last executing test programs: 21m52.141855379s ago: executing program 0 (id=5): ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000040)={'tunl0\x00', 0x0}) bpf$PROG_LOAD(0x5, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000080)={0x20080522}, &(0x7f00000000c0)={0x200000, 0x200002, 0x7}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000041300"], 0x50) 21m51.467364306s ago: executing program 1 (id=6): r0 = syz_open_dev$loop(&(0x7f0000000140), 0x4, 0x801) ioctl$BLKCRYPTOPREPAREKEY(r0, 0xc040128b, 0x0) 21m51.225025749s ago: executing program 1 (id=7): sendmsg$IPCTNL_MSG_CT_GET_DYING(0xffffffffffffffff, 0x0, 0x4084) bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) r0 = inotify_init1(0x0) read(r0, 0x0, 0x0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000000000040ac054382408b0b00000109022400010000002009040000fd0301000009210000000122010009058103"], 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0}, 0x0) r2 = syz_open_dev$hiddev(&(0x7f00000000c0), 0x0, 0x0) ioctl$HIDIOCSREPORT(r2, 0x81044804, &(0x7f0000000400)={0x1}) syz_usb_control_io$hid(r1, &(0x7f0000000200)={0x14, 0x0, &(0x7f0000000580)={0x0, 0x3, 0x90, @string={0x90, 0x3, "f34634f72e1353da0318fe9681837733a95011dc325416397ad47c61144b2f2a406f06826853f696774fbf43f950b8b6aa0951364a98e328c5443562278e40fdbb7bf41c5e439f77d9d45cac6cae05560b021dc56b0be4a6b5e0ba81a1504e2a9ed5818400be1c03bdff93200376bd107b3ca297727d2d769a1e6435e75dd281340650d7d1825ace5d98ed296bab"}}, 0x0, 0x0}, 0x0) 21m42.62978693s ago: executing program 0 (id=8): r0 = gettid() ppoll(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x6a855000) prctl$PR_SET_THP_DISABLE(0x29, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00'}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21m41.041851967s ago: executing program 0 (id=9): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000800000001000100090000"], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0xb, 0x8, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r4, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000280)=r3}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={r5, &(0x7f00000001c0), 0x0}, 0x20) r6 = fsopen(&(0x7f0000000040)='gfs2meta\x00', 0x1) fsconfig$FSCONFIG_CMD_RECONFIGURE(r6, 0x7, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socket$inet_udp(0x2, 0x2, 0x0) 21m39.241231395s ago: executing program 1 (id=10): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) lremovexattr(0x0, 0x0) 21m39.131780501s ago: executing program 1 (id=11): socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$usbfs(&(0x7f0000000240), 0x75, 0x109301) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_usb_connect$uac1(0x2, 0xdc, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000000000106b1d01014000010203010902ca0003010070000904000000010100000a24010800000201020d24060000030800000000000000240803960c03112d9cd2ce0c240208000103000000ff000924060506020100000924030003030005490c240206", @ANYRES8=r0, @ANYRES16=r0], 0x0) 21m38.160769664s ago: executing program 1 (id=12): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) removexattr(0x0, 0x0) 21m37.6728677s ago: executing program 1 (id=13): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000000)='./file0\x00', r3}, 0x18) 21m24.483025312s ago: executing program 0 (id=14): sendmsg$IPCTNL_MSG_CT_GET_DYING(0xffffffffffffffff, 0x0, 0x4084) bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) r0 = inotify_init1(0x0) read(r0, 0x0, 0x0) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000000000040ac054382408b0b00000109022400010000002009040000fd0301000009210000000122010009058103"], 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f00000003c0)={0x14, 0x0, 0x0, &(0x7f0000000a80)=ANY=[], 0x0}, 0x0) r2 = syz_open_dev$hiddev(&(0x7f00000000c0), 0x0, 0x0) ioctl$HIDIOCSREPORT(r2, 0x81044804, &(0x7f0000000400)={0x1}) syz_usb_control_io$hid(r1, &(0x7f0000000200)={0x14, 0x0, &(0x7f0000000580)={0x0, 0x3, 0x90, @string={0x90, 0x3, "f34634f72e1353da0318fe9681837733a95011dc325416397ad47c61144b2f2a406f06826853f696774fbf43f950b8b6aa0951364a98e328c5443562278e40fdbb7bf41c5e439f77d9d45cac6cae05560b021dc56b0be4a6b5e0ba81a1504e2a9ed5818400be1c03bdff93200376bd107b3ca297727d2d769a1e6435e75dd281340650d7d1825ace5d98ed296bab"}}, 0x0, 0x0}, 0x0) 21m12.924400764s ago: executing program 0 (id=15): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000000)={0x2, 0x1, 0x16, 0x18, 0x9, 0x0}) 21m12.843756299s ago: executing program 0 (id=16): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = epoll_create1(0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000100)) dup3(r5, r4, 0x80000) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000000)={0x20000000}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) 20m51.729682994s ago: executing program 32 (id=13): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000000)='./file0\x00', r3}, 0x18) 20m27.601443374s ago: executing program 33 (id=16): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = epoll_create1(0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000100)) dup3(r5, r4, 0x80000) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000000)={0x20000000}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) 17m7.213406306s ago: executing program 2 (id=286): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000140)=@req3={0x7813, 0x3, 0x2, 0x81, 0x1ff, 0x1, 0x1}, 0x1c) recvmsg$unix(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000f40)=""/258, 0x102}], 0x1}, 0x20) sendmmsg(r2, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x101d0}], 0x1}}], 0x400000000000181, 0x9200000000000000) 17m6.332405134s ago: executing program 2 (id=287): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) faccessat(r2, &(0x7f0000000000)='./file0\x00', 0x5) 17m5.981561154s ago: executing program 2 (id=288): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0, 0x0, 0x3}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) fcntl$setlease(r1, 0x400, 0x1) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_default\x00') 17m5.473157841s ago: executing program 2 (id=289): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {0xb9}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0x8}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x4}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x7f}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffd}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xb0}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) 17m5.026139166s ago: executing program 2 (id=290): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x13}]}}, 0x0, 0x26}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x9, 0x4, 0x4, 0x2, 0x80, 0x1, 0x1000, '\x00', 0x0, r0, 0x1, 0x1}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000380), &(0x7f0000000280)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0d0000000400000004000000ffffffff00000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=r0], 0x50) 17m4.609188299s ago: executing program 2 (id=291): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000380)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 16m19.598385751s ago: executing program 34 (id=291): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000380)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 13m11.493292691s ago: executing program 4 (id=577): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) r1 = socket(0x10, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffffe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x304}, "a6341a1a379332f5", "1fd33c81cf7995313c09de00fd6ded74", "62266bd8", "1e00040000000100"}, 0x28) write$binfmt_script(r2, &(0x7f0000000500)={'#! ', './file0'}, 0xb) close_range(r1, r2, 0x0) 13m11.080812823s ago: executing program 4 (id=578): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0xfffffe00, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) r2 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) r3 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc3}, &(0x7f0000000480)={0x0, "6035ae1e0fe721441705322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x4, r3, r2, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x4, r1, r1, 0x0, 0x0) 13m10.673848676s ago: executing program 4 (id=579): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000640)='kmem_cache_free\x00', r0, 0x0, 0x80001}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffff0180c200000308060001080006040002aaaaaaaaaabbac1414bbaaaaaaaaaafbac"], 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendto$packet(r2, &(0x7f0000000100)="f257a8ea7bc273dfaeab96850806", 0x2a, 0x0, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) 13m9.853148611s ago: executing program 4 (id=580): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18f2ff0000000000000000000072cfe7aa110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xffffa8a9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3, 0x2, {0x0, 0xf0, 0x3}}, 0x18) sendmsg$inet6(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="919127f0d2d46490", 0x8}], 0x1}, 0x30048040) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), r2) syz_usb_connect(0x0, 0x4a, 0x0, 0x0) 13m8.624434578s ago: executing program 4 (id=581): r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x2}}) 13m8.133634625s ago: executing program 4 (id=582): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000003c0)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) 12m22.135238541s ago: executing program 35 (id=582): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000003c0)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) 10m51.323036259s ago: executing program 3 (id=706): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) syz_open_dev$usbfs(&(0x7f00000000c0), 0x800000001fe, 0x82) 10m51.131567239s ago: executing program 3 (id=708): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) fspick(0xffffffffffffff9c, &(0x7f0000001980)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1) 10m50.924023521s ago: executing program 3 (id=709): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r0 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r0, &(0x7f00000043c0)=[{{&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000580)='p', 0x1}], 0x1}}, {{&(0x7f00000006c0)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[], 0x20}}], 0x2, 0x20004800) 10m50.408432519s ago: executing program 3 (id=712): r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x40000000000012d, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000180)=0x80000001, 0x4) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000140)=0x6, 0x4) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x20000000) syz_emit_ethernet(0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x2e, &(0x7f0000000600)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x1, 0x4e20, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) 10m49.631203391s ago: executing program 3 (id=715): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0xc101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) 10m48.315559104s ago: executing program 3 (id=716): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000000000950000000000000085100000fcffffff95"], &(0x7f00000000c0)='GPL\x00'}, 0x94) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x8, 0x3, 0x208, 0x178, 0xe138, 0x198, 0x0, 0x198, 0x230, 0x358, 0x358, 0x230, 0x358, 0x3, 0x0, {[{{@ip={@broadcast, @loopback, 0x0, 0x0, 'nicvf0\x00', 'veth0_to_bond\x00'}, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x5, 0x1, 0x9, 0xf, 'pptp\x00', {0xe}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x268) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 10m2.665964901s ago: executing program 36 (id=716): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000000000950000000000000085100000fcffffff95"], &(0x7f00000000c0)='GPL\x00'}, 0x94) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x8, 0x3, 0x208, 0x178, 0xe138, 0x198, 0x0, 0x198, 0x230, 0x358, 0x358, 0x230, 0x358, 0x3, 0x0, {[{{@ip={@broadcast, @loopback, 0x0, 0x0, 'nicvf0\x00', 'veth0_to_bond\x00'}, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x5, 0x1, 0x9, 0xf, 'pptp\x00', {0xe}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x268) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 8m7.69282893s ago: executing program 5 (id=914): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454ca, &(0x7f0000000100)=ANY=[@ANYBLOB="2e2e0000001303ed6a33f2ff86"]) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'sit0\x00', &(0x7f0000000340)={'gretap0\x00', 0x0, 0x8000, 0x700, 0x1, 0x7, {{0x14, 0x4, 0x2, 0x2, 0x50, 0x64, 0x0, 0x9, 0x2, 0x0, @loopback, @loopback, {[@timestamp_addr={0x44, 0x14, 0xf4, 0x1, 0x9, [{@loopback, 0x7}, {@multicast1, 0x8}]}, @cipso={0x86, 0x6, 0x3}, @generic={0x7, 0xa, "55bc6f134c2cbf06"}, @ra={0x94, 0x4}, @rr={0x7, 0x13, 0xc2, [@rand_addr=0x64010101, @private=0xa010100, @private=0xa010101, @multicast2]}]}}}}}) pipe2(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000100000000000a20000000000a01010000000000000000010000000900010073797a300000000068000000090a010400000000000000000100000008000a4000000000200011800e000100636f6e6e6c696d69740000000c00028008000140000000000900010073797a30000000000900020073797a3200000000080005400000001f0c000980080001400037"], 0xb0}}, 0x0) 8m7.193296118s ago: executing program 5 (id=915): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001000)={&(0x7f0000000140)='kmem_cache_free\x00', r0, 0x0, 0x2}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x18) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000002140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff0200}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1b, &(0x7f0000002140)={0x1, &(0x7f00000000c0)=[{0x6}]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r3) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB='ya\x00\x00\x00\x00\x00\x00\x00\x00~\x00\x00'], 0x1c}}, 0x0) 8m6.549596843s ago: executing program 5 (id=916): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) creat(&(0x7f00000002c0)='./file0\x00', 0x109) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = getpid() bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r2, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)=[0x1], 0x0, 0x0, 0x1, 0x1, r3}}, 0x40) 8m6.102695927s ago: executing program 5 (id=917): r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = socket$packet(0x11, 0x3, 0x300) bind$packet(r2, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x10, 0x6, @link_local}, 0x14) r3 = socket$packet(0x11, 0x3, 0x300) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r4, 0x4) syz_emit_ethernet(0x36, &(0x7f0000000780)=ANY=[], 0x0) 8m5.545651358s ago: executing program 5 (id=918): r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'veth1\x00', &(0x7f00000001c0)=@ethtool_link_settings={0x4c, 0x32, 0xff, 0x3, 0x7d, 0x7, 0xc2, 0xc, 0x66, 0x4, [0x3e, 0x29, 0x3, 0x0, 0x6, 0x8, 0xfffffeff, 0x2174]}}) 8m5.390177746s ago: executing program 5 (id=919): openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x4, 0x0, &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r3, 0x0, 0x9}, 0x18) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x281, 0x0) ioctl$TIOCSSOFTCAR(r4, 0x5453, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffff0180c20000030806000108000604"], 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) r7 = inotify_init() r8 = creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) r9 = inotify_add_watch(r7, &(0x7f0000000200)='./file0\x00', 0x400008bf) write$binfmt_elf32(r8, &(0x7f0000000040)=ANY=[@ANYRES64=r9], 0x69) close(r8) execve(0x0, 0x0, 0x0) 7m20.332835711s ago: executing program 37 (id=919): openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x4, 0x0, &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r3, 0x0, 0x9}, 0x18) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x281, 0x0) ioctl$TIOCSSOFTCAR(r4, 0x5453, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffff0180c20000030806000108000604"], 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) getrusage(0xffffffffffffffff, 0x0) r7 = inotify_init() r8 = creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) r9 = inotify_add_watch(r7, &(0x7f0000000200)='./file0\x00', 0x400008bf) write$binfmt_elf32(r8, &(0x7f0000000040)=ANY=[@ANYRES64=r9], 0x69) close(r8) execve(0x0, 0x0, 0x0) 6m42.119795811s ago: executing program 6 (id=988): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000240)=@reiserfs_2={0x4b}, 0x0) 6m41.872174814s ago: executing program 6 (id=990): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x121602, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x18) ioctl$TIOCVHANGUP(r0, 0x5437, 0x2) 6m41.249459046s ago: executing program 6 (id=993): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f00000002c0)={{r1}, 0x401, 0xffffffffffffffff, 0x7}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='kfree\x00', r0}, 0x18) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240), 0x4000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000200"/15], 0x0}, 0x94) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x10}, 0x1c) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x28, 0x8, 0x0, 0xfffff034}, {0x80000006, 0x0, 0x9, 0x3ff}]}, 0x10) 6m40.607040079s ago: executing program 6 (id=996): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000540)='./file0/file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(&(0x7f0000000400)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x891008, 0x0) 6m40.415042519s ago: executing program 6 (id=997): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x11) recvfrom$inet(r1, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x700, 0x0, 0xfffffffffffffd25) setsockopt$inet_int(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0xc00) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) fcntl$lock(0xffffffffffffffff, 0x6, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000280)={0x1, 0x0, 0x2f, 0x9}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f00000000c0)={0x0, 0x2, 0x7, 0x401}) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000003c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x14, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x3c}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000002100)=@newtaction={0x894, 0x30, 0x12f, 0x0, 0x0, {}, [{0x880, 0x1, [@m_police={0x87c, 0x1, 0x0, 0x0, {{0xb}, {0x850, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x80000000, 0x0, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xb, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff35, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3, 0x0, 0x1]}], [@TCA_POLICE_RATE={0x404, 0x2, [0x7, 0x6, 0xffffffff, 0x7f, 0x401, 0x2, 0x0, 0x2, 0x80000000, 0x4, 0x1, 0x8, 0x0, 0x7fff, 0x75ba, 0x7fffffff, 0x5, 0xffffffff, 0x7ff, 0x2, 0x9, 0x2, 0x0, 0x1000, 0x1, 0x3, 0x6, 0x0, 0xfa, 0x4, 0x0, 0xf, 0x80000001, 0x7, 0xfffffffb, 0x1, 0x20, 0x5, 0x8, 0x1, 0x2f2, 0x7fff, 0x0, 0x81, 0x206, 0x1ff, 0x7, 0x3, 0x5, 0x3, 0x9, 0x1000, 0x401, 0x1, 0x6, 0x7, 0x2, 0x4, 0x7f, 0x5, 0xfffffffb, 0x1, 0x4, 0x5, 0x8, 0x2000009, 0x9, 0x10, 0x9, 0x7, 0xffffff00, 0x97, 0x0, 0x4, 0x8, 0x8, 0x1, 0x958, 0x1fe, 0x4, 0x6, 0x7, 0x80, 0x5, 0xe53, 0x10, 0xfffffffe, 0x4, 0x8, 0x9, 0x7fff, 0x30, 0x8, 0xfffffff7, 0x4, 0x9, 0x1, 0x4, 0x7, 0x9, 0x5, 0x7, 0x6, 0x0, 0x5, 0x2, 0x7, 0x3, 0xcdd, 0x2, 0xd67, 0x7, 0x4, 0x25, 0x9dc5, 0x7, 0x9, 0x2, 0x400, 0x8, 0x0, 0x7, 0x5, 0x9, 0xa, 0xa, 0x9, 0x5, 0xdb5, 0x101, 0x4, 0x74e4, 0x7fff, 0x7, 0x7ff, 0x1, 0xd70, 0x1, 0x8, 0xa, 0x7, 0x1, 0x82, 0x52e, 0x7, 0x1, 0x5, 0x26, 0x1, 0x1b2a, 0x81, 0x9, 0x1c, 0x767, 0x7, 0x9, 0x10, 0xc2a, 0xff, 0x7, 0x6, 0x7, 0x3, 0xfffffff4, 0x8, 0x3, 0xfff, 0x8, 0x2, 0x5, 0x6, 0x3, 0xd7c3, 0x2, 0x10000, 0x7fff, 0x5, 0x5, 0x0, 0xfffffff7, 0x4, 0x2, 0x0, 0x6ee1847d, 0x10001, 0x7ff, 0x1, 0xf0, 0x7, 0x2, 0x7, 0x4, 0x6, 0x4, 0x7, 0x2, 0x0, 0x1, 0x4, 0x3, 0xfff, 0x80000001, 0x7, 0x676, 0x3, 0x9, 0x2, 0x4, 0x7fff, 0x4a5, 0x23, 0x4, 0x9, 0x8, 0x0, 0x8000, 0xa, 0x9, 0xca000000, 0x2, 0xfffffffa, 0x3, 0x7, 0x9, 0x7, 0x65fe, 0x9, 0x6, 0x4, 0x80000000, 0x5, 0x801, 0xb848, 0x6, 0x6, 0x800, 0x7, 0x1, 0xb, 0x80, 0x2, 0x3, 0x6, 0x9, 0x4, 0x4, 0xc, 0x80000001, 0x5, 0x5, 0x10000002, 0xb, 0x7, 0x5, 0x2, 0x4]}], [@TCA_POLICE_AVRATE={0x8, 0x4, 0x9}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x3, 0x1, 0x7, 0x4, 0x1, {0x7, 0x0, 0x3, 0x7, 0x7, 0x80000001}, {0x4, 0x2, 0x2, 0xa, 0x1ff, 0x1c0000}, 0x9, 0xbc, 0xdf72c67}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x894}}, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6018232500082c"], 0x0) 6m40.153272112s ago: executing program 6 (id=998): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f00000001c0)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x2, 0x0, 0x0, 0x0) 6m40.152986972s ago: executing program 38 (id=998): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f00000001c0)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x2, 0x0, 0x0, 0x0) 3m26.128987416s ago: executing program 7 (id=1285): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000001000)={0x2, 0x4e21, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0xfd, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000400)=[@fadd={0x58, 0x114, 0x6, {{0x7, 0x8}, 0x0, 0x0, 0x53a, 0x4, 0xe, 0x8, 0x24, 0x8}}], 0x58}, 0x0) 3m25.693175539s ago: executing program 7 (id=1286): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x38, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast1=0xe0004001}}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x10000047}, 0x0) 3m25.243052042s ago: executing program 7 (id=1287): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="1801000000000000000000006dfeff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r0, 0x0, 0x401}, 0x11) syz_io_uring_setup(0x6180, &(0x7f0000000740)={0x0, 0x8077, 0x6, 0x3, 0x10288}, 0x0, 0x0) 3m24.974517915s ago: executing program 7 (id=1288): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x1b, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) preadv(r2, &(0x7f00000000c0), 0x1a2, 0x8, 0xfffffbfb) 3m24.484075961s ago: executing program 7 (id=1289): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000400)='locks_get_lock_context\x00', r1}, 0x3d) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x2}) 3m24.032538654s ago: executing program 7 (id=1290): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f687372000000001400010076657468315f766c616e"], 0xfc}}, 0x0) 2m38.981101155s ago: executing program 39 (id=1290): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f687372000000001400010076657468315f766c616e"], 0xfc}}, 0x0) 18.53200323s ago: executing program 9 (id=1480): syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x84, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f00000001c0)) syz_open_dev$dmmidi(&(0x7f0000000080), 0x200, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r1, 0xffffffffffffffff, 0x0) 17.904765982s ago: executing program 9 (id=1481): pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff8141", @ANYBLOB="67a9fde5"], 0x3}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000), 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 15.230672469s ago: executing program 9 (id=1482): bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1e00000000000000070000000600000000000000", @ANYRES32, @ANYBLOB="ffffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000900000000000085"], 0x50) 14.913784046s ago: executing program 9 (id=1483): r0 = memfd_create(0x0, 0x6) fallocate(r0, 0x0, 0x9, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000f3ffffffff4f89bde08334ed692a002c08ff1a92d4a964b11e44b0576dba48baf8c1abdabe5d40d0257a7c9d2a4039228f68cc53760cda77df6304000000cb50cc290a32"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r2}, 0x8) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffffe}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r5 = socket$unix(0x1, 0x1, 0x0) pipe2$watch_queue(&(0x7f0000000040), 0x80) close_range(r5, 0xffffffffffffffff, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r6, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x80065c9}, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010200000000000000020000000900010073797a300000000040000000030a01010000000000000000020000000900010073797a30000000000900030073797a320000000014000480080001400000000008000240000000002c000000030a03000000000000000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x400c0d1}, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f0000000280)) dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a310000000084000000060a010400000000000000000100000008000b40000000005c0004802c000180090001007866726d000000001c0002800800024000000004050003000000000008000140000000092c00018008000100636d7000200002800c00038005000100ac000000080001400000000c08000240000000000900010073797a300000000014000000110001"], 0xf8}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 4.632128903s ago: executing program 8 (id=1489): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000080)={0x19}) r1 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r1, 0x3b81, &(0x7f0000000200)={0x15, 0x0, 0x0}) ioctl$IOMMU_IOAS_MAP$PAGES(r0, 0x3b85, &(0x7f00000000c0)={0x28, 0x7, r2, 0x0, &(0x7f0000800000/0x800000)=nil, 0x800000}) ioctl$IOMMU_TEST_OP_CREATE_ACCESS(r0, 0x3ba0, &(0x7f0000000340)={0x48, 0x5, r2, 0x0, 0xffffffffffffffff, 0x1}) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r1, 0x3ba0, &(0x7f0000000180)={0x48, 0x7, r3, 0x0, 0x10001, 0x0, 0x4, 0xdaa50, 0x31f09b}) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r0, 0x3ba0, &(0x7f0000000240)={0x48, 0x7, r3, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x1ecbb5}) close_range(r3, 0xffffffffffffffff, 0x0) 4.225053714s ago: executing program 8 (id=1490): syz_usb_connect(0x0, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000d5e9bd40eb030200c0ba050000010902115c01000000000904000001b504b100090581"], 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x3, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x5a}}, 0x0, 0x5, 0x0, 0x0, 0x41000}, 0x94) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x4, 0x802) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000040)=""/185) 4.131936989s ago: executing program 8 (id=1491): syz_open_dev$ndb(&(0x7f0000000540), 0x0, 0x60081) r0 = syz_open_dev$ndb(&(0x7f0000000b80), 0x0, 0x40) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000bc0)=0x2744b3b7) 4.020488664s ago: executing program 8 (id=1492): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400), 0x42, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000180)=0x0, &(0x7f0000000240)) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1]) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file1/../file0/file0\x00', 0x0, 0x0) mount$bind(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2a05004, 0x0) mount$bind(&(0x7f0000000240)='.\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1a8584c, 0x0) mount$bind(&(0x7f0000000240)='.\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x120584c, 0x0) syz_fuse_handle_req(r0, &(0x7f0000013800)="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", 0x2000, &(0x7f0000001480)={&(0x7f0000000480)={0x50, 0xfffffffffffffff5, 0x0, {0x7, 0x28, 0x2000000, 0x461410, 0x0, 0x0, 0x10000000}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 2.571529359s ago: executing program 9 (id=1493): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x80de02bd3ca0bfdb}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000004440)=[{{0x0, 0x0, 0x0}, 0x9}], 0x1, 0x2102, 0x0) 1.871720665s ago: executing program 8 (id=1494): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000080)={0x19}) r1 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r1, 0x3b81, &(0x7f0000000200)={0x15, 0x0, 0x0}) ioctl$IOMMU_IOAS_MAP$PAGES(r0, 0x3b85, &(0x7f00000000c0)={0x28, 0x7, r2, 0x0, &(0x7f0000800000/0x800000)=nil, 0x800000}) ioctl$IOMMU_TEST_OP_CREATE_ACCESS(r0, 0x3ba0, &(0x7f0000000340)={0x48, 0x5, r2, 0x0, 0xffffffffffffffff, 0x1}) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r1, 0x3ba0, &(0x7f0000000180)={0x48, 0x7, r3, 0x0, 0x10001, 0x0, 0x4, 0xdaa50, 0x31f09b}) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r0, 0x3ba0, &(0x7f0000000240)={0x48, 0x7, r3, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x1ecbb5}) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r1, 0x3ba0, 0x0) 1.719398263s ago: executing program 8 (id=1495): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000600)=ANY=[@ANYBLOB="120100001d9167204f17316a3f26010203010902120001000000000904"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) 1.719119112s ago: executing program 40 (id=1495): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000600)=ANY=[@ANYBLOB="120100001d9167204f17316a3f26010203010902120001000000000904"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) 0s ago: executing program 9 (id=1496): r0 = openat$comedi(0xffffff9c, &(0x7f0000000040)='/dev/comedi1\x00', 0x0, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f0000000300)={'comedi_parport\x00', [0x2f00, 0x5, 0xd09a, 0xffffffff, 0x3, 0xfffffffe, 0x20000004, 0x3, 0xffe, 0x7fffffff, 0xc, 0x2, 0x4, 0x8, 0xffff, 0x6, 0x5, 0x7ff, 0x830, 0x8, 0x10000, 0x9, 0x800, 0x101, 0x2, 0x8001, 0x7, 0x3, 0x4, 0x5, 0x70f]}) kernel console output (not intermixed with test programs): ] audit: type=1326 audit(805.469:1694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7900 comm="syz.5.759" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 805.562223][ T31] audit: type=1326 audit(805.469:1695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7900 comm="syz.5.759" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 805.576179][ T31] audit: type=1326 audit(805.479:1696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7900 comm="syz.5.759" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 805.583211][ T31] audit: type=1326 audit(805.479:1697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7900 comm="syz.5.759" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 805.588864][ T31] audit: type=1326 audit(805.479:1698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7900 comm="syz.5.759" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 805.590520][ T31] audit: type=1326 audit(805.509:1699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7900 comm="syz.5.759" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 805.612026][ T31] audit: type=1326 audit(805.539:1700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7900 comm="syz.5.759" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 806.479091][ T7911] netlink: 4 bytes leftover after parsing attributes in process `syz.5.761'. [ 812.336694][ T7948] netlink: 4 bytes leftover after parsing attributes in process `syz.5.768'. [ 812.549271][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 812.554711][ T31] audit: type=1400 audit(812.479:1705): avc: denied { create } for pid=7950 comm="syz.5.769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 813.929279][ T31] audit: type=1326 audit(813.859:1706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7962 comm="syz.5.773" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 813.932628][ T31] audit: type=1326 audit(813.859:1707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7962 comm="syz.5.773" exe="/syz-executor" sig=0 arch=40000028 syscall=382 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 813.935867][ T31] audit: type=1326 audit(813.869:1708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7962 comm="syz.5.773" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 817.364959][ T8101] netlink: 132 bytes leftover after parsing attributes in process `syz.5.782'. [ 817.624434][ T31] audit: type=1400 audit(817.539:1709): avc: denied { module_request } for pid=7943 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 817.752857][ T31] audit: type=1400 audit(817.679:1710): avc: denied { read } for pid=8106 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 817.786017][ T31] audit: type=1400 audit(817.719:1711): avc: denied { create } for pid=8106 comm="syz.5.784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 817.799142][ T31] audit: type=1400 audit(817.729:1712): avc: denied { connect } for pid=8106 comm="syz.5.784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 817.837334][ T31] audit: type=1400 audit(817.769:1713): avc: denied { setopt } for pid=8106 comm="syz.5.784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 817.871186][ T31] audit: type=1400 audit(817.799:1714): avc: denied { sys_module } for pid=7943 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 818.033252][ T31] audit: type=1400 audit(817.959:1715): avc: denied { prog_load } for pid=8109 comm="syz.5.785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 818.034158][ T31] audit: type=1400 audit(817.959:1716): avc: denied { bpf } for pid=8109 comm="syz.5.785" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 818.034388][ T31] audit: type=1400 audit(817.959:1717): avc: denied { perfmon } for pid=8109 comm="syz.5.785" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 818.034586][ T31] audit: type=1400 audit(817.959:1718): avc: denied { prog_run } for pid=8109 comm="syz.5.785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 818.377164][ T7943] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 818.390559][ T7943] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 818.515229][ T8145] netlink: 32 bytes leftover after parsing attributes in process `syz.5.787'. [ 818.545703][ T8145] netlink: 16402 bytes leftover after parsing attributes in process `syz.5.787'. [ 821.206340][ T7943] hsr_slave_0: entered promiscuous mode [ 821.209114][ T7943] hsr_slave_1: entered promiscuous mode [ 821.944036][ T7943] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 821.961841][ T7943] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 821.983242][ T7943] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 822.007750][ T7943] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 824.123220][ T7943] 8021q: adding VLAN 0 to HW filter on device bond0 [ 824.448383][ T8313] netlink: 4 bytes leftover after parsing attributes in process `syz.5.791'. [ 832.096127][ T1055] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 832.149758][ T1055] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 832.226208][ T1055] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 832.268172][ T1055] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 832.667091][ T1055] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 832.672876][ T1055] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 832.678236][ T1055] bond0 (unregistering): Released all slaves [ 832.776694][ T1055] hsr_slave_0: left promiscuous mode [ 832.778906][ T1055] hsr_slave_1: left promiscuous mode [ 832.787874][ T1055] veth1_macvtap: left promiscuous mode [ 832.788243][ T1055] veth0_macvtap: left promiscuous mode [ 832.788594][ T1055] veth1_vlan: left promiscuous mode [ 832.788787][ T1055] 0·: left promiscuous mode [ 833.219224][ T7943] veth0_vlan: entered promiscuous mode [ 833.277615][ T7943] veth1_vlan: entered promiscuous mode [ 833.387856][ T7943] veth0_macvtap: entered promiscuous mode [ 833.411849][ T7943] veth1_macvtap: entered promiscuous mode [ 833.518959][ T3180] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 833.519413][ T3180] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 833.519515][ T3180] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 833.519648][ T3180] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 833.681497][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 833.681764][ T31] audit: type=1400 audit(833.609:1730): avc: denied { mounton } for pid=7943 comm="syz-executor" path="/syzkaller.Kf8zBx/syz-tmp" dev="vda" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 833.685152][ T31] audit: type=1400 audit(833.619:1731): avc: denied { mount } for pid=7943 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 833.688830][ T31] audit: type=1400 audit(833.619:1732): avc: denied { mounton } for pid=7943 comm="syz-executor" path="/syzkaller.Kf8zBx/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 833.692648][ T31] audit: type=1400 audit(833.619:1733): avc: denied { mount } for pid=7943 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 833.702585][ T31] audit: type=1400 audit(833.629:1734): avc: denied { mounton } for pid=7943 comm="syz-executor" path="/syzkaller.Kf8zBx/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 833.708018][ T31] audit: type=1400 audit(833.639:1735): avc: denied { mounton } for pid=7943 comm="syz-executor" path="/syzkaller.Kf8zBx/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=11695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 833.730804][ T31] audit: type=1400 audit(833.659:1736): avc: denied { unmount } for pid=7943 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 833.746073][ T31] audit: type=1400 audit(833.669:1737): avc: denied { mounton } for pid=7943 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 833.754243][ T31] audit: type=1400 audit(833.679:1738): avc: denied { mount } for pid=7943 comm="syz-executor" name="/" dev="gadgetfs" ino=3200 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 833.754552][ T31] audit: type=1400 audit(833.679:1739): avc: denied { mount } for pid=7943 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 845.397018][ T8401] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2052 sclass=netlink_audit_socket pid=8401 comm=syz.5.797 [ 845.426111][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 845.434593][ T31] audit: type=1400 audit(845.359:1761): avc: denied { allowed } for pid=8400 comm="syz.6.798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 845.437106][ T31] audit: type=1400 audit(845.369:1762): avc: denied { create } for pid=8400 comm="syz.6.798" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 845.438829][ T31] audit: type=1400 audit(845.369:1763): avc: denied { map } for pid=8400 comm="syz.6.798" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11742 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 845.440819][ T31] audit: type=1400 audit(845.369:1764): avc: denied { read write } for pid=8400 comm="syz.6.798" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11742 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 845.481181][ T31] audit: type=1400 audit(845.409:1765): avc: denied { write } for pid=8400 comm="syz.6.798" name="seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 845.504432][ T31] audit: type=1400 audit(845.419:1766): avc: denied { open } for pid=8400 comm="syz.6.798" path="/dev/snd/seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 855.023267][ T8441] netlink: 4 bytes leftover after parsing attributes in process `syz.5.806'. [ 855.418373][ T31] audit: type=1400 audit(855.349:1767): avc: denied { ioctl } for pid=8445 comm="syz.5.808" path="/dev/snd/timer" dev="devtmpfs" ino=718 ioctlcmd=0x5410 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 855.805659][ T31] audit: type=1400 audit(855.729:1768): avc: denied { create } for pid=8428 comm="syz.6.804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 855.811068][ T31] audit: type=1400 audit(855.739:1769): avc: denied { setopt } for pid=8428 comm="syz.6.804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 856.126082][ T31] audit: type=1400 audit(856.059:1770): avc: denied { write } for pid=8451 comm=",&#^%" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 857.996888][ T8458] netlink: 96 bytes leftover after parsing attributes in process `syz.6.813'. [ 858.886124][ T8460] serio: Serial port pts0 [ 874.685293][ T8500] syzkaller0: entered promiscuous mode [ 874.685557][ T8500] syzkaller0: entered allmulticast mode [ 875.326035][ T31] audit: type=1400 audit(875.259:1771): avc: denied { append } for pid=8506 comm="syz.5.819" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 878.672061][ T31] audit: type=1326 audit(878.599:1772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8519 comm="syz.5.822" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 878.672783][ T31] audit: type=1326 audit(878.599:1773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8519 comm="syz.5.822" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 878.689465][ T31] audit: type=1326 audit(878.619:1774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8519 comm="syz.5.822" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x1348ac code=0x7ffc0000 [ 878.692367][ T31] audit: type=1326 audit(878.619:1775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8519 comm="syz.5.822" exe="/syz-executor" sig=0 arch=40000028 syscall=290 compat=0 ip=0x134688 code=0x7ffc0000 [ 878.696773][ T31] audit: type=1326 audit(878.629:1776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8519 comm="syz.5.822" exe="/syz-executor" sig=0 arch=40000028 syscall=291 compat=0 ip=0x1345a8 code=0x7ffc0000 [ 878.697143][ T31] audit: type=1326 audit(878.629:1777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8519 comm="syz.5.822" exe="/syz-executor" sig=0 arch=40000028 syscall=291 compat=0 ip=0x1345a8 code=0x7ffc0000 [ 878.697242][ T31] audit: type=1326 audit(878.629:1778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8519 comm="syz.5.822" exe="/syz-executor" sig=0 arch=40000028 syscall=6 compat=0 ip=0x13070c code=0x7ffc0000 [ 878.702238][ T31] audit: type=1326 audit(878.629:1779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8519 comm="syz.5.822" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 879.940578][ T31] audit: type=1400 audit(879.869:1780): avc: denied { create } for pid=8535 comm="syz.6.827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 881.971023][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 881.972211][ T31] audit: type=1400 audit(881.899:1783): avc: denied { map } for pid=8543 comm="syz.6.831" path="socket:[12432]" dev="sockfs" ino=12432 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 881.984848][ T31] audit: type=1400 audit(881.899:1784): avc: denied { create } for pid=8546 comm="syz.5.832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 881.994575][ T31] audit: type=1400 audit(881.919:1785): avc: denied { write } for pid=8546 comm="syz.5.832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 881.995313][ T31] audit: type=1400 audit(881.919:1786): avc: denied { nlmsg_write } for pid=8546 comm="syz.5.832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 881.995627][ T31] audit: type=1400 audit(881.919:1787): avc: denied { read } for pid=8543 comm="syz.6.831" path="socket:[12432]" dev="sockfs" ino=12432 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 882.494911][ T31] audit: type=1400 audit(882.419:1788): avc: denied { ioctl } for pid=8550 comm="syz.5.834" path="socket:[11882]" dev="sockfs" ino=11882 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 884.690860][ T31] audit: type=1400 audit(884.619:1789): avc: denied { setcheckreqprot } for pid=8567 comm="syz.5.840" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 884.878249][ T8572] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14385 sclass=netlink_route_socket pid=8572 comm=syz.5.842 [ 884.999961][ T31] audit: type=1400 audit(884.919:1790): avc: denied { nlmsg_read } for pid=8573 comm="syz.6.843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 885.004475][ T31] audit: type=1400 audit(884.929:1791): avc: denied { audit_write } for pid=8573 comm="syz.6.843" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 885.006625][ T31] audit: type=1107 audit(884.929:1792): pid=8573 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 885.817214][ T8582] netlink: 4 bytes leftover after parsing attributes in process `syz.6.847'. [ 886.697540][ T8594] ALSA: seq fatal error: cannot create timer (-19) [ 887.481687][ T8603] capability: warning: `syz.6.856' uses deprecated v2 capabilities in a way that may be insecure [ 887.833251][ T8607] netlink: 24 bytes leftover after parsing attributes in process `syz.6.858'. [ 887.834533][ T8607] netlink: 212 bytes leftover after parsing attributes in process `syz.6.858'. [ 888.169127][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 888.169442][ T31] audit: type=1400 audit(888.099:1807): avc: denied { bind } for pid=8608 comm="syz.5.859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 888.205398][ T31] audit: type=1400 audit(888.139:1808): avc: denied { setopt } for pid=8608 comm="syz.5.859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 888.685290][ T31] audit: type=1400 audit(888.619:1809): avc: denied { ioctl } for pid=8608 comm="syz.5.859" path="socket:[12514]" dev="sockfs" ino=12514 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 888.901345][ T8615] serio: Serial port ptm0 [ 889.077880][ T31] audit: type=1326 audit(889.009:1810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8616 comm="syz.6.862" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 889.078241][ T31] audit: type=1326 audit(889.009:1811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8616 comm="syz.6.862" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 889.078446][ T31] audit: type=1326 audit(889.009:1812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8616 comm="syz.6.862" exe="/syz-executor" sig=0 arch=40000028 syscall=448 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 889.078645][ T31] audit: type=1326 audit(889.009:1813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8616 comm="syz.6.862" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 889.103876][ T31] audit: type=1326 audit(889.019:1814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8616 comm="syz.6.862" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 889.107827][ T31] audit: type=1326 audit(889.039:1815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8616 comm="syz.6.862" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 889.112191][ T31] audit: type=1326 audit(889.039:1816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8616 comm="syz.6.862" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 892.792739][ T8647] capability: warning: `syz.6.873' uses 32-bit capabilities (legacy support in use) [ 893.574890][ T8655] netlink: 5 bytes leftover after parsing attributes in process `syz.6.875'. [ 893.575513][ T8655] 0ªî{X¹¦: renamed from gretap0 (while UP) [ 893.612491][ T8655] 0ªî{X¹¦: entered allmulticast mode [ 893.614523][ T8655] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 898.161895][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 898.163163][ T31] audit: type=1400 audit(898.089:1820): avc: denied { execute } for pid=8681 comm="syz.6.888" dev="tmpfs" ino=22 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 898.300892][ T31] audit: type=1400 audit(898.229:1821): avc: denied { execute_no_trans } for pid=8681 comm="syz.6.888" path=2F6D656D66643AA39F6EB4645204693502ACCEE1889D5B4038D7CE1F2039497F151D933DB5E75C274CE6D28EBC294A7454447181CF81BAE531F520C8103EC95C85174CBFCF91DF4DF3025E542A202864656C6574656429 dev="tmpfs" ino=22 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 916.259876][ T31] audit: type=1326 audit(916.189:1822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.5.890" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 916.262963][ T31] audit: type=1326 audit(916.189:1823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.5.890" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 916.267781][ T31] audit: type=1326 audit(916.199:1824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.5.890" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 916.272040][ T31] audit: type=1326 audit(916.199:1825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.5.890" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 916.275599][ T31] audit: type=1326 audit(916.209:1826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.5.890" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 916.280232][ T31] audit: type=1326 audit(916.209:1827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.5.890" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12ffe8 code=0x7ffc0000 [ 916.284508][ T31] audit: type=1326 audit(916.209:1828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.5.890" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 916.287039][ T31] audit: type=1326 audit(916.219:1829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.5.890" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 916.292011][ T31] audit: type=1326 audit(916.219:1830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.5.890" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 916.295779][ T31] audit: type=1326 audit(916.229:1831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8688 comm="syz.5.890" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 916.391579][ T8689] syzkaller1: entered promiscuous mode [ 916.391977][ T8689] syzkaller1: entered allmulticast mode [ 920.199125][ T8715] netlink: 4 bytes leftover after parsing attributes in process `syz.6.897'. [ 920.483044][ T8715] netlink: 4 bytes leftover after parsing attributes in process `syz.6.897'. [ 923.391846][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 923.404228][ T31] audit: type=1400 audit(923.319:1867): avc: denied { getopt } for pid=8725 comm="syz.5.902" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 923.873066][ T31] audit: type=1400 audit(923.799:1868): avc: denied { create } for pid=8729 comm="syz.5.904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 923.889708][ T31] audit: type=1400 audit(923.819:1869): avc: denied { ioctl } for pid=8729 comm="syz.5.904" path="socket:[12668]" dev="sockfs" ino=12668 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 923.895728][ T31] audit: type=1400 audit(923.829:1870): avc: denied { bind } for pid=8729 comm="syz.5.904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 928.680002][ T31] audit: type=1400 audit(928.609:1871): avc: denied { bind } for pid=8758 comm="syz.5.917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 934.286598][ T31] audit: type=1400 audit(934.219:1872): avc: denied { watch watch_reads } for pid=8762 comm="syz.5.919" path="/209/file0" dev="tmpfs" ino=1077 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 942.664721][ T31] audit: type=1400 audit(942.589:1873): avc: denied { create } for pid=8770 comm="syz.6.921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 944.057675][ T31] audit: type=1400 audit(943.989:1874): avc: denied { create } for pid=8776 comm="syz.6.923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 944.598417][ T31] audit: type=1400 audit(944.529:1875): avc: denied { mount } for pid=8776 comm="syz.6.923" name="/" dev="ramfs" ino=12226 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 944.675148][ T8777] smc: net device bond0 applied user defined pnetid SYZ0 [ 944.841978][ T31] audit: type=1400 audit(944.769:1876): avc: denied { ioctl } for pid=8780 comm="syz.6.924" path="socket:[12750]" dev="sockfs" ino=12750 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 963.388483][ T31] audit: type=1400 audit(963.319:1877): avc: denied { watch } for pid=8801 comm="syz.6.934" path="/70" dev="tmpfs" ino=364 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 964.776105][ T31] audit: type=1400 audit(964.709:1878): avc: denied { create } for pid=8810 comm="syz.6.936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 965.848403][ T8816] sch_fq: defrate 2048 ignored. [ 966.255269][ T8818] serio: Serial port pts0 [ 968.774787][ T31] audit: type=1326 audit(968.699:1879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8825 comm="syz.6.940" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 968.778242][ T31] audit: type=1326 audit(968.709:1880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8825 comm="syz.6.940" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 