last executing test programs: 24m11.040786519s ago: executing program 32 (id=327): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000400)={@loopback, 0x43, r2}) 19m28.440690205s ago: executing program 33 (id=953): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r4}, 0x18) r5 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000c00)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x60, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r7, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0xea, 0x0, 0x0, 0x0, 0x9, 0x5}, {0x12, 0x2, 0x0, 0x401, 0x8001, 0x1400}, 0xa5, 0x5, 0x10000000}}, @TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x60}}, 0x44080) 18m20.383993309s ago: executing program 34 (id=965): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) 15m49.124030877s ago: executing program 35 (id=1082): creat(&(0x7f0000000340)='./file0\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'erspan0\x00', 0x0}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x8, 0x4, 0xcf4, 0x2020, r3, 0x97, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x0, 0x4, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000040000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) quotactl$Q_SYNC(0xffffffff80000102, 0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) faccessat2(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x2, 0x1100) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) unshare(0x42000000) 13m5.76722264s ago: executing program 36 (id=1202): bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setscheduler(0x0, 0x2, 0x0) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc90}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = socket(0x400000000010, 0x3, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r7, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000002240)=@newtfilter={0x34, 0x2c, 0xd27, 0x70bd25, 0x8000, {0x0, 0x0, 0x0, r7, {0x0, 0x7}, {}, {0x7, 0x8}}, [@filter_kind_options=@f_fw={{0x7}, {0x8, 0x2, [@TCA_FW_ACT={0x4}]}}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x800) creat(0x0, 0x0) socket(0x10, 0x803, 0x0) 11m15.701393894s ago: executing program 37 (id=1258): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) setsockopt$MRT_FLUSH(0xffffffffffffffff, 0x0, 0xd4, &(0x7f0000000000)=0x8, 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/key-users\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70200000004000085000000860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd42, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) unshare(0x64000600) 10m10.655726508s ago: executing program 38 (id=1301): setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) 8m41.027823075s ago: executing program 7 (id=1377): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) syz_open_procfs(0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$inet(0x2, 0x1, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r5, &(0x7f0000000080)=""/43, 0x2b) getdents(r5, 0x0, 0x58) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x8, 0x3, 0x498, 0x320, 0xa, 0x148, 0x368, 0x60, 0x400, 0x2a8, 0x2a8, 0x400, 0x2a8, 0x7fffffe, 0x0, {[{{@ip={@multicast2, @multicast2, 0x0, 0x0, 'bridge0\x00', 'rose0\x00'}, 0x0, 0x2f8, 0x368, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x8601, 0x6, './file0\x00'}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f2f7b9f28413d9d8ad470ad2b60c45cb4ea6e7bf902bdc2ff8a9304d9f655c746adc0bdc773506378bc2d27efd6abb05175089830cc46186074d7de46d5af300"}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4f8) 8m27.915337108s ago: executing program 7 (id=1378): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd63"], 0xffbf) 8m27.69952307s ago: executing program 7 (id=1379): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 8m27.287686723s ago: executing program 7 (id=1380): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r1}, 0x10) setitimer(0x1, 0x0, 0x0) 8m27.17901317s ago: executing program 7 (id=1381): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r0}, 0x10) ioprio_set$pid(0x2, 0x0, 0x6000) 8m26.9983781s ago: executing program 7 (id=1382): r0 = socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x200}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0) ftruncate(r7, 0xc17a) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'batadv_slave_1\x00', {0x2, 0x0, @loopback=0x7f000000}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 8m8.936671703s ago: executing program 39 (id=1364): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0xffffffffffffffe0, &(0x7f0000000180)=0x6) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7b7f38972eea2c57, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_emit_ethernet(0x2a, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/protocols\x00') 7m41.465650369s ago: executing program 40 (id=1382): r0 = socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x200}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0) ftruncate(r7, 0xc17a) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'batadv_slave_1\x00', {0x2, 0x0, @loopback=0x7f000000}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 7m27.32009736s ago: executing program 1 (id=1418): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000070000000000010003"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "69dcaf20127e9a854529f45826cb35be51682e30944313e2ca73845d177d601880221daeccfda56b75cfe2bad94f000066b2ddab614fec2236da7d88ea07c9ee"}, 0x48, 0xfffffffffffffffe) 7m27.075793094s ago: executing program 1 (id=1419): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) setuid(0xee01) 7m26.935065882s ago: executing program 1 (id=1420): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet(0x2, 0x3, 0x8d) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="8e"], 0x1) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000000c0)={0x0, @local, @local}, &(0x7f0000000140)=0xc) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000000)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x3b, r4}) r6 = socket(0xa, 0x1, 0x0) ioctl(r6, 0x8936, 0x0) r7 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r7, &(0x7f0000000080), 0x0) 7m10.831531574s ago: executing program 