc: denied { read } for pid=7320 comm="syz.4.2523" name="kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 232.840988][ T28] audit: type=1400 audit(232.782:386260): avc: denied { read write } for pid=7320 comm="syz.4.2523" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 232.863880][ T28] audit: type=1400 audit(232.782:386261): avc: denied { bpf } for pid=7320 comm="syz.4.2523" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 232.883861][ T28] audit: type=1400 audit(232.782:386262): avc: denied { prog_load } for pid=7320 comm="syz.4.2523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 232.883897][ T28] audit: type=1400 audit(232.782:386263): avc: denied { bpf } for pid=7320 comm="syz.4.2523" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 232.922320][ T28] audit: type=1400 audit(232.782:386264): avc: denied { prog_load } for pid=7320 comm="syz.4.2523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 232.940771][ T28] audit: type=1400 audit(232.782:386265): avc: denied { bpf } for pid=7320 comm="syz.4.2523" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 232.960770][ T28] audit: type=1400 audit(232.782:386266): avc: denied { map_create } for pid=7320 comm="syz.4.2523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 232.960804][ T28] audit: type=1400 audit(232.772:386257): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 235.011435][ T7394] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 237.800253][ T28] kauditd_printk_skb: 13359 callbacks suppressed [ 237.800272][ T28] audit: type=1400 audit(237.792:399626): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 237.844228][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 237.844238][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 237.844252][ T84] audit: audit_lost=902 audit_rate_limit=0 audit_backlog_limit=64 [ 237.853206][ T140] audit: audit_lost=903 audit_rate_limit=0 audit_backlog_limit=64 [ 237.863677][ T84] audit: backlog limit exceeded [ 237.875652][ T28] audit: type=1400 audit(237.792:399627): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 237.898603][ T140] audit: backlog limit exceeded [ 237.898701][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 237.903628][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 242.810286][ T28] kauditd_printk_skb: 14201 callbacks suppressed [ 242.810304][ T28] audit: type=1400 audit(242.802:413825): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 242.859661][ T28] audit: type=1400 audit(242.802:413826): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 242.882538][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 242.888873][ T84] audit: audit_lost=906 audit_rate_limit=0 audit_backlog_limit=64 [ 242.897274][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 242.904520][ T84] audit: backlog limit exceeded [ 242.906696][ T140] audit: audit_lost=907 audit_rate_limit=0 audit_backlog_limit=64 [ 242.911700][ T290] audit: audit_backlog=65 > audit_backlog_limit=64 [ 242.930773][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 242.935197][ T140] audit: backlog limit exceeded [ 247.820928][ T28] kauditd_printk_skb: 13124 callbacks suppressed [ 247.820945][ T28] audit: type=1400 audit(247.812:426929): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 247.862600][ T28] audit: type=1400 audit(247.812:426930): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 247.892702][ T7772] audit: audit_backlog=65 > audit_backlog_limit=64 [ 247.892775][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 247.899148][ T7772] audit: audit_lost=916 audit_rate_limit=0 audit_backlog_limit=64 [ 247.910090][ T140] audit: audit_lost=917 audit_rate_limit=0 audit_backlog_limit=64 [ 247.913386][ T28] audit: type=1400 audit(247.842:426931): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 247.930100][ T140] audit: backlog limit exceeded [ 247.942140][ T7772] audit: backlog limit exceeded [ 247.951902][ T28] audit: type=1400 audit(247.842:426932): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 252.830112][ T28] kauditd_printk_skb: 11988 callbacks suppressed [ 252.830129][ T28] audit: type=1400 audit(252.812:438876): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 252.876346][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 252.882836][ T84] audit: audit_lost=933 audit_rate_limit=0 audit_backlog_limit=64 [ 252.891281][ T28] audit: type=1400 audit(252.842:438877): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 252.911726][ T84] audit: backlog limit exceeded [ 252.917070][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 252.923911][ T84] audit: audit_lost=934 audit_rate_limit=0 audit_backlog_limit=64 [ 252.931572][ T84] audit: backlog limit exceeded [ 252.938324][ T28] audit: type=1400 audit(252.842:438878): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 252.970552][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 257.840401][ T28] kauditd_printk_skb: 11826 callbacks suppressed [ 257.840419][ T28] audit: type=1400 audit(257.832:450277): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 257.905039][ T28] audit: type=1400 audit(257.832:450278): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 257.926698][ T28] audit: type=1400 audit(257.862:450279): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 257.959066][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 257.965655][ T84] audit: audit_lost=1078 audit_rate_limit=0 audit_backlog_limit=64 [ 257.977133][ T28] audit: type=1400 audit(257.862:450280): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 257.980787][ T84] audit: backlog limit exceeded [ 257.998580][ T8062] audit: audit_backlog=65 > audit_backlog_limit=64 [ 258.009742][ T8062] audit: audit_lost=1079 audit_rate_limit=0 audit_backlog_limit=64 [ 258.009766][ T8062] audit: backlog limit exceeded [ 262.850924][ T28] kauditd_printk_skb: 12490 callbacks suppressed [ 262.850942][ T28] audit: type=1400 audit(262.842:462772): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 262.850970][ T28] audit: type=1400 audit(262.842:462771): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 262.909779][ T28] audit: type=1400 audit(262.892:462773): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 262.932945][ T28] audit: type=1400 audit(262.892:462774): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 262.958880][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 262.961168][ T294] audit: audit_backlog=65 > audit_backlog_limit=64 [ 262.966870][ T140] audit: audit_lost=1080 audit_rate_limit=0 audit_backlog_limit=64 [ 262.971935][ T294] audit: audit_lost=1081 audit_rate_limit=0 audit_backlog_limit=64 [ 262.979523][ T8220] audit: audit_backlog=65 > audit_backlog_limit=64 [ 262.987310][ T28] audit: type=1400 audit(262.892:462775): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 267.860133][ T28] kauditd_printk_skb: 11275 callbacks suppressed [ 267.860150][ T28] audit: type=1400 audit(267.842:473678): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 267.915530][ T28] audit: type=1400 audit(267.882:473679): avc: denied { bpf } for pid=8356 comm="syz.3.2889" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 267.943763][ T8365] audit: audit_backlog=66 > audit_backlog_limit=64 [ 267.943836][ T84] audit: audit_backlog=66 > audit_backlog_limit=64 [ 267.950267][ T140] audit: audit_backlog=66 > audit_backlog_limit=64 [ 267.958727][ T8366] audit: audit_backlog=66 > audit_backlog_limit=64 [ 267.963038][ T140] audit: audit_lost=1206 audit_rate_limit=0 audit_backlog_limit=64 [ 267.977027][ T8363] audit: audit_backlog=66 > audit_backlog_limit=64 [ 267.977182][ T28] audit: type=1400 audit(267.882:473680): avc: denied { prog_load } for pid=8356 comm="syz.3.2889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 267.990089][ T84] audit: audit_lost=1207 audit_rate_limit=0 audit_backlog_limit=64 [ 272.874268][ T28] kauditd_printk_skb: 13237 callbacks suppressed [ 272.874285][ T28] audit: type=1400 audit(272.862:486781): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 272.929376][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 272.932712][ T28] audit: type=1400 audit(272.892:486782): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 272.944390][ T84] audit: audit_lost=1254 audit_rate_limit=0 audit_backlog_limit=64 [ 272.972056][ T28] audit: type=1400 audit(272.892:486783): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 272.985456][ T84] audit: backlog limit exceeded [ 272.993457][ T8510] audit: audit_backlog=65 > audit_backlog_limit=64 [ 272.999857][ T28] audit: type=1400 audit(272.892:486784): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 273.017437][ T8510] audit: audit_lost=1255 audit_rate_limit=0 audit_backlog_limit=64 [ 273.030646][ T28] audit: type=1400 audit(272.892:486785): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 277.594393][ T8679] netlink: 'syz.3.3004': attribute type 30 has an invalid length. [ 277.881333][ T28] kauditd_printk_skb: 14627 callbacks suppressed [ 277.881350][ T28] audit: type=1400 audit(277.872:501247): avc: denied { read write } for pid=293 comm="syz-executor" name="loop4" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 277.943172][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 277.949509][ T84] audit: audit_lost=1311 audit_rate_limit=0 audit_backlog_limit=64 [ 277.960487][ T28] audit: type=1400 audit(277.872:501248): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 277.970104][ T84] audit: backlog limit exceeded [ 277.982098][ T8690] audit: audit_backlog=65 > audit_backlog_limit=64 [ 277.990401][ T8689] audit: audit_backlog=65 > audit_backlog_limit=64 [ 278.004185][ T8690] audit: audit_lost=1312 audit_rate_limit=0 audit_backlog_limit=64 [ 278.006684][ T291] audit: audit_backlog=65 > audit_backlog_limit=64 [ 278.015258][ T28] audit: type=1400 audit(277.902:501249): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 278.067968][ T8694] device pim6reg1 entered promiscuous mode [ 282.890254][ T28] kauditd_printk_skb: 16097 callbacks suppressed [ 282.890271][ T28] audit: type=1400 audit(282.872:517159): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 282.922209][ T28] audit: type=1400 audit(282.882:517160): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 282.947132][ T28] audit: type=1400 audit(282.882:517161): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 282.974871][ T28] audit: type=1400 audit(282.882:517162): avc: denied { read } for pid=8867 comm="syz.2.3072" dev="nsfs" ino=4026532630 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 283.000738][ T28] audit: type=1400 audit(282.912:517163): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 283.009131][ T8872] audit: audit_backlog=65 > audit_backlog_limit=64 [ 283.022478][ T28] audit: type=1400 audit(282.912:517164): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 283.049920][ T8872] audit: audit_lost=1376 audit_rate_limit=0 audit_backlog_limit=64 [ 283.049977][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 283.057731][ T8872] audit: backlog limit exceeded [ 285.130098][ T45] Bluetooth: hci0: command 0x1003 tx timeout [ 285.130602][ T4332] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 287.901042][ T28] kauditd_printk_skb: 17830 callbacks suppressed [ 287.901060][ T28] audit: type=1400 audit(287.892:534990): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 287.933706][ T28] audit: type=1400 audit(287.892:534991): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 287.960501][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 287.966472][ T292] audit: audit_backlog=65 > audit_backlog_limit=64 [ 287.967309][ T140] audit: audit_lost=1379 audit_rate_limit=0 audit_backlog_limit=64 [ 287.978958][ T292] audit: audit_lost=1380 audit_rate_limit=0 audit_backlog_limit=64 [ 287.991606][ T84] audit: audit_backlog=66 > audit_backlog_limit=64 [ 287.998435][ T84] audit: audit_lost=1381 audit_rate_limit=0 audit_backlog_limit=64 [ 288.006332][ T28] audit: type=1400 audit(287.892:534992): avc: denied { read } for pid=9027 comm="syz.2.3136" name="kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 288.021710][ T290] audit: audit_backlog=65 > audit_backlog_limit=64 [ 292.910275][ T28] kauditd_printk_skb: 17960 callbacks suppressed [ 292.910292][ T28] audit: type=1400 audit(292.902:552948): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 292.910320][ T28] audit: type=1400 audit(292.902:552949): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 292.958526][ T28] audit: type=1400 audit(292.942:552951): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 292.980181][ T28] audit: type=1400 audit(292.942:552950): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 293.001492][ T28] audit: type=1400 audit(292.972:552952): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 293.022773][ T28] audit: type=1400 audit(292.972:552953): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 293.044168][ T28] audit: type=1400 audit(292.972:552954): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 293.070737][ T28] audit: type=1400 audit(293.062:552955): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 293.096863][ T28] audit: type=1400 audit(293.062:552956): avc: denied { read write } for pid=291 comm="syz-executor" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 293.120562][ T28] audit: type=1400 audit(293.062:552957): avc: denied { read write } for pid=294 comm="syz-executor" name="loop2" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 297.920194][ T28] kauditd_printk_skb: 16570 callbacks suppressed [ 297.920212][ T28] audit: type=1400 audit(297.902:569528): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 297.953246][ T28] audit: type=1400 audit(297.902:569529): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 297.975219][ T28] audit: type=1400 audit(297.942:569530): avc: denied { bpf } for pid=9379 comm="syz.4.3265" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 297.997216][ T28] audit: type=1400 audit(297.942:569531): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 298.018925][ T28] audit: type=1400 audit(297.942:569532): avc: denied { execmem } for pid=9379 comm="syz.4.3265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 298.040236][ T28] audit: type=1400 audit(297.942:569533): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 298.062158][ T28] audit: type=1400 audit(297.942:569534): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 298.086818][ T28] audit: type=1400 audit(297.942:569535): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 298.108245][ T28] audit: type=1400 audit(297.942:569536): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 298.128175][ T9388] audit: audit_backlog=65 > audit_backlog_limit=64 [ 302.930118][ T28] kauditd_printk_skb: 20831 callbacks suppressed [ 302.930134][ T28] audit: type=1400 audit(302.922:590367): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 302.956854][ T28] audit: type=1400 