968.783079][ T31] audit: type=1326 audit(968.709:1881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8825 comm="syz.6.940" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 968.798694][ T31] audit: type=1326 audit(968.729:1882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8825 comm="syz.6.940" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 968.801147][ T31] audit: type=1326 audit(968.729:1883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8825 comm="syz.6.940" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 968.807830][ T31] audit: type=1326 audit(968.739:1884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8825 comm="syz.6.940" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 968.814259][ T31] audit: type=1326 audit(968.739:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8825 comm="syz.6.940" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 968.826311][ T31] audit: type=1326 audit(968.739:1886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8825 comm="syz.6.940" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 968.837653][ T31] audit: type=1326 audit(968.769:1887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8825 comm="syz.6.940" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 968.840255][ T31] audit: type=1326 audit(968.769:1888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8825 comm="syz.6.940" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 970.121167][ T8834] serio: Serial port pts0 [ 974.069725][ T8843] ALSA: seq fatal error: cannot create timer (-19) [ 974.337381][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 974.337611][ T31] audit: type=1326 audit(974.269:1900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8845 comm="syz.6.947" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 974.354464][ T31] audit: type=1400 audit(974.279:1901): avc: denied { execute } for pid=8846 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 974.354797][ T31] audit: type=1326 audit(974.279:1902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8845 comm="syz.6.947" exe="/syz-executor" sig=0 arch=40000028 syscall=373 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 974.355048][ T31] audit: type=1326 audit(974.279:1903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8845 comm="syz.6.947" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 974.355257][ T31] audit: type=1400 audit(974.279:1904): avc: denied { execute_no_trans } for pid=8846 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 974.364960][ T31] audit: type=1326 audit(974.299:1905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8845 comm="syz.6.947" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 974.585892][ T31] audit: type=1400 audit(974.519:1906): avc: denied { mounton } for pid=8848 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 974.705050][ T8850] serio: Serial port pts0 [ 979.551383][ T8848] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 979.579477][ T8848] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 981.998241][ T8848] hsr_slave_0: entered promiscuous mode [ 982.000959][ T8848] hsr_slave_1: entered promiscuous mode [ 982.005100][ T8848] debugfs: 'hsr0' already exists in 'hsr' [ 982.006025][ T8848] Cannot create hsr debugfs directory [ 982.899055][ T8848] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 982.909848][ T8848] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 982.966573][ T8848] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 982.995817][ T8848] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 985.179303][ T8848] 8021q: adding VLAN 0 to HW filter on device bond0 [ 996.511576][ T8848] veth0_vlan: entered promiscuous mode [ 996.543139][ T8848] veth1_vlan: entered promiscuous mode [ 996.611766][ T8848] veth0_macvtap: entered promiscuous mode [ 996.622466][ T8848] veth1_macvtap: entered promiscuous mode [ 996.691491][ T7417] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 996.694086][ T7417] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 996.696062][ T7417] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 996.697059][ T7417] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 996.962121][ T31] audit: type=1400 audit(996.889:1907): avc: denied { write } for pid=9214 comm="syz.7.948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 997.099311][ T31] audit: type=1400 audit(997.029:1908): avc: denied { cmd } for pid=9216 comm="syz.7.952" path="socket:[13238]" dev="sockfs" ino=13238 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 997.429046][ T9219] serio: Serial port pts0 [ 1000.962946][ T31] audit: type=1326 audit(1000.879:1909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9237 comm="syz.7.959" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1000.963401][ T31] audit: type=1326 audit(1000.889:1910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9237 comm="syz.7.959" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1000.964112][ T31] audit: type=1326 audit(1000.889:1911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9237 comm="syz.7.959" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1000.964307][ T31] audit: type=1326 audit(1000.889:1912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9237 comm="syz.7.959" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1000.971871][ T31] audit: type=1326 audit(1000.899:1913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9237 comm="syz.7.959" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1000.988896][ T31] audit: type=1326 audit(1000.919:1914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9237 comm="syz.7.959" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1000.992064][ T31] audit: type=1326 audit(1000.919:1915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9237 comm="syz.7.959" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1001.011729][ T31] audit: type=1326 audit(1000.939:1916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9237 comm="syz.7.959" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1002.715897][ T9258] netlink: 8 bytes leftover after parsing attributes in process `syz.6.968'. [ 1004.146747][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 1004.147045][ T31] audit: type=1400 audit(1004.079:1924): avc: denied { create } for pid=9269 comm="syz.6.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1004.267043][ T31] audit: type=1400 audit(1004.189:1925): avc: denied { bind } for pid=9269 comm="syz.6.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1004.271109][ T31] audit: type=1400 audit(1004.199:1926): avc: denied { listen } for pid=9269 comm="syz.6.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1004.340516][ T31] audit: type=1400 audit(1004.269:1927): avc: denied { connect } for pid=9269 comm="syz.6.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1004.381286][ T31] audit: type=1400 audit(1004.299:1928): avc: denied { write } for pid=9269 comm="syz.6.972" path="socket:[14359]" dev="sockfs" ino=14359 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1004.417931][ T31] audit: type=1400 audit(1004.349:1929): avc: denied { accept } for pid=9269 comm="syz.6.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1004.448950][ T31] audit: type=1400 audit(1004.379:1930): avc: denied { read } for pid=9269 comm="syz.6.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1006.531730][ T9278] serio: Serial port pts0 [ 1010.714433][ T31] audit: type=1326 audit(1010.639:1931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9289 comm="syz.6.979" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1010.722782][ T31] audit: type=1326 audit(1010.649:1932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9289 comm="syz.6.979" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1010.723204][ T31] audit: type=1326 audit(1010.649:1933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9289 comm="syz.6.979" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1010.744382][ T31] audit: type=1326 audit(1010.669:1934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9289 comm="syz.6.979" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1010.747236][ T31] audit: type=1326 audit(1010.679:1935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9289 comm="syz.6.979" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1010.749473][ T31] audit: type=1326 audit(1010.679:1936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9289 comm="syz.6.979" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1010.759628][ T31] audit: type=1326 audit(1010.689:1937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9289 comm="syz.6.979" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1010.759793][ T31] audit: type=1326 audit(1010.689:1938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9289 comm="syz.6.979" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1010.759846][ T31] audit: type=1326 audit(1010.689:1939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9289 comm="syz.6.979" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1010.762250][ T31] audit: type=1326 audit(1010.689:1940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9289 comm="syz.6.979" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1011.158604][ T9294] serio: Serial port pts0 [ 1014.318928][ T7417] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1014.418690][ T7417] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1014.588385][ T7417] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1014.688743][ T7417] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1015.445487][ T7417] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1015.504019][ T7417] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1015.520216][ T7417] bond0 (unregistering): Released all slaves [ 1015.670628][ T7417] hsr_slave_0: left promiscuous mode [ 1015.680393][ T7417] hsr_slave_1: left promiscuous mode [ 1015.706205][ T7417] veth1_macvtap: left promiscuous mode [ 1015.712339][ T7417] veth0_macvtap: left promiscuous mode [ 1015.715430][ T7417] veth1_vlan: left promiscuous mode [ 1015.716454][ T7417] veth0_vlan: left promiscuous mode [ 1021.997661][ T9332] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1022.027241][ T9332] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1023.180497][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 1023.180801][ T31] audit: type=1400 audit(1023.109:1971): avc: denied { load_policy } for pid=9557 comm="syz.7.1006" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1023.181270][ T9559] SELinux: failed to load policy [ 1025.126866][ T9332] hsr_slave_0: entered promiscuous mode [ 1025.128565][ T9332] hsr_slave_1: entered promiscuous mode [ 1026.330594][ T9332] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 1026.390888][ T9332] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 1026.450766][ T9332] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 1026.550077][ T9332] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 1027.289588][ T31] audit: type=1326 audit(1027.219:1972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9706 comm="syz.7.1010" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1027.290478][ T31] audit: type=1326 audit(1027.219:1973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9706 comm="syz.7.1010" exe="/syz-executor" sig=0 arch=40000028 syscall=383 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1027.296916][ T31] audit: type=1326 audit(1027.219:1974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9706 comm="syz.7.1010" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1027.297297][ T31] audit: type=1326 audit(1027.229:1975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9706 comm="syz.7.1010" exe="/syz-executor" sig=0 arch=40000028 syscall=136 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1027.297469][ T31] audit: type=1326 audit(1027.229:1976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9706 comm="syz.7.1010" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1027.307846][ T31] audit: type=1326 audit(1027.229:1977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9706 comm="syz.7.1010" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1027.309133][ T31] audit: type=1326 audit(1027.229:1978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9706 comm="syz.7.1010" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1027.310159][ T31] audit: type=1326 audit(1027.239:1979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9706 comm="syz.7.1010" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1027.311081][ T31] audit: type=1326 audit(1027.239:1980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9706 comm="syz.7.1010" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1028.211820][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 1028.212750][ T31] audit: type=1326 audit(1028.139:1999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9728 comm="syz.7.1012" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1028.215822][ T31] audit: type=1326 audit(1028.139:2000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9728 comm="syz.7.1012" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1028.236449][ T31] audit: type=1326 audit(1028.169:2001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9728 comm="syz.7.1012" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1028.236818][ T31] audit: type=1326 audit(1028.169:2002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9728 comm="syz.7.1012" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1028.237010][ T31] audit: type=1326 audit(1028.169:2003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9728 comm="syz.7.1012" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1028.251595][ T31] audit: type=1326 audit(1028.179:2004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9728 comm="syz.7.1012" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1028.305214][ T31] audit: type=1326 audit(1028.239:2005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9728 comm="syz.7.1012" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1028.305384][ T31] audit: type=1326 audit(1028.239:2006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9728 comm="syz.7.1012" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1028.418510][ T31] audit: type=1326 audit(1028.309:2007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9728 comm="syz.7.1012" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1028.459290][ T31] audit: type=1326 audit(1028.389:2008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9728 comm="syz.7.1012" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1029.199098][ T9332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1040.259159][ T9332] veth0_vlan: entered promiscuous mode [ 1040.349328][ T9332] veth1_vlan: entered promiscuous mode [ 1040.587049][ T9332] veth0_macvtap: entered promiscuous mode [ 1040.661160][ T9332] veth1_macvtap: entered promiscuous mode [ 1040.933218][ T3180] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1040.934843][ T3180] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1040.935539][ T3180] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1040.935858][ T3180] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1042.245614][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 1042.246544][ T31] audit: type=1326 audit(1042.179:2016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9795 comm="syz.8.1015" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1042.248888][ T31] audit: type=1326 audit(1042.179:2017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9795 comm="syz.8.1015" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1042.271401][ T31] audit: type=1326 audit(1042.199:2018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9795 comm="syz.8.1015" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12ffe8 code=0x7ffc0000 [ 1042.280251][ T31] audit: type=1326 audit(1042.209:2019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9795 comm="syz.8.1015" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12ffe8 code=0x7ffc0000 [ 1042.282029][ T31] audit: type=1326 audit(1042.209:2020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9795 comm="syz.8.1015" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1042.285004][ T31] audit: type=1326 audit(1042.209:2021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9795 comm="syz.8.1015" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1042.288628][ T31] audit: type=1326 audit(1042.219:2022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9795 comm="syz.8.1015" exe="/syz-executor" sig=0 arch=40000028 syscall=332 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1042.292548][ T31] audit: type=1326 audit(1042.219:2023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9795 comm="syz.8.1015" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1042.300758][ T31] audit: type=1326 audit(1042.229:2024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9795 comm="syz.8.1015" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1042.766514][ T31] audit: type=1400 audit(1042.699:2025): avc: denied { validate_trans } for pid=9799 comm="syz.8.1017" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1044.456174][ T9811] netlink: 20 bytes leftover after parsing attributes in process `syz.8.1022'. [ 1044.457665][ T9811] x_tables: ip_tables: udp match: only valid for protocol 17 [ 1060.267597][ T9892] netlink: 16 bytes leftover after parsing attributes in process `syz.7.1033'. [ 1060.494715][ T31] audit: type=1326 audit(1060.379:2026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9893 comm="syz.7.1034" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1060.495082][ T31] audit: type=1326 audit(1060.379:2027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9893 comm="syz.7.1034" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1060.495334][ T31] audit: type=1326 audit(1060.379:2028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9893 comm="syz.7.1034" exe="/syz-executor" sig=0 arch=40000028 syscall=424 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1060.495456][ T31] audit: type=1326 audit(1060.379:2029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9893 comm="syz.7.1034" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1061.753000][ T31] audit: type=1400 audit(1061.669:2030): avc: denied { create } for pid=9903 comm="syz.7.1039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1061.768770][ T31] audit: type=1400 audit(1061.689:2031): avc: denied { write } for pid=9903 comm="syz.7.1039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1063.018476][ T31] audit: type=1326 audit(1062.949:2032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9919 comm="syz.7.1044" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1063.020497][ T31] audit: type=1326 audit(1062.949:2033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9919 comm="syz.7.1044" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1063.022891][ T31] audit: type=1326 audit(1062.949:2034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9919 comm="syz.7.1044" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1063.025575][ T31] audit: type=1326 audit(1062.949:2035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9919 comm="syz.7.1044" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1063.366240][ T9923] pim6reg1: entered promiscuous mode [ 1063.367529][ T9923] pim6reg1: entered allmulticast mode [ 1064.759481][ T9945] netlink: 8 bytes leftover after parsing attributes in process `syz.8.1051'. [ 1064.764094][ T9945] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1051'. [ 1069.524585][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 1069.538465][ T31] audit: type=1107 audit(1069.449:2047): pid=9961 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 1074.334195][ T31] audit: type=1400 audit(1074.259:2048): avc: denied { create } for pid=9965 comm="syz.8.1056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1074.364526][ T31] audit: type=1400 audit(1074.289:2049): avc: denied { sys_admin } for pid=9965 comm="syz.8.1056" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1083.404110][ T31] audit: type=1400 audit(1083.329:2050): avc: denied { create } for pid=10019 comm="syz.7.1066" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=unix_stream_socket permissive=1 [ 1083.414266][ T31] audit: type=1400 audit(1083.339:2051): avc: denied { bind } for pid=10019 comm="syz.7.1066" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=unix_stream_socket permissive=1 [ 1083.425229][ T31] audit: type=1400 audit(1083.359:2052): avc: denied { listen } for pid=10019 comm="syz.7.1066" path=2F35382FE91F7189591E9233614B scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=unix_stream_socket permissive=1 [ 1084.979187][T10026] netlink: 92 bytes leftover after parsing attributes in process `syz.8.1069'. [ 1084.981855][T10026] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1085.196429][ T31] audit: type=1400 audit(1085.129:2053): avc: denied { nlmsg_write } for pid=10027 comm="syz.8.1070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1091.442116][T10049] netlink: 'syz.7.1075': attribute type 11 has an invalid length. [ 1091.450228][T10049] netlink: 44 bytes leftover after parsing attributes in process `syz.7.1075'. [ 1093.959172][T10068] netlink: 28 bytes leftover after parsing attributes in process `syz.7.1084'. [ 1093.961052][T10068] netlink: 28 bytes leftover after parsing attributes in process `syz.7.1084'. [ 1095.067449][ T31] audit: type=1400 audit(1094.999:2054): avc: denied { create } for pid=10072 comm="syz.7.1086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1095.088616][ T31] audit: type=1400 audit(1095.019:2055): avc: denied { setopt } for pid=10072 comm="syz.7.1086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1095.363254][ T31] audit: type=1400 audit(1095.289:2056): avc: denied { lock } for pid=10076 comm="syz.8.1088" path="socket:[15122]" dev="sockfs" ino=15122 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 1096.365789][ T31] audit: type=1400 audit(1096.299:2057): avc: denied { create } for pid=10090 comm="syz.7.1094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1096.370479][ T31] audit: type=1400 audit(1096.299:2058): avc: denied { write } for pid=10090 comm="syz.7.1094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1096.994464][ T31] audit: type=1326 audit(1096.919:2059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10099 comm="syz.7.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1097.015202][ T31] audit: type=1326 audit(1096.939:2060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10099 comm="syz.7.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1097.087597][ T31] audit: type=1326 audit(1097.019:2061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10099 comm="syz.7.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1097.093239][ T31] audit: type=1326 audit(1097.019:2062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10099 comm="syz.7.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1097.098577][ T31] audit: type=1326 audit(1097.019:2063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10099 comm="syz.7.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1100.448626][ T31] kauditd_printk_skb: 86 callbacks suppressed [ 1100.449555][ T31] audit: type=1400 audit(1100.379:2150): avc: denied { mount } for pid=10142 comm="syz.7.1109" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1100.487023][ T31] audit: type=1400 audit(1100.419:2151): avc: denied { unmount } for pid=8848 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1100.710647][ T31] audit: type=1400 audit(1100.639:2152): avc: denied { create } for pid=10146 comm="syz.7.1110" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1100.768396][ T31] audit: type=1400 audit(1100.699:2153): avc: denied { write } for pid=10146 comm="syz.7.1110" name="file0" dev="tmpfs" ino=467 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1100.770330][ T31] audit: type=1400 audit(1100.699:2154): avc: denied { open } for pid=10146 comm="syz.7.1110" path="/88/file0" dev="tmpfs" ino=467 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1100.817567][ T31] audit: type=1400 audit(1100.749:2155): avc: denied { unlink } for pid=8848 comm="syz-executor" name="file0" dev="tmpfs" ino=467 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1101.435996][T10159] netlink: 'syz.7.1114': attribute type 1 has an invalid length. [ 1102.180533][T10185] SELinux: failed to load policy [ 1103.087084][ T7417] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1103.195676][ T7417] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1103.373161][ T7417] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1103.497655][ T31] audit: type=1326 audit(1103.409:2156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10207 comm="syz.7.1125" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1103.517992][ T31] audit: type=1326 audit(1103.409:2157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10207 comm="syz.7.1125" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1103.538293][ T7417] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1103.546171][ T31] audit: type=1326 audit(1103.479:2158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10207 comm="syz.7.1125" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1103.548120][ T31] audit: type=1326 audit(1103.479:2159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10207 comm="syz.7.1125" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1104.081602][ T7417] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1104.108079][ T7417] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1104.119508][ T7417] bond0 (unregistering): Released all slaves [ 1104.236709][T10230] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1104.298476][ T7417] hsr_slave_0: left promiscuous mode [ 1104.304363][ T7417] hsr_slave_1: left promiscuous mode [ 1104.349204][ T7417] veth1_macvtap: left promiscuous mode [ 1104.349577][ T7417] veth0_macvtap: left promiscuous mode [ 1104.349922][ T7417] veth1_vlan: left promiscuous mode [ 1104.350066][ T7417] veth0_vlan: left promiscuous mode [ 1106.337145][T10230] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1106.478878][T10230] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1106.581763][T10230] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1106.729523][ T7417] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1106.767676][ T7417] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1106.796643][ T7417] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1106.838372][ T7417] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1108.934718][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 1108.934873][ T31] audit: type=1400 audit(1108.869:2177): avc: denied { connect } for pid=10268 comm="syz.7.1132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1108.974732][ T31] audit: type=1400 audit(1108.899:2178): avc: denied { write } for pid=10268 comm="syz.7.1132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1109.105330][ T31] audit: type=1326 audit(1109.039:2179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10273 comm="syz.7.1133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1109.105647][ T31] audit: type=1326 audit(1109.039:2180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10273 comm="syz.7.1133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1109.108086][ T31] audit: type=1326 audit(1109.039:2181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10273 comm="syz.7.1133" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1109.122389][ T31] audit: type=1326 audit(1109.049:2182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10273 comm="syz.7.1133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1109.148006][ T31] audit: type=1326 audit(1109.079:2183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10273 comm="syz.7.1133" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1109.148337][ T31] audit: type=1326 audit(1109.079:2184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10273 comm="syz.7.1133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1109.156251][ T31] audit: type=1326 audit(1109.089:2185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10273 comm="syz.7.1133" exe="/syz-executor" sig=0 arch=40000028 syscall=153 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1109.175739][ T31] audit: type=1326 audit(1109.099:2186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10273 comm="syz.7.1133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1126.731919][T10321] serio: Serial port pts0 [ 1134.744610][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 1134.744842][ T31] audit: type=1400 audit(1134.669:2188): avc: denied { mount } for pid=10333 comm="syz.8.1142" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1150.235944][ T31] audit: type=1400 audit(1150.169:2189): avc: denied { unmount } for pid=9332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1150.440733][T10374] serio: Serial port pts0 [ 1155.149240][ T31] audit: type=1326 audit(1155.079:2190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10419 comm="syz.7.1152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1155.149569][ T31] audit: type=1326 audit(1155.079:2191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10419 comm="syz.7.1152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1155.163056][ T31] audit: type=1326 audit(1155.089:2192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10419 comm="syz.7.1152" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1155.163859][ T31] audit: type=1326 audit(1155.089:2193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10419 comm="syz.7.1152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1155.164060][ T31] audit: type=1326 audit(1155.089:2194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10419 comm="syz.7.1152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1155.187412][ T31] audit: type=1326 audit(1155.119:2195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10419 comm="syz.7.1152" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1155.195998][ T31] audit: type=1326 audit(1155.129:2196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10419 comm="syz.7.1152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1155.199533][ T31] audit: type=1326 audit(1155.129:2197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10419 comm="syz.7.1152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1155.204195][T10422] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 1155.206143][ T31] audit: type=1326 audit(1155.139:2198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10419 comm="syz.7.1152" exe="/syz-executor" sig=0 arch=40000028 syscall=358 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1155.680733][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 1155.681850][ T31] audit: type=1326 audit(1155.609:2201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10424 comm="syz.8.1154" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1155.712676][ T31] audit: type=1326 audit(1155.639:2202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10424 comm="syz.8.1154" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1155.712955][ T31] audit: type=1326 audit(1155.639:2203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10424 comm="syz.8.1154" exe="/syz-executor" sig=0 arch=40000028 syscall=262 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1155.713143][ T31] audit: type=1326 audit(1155.639:2204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10424 comm="syz.8.1154" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1155.947400][T10428] netlink: 12 bytes leftover after parsing attributes in process `syz.7.1156'. [ 1156.610803][ T31] audit: type=1400 audit(1156.539:2205): avc: denied { name_bind } for pid=10436 comm="syz.7.1161" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1156.611130][ T31] audit: type=1400 audit(1156.539:2206): avc: denied { node_bind } for pid=10436 comm="syz.7.1161" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1156.936291][T10442] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1163'. [ 1157.462210][T10447] netlink: 28 bytes leftover after parsing attributes in process `syz.7.1165'. [ 1158.327440][ T31] audit: type=1400 audit(1158.259:2207): avc: denied { write } for pid=10441 comm="syz.8.1163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1158.338624][ T31] audit: type=1326 audit(1158.269:2208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10441 comm="syz.8.1163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1158.340715][ T31] audit: type=1326 audit(1158.269:2209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10441 comm="syz.8.1163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1158.356201][ T31] audit: type=1326 audit(1158.289:2210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10441 comm="syz.8.1163" exe="/syz-executor" sig=0 arch=40000028 syscall=41 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1158.381017][T10473] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1163'. [ 1160.686768][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 1160.687799][ T31] audit: type=1400 audit(1160.619:2240): avc: denied { wake_alarm } for pid=10479 comm="syz.8.1170" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1160.798117][ T31] audit: type=1400 audit(1160.729:2241): avc: denied { setopt } for pid=10479 comm="syz.8.1170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1160.854176][T10480] netlink: 'syz.8.1170': attribute type 10 has an invalid length. [ 1161.146170][ T31] audit: type=1400 audit(1161.079:2242): avc: denied { open } for pid=10481 comm="syz.8.1171" path="/dev/ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1161.152550][ T31] audit: type=1400 audit(1161.079:2243): avc: denied { ioctl } for pid=10481 comm="syz.8.1171" path="/dev/ttyS3" dev="devtmpfs" ino=607 ioctlcmd=0x5453 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1161.364362][ T31] audit: type=1326 audit(1161.289:2244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10483 comm="syz.8.1172" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1161.365012][ T31] audit: type=1326 audit(1161.289:2245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10483 comm="syz.8.1172" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1161.365205][ T31] audit: type=1326 audit(1161.289:2246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10483 comm="syz.8.1172" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1161.365386][ T31] audit: type=1326 audit(1161.289:2247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10483 comm="syz.8.1172" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1161.365572][ T31] audit: type=1326 audit(1161.299:2248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10483 comm="syz.8.1172" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1161.365777][ T31] audit: type=1326 audit(1161.299:2249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10483 comm="syz.8.1172" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1165.557955][T10497] netlink: 56 bytes leftover after parsing attributes in process `syz.8.1178'. [ 1165.571640][T10497] netlink: 24 bytes leftover after parsing attributes in process `syz.8.1178'. [ 1165.796531][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 1165.796789][ T31] audit: type=1400 audit(1165.729:2265): avc: denied { create } for pid=10471 comm="syz.7.1167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 1166.055148][ T31] audit: type=1400 audit(1165.989:2266): avc: denied { name_bind } for pid=10504 comm="syz.8.1181" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1166.062025][ T31] audit: type=1400 audit(1165.989:2267): avc: denied { write } for pid=10504 comm="syz.8.1181" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1166.076363][ T31] audit: type=1400 audit(1165.999:2268): avc: denied { create } for pid=10471 comm="syz.7.1167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1168.834611][ T31] audit: type=1400 audit(1168.759:2269): avc: denied { create } for pid=10507 comm="syz.8.1182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1169.389687][ T31] audit: type=1400 audit(1169.289:2270): avc: denied { read } for pid=10510 comm="syz.8.1183" dev="nsfs" ino=4026532648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1169.407179][ T31] audit: type=1400 audit(1169.329:2271): avc: denied { open } for pid=10510 comm="syz.8.1183" path="net:[4026532648]" dev="nsfs" ino=4026532648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1169.436783][T10511] netlink: 8 bytes leftover after parsing attributes in process `syz.8.1183'. [ 1169.863193][ T31] audit: type=1400 audit(1169.789:2272): avc: denied { create } for pid=10516 comm="syz.8.1186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1169.876471][ T31] audit: type=1400 audit(1169.809:2273): avc: denied { setopt } for pid=10516 comm="syz.8.1186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1174.478472][ T31] audit: type=1400 audit(1174.409:2274): avc: denied { load_policy } for pid=10524 comm="syz.8.1189" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1174.480912][T10525] SELinux: failed to load policy [ 1176.215309][ T31] audit: type=1400 audit(1176.129:2275): avc: denied { bind } for pid=10533 comm="syz.8.1193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1176.219962][ T31] audit: type=1400 audit(1176.149:2276): avc: denied { setopt } for pid=10533 comm="syz.8.1193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1177.842632][ T31] audit: type=1400 audit(1177.769:2277): avc: denied { name_bind } for pid=10540 comm="syz.8.1196" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1177.856979][ T31] audit: type=1400 audit(1177.779:2278): avc: denied { node_bind } for pid=10540 comm="syz.8.1196" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1177.880534][T10541] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 1178.340504][ T31] audit: type=1400 audit(1178.269:2279): avc: denied { map } for pid=10544 comm="syz.8.1198" path="socket:[16835]" dev="sockfs" ino=16835 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1178.343109][ T31] audit: type=1400 audit(1178.269:2280): avc: denied { read write } for pid=10544 comm="syz.8.1198" path="socket:[16835]" dev="sockfs" ino=16835 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1178.898689][ T31] audit: type=1400 audit(1178.829:2281): avc: denied { create } for pid=10550 comm="syz.8.1201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1178.914693][ T31] audit: type=1400 audit(1178.839:2282): avc: denied { ioctl } for pid=10550 comm="syz.8.1201" path="socket:[15920]" dev="sockfs" ino=15920 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1178.915021][ T31] audit: type=1400 audit(1178.839:2283): avc: denied { ioctl } for pid=10550 comm="syz.8.1201" path="socket:[15919]" dev="sockfs" ino=15919 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1179.696151][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 1179.696421][ T31] audit: type=1326 audit(1179.629:2286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10554 comm="syz.8.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1179.696957][ T31] audit: type=1326 audit(1179.629:2287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10554 comm="syz.8.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1179.703789][ T31] audit: type=1326 audit(1179.629:2288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10554 comm="syz.8.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1179.704188][ T31] audit: type=1326 audit(1179.629:2289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10554 comm="syz.8.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1179.715745][ T31] audit: type=1326 audit(1179.649:2290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10554 comm="syz.8.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1179.719906][ T31] audit: type=1326 audit(1179.649:2291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10554 comm="syz.8.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1179.722619][ T31] audit: type=1326 audit(1179.649:2292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10554 comm="syz.8.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1179.726118][ T31] audit: type=1326 audit(1179.649:2293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10554 comm="syz.8.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=274 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1179.729402][ T31] audit: type=1326 audit(1179.649:2294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10554 comm="syz.8.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1179.731286][ T31] audit: type=1326 audit(1179.649:2295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10554 comm="syz.8.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1180.671523][T10559] serio: Serial port pts0 [ 1184.498442][T10577] serio: Serial port pts0 [ 1187.938733][T10594] netlink: 'syz.7.1213': attribute type 1 has an invalid length. [ 1188.022489][T10594] bond1: entered promiscuous mode [ 1188.026963][T10594] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1188.090596][T10594] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1188.096991][T10594] bond1: (slave wireguard0): The slave device specified does not support setting the MAC address [ 1188.101202][T10594] bond1: (slave wireguard0): Setting fail_over_mac to active for active-backup mode [ 1188.318830][T10594] bond1: (slave wireguard0): making interface the new active one [ 1188.321012][T10594] wireguard0: entered promiscuous mode [ 1188.326105][T10594] bond1: (slave wireguard0): Enslaving as an active interface with an up link [ 1188.526454][T10634] serio: Serial port pts0 [ 1190.536605][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 1190.537613][ T31] audit: type=1400 audit(1190.469:2301): avc: denied { execmem } for pid=10644 comm="syz.7.1219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1191.774708][T10660] serio: Serial port pts0 [ 1191.955592][ T31] audit: type=1400 audit(1191.879:2302): avc: denied { create } for pid=10661 comm="syz.8.1225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1192.016701][ T31] audit: type=1326 audit(1191.949:2303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10661 comm="syz.8.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1192.034314][ T31] audit: type=1326 audit(1191.959:2304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10661 comm="syz.8.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1192.034684][ T31] audit: type=1326 audit(1191.959:2305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10661 comm="syz.8.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1192.062720][ T31] audit: type=1326 audit(1191.989:2306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10661 comm="syz.8.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1192.063110][ T31] audit: type=1326 audit(1191.989:2307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10661 comm="syz.8.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1192.087591][ T31] audit: type=1326 audit(1192.019:2308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10661 comm="syz.8.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1192.088151][ T31] audit: type=1326 audit(1192.019:2309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10661 comm="syz.8.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1192.098885][ T31] audit: type=1326 audit(1192.019:2310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10661 comm="syz.8.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1195.569209][T10696] serio: Serial port pts0 [ 1196.674904][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 1196.675291][ T31] audit: type=1400 audit(1196.599:2355): avc: denied { setopt } for pid=10704 comm="syz.7.1235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1197.485163][ T31] audit: type=1326 audit(1197.409:2356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10710 comm="syz.7.1237" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1197.485548][ T31] audit: type=1326 audit(1197.419:2357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10710 comm="syz.7.1237" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1197.507925][ T31] audit: type=1326 audit(1197.439:2358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10710 comm="syz.7.1237" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1197.517790][ T31] audit: type=1326 audit(1197.449:2359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10710 comm="syz.7.1237" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1197.519001][ T31] audit: type=1326 audit(1197.449:2360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10710 comm="syz.7.1237" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1197.520176][ T31] audit: type=1326 audit(1197.449:2361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10710 comm="syz.7.1237" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1197.521160][ T31] audit: type=1326 audit(1197.449:2362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10710 comm="syz.7.1237" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1197.539712][ T31] audit: type=1326 audit(1197.469:2363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10710 comm="syz.7.1237" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1197.567170][ T31] audit: type=1326 audit(1197.499:2364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10710 comm="syz.7.1237" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1198.883508][T10722] netlink: 13 bytes leftover after parsing attributes in process `syz.8.1240'. [ 1201.689379][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 1201.689805][ T31] audit: type=1400 audit(1201.619:2377): avc: denied { write } for pid=10761 comm="syz.7.1248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1201.717951][ T31] audit: type=1400 audit(1201.649:2378): avc: denied { block_suspend } for pid=10761 comm="syz.7.1248" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1201.996402][ T31] audit: type=1326 audit(1201.919:2379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10767 comm="syz.7.1249" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1202.014622][ T31] audit: type=1326 audit(1201.919:2380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10767 comm="syz.7.1249" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1202.029464][ T31] audit: type=1326 audit(1201.959:2381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10767 comm="syz.7.1249" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1202.029834][ T31] audit: type=1326 audit(1201.959:2382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10767 comm="syz.7.1249" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1202.030025][ T31] audit: type=1326 audit(1201.959:2383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10767 comm="syz.7.1249" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1202.046844][ T31] audit: type=1326 audit(1201.979:2384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10767 comm="syz.7.1249" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1202.054651][ T31] audit: type=1326 audit(1201.979:2385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10767 comm="syz.7.1249" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1202.068964][ T31] audit: type=1326 audit(1201.999:2386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10767 comm="syz.7.1249" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1202.575974][T10776] netlink: 8 bytes leftover after parsing attributes in process `syz.8.1250'. [ 1207.270952][ T31] kauditd_printk_skb: 108 callbacks suppressed [ 1207.271975][ T31] audit: type=1400 audit(1207.199:2495): avc: denied { create } for pid=10839 comm="syz.7.1282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1207.288863][ T31] audit: type=1400 audit(1207.219:2496): avc: denied { ioctl } for pid=10839 comm="syz.7.1282" path="socket:[17154]" dev="sockfs" ino=17154 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1207.904725][ T31] audit: type=1400 audit(1207.829:2497): avc: denied { connect } for pid=10845 comm="syz.7.1283" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1208.729942][ T31] audit: type=1400 audit(1208.659:2498): avc: denied { bind } for pid=10849 comm="syz.7.1285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1208.731725][ T31] audit: type=1400 audit(1208.659:2499): avc: denied { write } for pid=10849 comm="syz.7.1285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1209.395858][ T31] audit: type=1400 audit(1209.329:2500): avc: denied { sqpoll } for pid=10854 comm="syz.7.1287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1212.691727][ T31] audit: type=1326 audit(1212.619:2501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10838 comm="syz.8.1281" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1212.699244][ T31] audit: type=1326 audit(1212.629:2502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10838 comm="syz.8.1281" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1212.766160][ T31] audit: type=1326 audit(1212.629:2503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10838 comm="syz.8.1281" exe="/syz-executor" sig=0 arch=40000028 syscall=385 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1212.770709][ T31] audit: type=1326 audit(1212.699:2504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10838 comm="syz.8.1281" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1212.773157][ T31] audit: type=1326 audit(1212.699:2505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10838 comm="syz.8.1281" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1212.775570][ T31] audit: type=1326 audit(1212.699:2506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10838 comm="syz.8.1281" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1212.777272][ T31] audit: type=1326 audit(1212.699:2507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10838 comm="syz.8.1281" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1212.781530][ T31] audit: type=1326 audit(1212.699:2508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10838 comm="syz.8.1281" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1212.786238][ T31] audit: type=1326 audit(1212.709:2509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10838 comm="syz.8.1281" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1212.788545][ T31] audit: type=1326 audit(1212.709:2510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10838 comm="syz.8.1281" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1222.023923][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 1222.024188][ T31] audit: type=1400 audit(1221.949:2543): avc: denied { mount } for pid=10902 comm="syz.8.1306" name="/" dev="configfs" ino=27 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1222.047702][ T31] audit: type=1400 audit(1221.969:2544): avc: denied { search } for pid=10902 comm="syz.8.1306" name="/" dev="configfs" ino=27 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1222.068014][ T31] audit: type=1400 audit(1221.999:2545): avc: denied { search } for pid=10902 comm="syz.8.1306" name="/" dev="configfs" ino=27 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1222.078619][ T31] audit: type=1400 audit(1221.999:2546): avc: denied { read open } for pid=10902 comm="syz.8.1306" path="/" dev="configfs" ino=27 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1226.771973][T10918] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1312'. [ 