1 (id=1427): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x891018, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x101091, 0x0) getpid() r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) umount2(0x0, 0x2) 7m10.54472862s ago: executing program 1 (id=1428): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) 7m10.19153345s ago: executing program 1 (id=1429): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000008c0)={0x0, 0x2, 0x0, [0x7fff, 0xa0000000, 0x4, 0xffff, 0x1], [0x1, 0x4, 0x1, 0x7, 0x401, 0x9, 0x8001, 0x620f, 0x8, 0x400, 0xfffffffffffffffa, 0x687, 0x6, 0x1, 0x5, 0x4d6e, 0x80000000, 0x4, 0xed, 0x2, 0x9, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x9, 0x3f, 0x80, 0x0, 0x46000000, 0x0, 0x0, 0x1f, 0xffffffff7fffffff, 0xff, 0x8000000000000001, 0x5, 0x1, 0x200, 0x1, 0xfffffffffffffff7, 0x4, 0x20, 0x6, 0x1, 0x8, 0xd53, 0x0, 0x5, 0x2, 0x20, 0x800, 0x0, 0x2, 0x1, 0x8, 0x2, 0x8, 0xffffffffffffffc1, 0xffffffffffffffc5, 0x8000000000000001, 0x4, 0x1000, 0x6, 0x800, 0x3f, 0x4, 0x600, 0x3, 0x4, 0x4f43, 0x4, 0x81ce, 0x8, 0x1, 0xf67, 0x10001, 0x869, 0x4c0b, 0x2, 0x7fff, 0xfffffffffffffffc, 0x3, 0x18, 0x3, 0x9, 0x81, 0x219, 0xfffffffffffffffe, 0xffffffffffffffff, 0x6, 0x1, 0x8a70, 0x4, 0x5, 0x4, 0x0, 0x3f, 0x1c7, 0xe1b80000, 0x1f, 0x1, 0x6, 0x8001, 0x8000, 0x6, 0x400, 0x4, 0x8000000000000001, 0x6, 0x8, 0x855a, 0x155, 0x8000, 0xff, 0x5]}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_ADDR_REMOTE={0x14, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x18}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x18}]}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x2c, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x40}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1f}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x18}]}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000040)={0x0, 'ipvlan1\x00', {0x28fd}, 0x8000}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000440)=0xd4, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000000)=0x11b0, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={0x1, &(0x7f00000001c0)="f1b158a8bdf59792e0af784ee60624ec31350991832cccf8de0f373252560b4b30bf7415ac0974f933ca37c17ba6d0a24b11dec7fd593be8546378b486c9b82b5ba90120ce907e1ae04e22256ed7274eb798606a341f594b373a993d32d70ed5c1a050", &(0x7f0000000240)=@tcp=r2, 0x4}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x6, 0xcd, 0xe8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002300)={0x0, 0x0, &(0x7f0000000240), &(0x7f0000002380), 0x806, r3}, 0x38) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000800)={r3, &(0x7f0000000a00), 0x20000000, 0x2}, 0x20) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, 0xfffffffffffffffe, 0x4) pipe(&(0x7f0000000500)={0xffffffffffffffff}) connect$inet(r5, &(0x7f0000000540)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) bind$inet(r4, &(0x7f00000002c0)={0x2, 0x4e22, @multicast1}, 0x10) r6 = socket(0x8, 0x3, 0x81) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f0000000080)="6c4c4268c43f7a8efa4ec9c6c5a8857032d8bc7edbc09a1d722ad49905f15c79b3fe63d8de1f0a19a3167fb165ce7e31fe056ed9814ded9d112feccda68d276dcbcfad1dcc62aeacc712e8382a9225638dea800d2705abdc37054b3aad748aefe9dcfd1deb42ae4aea1ab78857b02548795fc3c54274c4c866f062e2db0560c57c21c9a66069b6880f4549cd97fa8210191777dd5d442c5de6959c0c71", &(0x7f0000000140)=@tcp6=r6, 0x4}, 0x20) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x890b, &(0x7f0000000000)={0xffffc0fe, 'vlan0\x00'}) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000480), &(0x7f00000004c0)=0x8) 7m10.19100106s ago: executing program 41 (id=1429): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000008c0)={0x0, 0x2, 0x0, [0x7fff, 0xa0000000, 0x4, 0xffff, 0x1], [0x1, 0x4, 0x1, 0x7, 0x401, 0x9, 0x8001, 0x620f, 0x8, 0x400, 0xfffffffffffffffa, 0x687, 0x6, 0x1, 0x5, 0x4d6e, 0x80000000, 0x4, 0xed, 0x2, 0x9, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x9, 0x3f, 0x80, 0x0, 0x46000000, 0x0, 0x0, 0x1f, 0xffffffff7fffffff, 0xff, 0x8000000000000001, 0x5, 0x1, 0x200, 0x1, 0xfffffffffffffff7, 0x4, 0x20, 0x6, 0x1, 0x8, 0xd53, 0x0, 0x5, 0x2, 0x20, 0x800, 0x0, 0x2, 0x1, 0x8, 0x2, 0x8, 0xffffffffffffffc1, 0xffffffffffffffc5, 0x8000000000000001, 0x4, 0x1000, 0x6, 0x800, 0x3f, 0x4, 0x600, 0x3, 0x4, 0x4f43, 0x4, 0x81ce, 0x8, 0x1, 0xf67, 0x10001, 0x869, 0x4c0b, 0x2, 0x7fff, 0xfffffffffffffffc, 0x3, 0x18, 0x3, 0x9, 0x81, 0x219, 0xfffffffffffffffe, 0xffffffffffffffff, 0x6, 0x1, 0x8a70, 0x4, 0x5, 0x4, 0x0, 0x3f, 0x1c7, 0xe1b80000, 0x1f, 0x1, 0x6, 0x8001, 0x8000, 0x6, 0x400, 0x4, 0x8000000000000001, 0x6, 0x8, 0x855a, 0x155, 0x8000, 0xff, 0x5]}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_ADDR_REMOTE={0x14, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x18}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x18}]}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x2c, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x40}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1f}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x18}]}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000040)={0x0, 'ipvlan1\x00', {0x28fd}, 0x8000}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000440)=0xd4, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000000)=0x11b0, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={0x1, &(0x7f00000001c0)="f1b158a8bdf59792e0af784ee60624ec31350991832cccf8de0f373252560b4b30bf7415ac0974f933ca37c17ba6d0a24b11dec7fd593be8546378b486c9b82b5ba90120ce907e1ae04e22256ed7274eb798606a341f594b373a993d32d70ed5c1a050", &(0x7f0000000240)=@tcp=r2, 0x4}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x6, 0xcd, 0xe8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002300)={0x0, 0x0, &(0x7f0000000240), &(0x7f0000002380), 0x806, r3}, 0x38) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000800)={r3, &(0x7f0000000a00), 0x20000000, 0x2}, 0x20) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, 0xfffffffffffffffe, 0x4) pipe(&(0x7f0000000500)={0xffffffffffffffff}) connect$inet(r5, &(0x7f0000000540)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) bind$inet(r4, &(0x7f00000002c0)={0x2, 0x4e22, @multicast1}, 0x10) r6 = socket(0x8, 