last executing test programs: 3m51.33281402s ago: executing program 3 (id=13885): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x73b, 0x80000000}, 0x280, 0x0, 0xfffffffe, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'dh\x00', 0x10, 0x5, 0x2d}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x483, &(0x7f0000000000)={0x6, @local, 0x0, 0x0, 'none\x00', 0x3a, 0x0, 0x7f}, 0x2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000600)) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000280)={0x0, 0x1, 0x6, @broadcast}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) 3m51.13591494s ago: executing program 3 (id=13886): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x2, 0x80805, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='map_files\x00') getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000040)={@rand_addr, @broadcast}, &(0x7f00000002c0)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf38, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x21000e, &(0x7f0000000380), 0xde, 0x529, &(0x7f00000008c0)="$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") creat(0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$sock_SIOCETHTOOL(r3, 0x8923, &(0x7f0000000540)={'bond0\x00', &(0x7f0000000040)=@ethtool_sfeatures}) 3m50.819985909s ago: executing program 3 (id=13888): r0 = open(&(0x7f0000000100)='./bus\x00', 0x101c42, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000cc0)=ANY=[], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f00000001c0)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000000300)='GPL\x00', 0x9, 0x1, &(0x7f0000000340)=""/1, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) io_setup(0xc, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f00000008c0)=[0x0]) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2b0, 0x0, 0x18c, 0x203, 0x4d000000, 0x19030000, 0x460, 0x2e0, 0x2e0, 0x460, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@private, 'veth1_macvtap\x00'}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x310) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_RATE_GET(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x44, &(0x7f0000000140)='..@(%+\x00') 3m50.615958258s ago: executing program 3 (id=13891): setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x4001, 0x8000000, 0x238, 0xf8, 0x720d, 0x148, 0xf8, 0x148, 0x1c8, 0x240, 0x240, 0x1c8, 0x240, 0x7fffffe, 0x0, {[{{@ip={@remote, @empty, 0x0, 0x0, 'wlan1\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = syz_io_uring_complete(0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x43, 0x2, 0x3}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x203, 0x8401) ioctl$USBDEVFS_DROP_PRIVILEGES(r3, 0x4004551e, &(0x7f0000000000)=0xfdfffffd) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) syz_emit_ethernet(0xfffffffffffffd75, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaa2750a245d5cde008004500003000009078000000004500000800009d557500"/62], 0x0) recvmmsg(r0, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0) 3m50.514655948s ago: executing program 3 (id=13893): socket$nl_route(0x10, 0x3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 3m50.380618927s ago: executing program 3 (id=13894): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1e0000000000000005000000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x5}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f00000000000000000a000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001f2, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000031401002cbd7000fcdbdf250900020073797a32000000000800410073697700140033006c6f"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) sendmsg$RDMA_NLDEV_CMD_DELLINK(r3, &(0x7f00000002c0)={0x0, 0x1f, &(0x7f0000000280)={&(0x7f0000000100)={0x18, 0x1404, 0x1, 0x70bd2d, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x671ec167a4b72164}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000002c0)='kfree\x00'}, 0x18) r4 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000640)=ANY=[], 0x0) close_range(r4, 0xffffffffffffffff, 0x0) 3m38.239505806s ago: executing program 2 (id=14048): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$nl_xfrm(0x10, 0x3, 0x6) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', 0xffffffffffffffff, 0x0, 0x7fffffff}, 0x18) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x141081, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vxcan1\x00'}) r2 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8943, &(0x7f0000001980)={'macvtap0\x00', 0x0}) 3m38.153458196s ago: executing program 2 (id=14049): r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'team_slave_0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x4, 0x0, &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x1, 0x7fff0000}]}) flistxattr(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="190000000400000008000000ff"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000000000000, 0x2}}) r4 = io_uring_setup(0x79bf, &(0x7f00000002c0)={0x0, 0x0, 0x2, 0x1, 0x32f}) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x4) close_range(r4, 0xffffffffffffffff, 0x0) 3m38.115431726s ago: executing program 2 (id=14050): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001", @ANYRES32=0x0], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000001600), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r5, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000001640)={0x1c, r6, 0x1, 0xfffffffe}, 0x1c}}, 0x0) 3m36.839997401s ago: executing program 2 (id=14052): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xcc0984f9ead32b32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001900)=@bridge_delneigh={0x1c, 0x1e, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x4}, 0x18) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) close(0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) writev(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x143c62, 0x0) ioctl$sock_SIOCBRDELBR(r4, 0x89a2, &(0x7f0000000200)='bridge0\x00') 3m36.831268051s ago: executing program 2 (id=14053): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="fb00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8912, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) syslog(0x9, 0x0, 0x0) io_uring_setup(0x70f6, &(0x7f0000000940)={0x0, 0x1fff, 0x400, 0x2, 0x8000}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000500)={0xffffffffffffffff}) splice(r3, 0x0, r2, 0x0, 0xffffffffffff8000, 0x0) 3m35.935954808s ago: executing program 2 (id=14062): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x5}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f00000000000000000a000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001f2, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000031401002cbd7000fcdbdf250900020073797a32000000000800410073697700140033006c6f"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) sendmsg$RDMA_NLDEV_CMD_DELLINK(r3, &(0x7f00000002c0)={0x0, 0x1f, &(0x7f0000000280)={&(0x7f0000000100)={0x18, 0x1404, 0x1, 0x70bd2d, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x671ec167a4b72164}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000002c0)='kfree\x00'}, 0x18) r4 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000640)=ANY=[], 0x0) close_range(r4, 0xffffffffffffffff, 0x0) 3m35.316836267s ago: executing program 32 (id=13894): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1e0000000000000005000000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x5}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f00000000000000000a000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001f2, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000031401002cbd7000fcdbdf250900020073797a32000000000800410073697700140033006c6f"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) sendmsg$RDMA_NLDEV_CMD_DELLINK(r3, &(0x7f00000002c0)={0x0, 0x1f, &(0x7f0000000280)={&(0x7f0000000100)={0x18, 0x1404, 0x1, 0x70bd2d, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x671ec167a4b72164}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000002c0)='kfree\x00'}, 0x18) r4 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000640)=ANY=[], 0x0) close_range(r4, 0xffffffffffffffff, 0x0) 3m20.857894338s ago: executing program 33 (id=14062): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x5}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f00000000000000000a000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001f2, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000031401002cbd7000fcdbdf250900020073797a32000000000800410073697700140033006c6f"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) sendmsg$RDMA_NLDEV_CMD_DELLINK(r3, &(0x7f00000002c0)={0x0, 0x1f, &(0x7f0000000280)={&(0x7f0000000100)={0x18, 0x1404, 0x1, 0x70bd2d, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x671ec167a4b72164}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000002c0)='kfree\x00'}, 0x18) r4 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000640)=ANY=[], 0x0) close_range(r4, 0xffffffffffffffff, 0x0) 16.763875267s ago: executing program 4 (id=18422): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0xffff, 0x0, 0x0, 0xfffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000400000014000500fc01000000000000000000000000000008000200050000000a0006"], 0x4c}}, 0x0) 16.725729177s ago: executing program 4 (id=18425): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) rt_sigqueueinfo(0x0, 0x8, 0x0) 16.690273277s ago: executing program 4 (id=18429): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000400)='./file1\x00', 0x200000, &(0x7f0000000780)={[{@jqfmt_vfsv1}, {@min_batch_time={'min_batch_time', 0x3d, 0xc0}}, {@noblock_validity}, {@noauto_da_alloc}, {@i_version}, {@errors_remount}, {@resgid}, {@grpquota}, {@sysvgroups}]}, 0xfd, 0x580, &(0x7f00000016c0)="$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") chdir(0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) 16.632345877s ago: executing program 4 (id=18435): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f00000005c0)={[{@noblock_validity}, {}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x3, 0x56a, &(0x7f00000015c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000003c0)='./bus\x00', 0x0) renameat2(r0, &(0x7f0000000300)='./bus\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x4) 16.599275096s ago: executing program 4 (id=18439): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) time(0x0) 16.058405935s ago: executing program 4 (id=18478): bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000008850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) getpgrp(0x0) 16.011510975s ago: executing program 34 (id=18478): bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000008850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) getpgrp(0x0) 8.127615688s ago: executing program 0 (id=18517): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x530, 0x348, 0x18c, 0x203, 0x348, 0x19030000, 0x460, 0x2e0, 0x2e0, 0x460, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x300, 0x348, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x16}]}}, @common=@hl={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) 8.127242858s ago: executing program 1 (id=18518): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0xa, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x400, &(0x7f0000000000)={[{@shortname_winnt}, {@utf8no}, {@fat=@check_strict}, {@fat=@discard}, {@utf8}, {@fat=@nfs}, {@shortname_win95}, {@shortname_lower}, {@utf8}]}, 0xfd, 0x2a0, &(0x7f0000000540)="$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") openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc4042, 0x1ff) 8.126865098s ago: executing program 6 (id=18519): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7}, 0x1100, 0x4, 0x3, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000001280), 0x6) 8.126629148s ago: executing program 5 (id=18520): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000002305e20000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0xfe80, &(0x7f00000005c0)=[{&(0x7f0000000940)="2e00000010008188e6b62aa73772cc9f1ba1f8482e0000005e140602000000000e000a001000000002800000128c", 0x2e}], 0x1}, 0x0) 6.721118993s ago: executing program 0 (id=18521): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000000c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$UHID_CREATE2(r1, 0x0, 0x1b) 6.720320183s ago: executing program 1 (id=18522): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000e0000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000d40000000000000000000000000a20000000000a03000000000000000000010000000900010073797a3000000000bc000000160a01000000000000000000010000000900010073797a30000000000900020073797a3000000000900003"], 0x4b0}, 0x1, 0x0, 0x0, 0x44}, 0x0) 6.719960803s ago: executing program 6 (id=18523): r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x2, {0x2, 0x3, 0x3}}, 0x80, 0x0}, 0x24044004) r1 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x140f, 0x1, 0x70bd25, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x9, 0x45, 'issm\x00'}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x9, 0x45, 'issm\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x40) 6.719673903s ago: executing program 5 (id=18524): r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup(r0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40603d10, &(0x7f0000000040)) 5.214850858s ago: executing program 0 (id=18525): r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000400)={0x18, 0x0, {0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000001f00)) sendmmsg$sock(r0, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="8e", 0x1}], 0x1}}], 0x1, 0x80) 5.214484758s ago: executing program 1 (id=18526): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f0000000a80)=ANY=[@ANYBLOB="180000000000002000000000ff000000850000000f000000850000000500000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r1}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="380000005400e500000000000000000007"], 0x38}}, 0x0) 5.207787928s ago: executing program 6 (id=18527): syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x35d, &(0x7f0000000f00)="$eJzs3c1rO0UYwPEnaZImKW1yEEVBOtiLXpY2ehaDtCAELG0jtoKwbTcasiYlG6oRse3Jq3j3JHgovVnwUND+A71404sI3noRPNiDurJvyeatLzFpfr/2+4GSycw8u7OZSXk27WYv3/3yo0rJ0kp6Q6JJJRERkSuRrEQlEPEfo245IWGH8srMnz+/uL5ZTHoVaiW/8WpOKTU3/8PHn6X8bmfTcpF9//KP3O8Xz148f/nvxodlS5UtVa01lK62a7829G3TULtlq6IptWoaumWoctUy6l77d/52zNreXlPp1d3Z9F7dsCylV5uqYjRVo6Ya9abSP9DLVaVpmppNC25SPF5b0/NDBu+MeDAYk3o9r0+JSKqnpXg8kQEBAICJ6s7/o05KP0z+vyVzhcLymnI6t/P/k5fOGzPvnM75+f9Zol/+/9ov3rY68n/ndKKd/9e884PSzfn/13KH/L83I3pchs7/s2MYDIYzn+ipinQ8c/L/tP/+dR29d7LoFsj/AQAAAAAAAAAAAAAAAAAAAAB4GlzZdsa27UzwGPy0LyHwn+NBGjT/0yKSdGbfZv4fsvXNLUm6F+45c2x+sV/cL3qPfodzETHF+Mfu5qyN4Moj5cjKj+aBH3+wX5xyW/IlKTvxsiQZybrrKRRv2ytvFZaXlMePb12mlA7H5yQjz4Tjv3dXpxOf64z395+QlxdC8Zpk5KcdqYkpu25ke/+fLyn15tuFrviU209Efrv3SQEAAAAAYMQ01dL3/F3TBrV73zKSL7kfExmyKBn5u//5/WLf8/NY5oXYpI8eAAAAAIDHwWp+WtElatTdgmn2K6RkYNMICrGOmriI9O2c6KqJX7flqdAR3nY8CfHuYPJ/j+ub4FW9S1TwjxTOwFtN/h1VZLjxBMfv1kRiw09T5FDcBXAYborKLcJj3YOfdypU384LA7dz5B9Iqyb42Cgx4HWW1d7tRK9ZCfGeGjsy3AJ47qtv/xrdG+T1U38FfHJz5yPTsA/kNpPSVXB20dsUH/svHgAAAAD3rp30BzVvhJvDNxIJ3yyHv9wDAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBCY/lKv67CpI8RAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeFL8FwAA//8GuPOT") mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001a80)=""/4096, 0x1000) 5.207556108s ago: executing program 5 (id=18528): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x1, @none, 0x0, 0x1}, 0xe) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x1, @any, 0x0, 0x1}, 0xe) 3.601935122s ago: executing program 0 (id=18529): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000023ed0000180100002820702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) mknod$loop(&(0x7f0000000140)='./file0\x00', 0xfff, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff) 3.601569883s ago: executing program 1 (id=18530): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x10, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000032500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000850000000f000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) mremap(&(0x7f0000ceb000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 3.601078022s ago: executing program 6 (id=18531): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x764922f6ef795283}, 0x8, 0x0, 0x9, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x20) msgrcv(r0, 0x0, 0x2c, 0x3, 0x3000) msgctl$IPC_RMID(r0, 0x0) 3.600786373s ago: executing program 5 (id=18532): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0xc, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x0, &(0x7f0000000ac0)="c21e729275995250167bd449636b", 0x0, 0xa65, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.875890077s ago: executing program 0 (id=18533): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5393, &(0x7f0000000000)) 1.875473177s ago: executing program 1 (id=18534): r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x3}, 0x8) sendto$inet6(r0, &(0x7f0000000040)="aa", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) shutdown(r0, 0x1) 1.875136087s ago: executing program 6 (id=18535): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0xfdef, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xfde1, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0xfdcd, 0x0, @wg=@data}}}}}, 0x0) 1.874830227s ago: executing program 5 (id=18536): syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000680)='./file1\x00', 0x1018ed8, &(0x7f00000005c0)={[{@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@nodiscard}, {@nodelalloc}, {@usrquota}, {@nolazytime}, {@noblock_validity}, {@block_validity}, {@barrier}]}, 0x6, 0x647, &(0x7f0000002740)="$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") bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0xc0185879, &(0x7f0000000680)={0x0, 0x1000, 0x2000, 0x0, 0x0, 0x0, 0x2401}) 49.725521ms ago: executing program 0 (id=18537): syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x414, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2a1, &(0x7f0000000f40)="$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") syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaa"], 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) 44.484371ms ago: executing program 1 (id=18538): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3b, 0x1, 0x0, 0x0, 0x0, 0x89, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x2, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0xf5, 0x0, 0x102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/mdstat\x00', 0x0, 0x0) r1 = epoll_create(0xfff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x90000014}) 44.161841ms ago: executing program 6 (id=18539): move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x100100, 0x100, 0x3, 0x0, 0x0, 0x8, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000280)={[{@journal_path={'journal_path', 0x3d, './file0'}}, {}]}, 0x6, 0x4eb, &(0x7f0000000a40)="$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") 0s ago: executing program 5 (id=18540): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) setgroups(0x0, 0x0) kernel console output (not intermixed with test programs): 0000 [ 956.286921][ [ 956.474607][ T29] audit: type=1326 audit(1185.510:118966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15357 comm="syz.5.15828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f989a29cce7 code=0x7ffc0000 T29] audit: ty[ 956.499165][ T29] audit: type=1326 audit(1185.510:118967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15357 comm="syz.5.15828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f989a241f29 code=0x7ffc0000 pe=1326 audit(11[ 956.503879][T15384] »»»»»» speed is unknown, defaulting to 1000 85.426:118960): [ 956.523455][ T29] audit: type=1326 audit(1185.510:118968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15357 comm="syz.5.15828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f989a2a5d29 code=0x7ffc0000 auid=4294967295 [ 956.523542][ T29] audit: type=1400 audit(1185.528:118969): avc: denied { create } for pid=15386 comm="syz.1.15841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15357 comm="syz.5.15828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 Jan 1 00:19:45 syzkaller kern.notice kernel: [ 956.316369][ T29] audit: type=1326 audit(1185.426:118961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15357 comm="syz.5.15828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 Jan 1 00:19:45 syzkaller kern.notice kernel: [ 956.340142][ T29] audit: type=1326 audit(1185.426:118962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15357 comm="syz.5.15828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat= Jan 1 00:19:45 syzkaller kern.notice kernel: [ 956.401353][ T29] audit: type=1326 audit(1185.510:118963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15357 comm="syz.5.15828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 Jan 1 00:19:45 syzkaller kern.notice kernel: [ 956.425645][ T29] audit: type=1326 audit(1185.510:118964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15357 comm="syz.5.15828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 Jan 1 00:19:45 syzkaller kern.notice kernel: [ 956.450068][ T29] audit: type=1326 audit(1185.510:118965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15357 comm="syz.5.15828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat= Jan 1 00:19:45 syzkaller kern.notice kernel: [ 956.474607][ T29] audit: type=1326 audit(1185.510:118966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15357 comm="syz.5.15828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 Jan 1 00:19:45 syzkaller kern.notice kernel: [ 956.499165][ T29] audit: type=1326 audit(1185.510:118967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15357 comm="syz.5.15828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 Jan 1 00:19:45 syzkaller kern.warn kernel: [ 956.503879][T15384] »»»»»» speed is unknown, defaulting to 1000 Jan 1 00:19:45 syzkaller kern.notice kernel: [ 956.523455][ T29] audit: type=1326 audit(1185.510:118968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15357 comm="syz.5.15828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat= Jan 1 00:19:45 syzkaller kern.notice kernel: [ 956.523542][ T29] audit: type=1400 audit(1185.528:118969): avc: denied { create } for pid=15386 comm="syz.1.15841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive= [ 956.898968][T15410] lo speed is unknown, defaulting to 1000 [ 956.905073][T15410] »»»»»» speed is unknown, defaulting to 1000 Jan 1 00:19:46 syzkaller kern.warn kernel: [ 956.898968][T15410] lo speed is unknown, defaulting to 1000 Jan 1 00:19:46 syzkaller kern.warn kernel: [ 956.905073][T15410] »»»»»» speed is unknown, defaulting to 1000 [ 956.981166][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 956.988133][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 00:19:46 syzkaller kern.err kernel: [ 956.981166][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 00:19:46 syzkaller kern.err kernel: [ 956.988133][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 957.174169][T15410] »»»»»» speed is unknown, defaulting to 1000 Jan 1 00:19:46 syzkaller kern.warn kernel: [ 957.174169][T15410] »»»»»» speed is unknown, defaulting to 1000 [ 957.443956][T15441] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 00:19:46 syzkaller kern.info kernel: [ 957.443956][T15441] xt_TPROXY: Can be used only with -p tcp or -p udp [ 958.093019][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 958.099976][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 00:19:47 syzkaller kern.err kernel: [ 958.093019][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 00:19:47 syzkaller kern.err kernel: [ 958.099976][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 959.215466][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 959.222465][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 00:19:48 syzkaller kern.err kernel: [ 959.215466][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 00:19:48 syzkaller kern.err kernel: [ 959.222465][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 959.280133][T15468] syz.6.15873: attempt to access beyond end of device [ 959.280133][T15468] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 Jan 1 00:19:48 syzkaller kern.info kernel: [ 959.280133][T15468] syz.6.15873: attempt to access beyond end of device Jan 1 00:19:48 syzkaller kern.info kernel: [ 959.280133][T15468] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 959.607938][T15473] lo speed is unknown, defaulting to 1000 Jan 1 00:19:48 syzkaller kern.warn kernel: [ 959.607938][T15473] lo speed is unknown, defaulting to 1000 [ 959.646469][T15473] »»»»»» speed is unknown, defaulting to 1000 Jan 1 00:19:48 syzkaller kern.warn kernel: [ 959.646469][T15473] »»»»»» speed is unknown, defaulting to 1000 [ 959.925243][T15473] »»»»»» speed is unknown, defaulting to 1000 Jan 1 00:19:48 syzkaller kern.warn kernel: [ 959.925243][T15473] »»»»»» speed is unknown, defaulting to 1000 [ 960.316709][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 960.323709][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 00:19:49 syzkaller kern.err kernel: [ 960.323709][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 961.439139][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 961.446112][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 00:19:50 syzkaller kern.err kernel: [ 961.439139][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 00:19:50 syzkaller kern.err kernel: [ 961.446112][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 961.486711][T15506] lo speed is unknown, defaulting to 1000 [ 961.505402][T15506] »»»»»» speed is unknown, defaulting to 1000 Jan 1 00:19:50 syzkaller kern.warn kernel: [ 961.486711][T15506] lo speed is unknown, defaulting to 1000 Jan 1 00:19:50 syzkaller kern.warn kernel: [ 961.505402][T15506] »»»»»» speed is unknown, defaulting to 1000 [ 961.681226][ T29] kauditd_printk_skb: 699 callbacks suppressed [ 961.681319][ T29] audit: type=1400 audit(1190.477:119669): avc: denied { create } for pid=15501 comm="syz.1.15883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 961.706953][ T29] audit: type=1400 audit(1190.477:119670): avc: denied { map_create } for pid=15501 comm="syz.1.15883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 961.725911][ T29] audit: type=1400 audit(1190.477:119671): avc: denied { prog_load } for pid=15501 comm="syz.1.15883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 961.744841][ T29] audit: type=1400 audit(1190.477:119672): avc: denied { prog_load } for pid=15501 comm="syz.1.15883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 00:19:50 syzkaller kern.warn kernel: [ 961.681226][ T29] kauditd_printk_skb: 699 callbacks suppressed Jan 1 00:19:50 syzkaller kern.notice kernel: [ 961.681319][ T29] audit: type=1400 audit(1190.477:119669): avc: denied { create } for pid=15501 comm="syz.1.15883" scontext=root:sysadm_r[ 961.801384][T15506] »»»»»» speed is unknown, defaulting to 1000 :sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Jan 1 00:19:50 syzkaller kern.notice kernel: [ 961.706953][ T29] audit: type=1400 audit(1190.477:119670): avc: denied { map_create } for pid=15501 comm="syz.1.15883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 00:19:50 syzkaller kern.notice kernel: [ 961.725911][ T29] audit: type=1400 audit(1190.477:119671): avc: denied { [ 961.847760][ T29] audit: type=1400 audit(1190.561:119673): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 prog_load } for [ 961.869853][ T29] audit: type=1400 audit(1190.561:119674): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 pid=15501 comm=[ 961.892787][ T29] audit: type=1400 audit(1190.561:119675): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 "syz.1.15883" sc[ 961.915741][ T29] audit: type=1400 audit(1190.561:119676): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ontext=root:sysa[ 961.938688][ T29] audit: type=1400 audit(1190.561:119677): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 dm_r:sysadm_t tc[ 961.961701][ T29] audit: type=1400 audit(1190.608:119678): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 00:19:50 syzkaller kern.notice kernel: [ 961.744841][ T29] audit: type=1400 audit(1190.477:119672): avc: denied { prog_load } for pid=15501 comm="syz.1.15883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 00:19:50 syzkaller kern.warn kernel: [ 961.801384][T15506] »»»»»» speed is unknown, defaulting to 1000 Jan 1 00:19:50 syzkaller kern.info kernel: } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:19:50 syzkaller kern.notice kernel: [ 961.869853][ T29] audit: type=1400 audit(1190.561:119674): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 00:19:50 syzkaller kern.notice kernel: [ 961.892787][ T29] audit: type=1400 audit(1190.561:119675): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 00:19:50 syzkaller kern.notice kernel: [ 961.915741][ T29] audit: type=1400 audit(1190.561:119676): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 00:19:50 syzkaller kern.notice kernel: [ 961.938688][ T29] audit: type=1400 audit(1190.561:119677): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 00:19:50 syzkaller kern.notice kernel: [ 961.961701][ T29] audit: type=1400 audit(1190.608:119678): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ [ 962.340107][T15521] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 00:19:51 syzkaller kern.info kernel: [ 962.340107][T15521] xt_TPROXY: Can be used only with -p tcp or -p udp [ 962.551038][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 962.558099][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 00:19:51 syzkaller kern.err kernel: [ 962.551038][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 00:19:51 syzkaller kern.err kernel: [ 962.558099][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 962.841918][T15551] lo speed is unknown, defaulting to 1000 [ 962.848194][T15551] »»»»»» speed is unknown, defaulting to 1000 Jan 1 00:19:51 syzkaller kern.warn kernel: [ 962.841918][T15551] lo speed is unknown, defaulting to 1000 Jan 1 00:19:51 syzkaller kern.warn kernel: [ 962.848194][T15551] »»»»»» speed is unknown, defaulting to 1000 [ 963.043998][T15551] »»»»»» speed is unknown, defaulting to 1000 Jan 1 00:19:51 syzkaller kern.warn kernel: [ 963.043998][T15551] »»»»»» speed is unknown, defaulting to 1000 [ 963.626319][T15696] xt_TPROXY: Can be used only with -p tcp or -p udp [ 963.652058][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 963.659035][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 00:19:52 syzkaller kern.err kernel: [ 963.652058][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 00:19:52 syzkaller kern.err kernel: [ 963.659035][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 963.821132][T15715] lo speed is unknown, defaulting to 1000 [ 963.835253][T15715] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:07 syzkaller kern.warn kernel: [ 963.821132][T15715] lo speed is unknown, defaulting to 1000 Jan 1 01:28:07 syzkaller kern.warn kernel: [ 963.835253][T15715] »»»»»» speed is unknown, defaulting to 1000 [ 964.007472][T15715] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:07 syzkaller kern.warn kernel: [ 964.007472][T15715] »»»»»» speed is unknown, defaulting to 1000 [ 964.093177][T15728] xt_TPROXY: Can be used only with -p tcp or -p udp [ 964.198776][T15741] lo speed is unknown, defaulting to 1000 [ 964.205934][T15741] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:07 syzkaller kern.warn kernel: [ 964.198776][T15741] lo speed is unknown, defaulting to 1000 Jan 1 01:28:07 syzkaller kern.warn kernel: [ 964.205934][T15741] »»»»»» speed is unknown, defaulting to 1000 [ 964.307942][T15741] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:07 syzkaller kern.warn kernel: [ 964.307942][T15741] »»»»»» speed is unknown, defaulting to 1000 [ 964.774653][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 964.781757][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:08 syzkaller kern.err kernel: [ 964.774653][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:08 syzkaller kern.err kernel: [ 964.781757][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 965.343126][T15777] lo speed is unknown, defaulting to 1000 [ 965.349302][T15777] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:08 syzkaller kern.warn kernel: [ 965.343126][T15777] lo speed is unknown, defaulting to 1000 Jan 1 01:28:08 syzkaller kern.warn kernel: [ 965.349302][T15777] »»»»»» speed is unknown, defaulting to 1000 [ 965.472101][T15777] »»»»»» speed is unknown, defaulting to 1000 [ 965.543950][T15785] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15960'. Jan 1 01:28:09 syzkaller kern.warn kernel: [ 965.543950][T15785] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15960'. [ 965.629390][T15792] veth0_to_team: entered promiscuous mode [ 965.635158][T15792] veth0_to_team: entered allmulticast mode Jan 1 01:28:09 syzkaller kern.info kernel: [ 965.629390][T15792] veth0_to_team: entered promiscuous mode Jan 1 01:28:09 syzkaller kern.info kernel: [ 965.635158][T15792] veth0_to_team: entered allmulticast mode [ 965.875741][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 965.882721][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:09 syzkaller kern.err kernel: [ 965.875741][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:09 syzkaller kern.err kernel: [ 965.882721][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 966.109798][T15808] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:09 syzkaller kern.info kernel: [ 966.109798][T15808] xt_TPROXY: Can be used only with -p tcp or -p udp [ 966.164893][T15812] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:09 syzkaller kern.info kernel: [ 966.164893][T15812] xt_TPROXY: Can be used only with -p tcp or -p udp [ 966.482695][T15832] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' Jan 1 01:28:09 syzkaller kern.info kernel: [ 966.482695][T15832] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 966.987611][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 966.994585][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:10 syzkaller kern.err kernel: [ 966.987611][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:10 syzkaller kern.err kernel: [ 966.994585][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 