1227.426480][T10920] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1312'. [ 1228.210478][ T31] audit: type=1326 audit(1228.139:2547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10923 comm="syz.8.1314" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1228.215158][ T31] audit: type=1326 audit(1228.149:2548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10923 comm="syz.8.1314" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1228.215554][ T31] audit: type=1326 audit(1228.149:2549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10923 comm="syz.8.1314" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1228.220630][ T31] audit: type=1326 audit(1228.149:2550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10923 comm="syz.8.1314" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1228.227444][ T31] audit: type=1326 audit(1228.159:2551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10923 comm="syz.8.1314" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1228.245920][ T31] audit: type=1326 audit(1228.159:2552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10923 comm="syz.8.1314" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1228.250012][ T31] audit: type=1326 audit(1228.159:2553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10923 comm="syz.8.1314" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1228.278291][ T31] audit: type=1326 audit(1228.209:2554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10923 comm="syz.8.1314" exe="/syz-executor" sig=0 arch=40000028 syscall=382 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1228.284517][ T31] audit: type=1326 audit(1228.209:2555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10923 comm="syz.8.1314" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1228.286270][ T31] audit: type=1326 audit(1228.219:2556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10923 comm="syz.8.1314" exe="/syz-executor" sig=0 arch=40000028 syscall=428 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1236.415306][T10955] serio: Serial port pts0 [ 1243.804202][T10975] binfmt_misc: register: failed to install interpreter file ./bus [ 1248.266189][T10999] netlink: 8 bytes leftover after parsing attributes in process `syz.8.1337'. [ 1249.271779][T11004] netlink: 14 bytes leftover after parsing attributes in process `syz.8.1339'. [ 1250.442925][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 1250.444537][ T31] audit: type=1326 audit(1250.369:2581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11013 comm="syz.8.1342" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1250.455016][ T31] audit: type=1326 audit(1250.389:2582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11013 comm="syz.8.1342" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1250.473068][ T31] audit: type=1326 audit(1250.399:2583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11013 comm="syz.8.1342" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1250.481616][ T31] audit: type=1326 audit(1250.409:2584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11013 comm="syz.8.1342" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1250.484571][ T31] audit: type=1326 audit(1250.409:2585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11013 comm="syz.8.1342" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1250.486429][ T31] audit: type=1326 audit(1250.409:2586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11013 comm="syz.8.1342" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1250.489057][ T31] audit: type=1326 audit(1250.419:2587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11013 comm="syz.8.1342" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1250.490922][ T31] audit: type=1326 audit(1250.419:2588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11013 comm="syz.8.1342" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1250.492494][ T31] audit: type=1326 audit(1250.419:2589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11013 comm="syz.8.1342" exe="/syz-executor" sig=0 arch=40000028 syscall=171 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1250.492567][ T31] audit: type=1326 audit(1250.419:2590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11013 comm="syz.8.1342" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1251.107741][T11018] C: renamed from batadv_slave_0 (while UP) [ 1251.134874][T11018] netlink: 'syz.8.1343': attribute type 1 has an invalid length. [ 1251.135155][T11018] netlink: 152 bytes leftover after parsing attributes in process `syz.8.1343'. [ 1251.135689][T11018] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 1255.570818][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 1255.571146][ T31] audit: type=1400 audit(1255.499:2594): avc: denied { execute } for pid=11040 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1255.571446][ T31] audit: type=1400 audit(1255.499:2595): avc: denied { execute_no_trans } for pid=11040 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1255.712877][ T31] audit: type=1400 audit(1255.639:2596): avc: denied { mounton } for pid=11043 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1256.118329][ T31] audit: type=1326 audit(1256.049:2597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11049 comm="syz.8.1352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1256.118635][ T31] audit: type=1326 audit(1256.049:2598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11049 comm="syz.8.1352" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1256.118834][ T31] audit: type=1326 audit(1256.049:2599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11049 comm="syz.8.1352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1256.127762][ T31] audit: type=1326 audit(1256.059:2600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11049 comm="syz.8.1352" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1256.128479][ T31] audit: type=1326 audit(1256.059:2601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11049 comm="syz.8.1352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1256.129200][ T31] audit: type=1326 audit(1256.059:2602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11049 comm="syz.8.1352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1256.137972][ T31] audit: type=1326 audit(1256.069:2603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11049 comm="syz.8.1352" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1256.296524][T11053] netlink: 'syz.8.1353': attribute type 3 has an invalid length. [ 1256.297199][T11053] netlink: 'syz.8.1353': attribute type 3 has an invalid length. [ 1258.563187][T11092] netlink: 'syz.8.1357': attribute type 10 has an invalid length. [ 1258.587632][T11092] netlink: 'syz.8.1357': attribute type 10 has an invalid length. [ 1261.928970][T11043] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1261.947088][T11043] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1264.904755][T11043] hsr_slave_0: entered promiscuous mode [ 1264.909703][T11043] hsr_slave_1: entered promiscuous mode [ 1264.911681][T11043] debugfs: 'hsr0' already exists in 'hsr' [ 1264.912431][T11043] Cannot create hsr debugfs directory [ 1265.841258][T11043] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 1265.857991][T11043] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 1265.862989][T11043] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 1265.878624][T11043] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 1267.316379][T11043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1275.399190][T11043] veth0_vlan: entered promiscuous mode [ 1275.456131][T11043] veth1_vlan: entered promiscuous mode [ 1275.576704][T11043] veth0_macvtap: entered promiscuous mode [ 1275.589808][T11043] veth1_macvtap: entered promiscuous mode [ 1275.727915][ T7417] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1275.729088][ T7417] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1275.744904][ T7417] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1275.758768][ T7417] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1275.935370][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 1275.935621][ T31] audit: type=1400 audit(1275.869:2605): avc: denied { mounton } for pid=11043 comm="syz-executor" path="/syzkaller.YURc2j/syz-tmp" dev="vda" ino=823 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1275.952298][ T31] audit: type=1400 audit(1275.879:2606): avc: denied { mount } for pid=11043 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1275.969014][ T31] audit: type=1400 audit(1275.899:2607): avc: denied { mounton } for pid=11043 comm="syz-executor" path="/syzkaller.YURc2j/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1275.971978][ T31] audit: type=1400 audit(1275.899:2608): avc: denied { mounton } for pid=11043 comm="syz-executor" path="/syzkaller.YURc2j/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=18666 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1276.005673][ T31] audit: type=1400 audit(1275.939:2609): avc: denied { unmount } for pid=11043 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1276.019722][ T31] audit: type=1400 audit(1275.949:2610): avc: denied { mounton } for pid=11043 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1276.036949][ T31] audit: type=1400 audit(1275.959:2611): avc: denied { mount } for pid=11043 comm="syz-executor" name="/" dev="gadgetfs" ino=3200 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1276.037323][ T31] audit: type=1400 audit(1275.959:2612): avc: denied { mount } for pid=11043 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1276.037650][ T31] audit: type=1400 audit(1275.959:2613): avc: denied { mounton } for pid=11043 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1276.037727][ T31] audit: type=1400 audit(1275.959:2614): avc: denied { mount } for pid=11043 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1281.259020][T11440] IPv4: Oversized IP packet from 127.202.26.0 [ 1281.846904][T11445] netlink: 8 bytes leftover after parsing attributes in process `syz.9.1369'. [ 1282.226116][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 1282.226333][ T31] audit: type=1400 audit(1282.159:2629): avc: denied { create } for pid=11446 comm="syz.9.1370" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_route_socket permissive=1 [ 1282.500575][ T31] audit: type=1400 audit(1282.429:2630): avc: denied { write } for pid=11446 comm="syz.9.1370" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_route_socket permissive=1 [ 1282.500939][ T31] audit: type=1400 audit(1282.429:2631): avc: denied { nlmsg_write } for pid=11446 comm="syz.9.1370" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_route_socket permissive=1 [ 1284.127283][ T31] audit: type=1326 audit(1284.059:2632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11485 comm="syz.8.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1284.129509][ T31] audit: type=1326 audit(1284.059:2633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11485 comm="syz.8.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1284.158917][ T31] audit: type=1326 audit(1284.089:2634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11485 comm="syz.8.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1284.161151][ T31] audit: type=1326 audit(1284.089:2635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11485 comm="syz.8.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1284.163228][ T31] audit: type=1326 audit(1284.089:2636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11485 comm="syz.8.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1284.207308][ T31] audit: type=1326 audit(1284.129:2637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11485 comm="syz.8.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=181 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1284.210448][ T31] audit: type=1326 audit(1284.139:2638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11485 comm="syz.8.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1287.539213][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 1287.539494][T11508] netlink: 24 bytes leftover after parsing attributes in process `syz.9.1383'. [ 1287.541380][ T31] audit: type=1400 audit(1287.469:2642): avc: denied { write } for pid=11507 comm="syz.9.1383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1287.542974][ T31] audit: type=1400 audit(1287.469:2643): avc: denied { nlmsg_write } for pid=11507 comm="syz.9.1383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1287.729515][ T31] audit: type=1400 audit(1287.659:2644): avc: denied { connect } for pid=11510 comm="syz.9.1384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1287.970659][ T31] audit: type=1400 audit(1287.899:2645): avc: denied { create } for pid=11512 comm="syz.9.1385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1288.146383][ T31] audit: type=1326 audit(1288.079:2646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11514 comm="syz.9.1386" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1288.148151][ T31] audit: type=1326 audit(1288.079:2647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11514 comm="syz.9.1386" exe="/syz-executor" sig=0 arch=40000028 syscall=251 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1288.150107][ T31] audit: type=1326 audit(1288.079:2648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11514 comm="syz.9.1386" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1288.151770][ T31] audit: type=1326 audit(1288.079:2649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11514 comm="syz.9.1386" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1288.158314][ T31] audit: type=1326 audit(1288.079:2650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11514 comm="syz.9.1386" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1288.160293][ T31] audit: type=1326 audit(1288.079:2651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11514 comm="syz.9.1386" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1290.929768][T11545] netdevsim netdevsim8: Direct firmware load for ./file0/file1 failed with error -2 [ 1290.930766][T11545] netdevsim netdevsim8: Falling back to sysfs fallback for: ./file0/file1 [ 1293.779671][ T1055] netdevsim netdevsim9 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1293.779995][ T1055] netdevsim netdevsim9 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1293.780197][ T1055] netdevsim netdevsim9 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1293.780380][ T1055] netdevsim netdevsim9 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1296.358101][T11568] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1296.358987][T11568] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1297.955133][T11578] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1297.956896][T11578] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1298.808316][ T1055] netdevsim netdevsim8 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1298.825393][ T1055] netdevsim netdevsim8 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1298.825782][ T1055] netdevsim netdevsim8 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1298.826107][ T1055] netdevsim netdevsim8 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1304.036086][T11595] comedi: valid board names for 8255 driver are: [ 1304.036450][T11595] 8255 [ 1304.036638][T11595] comedi: valid board names for vmk80xx driver are: [ 1304.036684][T11595] vmk80xx [ 1304.036700][T11595] comedi: valid board names for usbduxsigma driver are: [ 1304.036714][T11595] usbduxsigma [ 1304.036726][T11595] comedi: valid board names for usbduxfast driver are: [ 1304.036741][T11595] usbduxfast [ 1304.036753][T11595] comedi: valid board names for usbdux driver are: [ 1304.036768][T11595] usbdux [ 1304.036780][T11595] comedi: valid board names for ni6501 driver are: [ 1304.036792][T11595] ni6501 [ 1304.036805][T11595] comedi: valid board names for dt9812 driver are: [ 1304.036847][T11595] dt9812 [ 1304.036968][T11595] comedi: valid board names for ni_labpc_cs driver are: [ 1304.036994][T11595] ni_labpc_cs [ 1304.037009][T11595] comedi: valid board names for ni_daq_700 driver are: [ 1304.037024][T11595] ni_daq_700 [ 1304.037036][T11595] comedi: valid board names for labpc_pci driver are: [ 1304.037092][T11595] labpc_pci [ 1304.037149][T11595] comedi: valid board names for adl_pci9118 driver are: [ 1304.037192][T11595] pci9118dg [ 1304.037297][T11595] pci9118hg [ 1304.037321][T11595] pci9118hr [ 1304.037337][T11595] comedi: valid board names for 8255_pci driver are: [ 1304.037355][T11595] 8255_pci [ 1304.037368][T11595] comedi: valid board names for comedi_parport driver are: [ 1304.037383][T11595] comedi_parport [ 1304.037396][T11595] comedi: valid board names for comedi_test driver are: [ 1304.037441][T11595] comedi_test [ 1304.037495][T11595] comedi: valid board names for comedi_bond driver are: [ 1304.037553][T11595] comedi_bond [ 1304.219461][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 1304.220629][ T31] audit: type=1400 audit(1304.149:2685): avc: denied { read } for pid=11596 comm="syz.8.1409" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1304.226061][ T31] audit: type=1400 audit(1304.149:2686): avc: denied { open } for pid=11596 comm="syz.8.1409" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1304.238585][ T31] audit: type=1400 audit(1304.169:2687): avc: denied { ioctl } for pid=11596 comm="syz.8.1409" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1304.241057][ T31] audit: type=1400 audit(1304.169:2688): avc: denied { set_context_mgr } for pid=11596 comm="syz.8.