0x3, 0x81) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f0000000080)="6c4c4268c43f7a8efa4ec9c6c5a8857032d8bc7edbc09a1d722ad49905f15c79b3fe63d8de1f0a19a3167fb165ce7e31fe056ed9814ded9d112feccda68d276dcbcfad1dcc62aeacc712e8382a9225638dea800d2705abdc37054b3aad748aefe9dcfd1deb42ae4aea1ab78857b02548795fc3c54274c4c866f062e2db0560c57c21c9a66069b6880f4549cd97fa8210191777dd5d442c5de6959c0c71", &(0x7f0000000140)=@tcp6=r6, 0x4}, 0x20) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x890b, &(0x7f0000000000)={0xffffc0fe, 'vlan0\x00'}) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000480), &(0x7f00000004c0)=0x8) 7m4.330653692s ago: executing program 9 (id=1433): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 7m3.66373633s ago: executing program 9 (id=1434): io_setup(0x1, &(0x7f0000000180)=0x0) r1 = eventfd2(0xfffffff7, 0x801) io_cancel(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x53, 0x0, 0x1, r1}, &(0x7f0000000340)) io_pgetevents(r0, 0x4, 0x4, &(0x7f00000001c0)=[{}, {}, {}, {}], 0x0, 0x0) io_destroy(r0) 7m2.969227839s ago: executing program 9 (id=1435): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000100)='io_uring_register\x00', r2}, 0x10) r3 = syz_io_uring_setup(0x371d, &(0x7f0000000440)={0x0, 0x0, 0x400, 0xa, 0xffffff}, &(0x7f0000000380), &(0x7f0000000400)) io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) 7m2.508941085s ago: executing program 9 (id=1436): syz_emit_ethernet(0x12, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void, {0x88a8, 0x7, 0x1, 0x1}}, {@generic={0x8864}}}, 0x0) 7m2.210639682s ago: executing program 9 (id=1437): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af25, &(0x7f0000000a40)) 7m2.020617303s ago: executing program 9 (id=1438): socketpair$unix(0x1, 0x1, 0x0, 0x0) chroot(0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd42, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, 0x0) setgid(0x0) setgroups(0x0, &(0x7f0000000600)) 6m16.117687313s ago: executing program 42 (id=1438): socketpair$unix(0x1, 0x1, 0x0, 0x0) chroot(0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd42, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, 0x0) setgid(0x0) setgroups(0x0, &(0x7f0000000600)) 5m50.789684508s ago: executing program 2 (id=1469): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 5m50.57548402s ago: executing program 2 (id=1470): r0 = syz_open_dev$evdev(0x0, 0x3e, 0x208604) r1 = syz_usb_connect$cdc_ecm(0x0, 0x5e, 0x0, 0x0) syz_usb_disconnect(r1) syz_usb_disconnect(r0) r2 = syz_usb_connect$printer(0x2, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x40, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0xff, 0x80, 0xc, [{{0x9, 0x4, 0x0, 0xfd, 0x1, 0x7, 0x1, 0x1, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x20, 0x4, 0x20, 0xb}}}}}]}}]}}, 0x0) syz_usb_control_io$printer(r2, &(0x7f0000001100)={0x14, 0x0, &(0x7f0000000300)={0x0, 0x3, 0x2, @string={0x2}}}, 0x0) r3 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000840)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_ep_read(r3, 0x4, 0x6a, &(0x7f0000000340)=""/106) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) r4 = syz_usb_connect(0x0, 0x2d, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r4, 0x82, 0x0, 0x0) r5 = syz_open_dev$char_usb(0xc, 0xb4, 0x80000000) write$char_usb(r5, &(0x7f0000006800)="10", 0x1) syz_usb_disconnect(r2) syz_usb_disconnect(0xffffffffffffffff) syz_usb_disconnect(r1) 5m49.380808768s ago: executing program 2 (id=1471): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) timer_getoverrun(0x0) 5m49.138097862s ago: executing program 2 (id=1472): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x8000}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000140)="b9ff03076804268cb89e14f088a847", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 5m48.889207796s ago: executing program 2 (id=1473): socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, 0x0, 0x8040080) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x161342, 0xd745c29a4b91e6f6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f, 0x0, 0x10400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x50) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x101001, 0x0) close(r1) 5m47.949874429s ago: executing program 2 (id=1474): accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) read$FUSE(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x10) sched_setaffinity(0x0, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f00000010c0)=0x5, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x20}], 0x1}, 0x20008010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) 5m26.638930776s ago: executing program 3 (id=1482): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000080000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x18) timer_create(0x1, 0x0, &(0x7f0000001880)=0x0) timer_getoverrun(r1) 5m26.348156412s ago: executing program 3 (id=1483): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000021850000007200000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='sys_enter\x00', r0}, 0x18) getdents(0xffffffffffffffff, 0x0, 0x0) 5m26.224243029s ago: executing program 3 (id=1484): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000880)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r2}, 0x10) io_pgetevents(0x0, 0x10000, 0x0, 0x0, 0x0, 0x0) 5m25.988186522s ago: executing program 3 (id=1485): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) futex(0x0, 0x100, 0x0, 0x0, 0x0, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) rt_sigaction(0x40, &(0x7f0000000140)={&(0x7f0000000080)="2437460f1c2bdfd5c4a2f10027c6c43b660feb2841d3ca0f75bed5370b1c2665d2950e000000dbf5", 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stat\x00') unshare(0x62040200) 5m15.040966623s ago: executing program 3 (id=1486): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) inotify_init1(0x0) 5m15.030575903s ago: executing program 3 (id=1487): mkdirat(0xffffffffffffff9c, 0x0, 0x0) socket(0x10, 0x803, 0x0) r0 = syz_open_procfs(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0xffffffffffffffe0, &(0x7f0000000180)=0x6) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7b7f38972eea2c57, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000680)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08004514001c8000000000029078ac1414117f000001177c9078e0000001dc489a7943e276ed9a55702fa62ad1c5494a333ae6e42ea521e460584946f7302bec4d0b82dbda5c0657ce35d82edaac274039986b35c3ab17fbb9e9db1bce4b156264d0526aa80078af0ce063652f2dba7a"], 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000340)={'veth0_virt_wifi\x00', {0x2, 0x4e20, @local}}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/protocols\x00') 5m2.945357108s ago: executing program 43 (id=1474): accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) read$FUSE(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x10) sched_setaffinity(0x0, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f00000010c0)=0x5, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r4, 0x107, 0x5, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000013c0)=ANY=[@ANYBLOB], 0x20}], 0x1}, 0x20008010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) 4m45.823882108s ago: executing program 0 (id=1495): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000400000001"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000a5a18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000950000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) pipe2$9p(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000280)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x2d93a000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) io_setup(0x7d, &(0x7f0000000600)) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) 4m36.619290419s ago: executing program 0 (id=1496): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x143042, 0x8d) pwritev2(r0, 0x0, 0x0, 0x5405, 0xd402, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r1, 0x400, 0x0) 4m36.517413915s ago: executing program 0 (id=1497): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x40, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x2040, 0x108) link(&(0x7f0000000200)='./file1\x00', &(0x7f0000000300)='./bus\x00') 4m36.306344297s ago: executing program 0 (id=1498): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) futex(0x0, 0x100, 0x0, 0x0, 0x0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) syz_open_dev$usbfs(0x0, 0x76, 0x101301) rt_sigaction(0x40, 0x0, 0x0, 0x8, &(0x7f0000000380)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stat\x00') unshare(0x62040200) 4m29.18481396s ago: executing program 44 (id=1487): mkdirat(0xffffffffffffff9c, 0x0, 0x0) socket(0x10, 0x803, 0x0) r0 = syz_open_procfs(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0xffffffffffffffe0, &(0x7f0000000180)=0x6) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7b7f38972eea2c57, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000680)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08004514001c8000000000029078ac1414117f000001177c9078e0000001dc489a7943e276ed9a55702fa62ad1c5494a333ae6e42ea521e460584946f7302bec4d0b82dbda5c0657ce35d82edaac274039986b35c3ab17fbb9e9db1bce4b156264d0526aa80078af0ce063652f2dba7a"], 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000340)={'veth0_virt_wifi\x00', {0x2, 0x4e20, @local}}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/protocols\x00') 4m27.06917028s ago: executing program 0 (id=1500): syz_emit_ethernet(0x76, &(0x7f0000000580)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x15, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x5, 0x0, @dev, @local, {[@cipso={0x86, 0x34, 0x3, [{0x7, 0x2}, {0x7, 0xc, "fd249985b40b04fabda2"}, {0x0, 0x2}, {0x0, 0x2}, {0x6, 0x5, "7166dc"}, {0x5, 0x10, "0bad84812401d4693ada6a1dfc9f"}, {0x2, 0x5, "3e1027"}, {0x5, 0x2}]}, @ssrr={0x89, 0x7, 0x74, [@multicast2]}, @generic={0x83, 0x2}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 4m27.000328144s ago: executing program 0 (id=1501): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, 0x0, 0x0) listen(r5, 0x3) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)=@o_path={&(0x7f0000000180)='./file0\x00'}, 0x18) syz_clone3(&(0x7f0000000680)={0x40004000, 0x0, 0x0, 0x0, {0x21}, 0x0, 0x0, 0x0, 0x0}, 0x58) 3m41.462278873s ago: executing program 45 (id=1501): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, 0x0, 0x0) listen(r5, 0x3) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)=@o_path={&(0x7f0000000180)='./file0\x00'}, 0x18) syz_clone3(&(0x7f0000000680)={0x40004000, 0x0, 0x0, 0x0, {0x21}, 0x0, 0x0, 0x0, 0x0}, 0x58) 3m8.50835415s ago: executing program 6 (id=1513): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000440)={r0, 0x0, 0x0, 0x4}, 0x20) 3m8.077990294s ago: executing program 6 (id=1516): creat(&(0x7f0000000040)='./bus\x00', 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)='trans=rdma,') 3m7.579438112s ago: executing program 6 (id=1519): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=@setneightbl={0x24, 0x43, 0x1, 0xffff7ffe, 0x0, {0xa}, [@NDTA_NAME={0xf, 0x1, '\xaa\xaa\xaa\xaa\xaa\xc47\xa5m\"0'}]}, 0x24}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$ethtool(0x0, r1) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x8080) r3 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000038c0)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da97e22f4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3ab60fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ad0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bff3b89c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c2ed01faa7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497dad64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6fba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd2310801570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88cf573fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb414c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953e88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a72e1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867857ed13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9ea81232fbef665f6212f875b2a000000000000000000000000000000000000000000000000000000a0cc2b89ce1525748ce167cbabb881f060599a6a59f645edca1d5c24b2f6b8c997a8f3e1b7679984a566d98d4d31198ee4c5ea7be0d99cf89bba4a6fd0bec12e7792bec3c5038e13b1982f80cdecd07f8908a983a7c9fb81c2ba7f7e87c991f30e50d1b3bbe4cf2a2f5d4571b6568ada51bc121c9139d2a8e0638c84066b1759081802"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r4}, 