967.043149][T15842] xt_TPROXY: Can be used only with -p tcp or -p udp [ 967.047360][ T29] kauditd_printk_skb: 1488 callbacks suppressed [ 967.047375][ T29] audit: type=1400 audit(5290.485:121167): avc: denied { prog_load } for pid=15838 comm="syz.0.15978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 967.075526][ T29] audit: type=1326 audit(5290.485:121168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15839 comm="syz.5.15980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f989a2a5d29 code=0x7ffc0000 [ 967.098766][ T29] audit: type=1400 audit(5290.485:121169): avc: denied { prog_load } for pid=15838 comm="syz.0.15978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:10 [ 967.118317][ T29] audit: type=1326 audit(5290.485:121170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15839 comm="syz.5.15980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f989a2a5d29 code=0x7ffc0000 syzkaller kern.i[ 967.142412][ T29] audit: type=1326 audit(5290.485:121171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15838 comm="syz.0.15978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3d8d295d29 code=0x7ffc0000 nfo kernel: [ 9[ 967.167743][ T29] audit: type=1326 audit(5290.485:121172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15838 comm="syz.0.15978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3d8d295d29 code=0x7ffc0000 67.043149][T1584[ 967.192075][ T29] audit: type=1326 audit(5290.494:121173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15838 comm="syz.0.15978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f3d8d295d29 code=0x7ffc0000 2] xt_TPROXY: Ca[ 967.216044][ T29] audit: type=1400 audit(5290.494:121174): avc: denied { prog_load } for pid=15837 comm="syz.6.15979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 n be used only with -p tcp or -p[ 967.236937][ T29] audit: type=1326 audit(5290.494:121175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15838 comm="syz.0.15978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3d8d295d29 code=0x7ffc0000 udp Jan 1 01:[ 967.236973][ T29] audit: type=1400 audit(5290.494:121176): avc: denied { mounton } for pid=15837 comm="syz.6.15979" path="/366/file0" dev="tmpfs" ino=1982 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 28:10 syzkaller kern.warn kernel: [ 967.047360][ T29] kauditd_printk_skb: 1488 callbacks suppressed Jan 1 01:28:10 syzkaller kern.notice kernel: [ 967.047375][ T29] audit: type=1400 audit(5290.485:121167): avc: denied { prog_load } for pid=15838 comm="syz.0.15978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:10 syzkaller kern.notice kernel: [ 967.075526][ T29] audit: type=1326 audit(5290.485:121168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15839 comm="syz.5.15980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat= Jan 1 01:28:10 syzkaller kern.notice kernel: [ 967.098766][ T29] audit: type=1400 audit(5290.485:121169): avc: denied { prog_load } for pid=15838 comm="syz.0.15978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:10 syzkaller kern.notice kernel: [ 967.118317][ T29] audit: type=1326 audit(5290.485:121170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15839 comm="syz.5.15980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat= Jan 1 01:28:10 syzkaller kern.notice kernel: [ 967.142412][ T29] audit: type=1326 audit(5290.485:121171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15838 comm="syz.0.15978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat= Jan 1 01:28:10 syzkaller kern.notice kernel: [ 967.167743][ T29] audit: type=1326 audit(5290.485:121172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15838 comm="syz.0.15978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat= Jan 1 01:28:10 syzkaller kern.notice kernel: [ 967.192075][ T29] audit: type=1326 audit(5290.494:121173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15838 comm="syz.0.15978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat= Jan 1 01:28:10 syzkaller kern.notice kernel: [ 967.216044][ T29] audit: type=1400 audit(5290.494:121174): avc: denied { prog_load } for pid=15837 comm="syz.6.15979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:10 syzka[ 967.484714][T15865] veth0_to_team: entered promiscuous mode ller kern.notice[ 967.490570][T15865] veth0_to_team: entered allmulticast mode kernel: [ 967.236937][ T29] audit: type=1326 audit(5290.494:121175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15838 comm="syz.0.15978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat= Jan 1 01:28:10 syzkaller kern.notice kernel: [ 967.236973][ T29] audit: type=1400 audit(5290.494:121176): avc: denied { mounton } for pid=15837 comm="syz.6.15979" path="/366/file0" dev="tmpfs" ino=1982 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs Jan 1 01:28:10 syzkaller kern.info kernel: [ 967.484714][T15865] veth0_to_team: entered promiscuous mode Jan 1 01:28:10 syzkaller kern.info kernel: [ 967.490570][T15865] veth0_to_team: entered allmulticast mode [ 967.959824][T15892] lo speed is unknown, defaulting to 1000 Jan 1 01:28:11 syzkaller kern.warn kernel: [ 967.959824][T15892] lo speed is unknown, defaulting to 1000 [ 967.980216][T15892] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:11 syzkaller kern.warn kernel: [ 967.980216][T15892] »»»»»» speed is unknown, defaulting to 1000 [ 968.110029][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 968.117038][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:11 syzkaller kern.err kernel: [ 968.110029][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:11 syzkaller kern.err kernel: [ 968.117038][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 968.276763][T15892] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:11 syzkaller kern.warn kernel: [ 968.276763][T15892] »»»»»» speed is unknown, defaulting to 1000 [ 969.134865][T15939] lo speed is unknown, defaulting to 1000 [ 969.142472][T15939] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:12 syzkaller kern.warn kernel: [ 969.134865][T15939] lo speed is unknown, defaulting to 1000 Jan 1 01:28:12 syzkaller kern.warn kernel: [ 969.142472][T15939] »»»»»» speed is unknown, defaulting to 1000 [ 969.211316][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 969.218329][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:12 syzkaller kern.err kernel: [ 969.211316][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:12 syzkaller kern.err kernel: [ 969.218329][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 969.270050][T15946] lo speed is unknown, defaulting to 1000 [ 969.278494][T15946] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:12 syzkaller kern.warn kernel: [ 969.270050][T1594[ 969.296320][T15939] »»»»»» speed is unknown, defaulting to 1000 6] lo speed is unknown, defaulting to 1000 Jan 1 01:28:12 syzkaller kern.warn kernel: [ 969.278494][T15946] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:12 syzkaller kern.warn kernel: [ 969.296320][T15939] »»»»»» speed is unknown, defaulting to 1000 [ 969.407091][T15946] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:12 syzkaller kern.warn kernel: [ 969.407091][T15946] »»»»»» speed is unknown, defaulting to 1000 [ 969.485815][T15960] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:12 syzkaller kern.info kernel: [ 969.485815][T15960] xt_TPROXY: Can be used only with -p tcp or -p udp [ 969.708333][T15971] lo speed is unknown, defaulting to 1000 [ 969.714645][T15971] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:13 syzkaller kern.warn kernel: [ 969.708333][T15971] lo speed is unknown, defaulting to 1000 Jan 1 01:28:13 syzkaller kern.warn kernel: [ 969.714645][T15971] »»»»»» speed is unknown, defaulting to 1000 [ 969.794332][T15971] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:13 syzkaller kern.warn kernel: [ 969.794332][T15971] »»»»»» speed is unknown, defaulting to 1000 [ 969.854068][T15974] lo speed is unknown, defaulting to 1000 [ 969.860097][T15974] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:13 syzkaller kern.warn kernel: [ 969.854068][T15974] lo speed is unknown, defaulting to 1000 Jan 1 01:28:13 syzkaller kern.warn kernel: [ 969.860097][T15974] »»»»»» speed is unknown, defaulting to 1000 [ 969.941559][T15974] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:13 syzkaller kern.warn kernel: [ 969.941559][T15974] »»»»»» speed is unknown, defaulting to 1000 [ 970.270034][T15989] lo speed is unknown, defaulting to 1000 [ 970.277455][T15989] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:13 syzkaller kern.warn kernel: [ 970.270034][T15989] lo speed is unknown, defaulting to 1000 Jan 1 01:28:13 syzkaller kern.warn kernel: [ 970.277455][T15989] »»»»»» speed is unknown, defaulting to 1000 [ 970.323001][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 970.329958][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:13 syzkaller kern.err kernel: [ 970.323001][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:13 syzkaller kern.err kernel: [ 970.329958][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 970.390474][T15989] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:13 syzkaller kern.warn kernel: [ 970.390474][T15989] »»»»»» speed is unknown, defaulting to 1000 [ 970.439824][T16001] lo speed is unknown, defaulting to 1000 [ 970.449182][T16001] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:13 syzkaller kern.warn kernel: [ 970.439824][T16001] lo speed is unknown, defaulting to 1000 Jan 1 01:28:13 syzkaller kern.warn kernel: [ 970.449182][T16001] »»»»»» speed is unknown, defaulting to 1000 [ 970.548533][T16001] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:13 syzkaller kern.warn kernel: [ 970.548533][T16001] »»»»»» speed is unknown, defaulting to 1000 [ 970.580523][ T1960] page_pool_release_retry() stalled pool shutdown: id 82, 49 inflight 484 sec Jan 1 01:28:13 syzkaller kern.warn kernel: [ 970.580523][ T1960] page_pool_release_retry() stalled pool shutdown: id 82, 49 inflight 484 sec [ 971.109611][T16038] netlink: 'syz.0.16059': attribute type 29 has an invalid length. Jan 1 01:28:14 syzkaller kern.warn kernel: [ 971.109611][T16038] netlink: 'syz.0.16059': attribute type 29 has an invalid length. [ 971.369999][T16055] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16055 comm=syz.0.16066 Jan 1 01:28:14 syzkaller kern.warn kernel: [ 971.369999][T16055] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16055 comm=syz.0.16066 [ 971.445582][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 971.452533][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:14 syzkaller kern.err kernel: [ 971.445582][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:14 syzkaller kern.err kernel: [ 971.452533][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 971.557724][T16072] lo speed is unknown, defaulting to 1000 [ 971.563954][T16072] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:14 syzkaller kern.warn kernel: [ 971.557724][T16072] lo speed is unknown, defaulting to 1000 Jan 1 01:28:14 syzkaller kern.warn kernel: [ 971.563954][T16072] »»»»»» speed is unknown, defaulting to 1000 [ 971.617182][T16076] netlink: 8 bytes leftover after parsing attributes in process `syz.4.16076'. Jan 1 01:28:14 syzkaller kern.warn kernel: [ 971.617182][T16076] netlink: 8 bytes leftover after parsing attributes in process `syz.4.16076'. [ 971.664709][T16072] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:14 syzkaller kern.warn kernel: [ 971.664709][T16072] »»»»»» speed is unknown, defaulting to 1000 [ 971.770436][T16083] lo speed is unknown, defaulting to 1000 [ 971.776515][T16083] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:14 syzkaller kern.warn kernel: [ 971.770436][T16083] lo speed is unknown, defaulting to 1000 Jan 1 01:28:14 syzkaller kern.warn kernel: [ 971.776515][T16083] »»»»»» speed is unknown, defaulting to 1000 [ 971.880985][T16083] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:15 syzkaller kern.warn kernel: [ 971.880985][T16083] »»»»»» speed is unknown, defaulting to 1000 [ 971.986260][T16112] lo speed is unknown, defaulting to 1000 [ 971.992762][T16112] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:15 syzkaller kern.warn kernel: [ 971.986260][T16112] lo speed is unknown, defaulting to 1000 Jan 1 01:28:15 syzkaller kern.warn kernel: [ 971.992762][T16112] »»»»»» speed is unknown, defaulting to 1000 [ 972.075023][T16112] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:15 syzkaller kern.warn kernel: [ 972.075023][T16112] »»»»»» speed is unknown, defaulting to 1000 [ 972.179747][T16118] lo speed is unknown, defaulting to 1000 Jan 1 01:28:15 [ 972.194329][T16118] »»»»»» speed is unknown, defaulting to 1000 syzkaller kern.w[ 972.200101][T16120] lo speed is unknown, defaulting to 1000 arn kernel: [ 972.179747][T16118] lo speed is unknown, defaulting to 1000 Jan 1 01:28:15 syzkaller kern.warn kernel: [ 972.194329][T16118] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:15 syzkaller kern.warn kernel: [ 972.200101][T16120] lo speed is unknown, defaulting to 1000 [ 972.240718][T16120] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:15 syzkaller kern.warn kernel: [ 972.240718][T16120] »»»»»» speed is unknown, defaulting to 1000 [ 972.365066][T16118] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:15 syzkaller kern.warn kernel: [ 972.365066][T16118] »»»»»» speed is unknown, defaulting to 1000 [ 972.401572][T16120] »»»»»» speed is unknown, defaulting to 1000 [ 972.402866][ T29] kauditd_printk_skb: 1965 callbacks suppressed [ 972.402882][ T29] audit: type=1326 audit(5295.508:123082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16067 comm="syz.0.16072" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3d8d295d29 code=0x7fc00000 Jan 1 01:28:15 syzkaller kern.warn kernel: [ 972.401572][T16120] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:15 syzkaller kern.warn kernel: [ 972.402866][ T29] kauditd_printk_skb: 1965 callbacks suppressed Jan 1 01:28:1[ 972.481651][ T29] audit: type=1326 audit(5295.545:123083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16119 comm="syz.1.16094" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f158b9c5d29 code=0x7ffc0000 5 syzkaller kern[ 972.506503][ T29] audit: type=1326 audit(5295.545:123084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16119 comm="syz.1.16094" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f158b9c5d29 code=0x7ffc0000 .notice kernel: [ 972.530395][ T29] audit: type=1400 audit(5295.555:123085): avc: denied { map_create } for pid=16122 comm="syz.6.16095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 972.402882][ [ 972.551309][ T29] audit: type=1400 audit(5295.555:123086): avc: denied { prog_load } for pid=16122 comm="syz.6.16095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 T29] audit: ty[ 972.570862][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 972.570958][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available pe=1326 audit(52[ 972.586536][ T29] audit: type=1400 audit(5295.564:123087): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 95.508:123082): [ 972.608934][ T29] audit: type=1400 audit(5295.564:123088): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 auid=4294967295 [ 972.632550][ T29] audit: type=1400 audit(5295.564:123089): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 uid=0 gid=0 ses=[ 972.655016][ T29] audit: type=1400 audit(5295.564:123090): avc: denied { prog_load } for pid=16122 comm="syz.6.16095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 4294967295 subj=[ 972.675649][ T29] audit: type=1400 audit(5295.564:123091): avc: denied { map_create } for pid=16122 comm="syz.6.16095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 root:sysadm_r:sysadm_t pid=16067 comm="syz.0.16072" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat= Jan 1 01:28:15 syzkaller kern.notice kernel: [ 972.481651][ T29] audit: type=1326 audit(5295.545:123083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16119 comm="syz.1.16094" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat= Jan 1 01:28:15 syzkaller kern.notice kernel: [ 972.506503][ T29] audit: type=1326 audit(5295.545:123084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16119 comm="syz.1.16094" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat= Jan 1 01:28:15 syzkaller kern.notice kernel: [ 972.530395][ T29] audit: type=1400 audit(5295.555:123085): avc: denied { map_create } for pid=16122 comm="syz.6.16095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:15 syzkaller kern.notice kernel: [ 972.551309][ T29] audit: type=1400 audit(5295.555:123086): avc: denied { prog_load } for pid=16122 comm="syz.6.16095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:15 syzkaller kern.err kernel: [ 972.570862][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:15 syzkaller kern.err kernel: [ 972.570958][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:15 syzkaller kern.notice kernel: [ 972.586536][ T29] audit: type=1400 audit(5295.564:123087): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:15 syzkaller kern.notice kernel: [ 972.608934][ T29[ 972.849175][T16145] lo speed is unknown, defaulting to 1000 ] audit: type=1400 audit(5295.564:123088): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="s[ 