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1304.269200][ T31] audit: type=1400 audit(1304.199:2689): avc: denied { map } for pid=11596 comm="syz.8.1409" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1304.289678][ T31] audit: type=1400 audit(1304.219:2690): avc: denied { call } for pid=11596 comm="syz.8.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1304.296571][ T31] audit: type=1400 audit(1304.219:2691): avc: denied { transfer } for pid=11596 comm="syz.8.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1309.740347][ T1055] netdevsim netdevsim7 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1309.809693][ T1055] netdevsim netdevsim7 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1309.886820][ T1055] netdevsim netdevsim7 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1309.969405][ T1055] netdevsim netdevsim7 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1310.552301][ T1055] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1310.568722][ T1055] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1310.574598][ T1055] bond0 (unregistering): Released all slaves [ 1310.627270][ T1055] bond1 (unregistering): (slave wireguard0): Releasing backup interface [ 1310.634684][ T1055] wireguard0: left promiscuous mode [ 1310.646047][ T1055] bond1 (unregistering): Released all slaves [ 1310.817788][ T1055] hsr_slave_0: left promiscuous mode [ 1310.845262][ T1055] hsr_slave_1: left promiscuous mode [ 1310.870186][ T1055] veth1_macvtap: left promiscuous mode [ 1310.874624][ T1055] veth0_macvtap: left promiscuous mode [ 1310.875813][ T1055] veth1_vlan: left promiscuous mode [ 1310.877711][ T1055] veth0_vlan: left promiscuous mode [ 1312.276789][ T31] audit: type=1400 audit(1312.209:2692): avc: denied { write } for pid=11618 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1312.285424][ T31] audit: type=1400 audit(1312.209:2693): avc: denied { open } for pid=11618 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1312.751883][ T31] audit: type=1400 audit(1312.679:2694): avc: denied { search } for pid=11619 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1312.768845][ T31] audit: type=1400 audit(1312.699:2695): avc: denied { search } for pid=11619 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1312.770900][ T31] audit: type=1400 audit(1312.699:2696): avc: denied { search } for pid=11619 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1312.772611][ T31] audit: type=1400 audit(1312.699:2697): avc: denied { search } for pid=11619 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1312.850291][ T31] audit: type=1400 audit(1312.779:2698): avc: denied { read open } for pid=11620 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1312.852421][ T31] audit: type=1400 audit(1312.779:2699): avc: denied { getattr } for pid=11620 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1313.110147][ T31] audit: type=1400 audit(1313.039:2700): avc: denied { add_name } for pid=11619 comm="dhcpcd-run-hook" name="resolv.conf.eth29.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1313.134619][ T31] audit: type=1400 audit(1313.059:2701): avc: denied { create } for pid=11619 comm="dhcpcd-run-hook" name="resolv.conf.eth29.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1318.105832][T11663] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1318.106822][T11663] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1321.630448][T11721] comedi: valid board names for 8255 driver are: [ 1321.632378][T11721] 8255 [ 1321.645643][T11721] comedi: valid board names for vmk80xx driver are: [ 1321.646967][T11721] vmk80xx [ 1321.647921][T11721] comedi: valid board names for usbduxsigma driver are: [ 1321.649099][T11721] usbduxsigma [ 1321.649938][T11721] comedi: valid board names for usbduxfast driver are: [ 1321.651740][T11721] usbduxfast [ 1321.652575][T11721] comedi: valid board names for usbdux driver are: [ 1321.654848][T11721] usbdux [ 1321.655508][T11721] comedi: valid board names for ni6501 driver are: [ 1321.656312][T11721] ni6501 [ 1321.656900][T11721] comedi: valid board names for dt9812 driver are: [ 1321.664429][T11721] dt9812 [ 1321.664721][T11721] comedi: valid board names for ni_labpc_cs driver are: [ 1321.664925][T11721] ni_labpc_cs [ 1321.665056][T11721] comedi: valid board names for ni_daq_700 driver are: [ 1321.665257][T11721] ni_daq_700 [ 1321.665292][T11721] comedi: valid board names for labpc_pci driver are: [ 1321.665309][T11721] labpc_pci [ 1321.665322][T11721] comedi: valid board names for adl_pci9118 driver are: [ 1321.665405][T11721] pci9118dg [ 1321.665451][T11721] pci9118hg [ 1321.665466][T11721] pci9118hr [ 1321.665482][T11721] comedi: valid board names for 8255_pci driver are: [ 1321.665497][T11721] 8255_pci [ 1321.665510][T11721] comedi: valid board names for comedi_parport driver are: [ 1321.665523][T11721] comedi_parport [ 1321.665536][T11721] comedi: valid board names for comedi_test driver are: [ 1321.665591][T11721] comedi_test [ 1321.665608][T11721] comedi: valid board names for comedi_bond driver are: [ 1321.665622][T11721] comedi_bond [ 1321.866763][T11723] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1321.867813][T11723] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1323.066206][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 1323.066426][ T31] audit: type=1326 audit(1322.999:2714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11733 comm="syz.9.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1323.071858][ T31] audit: type=1326 audit(1322.999:2715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11733 comm="syz.9.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1321f0 code=0x7ffc0000 [ 1323.163973][ C0] vkms_vblank_simulate: vblank timer overrun [ 1328.085657][ T31] audit: type=1400 audit(1328.019:2716): avc: denied { ioctl } for pid=11737 comm="syz.9.1435" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=19162 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1333.874184][T11768] netlink: 'syz.9.1440': attribute type 7 has an invalid length. [ 1347.631861][ T31] audit: type=1400 audit(1347.559:2717): avc: denied { connect } for pid=11774 comm="syz.9.1445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1347.635708][ T31] audit: type=1400 audit(1347.559:2718): avc: denied { read } for pid=11774 comm="syz.9.1445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1348.026405][T11777] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1348.030487][T11777] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1351.139282][ T31] audit: type=1400 audit(1351.059:2719): avc: denied { mounton } for pid=11791 comm="syz.8.1451" path="/proc/621/task" dev="proc" ino=18218 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1352.088398][ T31] audit: type=1400 audit(1352.019:2720): avc: denied { bind } for pid=11801 comm="syz.8.1453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1364.799462][ T31] audit: type=1400 audit(1364.729:2721): avc: denied { unmount } for pid=11043 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1374.732746][ T31] audit: type=1400 audit(1374.659:2722): avc: denied { mounton } for pid=11841 comm="syz.8.1464" path="/273/file0" dev="tmpfs" ino=1395 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1377.591813][T11852] random: crng reseeded on system resumption [ 1395.225970][T11880] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1395.227665][T11880] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1395.372474][ T31] audit: type=1400 audit(1395.299:2723): avc: denied { read } for pid=11883 comm="syz.9.1476" path="socket:[19324]" dev="sockfs" ino=19324 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1395.379409][ T31] audit: type=1400 audit(1395.309:2724): avc: denied { shutdown } for pid=11883 comm="syz.9.1476" lport=9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1398.794899][ T31] audit: type=1400 audit(1398.719:2725): avc: denied { execute_no_trans } for pid=11889 comm="syz.8.1479" path="/276/file1" dev="tmpfs" ino=1411 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1399.102757][ T31] audit: type=1400 audit(1399.029:2726): avc: denied { read } for pid=11889 comm="syz.8.1479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1409.390885][ T31] audit: type=1400 audit(1409.319:2727): avc: denied { create } for pid=11908 comm="syz.8.1486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 1409.769672][ T31] audit: type=1400 audit(1409.699:2728): avc: denied { create } for pid=11914 comm="syz.8.1488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1409.779393][ T31] audit: type=1400 audit(1409.709:2729): avc: denied { write } for pid=11914 comm="syz.8.1488" path="socket:[19360]" dev="sockfs" ino=19360 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1410.270758][T11919] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1410.274740][T11919] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1410.362924][ T31] audit: type=1400 audit(1410.289:2730): avc: denied { write } for pid=11922 comm="syz.8.1491" name="nbd8" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1410.364337][ T31] audit: type=1400 audit(1410.289:2731): avc: denied { open } for pid=11922 comm="syz.8.1491" path="/dev/nbd8" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1410.369429][ T31] audit: type=1400 audit(1410.299:2732): avc: denied { read } for pid=11922 comm="syz.8.1491" name="nbd8" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1410.378221][ T31] audit: type=1400 audit(1410.309:2733): avc: denied { ioctl } for pid=11922 comm="syz.8.1491" path="/dev/nbd8" dev="devtmpfs" ino=643 ioctlcmd=0x1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1413.110085][ T1055] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1413.115080][ T1055] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1413.117982][ T1055] bond0 (unregistering): Released all slaves [ 1413.182453][ T1055] hsr_slave_0: left promiscuous mode [ 1413.186206][ T1055] hsr_slave_1: left promiscuous mode [ 1414.496794][T12024] 8<--- cut here --- [ 1414.496978][T12024] Unable to handle kernel paging request at virtual address fee02f00 when write [ 1414.497136][T12024] [fee02f00] *pgd=80000080007003, *pmd=00000000 [ 1414.498772][T12024] Internal error: Oops: a06 [#1] SMP ARM [ 1414.503950][T12024] Modules linked in: [ 1414.505179][T12024] CPU: 1 UID: 0 PID: 12024 Comm: syz.9.1496 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 1414.505982][T12024] Hardware name: ARM-Versatile Express [ 1414.506991][T12024] PC is at parport_attach+0x174/0x1d0 [ 1414.507988][T12024] LR is at parport_attach+0x164/0x1d0 [ 1414.508249][T12024] pc : [<813aab88>] lr : [<813aab78>] psr: 60000013 [ 1414.508533][T12024] sp : dfa59d30 ip : dfa59d30 fp : dfa59d54 [ 1414.508836][T12024] r10: 82b1ef00 r9 : 00000003 r8 : 83c1ab40 [ 1414.509123][T12024] r7 : dfa59d90 r6 : 83c1ab40 r5 : 00000000 r4 : 00000000 [ 1414.509465][T12024] r3 : fee02f00 r2 : 81e16524 r1 : 00000001 r0 : 813aa7f8 [ 1414.509950][T12024] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1414.510298][T12024] Control: 30c5387d Table: 8577a480 DAC: 00000000 [ 1414.510618][T12024] Register r0 information: non-slab/vmalloc memory [ 1414.511578][T12024] Register r1 information: non-paged memory [ 1414.511930][T12024] Register r2 information: non-slab/vmalloc memory [ 1414.512267][T12024] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 1414.512957][T12024] Register r4 information: NULL pointer [ 1414.513213][T12024] Register r5 information: NULL pointer [ 1414.513884][T12024] Register r6 information: slab kmalloc-192 start 83c1ab40 pointer offset 0 size 192 [ 1414.514880][T12024] Register r7 information: 2-page vmalloc region starting at 0xdfa58000 allocated at kernel_clone+0xac/0x3ec [ 1414.515371][T12024] Register r8 information: slab kmalloc-192 start 83c1ab40 pointer offset 0 size 192 [ 1414.515909][T12024] Register r9 information: non-paged memory [ 1414.516184][T12024] Register r10 information: non-slab/vmalloc memory [ 1414.516456][T12024] Register r11 information: 2-page vmalloc region starting at 0xdfa58000 allocated at kernel_clone+0xac/0x3ec [ 1414.516884][T12024] Register r12 information: 2-page vmalloc region starting at 0xdfa58000 allocated at kernel_clone+0xac/0x3ec [ 1414.517365][T12024] Process syz.9.1496 (pid: 12024, stack limit = 0xdfa58000) [ 1414.517775][T12024] Stack: (0xdfa59d30 to 0xdfa5a000) [ 1414.518175][T12024] 9d20: 823fee60 83c1ab40 829cf8ec 829cf8ec [ 1414.518521][T12024] 9d40: 81e169e4 83c1ab84 dfa59d8c dfa59d58 813a6c20 813aaa20 20000300 00000000 [ 1414.518909][T12024] 9d60: dfa59d7c 20000300 83c1ab40 b5403587 20000300 833abc00 40946400 00000001 [ 1414.519299][T12024] 9d80: dfa59e4c dfa59d90 813a27a0 813a6b24 656d6f63 705f6964 6f707261 00007472 [ 1414.519717][T12024] 9da0: 00000000 00002f00 00000005 0000d09a ffffffff 00000003 fffffffe 20000004 [ 1414.520025][T12024] 9dc0: 00000003 00000ffe 7fffffff 0000000c 00000002 00000004 00000008 0000ffff [ 1414.520382][T12024] 9de0: 00000006 00000005 000007ff 00000830 00000008 00010000 00000009 00000800 [ 1414.520685][T12024] 9e00: 00000101 00000002 00008001 00000007 00000003 00000004 00000005 0000070f [ 1414.521036][T12024] 9e20: 00000000 fb7df993 00000000 833319c0 83c1ab40 20000300 20000300 833abc00 [ 1414.521332][T12024] 9e40: dfa59f14 dfa59e50 813a376c 813a26ac 00000000 00000000 00000000 fb7df993 [ 1414.521686][T12024] 9e60: 00000000 00000000 8247154c 0000005f 83cbd258 83c1ab70 841eddd4 833abc00 [ 1414.522040][T12024] 9e80: dfa59ee4 dfa59e90 80797ac4 8078de28 00000064 00000001 00000000 dfa59eac [ 1414.522387][T12024] 9ea0: 8637e0d0 834ee5d8 00006400 0000000b dfa59ea0 00000000 00000000 fb7df993 [ 1414.522870][T12024] 9ec0: 833319c0 40946400 20000300 20000300 833319c0 00000003 dfa59ef4 dfa59ee8 [ 1414.523224][T12024] 9ee0: 80797be4 fb7df993 dfa59f14 40946400 00000000 833319c1 20000300 833319c0 [ 1414.524125][T12024] 9f00: 00000003 833abc00 dfa59fa4 dfa59f18 8056d11c 813a319c ecac8b10 833abc00 [ 1414.524719][T12024] 9f20: dfa59f3c dfa59f30 81a38084 81a37f54 dfa59f54 dfa59f40 8025e400 8028eefc [ 1414.525036][T12024] 9f40: dfa59fb0 40000000 dfa59f84 dfa59f58 802229ec 8025e3bc 00000000 8281cddc [ 1414.525344][T12024] 9f60: dfa59fb0 0014c750 ecac8b10 80222940 00000000 fb7df993 dfa59fac 00000000 [ 1414.525701][T12024] 9f80: 00000000 002f6300 00000036 8020029c 833abc00 00000036 00000000 dfa59fa8 [ 1414.526100][T12024] 9fa0: 80200060 8056cff8 00000000 00000000 00000003 40946400 20000300 00000000 [ 1414.526480][T12024] 9fc0: 00000000 00000000 002f6300 00000036 002e0000 00000000 00006364 76bf80bc [ 1414.526864][T12024] 9fe0: 76bf7ec0 76bf7eb0 000193dc 001321f0 60000010 00000003 00000000 00000000 [ 1414.527316][T12024] Call trace: [ 1414.527822][T12024] [<813aaa14>] (parport_attach) from [<813a6c20>] (comedi_device_attach+0x108/0x250) [ 1414.528448][T12024] r6:83c1ab84 r5:81e169e4 r4:829cf8ec [ 1414.528794][T12024] [<813a6b18>] (comedi_device_attach) from [<813a27a0>] (do_devconfig_ioctl+0x100/0x220) [ 1414.529197][T12024] r10:00000001 r9:40946400 r8:833abc00 r7:20000300 r6:b5403587 r5:83c1ab40 [ 1414.529592][T12024] r4:20000300 [ 1414.529756][T12024] [<813a26a0>] (do_devconfig_ioctl) from [<813a376c>] (comedi_unlocked_ioctl+0x5dc/0x1c24) [ 1414.530187][T12024] r8:833abc00 r7:20000300 r6:20000300 r5:83c1ab40 r4:833319c0 [ 1414.530447][T12024] [<813a3190>] (comedi_unlocked_ioctl) from [<8056d11c>] (sys_ioctl+0x130/0xba0) [ 1414.530915][T12024] r10:833abc00 r9:00000003 r8:833319c0 r7:20000300 r6:833319c1 r5:00000000 [ 1414.531378][T12024] r4:40946400 [ 1414.531565][T12024] [<8056cfec>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1414.531935][T12024] Exception stack(0xdfa59fa8 to 0xdfa59ff0) [ 1414.532173][T12024] 9fa0: 00000000 00000000 00000003 40946400 20000300 00000000 [ 1414.532464][T12024] 9fc0: 00000000 00000000 002f6300 00000036 002e0000 00000000 00006364 76bf80bc [ 1414.532776][T12024] 9fe0: 76bf7ec0 76bf7eb0 000193dc 001321f0 [ 1414.533002][T12024] r10:00000036 r9:833abc00 r8:8020029c r7:00000036 r6:002f6300 r5:00000000 [ 1414.533269][T12024] r4:00000000 [ 1414.533849][T12024] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 1414.534572][T12024] ---[ end trace 0000000000000000 ]--- [ 1414.535392][T12024] Kernel panic - not syncing: Fatal exception [ 1414.539634][T12024] Rebooting in 86400 seconds.. VM DIAGNOSIS: 05:16:19 Registers: info registers vcpu 0 CPU#0 R00=e0531df8 R01=00000004 R02=d9ccb261 R03=000000ff R04=00000080 R05=85f0d860 R06=865a1000 R07=ffffffe4 R08=863ae99c R09=0000001c R10=0000001c R11=e0531ddc R12=8497d0c8 R13=e0531de0 R14=80e4a4d0 R15=80e4c8f4 PSR=60000113 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=83a78440 R01=0000005b R02=eb673000 R03=00000000 R04=83c7d000 R05=83a78440 R06=80a7928c R07=83c7d03a R08=82826ee0 R09=00000000 R10=0000098f R11=dfa59994 R12=00000002 R13=dfa59988 R14=82959084 R15=80a792e4 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000