0x10) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x20000000ec071, 0xffffffffffffffff, 0x0) r5 = socket$l2tp(0x2, 0x2, 0x73) r6 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r6, 0xc00c620f, &(0x7f0000000000)) bind$inet(r5, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) connect$inet(r5, &(0x7f0000000200)={0x2, 0x4e22, @local}, 0x10) sendmmsg$inet(r5, &(0x7f0000000900), 0x0, 0x0) 3m7.048581983s ago: executing program 6 (id=1520): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f687372000000001400010076657468315f766c616e"], 0xfc}}, 0x0) 3m6.838167234s ago: executing program 6 (id=1522): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0, 0x0, 0x2000000000000000}, 0x18) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r1, r1) 3m6.525311292s ago: executing program 6 (id=1523): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) io_setup(0x7d, &(0x7f0000000600)=0x0) io_submit(r4, 0x2, &(0x7f0000001d00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000000)="96", 0xffffff20, 0x0, 0x0, 0x0, r3}, &(0x7f0000000740)={0x0, 0x0, 0x41, 0x3, 0x0, r2, 0x0, 0x0, 0xffffffffffffffff}]) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f0000000200)=0x9) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x701, 0x0, [@sadb_key={0x2, 0x9, 0x8, 0x0, ','}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @private}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x8, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @empty}}]}, 0x60}, 0x1, 0x7}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x403, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x4, 0x0, 0x300, 0x8001}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gre={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_TTL={0x5, 0x8, 0x3}, @IFLA_GRE_TOS={0x5, 0x9, 0x8f}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4044090}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000400)=[{0x200000000006, 0x2, 0x1, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000540)=""/200) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r8 = add_key$keyring(&(0x7f0000000340), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xa, r8, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000400)='ex\x0f\xac\xd1\xeb\xf4\xd8&w\xef\x9f`T3%\xfa\xbf\xef\xeb\x8e1w\xfd') r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000ac0), r9) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r11}, 0x18) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff99, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r12}, 0xc) sendmsg$IEEE802154_LLSEC_SETPARAMS(r9, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000003c0)={0x20, r10, 0x5, 0x0, 0x0, {0x22}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x20}}, 0x2000c094) 2m35.320188319s ago: executing program 5 (id=1577): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1b, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3, 0x0, 0x5}, 0x18) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x2c, r0, 0x701, 0x0, 0x25dfdbfc, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x1374}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000891}, 0x40000c0) 2m34.988483328s ago: executing program 5 (id=1578): r0 = socket(0x1e, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x2017be01}) 2m34.24854903s ago: executing program 5 (id=1579): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x28, 0x8, 0x0, 0x71}, {0x80000006, 0x0, 0x9, 0x3ff}]}, 0x10) r1 = epoll_create1(0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wakeup_count', 0x2c802, 0x21) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x0, 0x0, 0x160, 0x160, 0x62020048, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback=0x7f008e04, @local, 0x0, 0x0, 'vlan0\x00', 'geneve1\x00'}, 0xb003, 0x130, 0x160, 0x8, {0xf400000000000000}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "4bc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a05050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x5a}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98, 0x0, {0xed030000}}, {0x28, '\x00', 0x4}}}}, 0x3a4) socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000007c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800"], 0x18}}], 0x1, 0x800) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) r7 = syz_open_dev$usbfs(&(0x7f0000000480), 0x76, 0x160341) ioctl$USBDEVFS_IOCTL(r7, 0xc0105512, &(0x7f0000000200)) ppoll(&(0x7f0000000080)=[{r1, 0x100}], 0x1, 0x0, 0x0, 0x0) 2m21.140401213s ago: executing program 46 (id=1523): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) io_setup(0x7d, &(0x7f0000000600)=0x0) io_submit(r4, 0x2, &(0x7f0000001d00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000000)="96", 0xffffff20, 0x0, 0x0, 0x0, r3}, &(0x7f0000000740)={0x0, 0x0, 0x41, 0x3, 0x0, r2, 0x0, 0x0, 0xffffffffffffffff}]) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f0000000200)=0x9) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x701, 0x0, [@sadb_key={0x2, 0x9, 0x8, 0x0, ','}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @private}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x8, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @empty}}]}, 0x60}, 0x1, 0x7}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x403, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x4, 0x0, 0x300, 0x8001}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gre={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_TTL={0x5, 0x8, 0x3}, @IFLA_GRE_TOS={0x5, 0x9, 0x8f}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4044090}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000400)=[{0x200000000006, 0x2, 0x1, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000540)=""/200) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r8 = add_key$keyring(&(0x7f0000000340), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xa, r8, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000400)='ex\x0f\xac\xd1\xeb\xf4\xd8&w\xef\x9f`T3%\xfa\xbf\xef\xeb\x8e1w\xfd') r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000ac0), r9) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r11}, 