972.864717][T16145] »»»»»» speed is unknown, defaulting to 1000 da1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:15 syzkaller kern.notice kernel: [ 972.632550][ T29] audit: type=1400 audit(5295.564:123089): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:15 syzkaller kern.notice kernel: [ 972.655016][ T29] audit: type=1400 audit(5295.564:123090): avc: denied { prog_load } for pid=16122 comm="syz.6.16095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:15 syzkaller kern.notice kernel: [ 972.675649][ T29] audit: type=1400 audit(5295.564:123091): avc: denied { map_create } for pid=16122 comm="syz.6.16095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:15 syzkaller kern.warn kernel: [ 972.849175][T16145] lo speed is unknown, defaulting to 1000 Jan 1 01:28:15 syzkaller kern.warn kernel: [ 972.864717][T16145] »»»»»» speed is unknown, defaulting to 1000 [ 972.984127][T16145] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:16 syzkaller kern.warn kernel: [ 972.984127][T16145] »»»»»» speed is unknown, defaulting to 1000 [ 973.669202][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 973.676194][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:16 syzkaller kern.err kernel: [ 973.669202][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:16 syzkaller kern.err kernel: [ 973.676194][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 974.780837][T16274] xt_TPROXY: Can be used only with -p tcp or -p udp [ 974.780999][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 974.794387][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:17 syzkaller kern.info kernel: [ 974.780837][T16274] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:17 syzkaller kern.err kernel: [ 974.780999][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:17 syzkaller kern.err kernel: [ 974.794387][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 975.574687][T16333] lo speed is unknown, defaulting to 1000 [ 975.581370][T16333] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:18 syzkaller kern.warn kernel: [ 975.574687][T16333] lo speed is unknown, defaulting to 1000 Jan 1 01:28:18 syzkaller kern.warn kernel: [ 975.581370][T16333] »»»»»» speed is unknown, defaulting to 1000 [ 975.704402][T16333] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:18 syzkaller kern.warn kernel: [ 975.704402][T16333] »»»»»» speed is unknown, defaulting to 1000 [ 975.845893][T16349] Cannot find del_set index 4 as target Jan 1 01:28:18 syzkaller kern.info kernel: [ 975.845893][T16349] Cannot find del_set index 4 as target [ 975.892969][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 975.899960][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:18 syzkaller kern.err kernel: [ 975.892969][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:18 syzkaller kern.err kerne[ 975.921103][T16361] xt_TPROXY: Can be used only with -p tcp or -p udp l: [ 975.899960][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:18 syzkaller kern.info kernel: [ 975.921103][T16361] xt_TPROXY: Can be used only with -p tcp or -p udp [ 976.728015][T16387] xt_NFQUEUE: number of total queues is 0 Jan 1 01:28:19 syzkaller kern.info kernel: [ 976.728015][T16387] xt_NFQUEUE: number of total queues is 0 [ 976.860084][T16391] x_tables: ip6_tables: socket match: used from hooks OUTPUT, but only valid from PREROUTING/INPUT Jan 1 01:28:19 syzkaller kern.info kernel: [ 976.860084][T16391] x_tables: ip6_tables: socket match: used from[ 976.889227][T16395] bridge0: entered allmulticast mode hooks OUTPUT, but only valid from PREROUTING/INPUT Jan 1 01:28:19 syzkaller kern.info kernel: [ 976.889227][[ 976.904252][T16395] bridge0 (unregistering): left promiscuous mode T16395] bridge0: entered allmulticast mode Jan 1 01:28:19 syzkaller kern.info kernel: [ 976.904252][T16395] bridge0 (unregistering): left promiscuous mode [ 976.993976][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 976.996668][T16393] lo speed is unknown, defaulting to 1000 [ 977.000930][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 977.008412][T16393] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:19 syzkaller kern.err kernel: [ 976.993976][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:19 syzkaller kern.warn kernel: [ 976.996668][T16393] lo speed is unknown, defaulting to 1000 Jan 1 01:28:19 syzkaller kern.err kernel: [ 977.000930][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:19 syzkaller kern.warn kernel: [ 977.008412][T16393] »»»»»» speed is unknown, defaulting to 1000 [ 977.164687][T16393] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:19 syzkaller kern.warn kernel: [ 977.164687][T16393] »»»»»» speed is unknown, defaulting to 1000 [ 977.190735][T16406] lo speed is unknown, defaulting to 1000 [ 977.203437][T16406] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:20 syzkaller kern.warn kernel: [ 977.190735][T16406] lo speed is unknown, defaulting to 1000 Jan 1 01:28:20 syzkaller kern.warn kernel: [ 977.203437][T16406] »»»»»» speed is unknown, defaulting to 1000 [ 977.376644][T16406] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:20 syzkaller kern.warn kernel: [ 977.376644][T16406] »»»»»» speed is unknown, defaulting to 1000 [ 977.596835][T16430] lo speed is unknown, defaulting to 1000 Jan 1 01:28:20 syzkaller kern.warn kernel: [ 9[ 977.614984][T16430] »»»»»» speed is unknown, defaulting to 1000 77.596835][T16430] lo speed is unknown, defaulting to 1000 Jan 1 01:28:20 syzkaller kern.warn kernel: [ 977.614984][T16430] »»»»»» speed is unknown, defaulting to 1000 [ 977.766667][ T29] kauditd_printk_skb: 3532 callbacks suppressed [ 977.766682][ T29] audit: type=1400 audit(5300.522:126594): avc: denied { map_create } for pid=16541 comm="syz.5.16225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 977.791996][ T29] audit: type=1400 audit(5300.522:126595): avc: denied { prog_load } for pid=16541 comm="syz.5.16225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 977.794775][T16430] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:20 syzkaller kern.warn kernel: [ 977.766667][ T29] kauditd_printk_skb: 3532 callbacks suppressed Jan 1 01:28:20 syzkaller kern.notice kernel: [ 977.766682][ T29] audit: type=1400 audit(5300.522:126594): avc: denied { map_create } for[ 977.849473][ T29] audit: type=1400 audit(5300.531:126596): avc: denied { prog_load } for pid=16541 comm="syz.5.16225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 pid=16541 comm[ 977.869624][ T29] audit: type=1400 audit(5300.531:126597): avc: denied { create } for pid=16541 comm="syz.5.16225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 ="syz.5.16225" s[ 977.890293][ T29] audit: type=1400 audit(5300.531:126598): avc: denied { prog_load } for pid=16541 comm="syz.5.16225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 context=root:sys[ 977.900386][T16547] audit: audit_backlog=65 > audit_backlog_limit=64 adm_r:sysadm_t t[ 977.910726][ T29] audit: type=1400 audit(5300.531:126599): avc: denied { create } for pid=16541 comm="syz.5.16225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 context=root:sys[ 977.910828][ T29] audit: type=1400 audit(5300.587:126600): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 adm_r:sysadm_t t[ 977.910858][ T29] audit: type=1400 audit(5300.587:126601): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 class=bpf permis[ 977.910968][ T29] audit: type=1400 audit(5300.587:126602): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 sive=0 Jan 1 01:28:20 syzkaller kern.notice kernel: [ 977.791996][ T29] audit: type=1400 audit(5300.522:126595): avc: denied { prog_load } for pid=16541 comm="syz.5.16225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:20 syzkaller kern.warn kernel: [ 977.794775][T16430] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:20 syzkaller kern.notice kernel: [ 977.849473][ T29] audit: type=1400 audit(5300.531:126596): avc: denied { prog_load } for pid=16541 comm="syz.5.16225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:20 syzkaller kern.notice kernel: [ 977.869624][ T29] audit: type=1400 audit(5300.531:126597): avc: denied { create } for pid=16541 comm="syz.5.16225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 Jan 1 01:28:20 syzkaller kern.notice kernel: [ 977.890293][ T29] audit: type=1400 audit(5300.531:126598): avc: denied { prog_load } for pid=16541 comm="syz.5.16225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:20 syzkaller kern.warn kernel: [ 977.900386][T16547] audit: audit_[ 978.116516][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available backlog=65 > aud[ 978.124542][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available it_backlog_limit=64 Jan 1 01:28:20 syzkaller kern.notice kernel: [ 977.910726][ T29] audit: type=1400 audit(5300.531:126599): avc: denied { create } for pid=16541 comm="syz.5.16225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissiv Jan 1 01:28:20 syzkaller kern.notice kernel: [ 977.910828][ T29] audit: type=1400 audit(5300.587:126600): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:20 syzkaller kern.notice kernel: [ 977.910858][ T29] audit: type=1400 audit(5300.587:126601): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:20 syzkaller kern.notice kernel: [ 977.910968][ T29] audit: type=1400 audit(5300.587:126602): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:20 syzkaller kern.err kernel: [ 978.116516][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:20 syzkaller kern.err kernel: [ 978.124542][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 978.304382][T16567] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2583 sclass=netlink_route_socket pid=16567 comm=syz.1.16236 Jan 1 01:28:21 syzkaller kern.warn kernel: [ 978.304382][T16567] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2583 sclass=netlink_route_socket pid=16567 comm=syz.1.16236 [ 978.420041][T16641] futex_wake_op: syz.1.16241 tries to shift op by 144; fix this program Jan 1 01:28:21 syzkaller kern.info kernel: [ 978.420041][T16641] futex_wake_op: syz.1.16241 tries to shift op by 144; fix this program [ 978.652007][T16700] lo speed is unknown, defaulting to 1000 [ 978.662342][T16700] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:21 syzkaller kern.warn kernel: [ 978.652007][T16700] lo speed is unknown, defaulting to 1000 Jan 1 01:28:21 syzkaller kern.warn kernel: [ 978.662342][T16700] »»»»»» speed is unknown, defaulting to 1000 [ 978.815647][T16700] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:21 syzkaller kern.warn kernel: [ 978.815647][T16700] »»»»»» speed is unknown, defaulting to 1000 [ 978.907348][T16717] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16717 comm=syz.4.16257 Jan 1 01:28:21 syzkaller kern.info kernel: 0 sclass=netlink_route_socket pid=16717 comm=syz.4.16257 [ 979.217596][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 979.224579][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:21 syzkaller kern.err kernel: [ 979.217596][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:21 syzkaller kern.err kernel: [ 979.224579][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 980.104289][T16761] lo speed is unknown, defaulting to 1000 [ 980.111302][T16761] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:22 syzkaller kern.warn kernel: [ 980.104289][T16761] lo speed is unknown, defaulting to 1000 Jan 1 01:28:22 syzkaller kern.warn kernel: [ 980.111302][T16761] »»»»»» speed is unknown, defaulting to 1000 [ 980.194234][T16761] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:22 syzkaller kern.warn kernel: [ 980.194234][T16761] »»»»»» speed is unknown, defaulting to 1000 [ 980.340159][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 980.347125][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:22 syzkaller kern.err kernel: [ 980.347125][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 980.436445][T16987] Process accounting resumed Jan 1 01:28:23 syzkaller kern.info kernel: [ 980.436445][T16987] Process accounting resumed [ 980.463980][T16991] x_tables: unsorted entry at hook 3 Jan 1 01:28:23 syzkaller kern.err kernel: [ 980.463980][T16991] x_tables: unsorted entry at hook 3 [ 980.873921][T17019] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=617 sclass=netlink_route_socket pid=17019 comm=syz.6.16293 [ 980.888040][T17019] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17019 comm=syz.6.16293 Jan 1 01:28:23 syzkaller kern.info kernel: 617 sclass=netlink_route_socket pid=17019 comm=syz.6.16293 Jan 1 01:28:23 syzkaller kern.warn kernel: [ 980.888040][T17019] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17019 comm=syz.6.16293 [ 981.047730][T17029] lo speed is unknown, defaulting to 1000 [ 981.054414][T17029] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:23 syzkaller kern.warn kernel: [ 981.047730][T17029] lo speed is unknown, defaulting to 1000 Jan 1 01:28:23 syzkaller kern.warn kernel: [ 981.054414][T17029] »»»»»» speed is unknown, defaulting to 1000 [ 981.140956][T17029] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:23 syzkaller kern.warn kernel: [ 981.140956][T17029] »»»»»» speed is unknown, defaulting to 1000 [ 981.441303][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 981.448293][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:23 syzkaller kern.err kernel: [ 981.441303][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:23 syzkaller kern.err kernel: [ 981.448293][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 982.331676][T17388] lo speed is unknown, defaulting to 1000 Jan 1 01:28:24 syzkaller kern.warn kernel: [ 982.331676][T1738[ 982.344442][T17388] »»»»»» speed is unknown, defaulting to 1000 8] lo speed is unknown, defaulting to 1000 Jan 1 01:28:24 syzkaller kern.warn kernel: [ 982.344442][T17388] »»»»»» speed is unknown, defaulting to 1000 [ 982.479672][T17501] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:24 syzkaller kern.info kernel: [ 982.479672][T17501] xt_TPROXY: Can be used only with -p tcp or -p udp [ 982.522691][T17388] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:24 syzkaller kern.warn kernel: [ 982.522691][T17388] »»»»»» speed is unknown, defaulting to 1000 [ 982.553159][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 982.560140][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:25 syzkaller kern.err kernel: [ 982.553159][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:25 syzkaller kern.err kernel: [ 982.560140][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 983.100120][T17737] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:25 syzkaller kern.info kernel: [ 983.100120][T17737] xt_TPROXY: Can be used only with -p tcp or -p udp [ 983.131125][ T29] kauditd_printk_skb: 2660 callbacks suppressed [ 983.131153][ T29] audit: type=1400 audit(5305.545:129261): avc: denied { prog_load } for pid=17738 comm="syz.4.16342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:25 syzkaller kern.warn kernel: [ 983.131125][ T29] kauditd_printk_skb: 2660 callbacks suppressed Jan 1 01:28:25 syzkaller kern.notice kernel: [ 983.131153][ [ 983.172774][ T29] audit: type=1400 audit(5305.573:129262): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] audit: ty[ 983.196059][ T29] audit: type=1400 audit(5305.573:129263): avc: denied { map_create } for pid=17738 comm="syz.4.16342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 pe=1400 audit(53[ 983.215819][ T29] audit: type=1400 audit(5305.573:129265): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 05.545:129261): [ 983.239261][ T29] audit: type=1400 audit(5305.573:129264): avc: denied { prog_load } for pid=17738 comm="syz.4.16342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 avc: denied { [ 983.258999][ T29] audit: type=1400 audit(5305.573:129266): avc: denied { prog_load } for pid=17738 comm="syz.4.16342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 prog_load } for [ 983.279688][ T29] audit: type=1400 audit(5305.573:129267): avc: denied { create } for pid=17738 comm="syz.4.16342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 983.299870][T17744] audit: audit_backlog=65 > audit_backlog_limit=64 pid=17738 comm=[ 983.300661][ T29] audit: type=1400 audit(5305.573:129268): avc: denied { map_create } for pid=17738 comm="syz.4.16342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 "syz.4.16342" sc[ 983.307137][T17744] audit: audit_lost=39 audit_rate_limit=0 audit_backlog_limit=64 ontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:25 syzkaller kern.notice kernel: [ 983.172774][ T29] audit: type=1400 audit(5305.573:129262): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:25 syzkaller kern.notice kernel: [ 983.196059][ T29] audit: type=1400 audit(5305.573:129263): avc: denied { map_create } for pid=17738 comm="syz.4.16342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:25 syzkaller kern.notice kernel: [ 983.215819][ T29] audit: type=1400 audit(5305.573:129265): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:25 syzkaller kern.notice kernel: [ 983.239261][ T29] audit: type=1400 audit(5305.573:129264): avc: denied { prog_load } for pid=17738 comm="syz.4.16342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:25 syzkaller kern.notice kernel: [ 983.258999][ T29] audit: type=1400 audit(5305.573:129266): avc: denied { prog_load } for pid=17738 comm="syz.4.16342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:25 syzkaller kern.notice kernel: [ 983.279688][ T29] audit: type=1400 audit(5305.573:129267): avc: denied { create } for pid=17738 comm="syz.4.16342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive= Jan 1 01:28:25 syzkaller kern.warn kernel: [ 983.299870][T17744] audit: audit_backlog=65 > audit_backlog_limit=64 Jan 1 01:28:25 syzkaller kern.notice kernel: [ 983.300661][ T29] audit: type=1400 audit(5305.573:129268): avc: denied { map_create } for pid=17738 comm="syz.4.16342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:25 syzkaller kern.warn kernel: [ 983.307137][T17744] audit: audit_lost=39 audit_rate_limit=0 audit_backlog_limit=64 [ 983.675626][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 983.682620][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 983.687399][T17867] lo speed is unknown, defaulting to 1000 [ 983.698640][T17867] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:26 syzkaller kern.err kernel: [ 983.675626][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:26 syzkaller kern.err kernel: [ 983.682620][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:26 syzkaller kern.warn kernel: [ 983.687399][T17867] lo speed is unknown, defaulting to 1000 Jan 1 01:28:26 syzkaller kern.warn kernel: [ 983.698640][T17867] »»»»»» speed is unknown, defaulting to 1000 [ 983.768041][T17931] lo speed is unknown, defaulting to 1000 [ 983.775918][T17931] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:26 syzkaller kern.warn kernel: [ 983.768041][T17931] lo speed is unknown, defaulting to 1000 Jan 1 01:28:26 syzk[ 983.801281][T17867] »»»»»» speed is unknown, defaulting to 1000 aller kern.warn kernel: [ 983.775918][T17931] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:26 syzkaller kern.warn kernel: [ 983.801281][T17867] »»»»»» speed is unknown, defaulting to 1000 [ 983.905341][T17931] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:26 syzkaller kern.warn kernel: [ 983.905341][T17931] »»»»»» speed is unknown, defaulting to 1000 [ 984.036056][T17996] lo speed is unknown, defaulting to 1000 [ 984.042343][T17996] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:26 syzkaller kern.warn kernel: [ 984.036056][T17996] lo speed is unknown, defaulting to 1000 Jan 1 01:28:26 syzkaller kern.warn [ 984.062432][T18000] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=32 sclass=netlink_audit_socket pid=18000 comm=syz.0.16366 kernel: [ 984.042343][T17996] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:26 syzkaller kern.warn kernel: [ 984.062432][T18000] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=32 sclass=netlink_audit_socket pid=18000 comm=syz.0.16366 [ 984.144286][T17996] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:26 syzkaller kern.warn kernel: [ 984.144286][T17996] »»»»»» speed is unknown, defaulting to 1000 [ 984.522428][T18332] xt_ecn: cannot match TCP bits for non-tcp packets Jan 1 01:28:26 syzkaller kern.info kernel: [ 984.522428][T18332] xt_ecn: cannot match TCP bits for non-tcp packets [ 984.570024][T18338] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported Jan 1 01:28:26 syzkaller kern.info kernel: [ 984.570024][T18338] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 984.787478][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 984.794479][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:27 syzkaller kern.err kernel: [ 984.787478][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:27 syzkaller kern.err kernel: [ 984.794479][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 984.919398][T18380] syz.6.16404: attempt to access beyond end of device [ 984.919398][T18380] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 Jan 1 01:28:27 syzkaller kern.info kernel: .919398][T18380] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 985.171590][T18509] dccp_invalid_packet: P.Data Offset(224) too large Jan 1 01:28:27 syzkaller kern.warn kernel: [ 985.171590][T18509] dccp_invalid_packet: P.Data Offset(224) too large [ 985.392116][T18638] xt_CT: No such helper "snmp" Jan 1 01:28:27 syzkaller kern.info kernel: [ 985.392116][T18638] xt_CT: No such helper "snmp" [ 985.521573][T18653] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:27 syzkaller kern.info kernel: [ 985.521573][T18653] xt_TPROXY: Can be used only with -p tcp or -p udp [ 985.784554][T18872] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD Jan 1 01:28:28 syzkaller kern.info kernel: [ 985.784554][T18872] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only u[ 985.815300][T18876] ebtables: ebtables: counters copy to user failed while replacing table sable from INPUT/FORWARD Jan 1 01:28:28 syzkaller kern.warn kernel: [ 985.815300][T18876] ebtables: ebtables: counters copy to user failed while replacing table [ 985.888566][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 985.895546][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:28 syzkaller kern.err kernel: [ 985.888566][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:28 syzkaller kern.err kernel: [ 985.895546][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 986.262783][T19104] xt_HMARK: spi-set and port-set can't be combined Jan 1 01:28:28 syzkaller kern.info kernel: [ 986.262783][T19104] xt_HMARK: spi-set and port-set can't be combined [ 986.551673][T19137] lo speed is unknown, defaulting to 1000 [ 986.558002][T19137] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:28 syzkaller kern.warn kernel: [ 986.551673][T19137] lo speed is unknown, defaulting to 1000 Jan 1 01:28:28 syzkaller kern.warn kernel: [ 986.558002][T19137] »»»»»» speed is unknown, defaulting to 1000 [ 986.656332][T19137] »»»»»» speed is unknown, defaulting to 1000 [ 986.802829][T19161] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:28 syzkaller kern.info kernel: [ 986.802829][T19161] xt_TPROXY: Can be used only with -p tcp or -p[ 986.828557][T19162] lo speed is unknown, defaulting to 1000 udp [ 986.835387][T19162] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:29 syzkaller kern.warn kernel: [ 986.828557][T19162] lo speed is unknown, defaulting to 1000 Jan 1 01:28:29 syzkaller kern.warn kernel: [ 986.835387][T19162] »»»»»» speed is unknown, defaulting to 1000 [ 986.961664][T19162] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:29 syzkaller kern.warn kernel: [ 986.961664][T19162] »»»»»» speed is unknown, defaulting to 1000 [ 987.685661][T19285] xt_HMARK: spi-set and port-set can't be combined Jan 1 01:28:29 syzkaller kern.info kernel: [ 987.685661][T19285] xt_HMARK: spi-set and port-set can't be combined [ 987.718727][T19291] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:29 syzkaller kern.info kernel: [ 987.718727][T19291] xt_TPROXY: Can be used only with -p tcp or -p udp [ 988.006725][T19415] xt_NFQUEUE: number of total queues is 0 Jan 1 01:28:30 syzkaller kern.info kernel: [ 988.006725][T19415] xt_NFQUEUE: number of total queues is 0 [ 988.055259][T19415] lo speed is unknown, defaulting to 1000 Jan 1 01:28:30 syzkaller kern.w[ 988.071360][T19415] »»»»»» speed is unknown, defaulting to 1000 arn kernel: [ 988.055259][T19415] lo speed is unknown, defaulting to 1000 Jan 1 01:28:30 syzkaller kern.warn kernel: [ 988.071360][T19415] »»»»»» speed is unknown, defaulting to 1000 [ 988.112225][ C0] net_ratelimit: 2 callbacks suppressed [ 988.112239][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 988.124818][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:30 syzkaller kern.warn kernel: [ 988.112225][ C0] net_ratelimit: 2 callbacks suppressed Jan 1 01:28:30 syzkaller kern.err kernel: [ 988.112239][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:30 syzkaller kern.err kernel: [ 988.124818][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 988.220596][T19415] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:30 syzkaller kern.warn kernel: [ 988.220596][T19415] »»»»»» speed is unknown, defaulting to 1000 [ 988.330613][T19722] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:30 syzkaller kern.info kernel: [ 988.330613][T19722] xt_TPROXY: Can be used only with -p tcp or -p udp [ 988.492943][T19827] lo speed is unknown, defaulting to 1000 [ 988.499182][T19827] »»»»»» speed is unknown, defaulting to 1000 [ 988.507919][ T29] kauditd_printk_skb: 3533 callbacks suppressed [ 988.507933][ T29] audit: type=1400 audit(5310.577:132762): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 01:28:30 syzkaller kern.warn kernel: [ 988.492943][T19827] lo speed is unknown, defaulti[ 988.547488][ T29] audit: type=1400 audit(5310.605:132763): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ng to 1000 Jan [ 988.570297][ T29] audit: type=1400 audit(5310.605:132764): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1 01:28:30 syzk[ 988.592691][ T29] audit: type=1400 audit(5310.605:132765): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 aller kern.warn kernel: [ 988.499182][T19827] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:30 syzkaller kern.warn [ 988.625464][ T29] audit: type=1400 audit(5310.671:132766): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 kernel: [ 988.5[ 988.649090][ T29] audit: type=1400 audit(5310.671:132767): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 07919][ T29] k[ 988.671351][ T29] audit: type=1400 audit(5310.671:132768): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 auditd_printk_skb: 3533 callbacks suppressed Ja[ 988.697769][ T29] audit: type=1400 audit(5310.746:132769): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 n 1 01:28:30 sy[ 988.720369][ T29] audit: type=1400 audit(5310.746:132770): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 zkaller kern.not[ 988.729644][T19827] »»»»»» speed is unknown, defaulting to 1000 ice kernel: [ 9[ 988.743788][ T29] audit: type=1400 audit(5310.746:132771): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 88.507933][ T29] audit: type=1400 audit(5310.577:132762): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:30 syzkaller kern.notice kernel: [ 988.547488][ T29] audit: type=1400 audit(5310.605:132763): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:30 syzkaller kern.notice kernel: [ 988.570297][ T29] audit: type=1400 audit(5310.605:132764): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:30 syzkaller kern.notice kernel: [ 988.592691][ T29] audit: type=1400 audit(5310.605:132765): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:30 syzkaller kern.notice kernel: [ 988.625464][ T29] audit: type=1400 audit(5310.671:132766): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:30 syzkaller kern.notice kernel: [ 988.649090][ T29] audit: type=1400 audit(5310.671:132767): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:30 syzkaller kern.notice kernel: [ 988.671351][ T29] audit: type=1400 audit(5310.671:132768): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:30 syzkaller kern.notice [ 988.940735][T20043] x_tables: unsorted underflow at hook 1 kernel: [ 988.697769][ T29] audit: type=1400 audit(5310.746:132769): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:30 syzkaller kern.notice kernel: [ 988.720369][ T29] audit: type=1400 audit(5310.746:132770): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:30 syzkaller kern.warn kernel: [ 988.729644][T19827] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:30 syzkaller kern.notice kernel: [ 988.743788][ T29] audit: type=1400 audit(5310.746:132771): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ [ 989.039151][T20055] xt_CT: No such helper "snmp_trap" Jan 1 01:28:31 syzkaller kern.info kernel: [ 989.039151][T20055] xt_CT: No such helper "snmp_trap" [ 989.234771][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 989.241737][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:31 syzkaller kern.err kernel: [ 989.234771][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:31 syzkaller kern.err kernel: [ 989.241737][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 989.395742][T20287] x_tables: duplicate underflow at hook 2 Jan 1 01:28:31 syzkaller kern.err kernel: [ 989.395742][T20287] x_tables: duplicate underflow at hook 2 [ 989.514195][T20309] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:31 syzkaller kern.i[ 989.526443][T20311] xt_TCPMSS: Only works on TCP SYN packets nfo kernel: [ 989.514195][T20309] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:31 syzkaller kern.info kernel: [ 989.526443][T20311] xt_TCPMSS: Only works on TCP SYN packets [ 989.586983][T20315] netlink: 20 bytes leftover after parsing attributes in process `syz.4.16546'. Jan 1 01:28:31 syzkaller kern.warn kernel: [ 989.586983][T20315] netlink: 20 bytes leftover after parsing attributes in process `syz.4.16546'. [ 989.777152][T20338] xt_CT: You must specify a L4 protocol and not use inversions on it Jan 1 01:28:31 syzkaller kern.info kernel: [ 989.777152][T20338] xt_CT: You must specify a L4 protocol and not use inversions on it [ 989.893452][T20353] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:31 syzkaller kern.info kernel: [ 989.893452][T20353] xt_TPROXY: Can be used only with -p tcp or -p udp [ 990.301711][T20411] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' Jan 1 01:28:32 syzkaller kern.info kernel: [ 990.301711][T20411] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 990.335848][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 990.342809][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:32 syzkaller kern.err kernel: [ 990.335848][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:32 syzkaller kern.err kernel: [ 990.342809][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 991.447710][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 991.454711][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 992.559510][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 992.566518][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:34 syzkaller kern.err kernel: [ 992.559510][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:34 syzkaller kern.err kernel: [ 992.566518][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 993.234546][T21104] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:35 syzkaller kern.info kernel: [ 993.234546][T21104] xt_TPROXY: Can be used only with -p tcp or -p udp [ 993.577711][T21151] x_tables: duplicate underflow at hook 2 Jan 1 01:28:35 syzkaller kern.err kernel: [ 993.577711][T21151] x_tables: duplicate underflow at hook 2 [ 993.671373][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 993.678299][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:35 syzkaller kern.err kernel: [ 993.671373][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:35 syzkaller kern.err kernel: [ 993.678299][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 993.884595][ T29] kauditd_printk_skb: 2276 callbacks suppressed [ 993.884610][ T29] audit: type=1400 audit(5315.591:135048): avc: denied { read } for pid=21191 comm="syz.6.16873" dev="nsfs" ino=4026534323 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Jan 1 01:28:35 syzkaller kern.warn kernel: [ 993.884595][ T29] kauditd_printk_skb: 2276 callbacks suppressed Jan 1 01:28:35 syzkaller kern.notice kernel: [ 993.926822][ T29] audit: type=1326 audit(5315.600:135049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21192 comm="syz.0.16874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3d8d295d29 code=0x7ffc0000 [ 993.884610][ [ 993.950971][ T29] audit: type=1326 audit(5315.600:135050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21192 comm="syz.0.16874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3d8d295d29 code=0x7ffc0000 T29] audit: ty[ 993.974873][ T29] audit: type=1326 audit(5315.628:135051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21192 comm="syz.0.16874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=37 compat=0 ip=0x7f3d8d295d29 code=0x7ffc0000 pe=1400 audit(53[ 993.999791][ T29] audit: type=1326 audit(5315.628:135052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21192 comm="syz.0.16874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3d8d295d29 code=0x7ffc0000 15.591:135048): [ 994.023873][ T29] audit: type=1400 audit(5315.628:135053): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 avc: denied { [ 994.047399][ T29] audit: type=1400 audit(5315.628:135054): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 read } for pid=21191 comm="syz.6.16873" dev="nsfs" ino=4026534323 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file per Jan 1 01:28:35 syzkaller kern.notice kernel: [ 993.926822][ T29] audit: type=1326 audit(5315.600:135049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21192 comm="syz.0.16874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat= Jan 1 01:28:35 syzkaller kern.notice kernel: [ 993.950971][ T29] audit: type=1326 audit(5315.600:135050): auid=4294967295 uid=0 gid=0 ses=42[ 994.122690][ T29] audit: type=1400 audit(5315.638:135055): avc: denied { prog_load } for pid=21199 comm="syz.5.16877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 94967295 subj=ro[ 994.142515][ T29] audit: type=1400 audit(5315.666:135056): avc: denied { map_create } for pid=21201 