audit(302.912:590366): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 302.991546][ T28] audit: type=1400 audit(302.972:590368): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 303.015117][ T28] audit: type=1400 audit(302.972:590369): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 303.036800][ T28] audit: type=1400 audit(302.972:590370): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 303.060256][ T28] audit: type=1400 audit(302.972:590371): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 303.081539][ T28] audit: type=1400 audit(302.972:590372): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 303.103712][ T28] audit: type=1400 audit(302.972:590373): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 303.124223][ T28] audit: type=1400 audit(302.972:590374): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 303.145051][ T28] audit: type=1400 audit(302.972:590375): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 307.940219][ T28] kauditd_printk_skb: 18927 callbacks suppressed [ 307.940236][ T28] audit: type=1400 audit(307.932:609303): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 307.994115][ T28] audit: type=1400 audit(307.932:609304): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 308.006531][ T9723] audit: audit_backlog=65 > audit_backlog_limit=64 [ 308.022159][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 308.022273][ T28] audit: type=1400 audit(307.962:609305): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 308.028477][ T84] audit: audit_lost=1384 audit_rate_limit=0 audit_backlog_limit=64 [ 308.028493][ T84] audit: backlog limit exceeded [ 308.028772][ T9723] audit: audit_lost=1385 audit_rate_limit=0 audit_backlog_limit=64 [ 308.054599][ T293] audit: audit_backlog=65 > audit_backlog_limit=64 [ 308.058592][ T9723] audit: backlog limit exceeded [ 312.952531][ T28] kauditd_printk_skb: 18618 callbacks suppressed [ 312.952548][ T28] audit: type=1400 audit(312.942:627838): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 312.994719][ T28] audit: type=1400 audit(312.942:627839): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 313.017413][ T28] audit: type=1400 audit(312.942:627840): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 313.017452][ T28] audit: type=1400 audit(312.942:627841): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 313.017478][ T28] audit: type=1400 audit(312.942:627842): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 313.017507][ T28] audit: type=1400 audit(312.972:627843): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 313.017534][ T28] audit: type=1400 audit(312.972:627844): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 313.017560][ T28] audit: type=1400 audit(312.972:627845): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 313.017587][ T28] audit: type=1400 audit(312.972:627846): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 313.017613][ T28] audit: type=1400 audit(312.972:627847): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 313.375058][ T9928] xt_CT: No such helper "snmp_trap" [ 317.960079][ T28] kauditd_printk_skb: 19647 callbacks suppressed [ 317.960095][ T28] audit: type=1400 audit(317.942:647495): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 317.990863][ T28] audit: type=1400 audit(317.952:647496): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 318.016770][ T28] audit: type=1400 audit(317.952:647497): avc: denied { read write } for pid=10082 comm="syz.3.3522" name="loop3" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 318.041446][ T28] audit: type=1400 audit(317.952:647498): avc: denied { bpf } for pid=10080 comm="syz.2.3520" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 318.041492][ T28] audit: type=1400 audit(317.952:647499): avc: denied { prog_load } for pid=10080 comm="syz.2.3520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 318.081336][T10083] xt_TCPMSS: Only works on TCP SYN packets [ 318.099222][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 318.104757][ T290] audit: audit_backlog=65 > audit_backlog_limit=64 [ 318.107035][ T140] audit: audit_lost=1415 audit_rate_limit=0 audit_backlog_limit=64 [ 318.122099][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 318.128453][ T84] audit: audit_lost=1416 audit_rate_limit=0 audit_backlog_limit=64 [ 322.971085][ T28] kauditd_printk_skb: 19061 callbacks suppressed [ 322.971101][ T28] audit: type=1400 audit(578.960:666554): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 323.016718][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 323.016730][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 323.016745][ T84] audit: audit_lost=1419 audit_rate_limit=0 audit_backlog_limit=64 [ 323.024313][ T140] audit: audit_lost=1420 audit_rate_limit=0 audit_backlog_limit=64 [ 323.030070][ T84] audit: backlog limit exceeded [ 323.046275][ T28] audit: type=1400 audit(578.960:666555): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 323.050079][ T140] audit: backlog