0x18) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff99, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r12}, 0xc) sendmsg$IEEE802154_LLSEC_SETPARAMS(r9, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000003c0)={0x20, r10, 0x5, 0x0, 0x0, {0x22}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x20}}, 0x2000c094) 2m11.419372073s ago: executing program 5 (id=1581): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380)=r0, 0x12) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') mmap$IORING_OFF_SQ_RING(&(0x7f000043b000/0x3000)=nil, 0x3000, 0x3, 0x12, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002000)={0xffffffffffffffff, 0x20, &(0x7f0000001fc0)={0x0, 0x0, 0x0, &(0x7f0000001ec0)=""/247, 0xf7}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002080)=@generic={&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x14}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000020c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x2, 0x0, @void, @value, @void, @value}, 0x50) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000, 0x1) gettid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) prctl$PR_SET_NAME(0xf, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000006c000000090a010400000000000000000700000008000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d2800128014000180090001006c617374000000000400028010000180060001006c6173740000000008000340000001"], 0xb4}}, 0x20050800) 2m10.826035517s ago: executing program 5 (id=1582): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ptrace$ARCH_SHSTK_LOCK(0x1e, 0x0, 0x3, 0x5003) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="fc000000070a"], 0xfc}, 0x1, 0x0, 0x0, 0x448d4}, 0x10000000) 2m10.40728114s ago: executing program 5 (id=1583): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1m25.433587846s ago: executing program 47 (id=1583): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 23.969069103s ago: executing program 8 (id=1800): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) quotactl_fd$Q_GETQUOTA(0xffffffffffffffff, 0xffffffff80000700, 0x0, 0x0) 23.736703296s ago: executing program 8 (id=1802): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) setrlimit(0x2, 0x0) 23.355557998s ago: executing program 8 (id=1803): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000004c0)='mm_page_free\x00', r0, 0x0, 0x178}, 0x18) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x560b0007, &(0x7f0000000000)="259a53f271a76d2686dd4c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 22.625542979s ago: executing program 8 (id=1806): bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r0 = socket$inet(0x2, 0x2, 0x1) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12012, r0, 0x800000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_adj\x00') writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000140)='15', 0x2}], 0x8) 8.416565784s ago: executing program 4 (id=1835): r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/cgroup.procs\x00', 0xc0002, 0x0) close(r0) 8.256487774s ago: executing program 4 (id=1836): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0e000000040000000400000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='mm_page_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc0041, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="034886dd09032800050030000000600000000028290081e949b93897bc3b0000000000007d01ff020000000000000000000000000001"], 0xfdef) 7.549753293s ago: executing program 4 (id=1837): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xa, 0x4, 0x7, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0x8}, 0x18) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000000206010100000000000000000000000005000100070000000900020073797a300000000014000780050015000000000008001240000000000d000300686173683a6e657400000000050005000a000000050004"], 0x5c}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24040800}, 0x8d0) 6.957755007s ago: executing program 4 (id=1838): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000016000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000880)='block_bio_remap\x00', r1}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 6.680613692s ago: executing program 4 (id=1839): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x800001d, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'syz_tun\x00', 0x0}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000980)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f00000000c0)={r5}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000002780)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000080)={r6, 0x3, r4, 0x5}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x1005c, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xa4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r7}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x2000000, 0x0, {0x0, 0x0, 0x0, r2, {0x9}, {0x0, 0xfff1}, {0xfff3, 0xc}}}, 0x24}, 0x1, 0x0, 0x0, 0x890}, 0x0) 5.149439019s ago: executing program 4 (id=1840): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000da16c167d803f1f805000600200000000a00060000000000ff0000000000000000001ffeff0001000003f1dc7f7c6e7c0200010000000000004000020000000005000500000000000a"], 0x80}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x400008a, 0x0) 139.038542ms ago: executing program 8 (id=1841): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0xa00, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x6b, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r3, 0x0, 0xfffffffffffffffe}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, &(0x7f0000000280), &(0x7f0000000380)=r2}, 0x20) r4 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r4, r0, 0x0, 0x3a) 0s ago: executing program 8 (id=1842): r0 = syz_io_uring_setup(0x82a, &(0x7f0000000300)={0x0, 0x0, 0x10100, 0x400000, 0x8000002}, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x16, &(0x7f0000000380)={&(0x7f0000001000)={[{0x0}]}, 0x1}, 0x1) r3 = socket(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000003c0)=@IORING_OP_SEND={0x1a, 0x20, 