comm="syz.5.16878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 ot:sysadm_r:sysa[ 994.162291][ T29] audit: type=1400 audit(5315.666:135057): avc: denied { prog_load } for pid=21201 comm="syz.5.16878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 dm_t pid=21192 comm="syz.0.16874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat= Jan 1 01:28:35 syzkaller kern.notice kernel: [ 993.974873][ T29] audit: type=1326 audit(5315.628:135051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21192 comm="syz.0.16874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=37 compat=0 Jan 1 01:28:35 syzkaller kern.notice kernel: [ 993.999791][ T29] audit: type=1326 audit(5315.628:135052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21192 comm="syz.0.16874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat= Jan 1 01:28:35 syzkaller kern.notice kernel: [ 994.023873][ T29] audit: type=1400 audit(5315.628:135053): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:35 syzkaller kern.notice kernel: [ 994.047399][ T29] audit: type=1400 audit(5315.628:135054): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:35 syzkaller kern.notice kernel: [ 994.122690][ T29] audit: type=1400 audit(5315.638:135055): avc: denied { prog_load } for pid=21199 comm="syz.5.16877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:35 syzkaller kern.notice kernel: [ 994.142515][ T29] audit: type=1400 audit(5315.666:135056): avc: denied { map_create } for pid=21201 comm="syz.5.16878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:35 syzkaller kern.notice kernel: [ 994.162291][ T29] audit: type=1400 audit(5315.666:135057): avc: denied { prog_load } for pid=21201 comm="syz.5.16878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 994.676337][T21276] xt_TPROXY: Can be used only with -p tcp or -p udp [ 994.783134][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 994.790104][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:36 syzkaller kern.err kernel: [ 994.783134][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:36 syzkaller kern.err kernel: [ 994.790104][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 995.084060][T21329] xt_TPROXY: Can be used only with -p tcp or -p udp [ 995.562896][T21393] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:37 syzkaller kern.info kernel: [ 995.562896][T21393] xt_TPROXY: Can be used only with -p tcp or -p udp [ 995.684221][T21412] x_tables: unsorted underflow at hook 1 Jan 1 01:28:37 syzkaller kern.err kernel: [ 995.684221][T21412] x_tables: unsorted underflow at hook 1 [ 995.895005][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 995.901934][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:37 syzkaller kern.err kernel: [ 995.895005][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:37 syzkaller kern.err kernel: [ 995.901934][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 996.428924][T21531] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:37 syzkaller kern.info kernel: [ 996.428924][T21531] xt_TPROXY: Can be used only with -p tcp or -p udp [ 997.006861][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 997.013875][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:38 syzkaller kern.e[ 997.025387][T21653] xt_TPROXY: Can be used only with -p tcp or -p udp rr kernel: [ 997.006861][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:38 syzkaller kern.err kernel: [ 997.013875][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:38 syzkaller kern.info kernel: [ 997.025387][T21653] xt_TPROXY: Can be used only with -p tcp or -p udp [ 997.752210][T21805] xt_TPROXY: Can be used only with -p tcp or -p udp [ 998.129368][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 998.136332][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:39 syzkaller kern.err kernel: [ 998.129368][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:39 syzkaller kern.err kernel: [ 998.136332][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 999.230432][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 999.237409][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 999.239480][ T29] kauditd_printk_skb: 948 callbacks suppressed [ 999.239493][ T29] audit: type=1400 audit(5320.605:136006): avc: denied { create } for pid=22132 comm="syz.1.17328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 Jan 1 01:28:40 syzkaller kern.err kernel: [ 999.230432][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:40 syzkaller kern.err kernel: [ 999.237409][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:40 syzkaller kern.warn kernel: [ 9[ 999.295986][ T29] audit: type=1400 audit(5320.614:136007): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 99.239480][ T2[ 999.319125][ T29] audit: type=1400 audit(5320.614:136008): avc: denied { read write } for pid=10767 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 9] kauditd_print[ 999.343894][ T29] audit: type=1400 audit(5320.614:136009): avc: denied { create } for pid=22135 comm="syz.6.17331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 k_skb: 948 callb[ 999.365126][ T29] audit: type=1400 audit(5320.642:136010): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 acks suppressed Jan 1 01:28:40 syzkaller kern.notice kernel: [ 999.239493][ [ 999.387553][ T29] audit: type=1400 audit(5320.642:136011): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] audit: type=1400 audit(5320.605:136006): avc: denied { create } for pid=22132 comm="syz.1.17328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissiv [ 999.387585][ T29] audit: type=1400 audit(5320.642:136012): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 999.387616][ T29] audit: type=1400 audit(5320.642:136013): avc: denied { read write } for pid=10767 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 999.387693][ T29] audit: type=1400 audit(5320.652:136014): avc: denied { create } for pid=22137 comm="syz.4.17330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 999.437515][T22154] xt_TPROXY: Can be used only with -p tcp or -p udp [ 999.531901][ T29] audit: type=1400 audit(5320.661:136015): avc: denied { read } for pid=22143 comm="syz.6.17333" dev="nsfs" ino=4026534323 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Jan 1 01:28:40 syzkaller kern.info kernel: } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 01:28:40 syzkaller kern.notice kernel: [ 999.319125][ T29] audit: type=1400 audit(5320.614:136008): avc: denied { read write } for pid=10767 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed Jan 1 01:28:40 syzkaller kern.notice kernel: [ 999.343894][ T29] audit: type=1400 audit(5320.614:136009): avc: denied { create } for pid=22135 comm="syz.6.17331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 Jan 1 01:28:40 syzkaller kern.notice kernel: [ 999.365126][ T29] audit: type=1400 audit(5320.642:136010): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:40 syzkaller kern.notice kernel: [ 999.387553][ T29] audit: type=1400 audit(5320.642:136011): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:40 syzkaller kern.notice kernel: [ 999.387585][ T29] audit: type=1400 audit(5320.642:136012): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:40 syzkaller kern.notice kernel: [ 999.387616][ T29] audit: type=1400 audit(5320.642:136013): avc: denied { read write } for pid=10767 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed Jan 1 01:28:40 syzkaller kern.notice kernel: [ 999.387693][ T29] audit: type=1400 audit(5320.652:136014): avc: denied { create } for pid=22137 comm="syz.4.17330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Jan 1 01:28:40 syzka[ 999.747399][T22300] xt_TPROXY: Can be used only with -p tcp or -p udp ller kern.info kernel: [ 999.437515][T22154] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:40 syzkaller kern.notice kernel: [ 999.531901][ T29] audit: type=1400 audit(5320.661:136015): avc: denied { read } for pid=22143 comm="syz.6.17333" dev="nsfs" ino=4026534323 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file per Jan 1 01:28:41 syzkaller kern.info kernel: [ 999.747399][T22300] xt_TPROXY: Can be used only with -p tcp or -p udp [ 1000.342314][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1000.349322][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:41 syzkaller kern.err kernel: [ 1000.342314][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:41 syzkaller kern.err kernel: [ 1000.349322][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1001.116353][T22604] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=22604 comm=syz.4.17513 Jan 1 01:28:42 syzkaller kern.warn kernel: [ 1001.116353][T22604] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=22604 comm=syz.4.17513 [ 1001.464761][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1001.471743][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:42 syzkaller kern.err kernel: [ 1001.464761][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:42 syzkaller kern.err kernel: [ 1001.471743][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1002.541682][T22918] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:43 syzkaller kern.info kernel: [ 1002.541682][T22918] xt_TPROXY: Can be used only with -p tcp or -p udp [ 1002.565976][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1002.573210][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:43 syzkaller kern.err kernel: [ 1002.565976][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:43 syzkaller kern.err kernel: [ 1002.573210][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1003.420824][T23200] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=18 sclass=netlink_audit_socket pid=23200 comm=syz.1.17759 Jan 1 01:28:44 syzkaller kern.warn kernel: [ 1003.420824][T23200] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=18 sclass=netlink_audit_socket pid=23200 comm=syz.1.17759 [ 1003.688392][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1003.695363][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:44 syzkaller kern.err kernel: [ 1003.688392][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:44 syzkaller kern.err kernel: [ 1003.695363][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1004.422644][T23410] Process accounting resumed Jan 1 01:28:45 syzkaller kern.info kernel: [ 1004.422644][T23410] Process accounting resumed [ 1004.587684][ T29] kauditd_printk_skb: 1004 callbacks suppressed [ 1004.587698][ T29] audit: type=1400 audit(5325.619:137020): avc: denied { prog_load } for pid=23449 comm="syz.0.17883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1004.618703][ T29] audit: type=1400 audit(5325.619:137021): avc: denied { open } for pid=23447 comm="syz.1.17881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 Jan 1 01:28:45 [ 1004.638099][ T29] audit: type=1400 audit(5325.637:137022): avc: denied { prog_load } for pid=23451 comm="syz.6.17884" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 syzkaller kern.w[ 1004.658915][ T29] audit: type=1400 audit(5325.647:137023): avc: denied { map_create } for pid=23453 comm="syz.4.17885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 arn kernel: [ 10[ 1004.678667][ T29] audit: type=1400 audit(5325.647:137024): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 04.587684][ T2[ 1004.702251][ T29] audit: type=1400 audit(5325.647:137025): avc: denied { create } for pid=23457 comm="syz.1.17886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 9] kauditd_print[ 1004.722404][ T29] audit: type=1400 audit(5325.665:137026): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 1004 call[ 1004.746021][ T29] audit: type=1400 audit(5325.703:137027): avc: denied { create } for pid=23455 comm="syz.5.17887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 backs suppressed[ 1004.767095][ T29] audit: type=1400 audit(5325.703:137028): avc: denied { create } for pid=23455 comm="syz.5.17887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Jan 1 01:28:4[ 1004.789225][ T29] audit: type=1400 audit(5325.721:137029): avc: denied { read write } for pid=10767 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 5 syzkaller kern.notice kernel: [ 1004.587698][ T29] audit: type=1400 audit(5325.619:137020): [ 1004.821644][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available avc: denied { [ 1004.828862][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available prog_load } for pid=23449 comm="syz.0.17883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:45 syzkaller kern.notice kernel: [ 1004.618703][ T29] audit: type=1400 audit(5325.619:137021): avc: denied { open } for pid=23447 comm="syz.1.17881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 Jan 1 01:28:45 syzkaller kern.notice kernel: [ 1004.638099][ T29] audit: type=1400 audit(5325.637:137022): avc: denied { prog_load } for pid=23451 comm="syz.6.17884" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:45 syzkaller kern.notice kernel: [ 1004.658915][ T29] audit: type=1400 audit(5325.647:137023): avc: denied { map_create } for pid=23453 comm="syz.4.17885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:45 syzkaller kern.notice kernel: [ 1004.678667][ T29] audit: type=1400 audit(5325.647:137024): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:45 syzkaller kern.notice kernel: [ 1004.702251][ T29] audit: type=1400 audit(5325.647:137025): avc: denied { create } for pid=23457 comm="syz.1.17886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Jan 1 01:28:45 syzkaller kern.notice kernel: [ 1004.722404][ T29] audit: type=1400 audit(5325.665:137026): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:45 syzkaller kern.notice kernel: [ 1004.746021][ T29] audit: type=1400 audit(5325.703:137027): avc: denied { create } for pid=23455 comm="syz.5.17887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive= Jan 1 01:28:45 syzkaller kern.notice kernel: [ 1004.767095][ T29] audit: type=1400 audit(5325.703:137028): avc: denied { create } for pid=23455 comm="syz.5.17887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive= Jan 1 01:28:45 syzkaller kern.notice kernel: [ 1004.789225][ T29] audit: type=1400 audit(5325.721:137029): avc: denied { read write } for pid=10767 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed Jan 1 01:28:45 syzkaller kern.err kernel: [ 1004.821644][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:45 syzkaller kern.err kernel: [ 1004.828862][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1005.414589][T23693] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:46 syzkaller kern.info kernel: [ 1005.414589][T23693] xt_TPROXY: Can be used only with -p tcp or -p udp [ 1005.912122][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1005.919084][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:46 syzkaller kern.err kernel: [ 1005.912122][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:46 syzkaller kern.err kernel: [ 1005.919084][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1005.983940][T23910] lo speed is unknown, defaulting to 1000 [ 1005.992466][T23910] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:46 syzkaller kern.warn kernel: [ 1005.983940][T23910] lo speed is unknown, defaulting to 1000 Jan 1 01:28:46 syzkaller kern.warn kernel: [ 1005.992466][T23910] »»»»»» speed is unknown, defaulting to 1000 [ 1006.101723][T23910] »»»»»» speed is unknown, defaulting to 1000 Jan 1 01:28:47 syzkaller kern.warn kernel: [ 1006.101723][T23910] »»»»»» speed is unknown, defaulting to 1000 [ 1006.898770][T24107] netlink: 4 bytes leftover after parsing attributes in process `syz.0.18109'. Jan 1 01:28:47 syzkaller kern.warn kernel: [ 1006.898770][T24107] netlink: 4 bytes leftover after parsing attributes in process `syz.0.18109'. [ 1007.013232][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1007.020174][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:47 syzkaller kern.err kernel: [ 1007.013232][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 0[ 1007.040531][T24134] xt_TPROXY: Can be used only with -p tcp or -p udp 1:28:47 syzkaller kern.err kernel: [ 1007.020174][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:47 syzkaller kern.info kernel: [ 1007.040531][T24134] xt_TPROXY: Can be used only with -p tcp or -p udp [ 1007.436981][T24211] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24211 comm=syz.1.18160 Jan 1 01:28:48 syzkaller kern.warn kernel: [ 1007.436981][T24211] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24211 comm=syz.1.18160 [ 1008.135666][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1008.142648][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:48 syzkaller kern.err kernel: [ 1008.135666][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:48 syzkaller kern.err kernel: [ 1008.142648][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1008.962236][T24562] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:49 syzkaller kern.info kernel: [ 1008.962236][T24562] xt_TPROXY: Can be used only with -p tcp or -p udp [ 1009.247581][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1009.254578][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:49 syzkaller kern.err kernel: [ 1009.247581][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:49 syzkaller kern.err kernel: [ 