limit exceeded [ 323.076419][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 323.083359][ T84] audit: audit_lost=1421 audit_rate_limit=0 audit_backlog_limit=64 [ 327.982010][ T28] kauditd_printk_skb: 18237 callbacks suppressed [ 327.982026][ T28] audit: type=1400 audit(583.970:684792): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 328.031186][ T28] audit: type=1400 audit(583.970:684793): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 328.058518][T10450] audit: audit_backlog=65 > audit_backlog_limit=64 [ 328.062313][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 328.065111][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 328.074540][ T28] audit: type=1400 audit(584.000:684794): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 328.078255][ T84] audit: audit_lost=1422 audit_rate_limit=0 audit_backlog_limit=64 [ 328.101738][ T140] audit: audit_lost=1423 audit_rate_limit=0 audit_backlog_limit=64 [ 328.113851][ T84] audit: backlog limit exceeded [ 328.119528][T10450] audit: audit_lost=1424 audit_rate_limit=0 audit_backlog_limit=64 [ 332.991075][ T28] kauditd_printk_skb: 15086 callbacks suppressed [ 332.991091][ T28] audit: type=1400 audit(588.980:699873): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 333.020735][ T28] audit: type=1400 audit(588.980:699874): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 333.046270][ T28] audit: type=1400 audit(589.010:699875): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 333.078673][ T28] audit: type=1400 audit(589.010:699876): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 333.082456][T10657] audit: audit_backlog=65 > audit_backlog_limit=64 [ 333.099993][ T28] audit: type=1400 audit(589.010:699877): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 333.127866][T10657] audit: audit_lost=1427 audit_rate_limit=0 audit_backlog_limit=64 [ 333.128236][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 333.136436][ T28] audit: type=1400 audit(589.010:699878): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 333.145317][T10659] audit: audit_backlog=65 > audit_backlog_limit=64 [ 338.000174][ T28] kauditd_printk_skb: 15251 callbacks suppressed [ 338.000191][ T28] audit: type=1400 audit(593.990:715092): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 338.028828][ T28] audit: type=1400 audit(594.010:715093): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 338.082957][ T291] audit: audit_backlog=65 > audit_backlog_limit=64 [ 338.087410][T10870] audit: audit_backlog=65 > audit_backlog_limit=64 [ 338.090186][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 338.096384][ T291] audit: audit_lost=1441 audit_rate_limit=0 audit_backlog_limit=64 [ 338.110078][ T28] audit: type=1400 audit(594.010:715094): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 338.110411][T10870] audit: audit_lost=1442 audit_rate_limit=0 audit_backlog_limit=64 [ 338.140052][ T84] audit: audit_lost=1443 audit_rate_limit=0 audit_backlog_limit=64 [ 338.145900][ T293] audit: audit_backlog=65 > audit_backlog_limit=64 [ 343.011336][ T28] kauditd_printk_skb: 16822 callbacks suppressed [ 343.011353][ T28] audit: type=1400 audit(599.000:731642): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 343.051220][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 343.051220][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 343.051238][ T84] audit: audit_lost=1535 audit_rate_limit=0 audit_backlog_limit=64 [ 343.057565][ T140] audit: audit_lost=1536 audit_rate_limit=0 audit_backlog_limit=64 [ 343.068657][ T84] audit: backlog limit exceeded [ 343.073322][ T294] audit: audit_backlog=65 > audit_backlog_limit=64 [ 343.079865][ T28] audit: type=1400 audit(599.000:731643): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.084501][ T294] audit: audit_lost=1537 audit_rate_limit=0 audit_backlog_limit=64 [ 343.093357][ T28] audit: type=1400 audit(599.020:731644): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 345.635968][T11169] xt_CT: No such helper "snmp_trap" [ 348.021740][ T28] kauditd_printk_skb: 17634 callbacks suppressed [ 348.021759][ T28] audit: type=1400 audit(604.010:749211): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.074875][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 348.074963][ T28] audit: type=1400 audit(604.010:749212): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 348.081751][ T140] audit: audit_lost=1560 audit_rate_limit=0 audit_backlog_limit=64 [ 348.103070][ T28] audit: type=1400 audit(604.010:749213): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.119268][ T140] audit: backlog limit exceeded [ 348.135832][T11261] audit: audit_backlog=65 > audit_backlog_limit=64 [ 348.135853][T11261] audit: audit_lost=1561 audit_rate_limit=0 audit_backlog_limit=64 [ 348.135867][T11261] audit: backlog limit exceeded [ 348.142904][ T28] audit: type=1400 audit(604.010:749214): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 353.030202][ T28] kauditd_printk_skb: 16903 callbacks suppressed [ 353.030219][ T28] audit: type=1400 audit(609.020:766118): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 353.089278][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 353.099605][ T28] audit: type=1400 audit(609.050:766119): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 353.101303][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 353.125956][ T28] audit: type=1400 audit(609.050:766120): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 353.128890][ T140] audit: audit_lost=1562 audit_rate_limit=0 audit_backlog_limit=64 [ 353.156710][ T84] audit: audit_lost=1563 audit_rate_limit=0 audit_backlog_limit=64 [ 353.157842][ T28] audit: type=1400 audit(609.050:766121): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 353.164448][ T84] audit: backlog limit exceeded [ 353.184536][ T140] audit: backlog limit exceeded [ 358.041433][ T28] kauditd_printk_skb: 19334 callbacks suppressed [ 358.041451][ T28] audit: type=1400 audit(614.030:785021): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 358.089854][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 358.104671][ T84] audit: audit_lost=1709 audit_rate_limit=0 audit_backlog_limit=64 [ 358.108928][ T294] audit: audit_backlog=65 > audit_backlog_limit=64 [ 358.115881][ T84] audit: backlog limit exceeded [ 358.118994][ T28] audit: type=1400 audit(614.030:785022): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 358.140109][ T294] audit: audit_lost=1710 audit_rate_limit=0 audit_backlog_limit=64 [ 358.154224][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 358.160665][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 358.168151][ T140] audit: audit_lost=1711 audit_rate_limit=0 audit_backlog_limit=64 [ 363.051718][ T28] kauditd_printk_skb: 17331 callbacks suppressed [ 363.051735][ T28] audit: type=1400 audit(619.040:802152): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 363.083552][ T28] audit: type=1400 audit(619.040:802153): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 363.107945][ T28] audit: type=1400 audit(619.040:802154): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 363.143612][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 363.143612][ T294] audit: audit_lost=1779 audit_rate_limit=0 audit_backlog_limit=64 [ 363.143631][ T294] audit: backlog limit exceeded [ 363.145217][ T28] audit: type=1400 audit(619.040:802155): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 363.152717][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 363.167014][ T291] audit: audit_backlog=65 > audit_backlog_limit=64 [ 363.187087][ T140] audit: audit_lost=1780 audit_rate_limit=0 audit_backlog_limit=64 [ 368.070394][ T28] kauditd_printk_skb: 13117 callbacks suppressed [ 368.070411][ T28] audit: type=1400 audit(624.060:815217): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 368.103216][ T28] audit: type=1400 audit(624.060:815218): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 368.135927][ T140] audit: audit_backlog=66 > audit_backlog_limit=64 [ 368.135938][ T84] audit: audit_backlog=66 > audit_backlog_limit=64 [ 368.135952][ T84] audit: audit_lost=1800 audit_rate_limit=0 audit_backlog_limit=64 [ 368.143449][ T140] audit: audit_lost=1801 audit_rate_limit=0 audit_backlog_limit=64 [ 368.163603][ T84] audit: backlog limit exceeded [ 368.177536][ T28] audit: type=1400 audit(624.090:815219): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 368.199248][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 368.208193][ T84] audit: audit_lost=1802 audit_rate_limit=0 audit_backlog_limit=64 [ 373.086098][ T28] kauditd_printk_skb: 14648 callbacks suppressed [ 373.086116][ T28] audit: type=1400 audit(629.070:829809): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 373.113805][ T28] audit: type=1400 audit(629.070:829810): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 373.137273][ T28] audit: type=1400 audit(629.070:829811): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 373.158013][ T28] audit: type=1400 audit(629.070:829812): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 373.179493][ T28] audit: type=1400 audit(629.070:829813): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 373.200344][ T28] audit: type=1400 audit(629.070:829814): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 373.221864][ T28] audit: type=1400 audit(629.070:829815): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 373.241556][T12118] audit: audit_backlog=65 > audit_backlog_limit=64 [ 373.242308][ T28] audit: type=1400 audit(629.070:829816): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 373.249951][T12118] audit: audit_lost=1822 audit_rate_limit=0 audit_backlog_limit=64 [ 373.529231][T12135] xt_TCPMSS: Only works on TCP SYN packets [ 378.090233][ T28] kauditd_printk_skb: 18363 callbacks suppressed [ 378.090249][ T28] audit: type=1400 audit(634.080:848176): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 378.097941][ T28] audit: type=1400 audit(634.080:848177): avc: denied { bpf } for pid=12288 comm="syz.1.4430" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 378.140436][ T28] audit: type=1400 audit(634.080:848178): avc: denied { prog_load } for pid=12288 comm="syz.1.4430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 378.159269][ T28] audit: type=1400 audit(634.130:848179): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 378.180711][ T28] audit: type=1400 audit(634.130:848180): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 378.201103][ T28] audit: type=1400 audit(634.130:848181): avc: denied { create } for pid=12288 comm="syz.1.4430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 378.220214][ T28] audit: type=1400 audit(634.130:848182): avc: denied { create } for pid=12288 comm="syz.1.4430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 378.239221][ T28] audit: type=1400 audit(634.130:848183): avc: denied { bpf } for pid=12288 comm="syz.1.4430" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 378.259439][ T28] audit: type=1400 audit(634.130:848184): avc: denied { map_create } for pid=12288 comm="syz.1.4430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 378.259473][ T28] audit: type=1400 audit(634.130:848185): avc: denied { bpf } for pid=12288 comm="syz.1.4430" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 383.100076][ T28] kauditd_printk_skb: 21035 callbacks suppressed [ 383.100094][ T28] audit: type=1400 audit(639.080:869221): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 383.127123][ T28] audit: type=1400 audit(639.120:869222): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 383.149220][ T28] audit: type=1400 audit(639.120:869223): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 383.170634][ T28] audit: type=1400 audit(639.160:869224): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 383.212943][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 383.217334][ T291] audit: audit_backlog=65 > audit_backlog_limit=64 [ 383.219394][T12461] audit: audit_backlog=65 > audit_backlog_limit=64 [ 383.227794][T12463] audit: audit_backlog=65 > audit_backlog_limit=64 [ 383.232488][ T84] audit: audit_lost=1824 audit_rate_limit=0 audit_backlog_limit=64 [ 383.238595][ T291] audit: audit_lost=1825 audit_rate_limit=0 audit_backlog_limit=64 Connection to 10.128.1.175 closed by remote host. [ 386.333908][T12596] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1540 sclass=netlink_route_socket pid=12596 comm=syz.4.4556 [ 387.137403][T12634] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4569'. [ 387.156678][T12631] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4569'. [ 387.995524][T12645] device syz_tun left promiscuous mode [ 388.020078][T12645] bridge0: port 3(syz_tun) entered disabled state [ 388.750813][ T367] device bridge_slave_1 left promiscuous mode [ 388.756729][ T367] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.763954][ T367] device bridge_slave_0 left promiscuous mode [ 388.769855][ T367] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.777623][ T367] device veth1_macvtap left promiscuous mode [ 388.783454][ T367] device veth0_vlan left promiscuous mode [ 389.601457][ T367] device bridge_slave_1 left promiscuous mode [ 389.607375][ T367] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.614554][ T367] device bridge_slave_0 left promiscuous mode [ 389.620477][ T367] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.628078][ T367] device bridge_slave_1 left promiscuous mode [ 389.634012][ T367] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.641304][ T367] device bridge_slave_0 left promiscuous mode [ 389.647224][ T367] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.654998][ T367] device bridge_slave_1 left promiscuous mode [ 389.660953][ T367] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.668076][ T367] device bridge_slave_0 left promiscuous mode [ 389.674021][ T367] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.681640][ T367] device bridge_slave_1 left promiscuous mode [ 389.687545][ T367] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.695512][ T367] device bridge_slave_0 left promiscuous mode [ 389.701464][ T367] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.709787][ T367] device veth1_macvtap left promiscuous mode [ 389.715733][ T367] device veth0_vlan left promiscuous mode [ 389.721584][ T367] device veth1_macvtap left promiscuous mode [ 389.727479][ T367] device veth0_vlan left promiscuous mode [ 389.733365][ T367] device veth1_macvtap left promiscuous mode [ 389.739175][ T367] device veth0_vlan left promiscuous mode [ 389.747386][ T367] device veth1_macvtap left promiscuous mode [ 389.753289][ T367] device veth0_vlan left promiscuous mode [ 389.999070][T12673] kvm: exiting hardware virtualization [ 390.005726][T12673] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 390.012337][T12673] ACPI: PM: Preparing to enter system sleep state S5 [ 390.019076][T12673] reboot: Power down serialport: VM disconnected.