1009.254578][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1009.578309][T24682] xt_hashlimit: overflow, try lower: 18446744073709551615/7 [ 1009.781377][T24718] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:50 syzkaller kern.info kernel: [ 1009.781377][T24718] xt_TPROXY: Can be used only with -p tcp or -p udp [ 1009.975397][ T29] kauditd_printk_skb: 1063 callbacks suppressed [ 1009.975414][ T29] audit: type=1400 audit(5330.632:138093): avc: denied { create } for pid=24741 comm="syz.4.18372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1010.001179][ T29] audit: type=1400 audit(5330.632:138094): avc: denied { prog_load } for pid=24740 comm="syz.5.18371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1010.020866][ T29] audit: type=1400 audit(5330.632:138095): avc: denied { execute } for pid=24738 comm="syz.0.18370" dev="tmpfs" ino=4295 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 1010.053713][ T29] audit: type=1400 audit(5330.651:138096): avc: denied { map_create } for pid=24746 comm="syz.1.18373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1010.053822][ T29] audit: type=1400 audit(5330.651:138097): avc: denied { prog_load } for pid=24746 comm="syz.1.18373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1010.053907][ T29] audit: type=1400 audit(5330.679:138098): avc: denied { module_request } for pid=24748 comm="syz.1.18375" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 1010.053975][ T29] audit: type=1400 audit(5330.679:138099): avc: denied { sys_module } for pid=24748 comm="syz.1.18375" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 1010.053999][ T29] audit: type=1400 audit(5330.698:138100): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 1010.054024][ T29] audit: type=1400 audit(5330.698:138101): avc: denied { prog_load } for pid=24750 comm="syz.1.18376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1010.054051][ T29] audit: type=1400 audit(5330.716:138102): avc: denied { map_create } for pid=24742 comm="syz.6.18369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:50 syzkaller kern.warn kernel: [ 1009.975397][ T29] kauditd_printk_skb: 1063 callbacks suppressed Jan 1 01:28:50 syzkaller kern.notice kernel: [ 1009.975414][ T29] audit: type=1400 audit(5330.632:138093): avc: denied { cr[ 1010.348706][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available eate } for pid=[ 1010.356550][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available 24741 comm="syz.4.18372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Jan 1 01:28:50 syzkaller kern.notice kernel: [ 1010.001179][ T29] audit: type=1400 audit(5330.632:138094): avc: denied { prog_load } for pid=24740 comm="syz.5.18371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:50 syzkaller kern.notice kernel: [ 1010.020866][ T29] audit: type=1400 audit(5330.632:138095): avc: denied { execute } for pid=24738 comm="syz.0.18370" dev="tmpfs" ino=4295 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file per Jan 1 01:28:50 syzkaller kern.notice kernel: [ 1010.053713][ T29] audit: type=1400 audit(5330.651:138096): avc: denied { map_create } for pid=24746 comm="syz.1.18373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:50 syzkaller kern.notice kernel: [ 1010.053822][ T29] audit: type=1400 audit(5330.651:138097): avc: denied { prog_load } for pid=24746 comm="syz.1.18373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:50 syzkaller kern.notice kernel: [ 1010.053907][ T29] audit: type=1400 audit(5330.679:138098): avc: denied { module_request } for pid=24748 comm="syz.1.18375" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass= Jan 1 01:28:50 syzkaller kern.notice kernel: [ 1010.053975][ T29] audit: type=1400 audit(5330.679:138099): avc: denied { sys_module } for pid=24748 comm="syz.1.18375" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability perm Jan 1 01:28:50 syzkaller kern.notice kernel: [ 1010.053999][ T29] audit: type=1400 audit(5330.698:138100): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:50 syzkaller kern.notice kernel: [ 1010.054024][ T29] audit: type=1400 audit(5330.698:138101): avc: denied { prog_load } for pid=24750 comm="syz.1.18376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:50 syzkaller kern.notice kernel: [ 1010.054051][ T29] audit: type=1400 audit(5330.716:138102): avc: denied { map_create } for pid=24742 comm="syz.6.18369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:51 syzkaller kern.err kernel: [ 1010.348706][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:51 syzkaller kern.err kernel: [ 1010.356550][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1011.460566][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1011.467494][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:52 syzkaller kern.err kernel: [ 1011.460566][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:52 syzkaller kern.err kernel: [ 1011.467494][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1011.799957][T24974] xt_TPROXY: Can be used only with -p tcp or -p udp Jan 1 01:28:52 syzkaller kern.info kernel: [ 1011.799957][T24974] xt_TPROXY: Can be used only with -p tcp or -p udp [ 1012.572280][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1012.579206][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:53 syzkaller kern.err kernel: [ 1012.572280][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:53 syzkaller kern.err kernel: [ 1012.579206][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1013.684259][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1013.691278][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:54 syzkaller kern.err kernel: [ 1013.684259][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:54 syzkaller kern.err kernel: [ 1013.691278][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1014.795977][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1014.803006][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:55 syzkaller kern.err kernel: [ 1014.795977][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:55 syzkaller kern.err kernel: [ 1014.803006][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1015.615944][ T29] kauditd_printk_skb: 391 callbacks suppressed [ 1015.615960][ T29] audit: type=1400 audit(5335.927:138494): avc: denied { execmem } for pid=25014 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Jan 1 01:28:55 syzkaller kern.warn kernel: [ 1015.615944][ T2[ 1015.646264][ T29] audit: type=1400 audit(5335.927:138495): avc: denied { map_create } for pid=25015 comm="syz.1.18504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 9] kauditd_print[ 1015.666131][ T29] audit: type=1400 audit(5335.927:138496): avc: denied { prog_load } for pid=25015 comm="syz.1.18504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 k_skb: 391 callb[ 1015.686374][ T29] audit: type=1400 audit(5335.936:138497): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 acks suppressed[ 1015.686410][ T29] audit: type=1400 audit(5335.945:138498): avc: denied { map_create } for pid=25019 comm="syz.1.18507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:55[ 1015.686439][ T29] audit: type=1400 audit(5335.945:138499): avc: denied { prog_load } for pid=25019 comm="syz.1.18507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 syzkaller kern.[ 1015.686467][ T29] audit: type=1400 audit(5335.955:138500): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 notice kernel: [[ 1015.772776][ T29] audit: type=1326 audit(5335.955:138501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25021 comm="syz.0.18503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3d8d295d29 code=0x7ffc0000 1015.615960][ [ 1015.797340][ T29] audit: type=1326 audit(5335.955:138502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25021 comm="syz.0.18503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3d8d295d29 code=0x7ffc0000 T29] audit: typ[ 1015.823033][ T29] audit: type=1326 audit(5335.964:138503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25021 comm="syz.0.18503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3d8d295d29 code=0x7ffc0000 e=1400 audit(5335.927:138494): avc: denied { execmem } for pid=25014 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Jan 1 01:28:55 syzkaller kern.notice kernel: [ 1015.646264][ T29] audit: type=1400 audit(5335.927:138495): avc: denied { map_create } for pid=25015 comm="syz.1.18504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:55 syzkaller kern.notice kernel: [ 1015.666131][ T29] audit: type=1400 audit(5335.927:138496): avc: denied { prog_load } for pid=25015 comm="syz.1.18504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclas[ 1015.907849][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available s=bpf permissive[ 1015.915700][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available =0 Jan 1 01:28:56 syzkaller kern.notice kernel: [ 1015.686374][ T29] audit: type=1400 audit(5335.936:138497): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:56 syzkaller kern.notice kernel: [ 1015.686410][ T29] audit: type=1400 audit(5335.945:138498): avc: denied { map_create } for pid=25019 comm="syz.1.18507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:56 syzkaller kern.notice kernel: [ 1015.686439][ T29] audit: type=1400 audit(5335.945:138499): avc: denied { prog_load } for pid=25019 comm="syz.1.18507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 01:28:56 syzkaller kern.notice kernel: [ 1015.686467][ T29] audit: type=1400 audit(5335.955:138500): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:28:56 syzkaller kern.notice kernel: [ 1015.772776][ T29] audit: type=1326 audit(5335.955:138501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25021 comm="syz.0.18503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat= Jan 1 01:28:56 syzkaller kern.notice kernel: [ 1015.797340][ T29] audit: type=1326 audit(5335.955:138502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25021 comm="syz.0.18503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat= Jan 1 01:28:56 syzkaller kern.notice kernel: [ 1015.823033][ T29] audit: type=1326 audit(5335.964:138503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25021 comm="syz.0.18503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat= Jan 1 01:28:56 syzkaller kern.err kernel: [ 1015.907849][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:56 syzkaller kern.err kernel: [ 1015.915700][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1017.030270][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1017.037175][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:57 syzkaller kern.err kernel: [ 1017.030270][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:57 syzkaller kern.err kernel: [ 1017.037175][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1018.131477][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1018.138495][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:58 syzkaller kern.err kernel: [ 1018.131477][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:58 syzkaller kern.err kernel: [ 1018.138495][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1019.253918][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1019.260877][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:59 syzkaller kern.err kernel: [ 1019.253918][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:28:59 syzkaller kern.err kernel: [ 1019.260877][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1020.355127][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1020.362061][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:00 syzkaller kern.err kernel: [ 1020.355127][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:00 syzkaller kern.err kernel: [ 1020.362061][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1021.466890][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1021.473836][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1021.481058][ T29] kauditd_printk_skb: 58 callbacks suppressed Jan 1 01:29:01 [ 1021.481072][ T29] audit: type=1400 audit(5341.417:138562): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.e[ 1021.511563][ T29] audit: type=1400 audit(5341.446:138563): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 rr kernel: [ 102[ 1021.533577][ T29] audit: type=1400 audit(5341.446:138564): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1.466890][ C0[ 1021.557716][ T29] audit: type=1400 audit(5341.492:138565): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ] IPVS: sh: UDP [ 1021.579685][ T29] audit: type=1400 audit(5341.492:138566): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 224.0.0.2:0 - no[ 1021.603560][ T29] audit: type=1400 audit(5341.511:138567): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 destination ava[ 1021.626282][ T29] audit: type=1400 audit(5341.548:138568): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ilable Jan 1 0[ 1021.649525][ T29] audit: type=1400 audit(5341.548:138569): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1:29:01 syzkalle[ 1021.671829][ T29] audit: type=1400 audit(5341.576:138570): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 r kern.err kerne[ 1021.694839][ T29] audit: type=1400 audit(5341.595:138571): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 l: [ 1021.473836][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:01 syzkaller kern.warn kernel: [ 1021.481058][ T29] kauditd_printk_skb: 58 callbacks suppressed Jan 1 01:29:01 syzkaller kern.notice kernel: [ 1021.481072][ T29] audit: type=1400 audit(5341.417:138562): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:01 syzkaller kern.notice kernel: [ 1021.511563][ T29] audit: type=1400 audit(5341.446:138563): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:01 syzkaller kern.notice kernel: [ 1021.533577][ T29] audit: type=1400 audit(5341.446:138564): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:01 syzkaller kern.notice kernel: [ 1021.557716][ T29] audit: type=1400 audit(5341.492:138565): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:01 syzkaller kern.notice kernel: [ 1021.579685][ T29] audit: type=1400 audit(5341.492:138566): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:01 syzkaller kern.notice kernel: [ 1021.603560][ T29] audit: type=1400 audit(5341.511:138567): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:01 syzkaller kern.notice kernel: [ 1021.626282][ T29] audit: type=1400 audit(5341.548:138568): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:01 syzkaller kern.notice kernel: [ 1021.649525][ T29] audit: type=1400 audit(5341.548:138569): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:01 syzkaller kern.notice kernel: [ 1021.671829][ T29] audit: type=1400 audit(5341.576:138570): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:01 syzkaller kern.notice kernel: [ 1021.694839][ T29] audit: type=1400 audit(5341.595:138571): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ [ 1022.589473][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1022.596790][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:02 syzkaller kern.err kernel: [ 1022.589473][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:02 syzkaller kern.err kernel: [ 1022.596790][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1023.690630][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1023.697991][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:03 syzkaller kern.err kernel: [ 1023.690630][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:03 syzkaller kern.err kernel: [ 1023.697991][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1024.802389][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1024.809317][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:04 syzkaller kern.err kernel: [ 1024.802389][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:04 syzkaller kern.err kernel: [ 1024.809317][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1025.914273][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1025.921173][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:05 syzkaller kern.err kernel: [ 1025.914273][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:05 syzkaller kern.err kernel: [ 1025.921173][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1027.026062][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1027.033087][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:06 [ 1027.040434][ T29] kauditd_printk_skb: 32 callbacks suppressed syzkaller kern.e[ 1027.040446][ T29] audit: type=1400 audit(5346.618:138604): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 rr kernel: [ 102[ 1027.070919][ T29] audit: type=1400 audit(5346.618:138605): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 7.026062][ C0[ 1027.094084][ T29] audit: type=1400 audit(5346.665:138606): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ] IPVS: sh: UDP [ 1027.117285][ T29] audit: type=1400 audit(5346.665:138607): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 224.0.0.2:0 - no[ 1027.140236][ T29] audit: type=1400 audit(5346.702:138608): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 destination ava[ 1027.163609][ T29] audit: type=1400 audit(5346.731:138609): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ilable Jan 1 0[ 1027.185980][ T29] audit: type=1400 audit(5346.731:138610): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1:29:06 syzkalle[ 1027.209788][ T29] audit: type=1400 audit(5346.777:138611): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 r kern.err kerne[ 1027.232272][ T29] audit: type=1400 audit(5346.796:138612): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 l: [ 1027.033087[ 1027.254744][ T29] audit: type=1400 audit(5346.796:138613): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:06 syzkaller kern.warn kernel: [ 1027.040434][ T29] kauditd_printk_skb: 32 callbacks suppressed Jan 1 01:29:06 syzkaller kern.notice kernel: [ 1027.040446][ T29] audit: type=1400 audit(5346.618:138604): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:06 syzkaller kern.notice kernel: [ 1027.070919][ T29] audit: type=1400 audit(5346.618:138605): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:06 syzkaller kern.notice kernel: [ 1027.094084][ T29] audit: type=1400 audit(5346.665:138606): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:06 syzkaller kern.notice kernel: [ 1027.117285][ T29] audit: type=1400 audit(5346.665:138607): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:06 syzkaller kern.notice kernel: [ 1027.140236][ T29] audit: type=1400 audit(5346.702:138608): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:06 syzkaller kern.notice kernel: [ 1027.163609][ T29] audit: type=1400 audit(5346.731:138609): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:06 syzkaller kern.notice kernel: [ 1027.185980][ T29] audit: type=1400 audit(5346.731:138610): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:06 syzkaller kern.notice kernel: [ 1027.209788][ T29] audit: type=1400 audit(5346.777:138611): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:06 syzkaller kern.notice kernel: [ 1027.232272][ T29] audit: type=1400 audit(5346.796:138612): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:06 syzkaller kern.notice kernel: [ 1027.254744][ T29] audit: type=1400 audit(5346.796:138613): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ [ 1028.137850][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1028.144812][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:07 syzkaller kern.err kernel: [ 1028.137850][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:07 syzkaller kern.err kernel: [ 1028.144812][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1028.993088][ C1] ================================================================== [ 1029.001182][ C1] BUG: KCSAN: data-race in __tmigr_cpu_activate / tmigr_handle_remote [ 1029.009329][ C1] [ 1029.011634][ C1] write to 0xffff888237c205dc of 1 bytes by task 0 on cpu 0: [ 1029.018983][ C1] __tmigr_cpu_activate+0x55/0x200 [ 1029.024082][ C1] tmigr_cpu_activate+0x8a/0xc0 [ 1029.028921][ C1] timer_clear_idle+0x28/0x100 [ 1029.033685][ C1] tick_nohz_restart_sched_tick+0x22/0x110 [ 1029.039487][ C1] tick_nohz_idle_exit+0xfe/0x1d0 [ 1029.044508][ C1] do_idle+0x1eb/0x230 [ 1029.048586][ C1] cpu_startup_entry+0x25/0x30 [ 1029.053342][ C1] rest_init+0xef/0xf0 [ 1029.057402][ C1] start_kernel+0x586/0x5e0 [ 1029.061924][ C1] x86_64_start_reservations+0x2a/0x30 [ 1029.067379][ C1] x86_64_start_kernel+0x9a/0xa0 [ 1029.072330][ C1] common_startup_64+0x12c/0x137 [ 1029.077260][ C1] [ 1029.079566][ C1] read to 0xffff888237c205dc of 1 bytes by interrupt on cpu 1: [ 1029.087090][ C1] tmigr_handle_remote+0x26e/0x940 [ 1029.092204][ C1] run_timer_softirq+0x5f/0x70 [ 1029.096957][ C1] handle_softirqs+0xbf/0x280 [ 1029.101631][ C1] __irq_exit_rcu+0x3a/0xc0 [ 1029.106127][ C1] sysvec_apic_timer_interrupt+0x73/0x80 [ 1029.111752][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1029.117719][ C1] acpi_safe_halt+0x21/0x30 [ 1029.122210][ C1] acpi_idle_do_entry+0x1d/0x30 [ 1029.127041][ C1] acpi_idle_enter+0x96/0xb0 [ 1029.131613][ C1] cpuidle_enter_state+0xc5/0x260 [ 1029.136634][ C1] cpuidle_enter+0x40/0x70 [ 1029.141043][ C1] do_idle+0x192/0x230 [ 1029.145099][ C1] cpu_startup_entry+0x25/0x30 [ 1029.149851][ C1] start_secondary+0x96/0xa0 [ 1029.154423][ C1] common_startup_64+0x12c/0x137 [ 1029.159349][ C1] [ 1029.161650][ C1] value changed: 0x00 -> 0x01 [ 1029.166305][ C1] [ 1029.168612][ C1] Reported by Kernel Concurrency Sanitizer on: [ 1029.174756][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 [ 1029.186546][ C1] Tainted: [W]=WARN [ 1029.190334][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1029.200379][ C1] ================================================================== Jan 1 01:29:08 syzkaller kern.err kernel: [ 1028.993088][ C1] ================================================================== Jan 1 01:29:08 syzkaller kern.err kernel: [ 1029.001182][ C1] BUG: KCSAN: data-race in __tmigr_cpu_activate / tmigr_handle_remote Jan 1 01:29:08 syzkaller kern.err kernel: [ 1029.009329][ C1] Jan 1 01:29:08 syzkaller kern.err kernel: [ 1029.011634][ C1] write to 0xffff888237c205dc of 1 bytes by task 0 on cpu 0: Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.018983][ C1] __tmigr_cpu_activate+0x55/0x200 Jan 1 01:29:08 syzkaller ke[ 1029.260375][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available rn.warn kernel: [ 1029.268051][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1029.024082][ C1] tmigr_cpu_activate+0x8a/0xc0 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.028921][ C1] timer_clear_idle+0x28/0x100 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.033685][ C1] tick_nohz_restart_sched_tick+0x22/0x110 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.039487][ C1] tick_nohz_idle_exit+0xfe/0x1d0 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.044508][ C1] do_idle+0x1eb/0x230 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.048586][ C1] cpu_startup_entry+0x25/0x30 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.053342][ C1] rest_init+0xef/0xf0 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.057402][ C1] start_kernel+0x586/0x5e0 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.061924][ C1] x86_64_start_reservations+0x2a/0x30 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.067379][ C1] x86_64_start_kernel+0x9a/0xa0 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.072330][ C1] common_startup_64+0x12c/0x137 Jan 1 01:29:08 syzkaller kern.err kernel: [ 1029.077260][ C1] Jan 1 01:29:08 syzkaller kern.err kernel: [ 1029.079566][ C1] read to 0xffff888237c205dc of 1 bytes by interrupt on cpu 1: Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.087090][ C1] tmigr_handle_remote+0x26e/0x940 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.092204][ C1] run_timer_softirq+0x5f/0x70 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.096957][ C1] handle_softirqs+0xbf/0x280 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.101631][ C1] __irq_exit_rcu+0x3a/0xc0 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.106127][ C1] sysvec_apic_timer_interrupt+0x73/0x80 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.111752][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.117719][ C1] acpi_safe_halt+0x21/0x30 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.122210][ C1] acpi_idle_do_entry+0x1d/0x30 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.127041][ C1] acpi_idle_enter+0x96/0xb0 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.131613][ C1] cpuidle_enter_state+0xc5/0x260 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.136634][ C1] cpuidle_enter+0x40/0x70 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.141043][ C1] do_idle+0x192/0x230 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.145099][ C1] cpu_startup_entry+0x25/0x30 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.149851][ C1] start_secondary+0x96/0xa0 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.154423][ C1] common_startup_64+0x12c/0x137 Jan 1 01:29:08 syzkaller kern.err kernel: [ 1029.159349][ C1] Jan 1 01:29:08 syzkaller kern.err kernel: [ 1029.161650][ C1] value changed: 0x00 -> 0x01 Jan 1 01:29:08 syzkaller kern.err kernel: [ 1029.166305][ C1] Jan 1 01:29:08 syzkaller kern.err kernel: [ 1029.168612][ C1] Reported by Kernel Concurrency Sanitizer on: Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.174756][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.186546][ C1] Tainted: [W]=WARN Jan 1 01:29:08 syzkaller kern.warn kernel: [ 1029.190334][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Jan 1 01:29:08 syzkaller kern.err kernel: [ 1029.200379][ C1] ================================================================== Jan 1 01:29:08 syzkaller kern.err kernel: [ 1029.260375][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:08 syzkaller kern.err kernel: [ 1029.268051][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:08 syzkaller auth.info sshd[3286]: Received disconnect from 10.128.0.163 port 48494:11: disconnected by user Jan 1 01:29:08 syzkaller auth.info sshd[3286]: Disconnected from user root 10.128.0.163 port 48494 [ 1030.361476][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1030.368379][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:09 syzkaller kern.err kernel: [ 1030.361476][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:09 syzkaller kern.err kernel: [ 1030.368379][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1031.473358][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1031.480360][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:10 syzkaller kern.err kernel: [ 1031.473358][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:10 syzkaller kern.err kernel: [ 1031.480360][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1032.595785][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1032.602698][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:11 [ 1032.610113][ T29] kauditd_printk_skb: 72 callbacks suppressed [ 1032.610127][ T29] audit: type=1400 audit(5351.828:138686): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.e[ 1032.639227][ T29] audit: type=1400 audit(5351.828:138687): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 rr kernel: [ 103[ 1032.662435][ T29] audit: type=1400 audit(5351.875:138688): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 2.595785][ C0[ 1032.685265][ T29] audit: type=1400 audit(5351.875:138689): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ] IPVS: sh: UDP [ 1032.707932][ T29] audit: type=1400 audit(5351.875:138690): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 224.0.0.2:0 - no[ 1032.731158][ T29] audit: type=1400 audit(5351.941:138691): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 destination ava[ 1032.754194][ T29] audit: type=1400 audit(5351.959:138692): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ilable Jan 1 0[ 1032.778064][ T29] audit: type=1400 audit(5351.987:138693): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1:29:11 syzkalle[ 1032.778097][ T29] audit: type=1400 audit(5351.987:138694): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 r kern.err kerne[ 1032.823541][ T29] audit: type=1400 audit(5352.025:138695): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 l: [ 1032.602698][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:11 syzkaller kern.warn kernel: [ 1032.610113][ T29] kauditd_printk_skb: 72 callbacks suppressed Jan 1 01:29:11 syzkaller kern.notice kernel: [ 1032.610127][ T29] audit: type=1400 audit(5351.828:138686): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:11 syzkaller kern.notice kernel: [ 1032.639227][ T29] audit: type=1400 audit(5351.828:138687): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:11 syzkaller kern.notice kernel: [ 1032.662435][ T29] audit: type=1400 audit(5351.875:138688): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:11 syzkaller kern.notice kernel: [ 1032.685265][ T29] audit: type=1400 audit(5351.875:138689): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:11 syzkaller kern.notice kernel: [ 1032.707932][ T29] audit: type=1400 audit(5351.875:138690): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:11 syzkaller kern.notice kernel: [ 1032.731158][ T29] audit: type=1400 audit(5351.941:138691): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:11 syzkaller kern.notice kernel: [ 1032.754194][ T29] audit: type=1400 audit(5351.959:138692): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:11 syzkaller kern.notice kernel: [ 1032.778064][ T29] audit: type=1400 audit(5351.987:138693): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:11 syzkaller kern.notice kernel: [ 1032.778097][ T29] audit: type=1400 audit(5351.987:138694): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:12 syzkaller kern.notice kernel: [ 1032.823541][ T29] audit: type=1400 audit(5352.025:138695): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ [ 1033.696999][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1033.703923][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:12 syzkaller kern.err kernel: [ 1033.696999][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:12 syzkaller kern.err kernel: [ 1033.703923][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1034.808759][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1034.815673][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:13 syzkaller kern.err kernel: [ 1034.808759][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:13 syzkaller kern.err kernel: [ 1034.815673][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1035.920671][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1035.927599][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:14 syzkaller kern.err kernel: [ 1035.920671][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:14 syzkaller kern.err kernel: [ 1035.927599][ C1] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1037.032435][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1037.039482][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:15 syzkaller kern.err kernel: [ 1037.032435][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:15 syzkaller kern.err kernel: [ 1037.039482][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1038.144309][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 1038.151247][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:17 [ 1038.158575][ T29] kauditd_printk_skb: 11 callbacks suppressed syzkaller kern.e[ 1038.158587][ T29] audit: type=1400 audit(5357.011:138707): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 1038.158616][ T29] audit: type=1400 audit(5357.011:138708): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 rr kernel: [ 103[ 1038.211083][ T29] audit: type=1400 audit(5357.067:138709): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 8.144309][ C0[ 1038.234144][ T29] audit: type=1400 audit(5357.067:138710): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ] IPVS: sh: UDP [ 1038.256834][ T29] audit: type=1400 audit(5357.113:138711): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 224.0.0.2:0 - no[ 1038.279809][ T29] audit: type=1400 audit(5357.123:138712): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 destination ava[ 1038.302814][ T29] audit: type=1400 audit(5357.142:138713): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ilable Jan 1 0[ 1038.325954][ T29] audit: type=1400 audit(5357.170:138714): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1:29:17 syzkalle[ 1038.349269][ T29] audit: type=1400 audit(5357.198:138715): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 r kern.err kerne[ 1038.371950][ T29] audit: type=1400 audit(5357.216:138716): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 l: [ 1038.151247][ C0] IPVS: sh: UDP 224.0.0.2:0 - no destination available Jan 1 01:29:17 syzkaller kern.warn kernel: [ 1038.158575][ T29] kauditd_printk_skb: 11 callbacks suppressed Jan 1 01:29:17 syzkaller kern.notice kernel: [ 1038.158587][ T29] audit: type=1400 audit(5357.011:138707): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:17 syzkaller kern.notice kernel: [ 1038.158616][ T29] audit: type=1400 audit(5357.011:138708): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:17 syzkaller kern.notice kernel: [ 1038.211083][ T29] audit: type=1400 audit(5357.067:138709): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:17 syzkaller kern.notice kernel: [ 1038.234144][ T29] audit: type=1400 audit(5357.067:138710): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:17 syzkaller kern.notice kernel: [ 1038.256834][ T29] audit: type=1400 audit(5357.113:138711): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:17 syzkaller kern.notice kernel: [ 1038.279809][ T29] audit: type=1400 audit(5357.123:138712): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:17 syzkaller kern.notice kernel: [ 1038.302814][ T29] audit: type=1400 audit(5357.142:138713): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:17 syzkaller kern.notice kernel: [ 1038.325954][ T29] audit: type=1400 audit(5357.170:138714): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:17 syzkaller kern.notice kernel: [ 1038.349269][ T29] audit: type=1400 audit(5357.198:138715): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_ Jan 1 01:29:17 syzkaller kern.notice kernel: [ 1038.371950][ T29] audit: type=1400 audit(5357.216:138716): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_