0x0, r3, 0x0, 0x0, 0x0, 0x200440c0, 0x1}) io_uring_enter(r0, 0x27e2, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): busy [ 1074.399291][T11060] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1074.505338][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 1074.506889][ T31] audit: type=1400 audit(1329.932:1000): avc: denied { create } for pid=11063 comm="syz.4.1275" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1078.562147][ T31] audit: type=1400 audit(1333.962:1001): avc: denied { unlink } for pid=8615 comm="syz-executor" name="file0" dev="tmpfs" ino=777 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1079.248607][T11068] SELinux: failed to load policy [ 1079.595209][T11070] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1277'. [ 1079.702667][T11070] ip6gre1: entered allmulticast mode [ 1080.170531][ T31] audit: type=1326 audit(1335.592:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11075 comm="syz.4.1279" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1080.174343][ T31] audit: type=1326 audit(1335.592:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11075 comm="syz.4.1279" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1080.174558][ T31] audit: type=1326 audit(1335.592:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11075 comm="syz.4.1279" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1080.174689][ T31] audit: type=1326 audit(1335.592:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11075 comm="syz.4.1279" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1080.174813][ T31] audit: type=1326 audit(1335.592:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11075 comm="syz.4.1279" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1080.174934][ T31] audit: type=1326 audit(1335.592:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11075 comm="syz.4.1279" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1080.175059][ T31] audit: type=1326 audit(1335.602:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11075 comm="syz.4.1279" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1080.175208][ T31] audit: type=1326 audit(1335.602:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11075 comm="syz.4.1279" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1080.182238][ T31] audit: type=1326 audit(1335.602:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11075 comm="syz.4.1279" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1080.182543][ T31] audit: type=1326 audit(1335.602:1011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11075 comm="syz.4.1279" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1087.139080][T11088] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1087.183653][T11088] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1088.659257][T11088] hsr_slave_0: entered promiscuous mode [ 1088.660246][T11088] hsr_slave_1: entered promiscuous mode [ 1088.660881][T11088] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1088.661019][T11088] Cannot create hsr debugfs directory [ 1089.442569][T11088] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 1089.449508][T11088] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 1089.467624][T11088] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 1089.474048][T11088] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 1090.632314][T11088] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1097.718741][T11088] veth0_vlan: entered promiscuous mode [ 1097.837214][T11088] veth1_vlan: entered promiscuous mode [ 1098.029775][T11088] veth0_macvtap: entered promiscuous mode [ 1098.057631][T11088] veth1_macvtap: entered promiscuous mode [ 1098.257395][T11088] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1098.257839][T11088] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1098.268304][T11088] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1098.268887][T11088] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1099.254948][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 1099.255432][ T31] audit: type=1326 audit(1354.682:1030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11448 comm="syz.7.1291" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1099.255673][ T31] audit: type=1326 audit(1354.682:1031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11448 comm="syz.7.1291" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1099.266396][ T31] audit: type=1326 audit(1354.692:1032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11448 comm="syz.7.1291" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1099.266861][ T31] audit: type=1326 audit(1354.692:1033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11448 comm="syz.7.1291" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1099.282846][ T31] audit: type=1326 audit(1354.692:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11448 comm="syz.7.1291" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1099.283399][ T31] audit: type=1326 audit(1354.702:1035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11448 comm="syz.7.1291" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1099.283510][ T31] audit: type=1326 audit(1354.702:1036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11448 comm="syz.7.1291" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1099.283593][ T31] audit: type=1326 audit(1354.702:1037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11448 comm="syz.7.1291" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1099.283684][ T31] audit: type=1326 audit(1354.702:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11448 comm="syz.7.1291" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1099.283828][ T31] audit: type=1326 audit(1354.702:1039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11448 comm="syz.7.1291" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1117.689034][ T3818] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1117.737102][ T3818] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1117.779204][ T3818] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1117.818553][ T3818] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1117.992678][ T3818] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1117.996626][ T3818] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1118.000935][ T3818] bond0 (unregistering): Released all slaves [ 1118.117190][ T3818] hsr_slave_0: left promiscuous mode [ 1118.118831][ T3818] hsr_slave_1: left promiscuous mode [ 1118.135731][ T3818] veth1_macvtap: left promiscuous mode [ 1118.142729][ T3818] veth0_macvtap: left promiscuous mode [ 1118.143052][ T3818] veth1_vlan: left promiscuous mode [ 1118.143432][ T3818] veth0_vlan: left promiscuous mode [ 1125.633123][T11546] netlink: 64 bytes leftover after parsing attributes in process `syz.7.1303'. [ 1150.718833][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 1150.719527][ T31] audit: type=1400 audit(1406.142:1052): avc: denied { sys_module } for pid=11590 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1150.720341][ T31] audit: type=1400 audit(1406.142:1053): avc: denied { module_request } for pid=11590 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1150.782128][ T31] audit: type=1400 audit(1406.202:1054): avc: denied { read } for pid=11723 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1150.817496][T11724] netlink: 'syz.7.1309': attribute type 4 has an invalid length. [ 1150.834423][T11724] netlink: 'syz.7.1309': attribute type 4 has an invalid length. [ 1150.843216][T11724] lo: entered promiscuous mode [ 1150.852416][T11724] tunl0: entered promiscuous mode [ 1150.857409][T11724] gre0: entered promiscuous mode [ 1150.871844][T11724] gretap0: entered promiscuous mode [ 1150.875481][T11724] erspan0: entered promiscuous mode [ 1150.879251][T11724] ip_vti0: entered promiscuous mode [ 1150.890353][T11724] ip6_vti0: entered promiscuous mode [ 1150.894166][T11724] sit0: entered promiscuous mode [ 1150.898012][T11724] ip6tnl0: entered promiscuous mode [ 1150.900862][T11724] ip6gre0: entered promiscuous mode [ 1150.915102][T11724] syz_tun: entered promiscuous mode [ 1150.919623][T11724] ip6gretap0: entered promiscuous mode [ 1150.926041][T11724] vcan0: entered promiscuous mode [ 1150.928088][T11724] bond0: entered promiscuous mode [ 1150.929352][T11724] bond_slave_0: entered promiscuous mode [ 1150.930757][T11724] bond_slave_1: entered promiscuous mode [ 1150.938500][T11724] dummy0: entered promiscuous mode [ 1150.943459][T11724] nlmon0: entered promiscuous mode [ 1150.953575][T11724] vxcan0: entered promiscuous mode [ 1150.954638][T11724] vxcan1: entered promiscuous mode [ 1150.956955][T11724] veth0: entered promiscuous mode [ 1150.960298][T11724] veth1: entered promiscuous mode [ 1150.970965][T11724] wg0: entered promiscuous mode [ 1150.979778][T11724] wg1: entered promiscuous mode [ 1150.985938][T11724] wg2: entered promiscuous mode [ 1150.987695][T11724] veth0_to_bridge: entered promiscuous mode [ 1150.994410][T11724] bridge_slave_0: entered promiscuous mode [ 1150.999270][T11724] veth1_to_bridge: entered promiscuous mode [ 1151.004874][T11724] bridge_slave_1: entered promiscuous mode [ 1151.006461][T11724] veth0_to_bond: entered promiscuous mode [ 1151.010696][T11724] veth1_to_bond: entered promiscuous mode [ 1151.034528][T11724] veth0_to_team: entered promiscuous mode [ 1151.036009][T11724] team_slave_0: entered promiscuous mode [ 1151.036913][T11724] veth1_to_team: entered promiscuous mode [ 1151.038274][T11724] team_slave_1: entered promiscuous mode [ 1151.038807][T11724] veth0_to_batadv: entered promiscuous mode [ 1151.040629][T11724] batadv_slave_0: entered promiscuous mode [ 1151.054123][T11724] veth1_to_batadv: entered promiscuous mode [ 1151.056335][T11724] batadv_slave_1: entered promiscuous mode [ 1151.058233][T11724] xfrm0: entered promiscuous mode [ 1151.059849][T11724] veth0_to_hsr: entered promiscuous mode [ 1151.074831][T11724] veth1_to_hsr: entered promiscuous mode [ 1151.086341][T11724] hsr0: entered promiscuous mode [ 1151.094737][T11724] veth1_virt_wifi: entered promiscuous mode [ 1151.103540][T11724] veth0_virt_wifi: entered promiscuous mode [ 1151.146828][T11724] vlan0: entered promiscuous mode [ 1151.148273][T11724] vlan1: entered promiscuous mode [ 1151.153156][T11724] macvlan0: entered promiscuous mode [ 1151.155581][T11724] macvlan1: entered promiscuous mode [ 1151.157236][T11724] ipvlan0: entered promiscuous mode [ 1151.157569][T11724] ipvlan1: entered promiscuous mode [ 1151.182690][T11724] macvtap0: entered promiscuous mode [ 1151.184762][T11724] macsec0: entered promiscuous mode [ 1151.189991][T11724] geneve0: entered promiscuous mode [ 1151.192941][T11724] netdevsim netdevsim7 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1151.193093][T11724] netdevsim netdevsim7 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1151.193217][T11724] netdevsim netdevsim7 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1151.193301][T11724] netdevsim netdevsim7 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1151.199883][T11724] geneve1: entered promiscuous mode [ 1151.203492][T11724] netdevsim netdevsim7 netdevsim0: entered promiscuous mode [ 1151.205622][T11724] netdevsim netdevsim7 netdevsim1: entered promiscuous mode [ 1151.207768][T11724] netdevsim netdevsim7 netdevsim2: entered promiscuous mode [ 1151.212164][T11724] netdevsim netdevsim7 netdevsim3: entered promiscuous mode [ 1151.344821][ T31] audit: type=1400 audit(1406.772:1055): avc: denied { map_create } for pid=11726 comm="syz.7.1310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1151.345051][ T31] audit: type=1400 audit(1406.772:1056): avc: denied { perfmon } for pid=11726 comm="syz.7.1310" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1151.345233][ T31] audit: type=1400 audit(1406.772:1057): avc: denied { map_read map_write } for pid=11726 comm="syz.7.1310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1151.350552][ T31] audit: type=1400 audit(1406.772:1058): avc: denied { prog_load } for pid=11726 comm="syz.7.1310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1151.350735][ T31] audit: type=1400 audit(1406.772:1059): avc: denied { bpf } for pid=11726 comm="syz.7.1310" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1151.362174][ T31] audit: type=1400 audit(1406.782:1060): avc: denied { prog_run } for pid=11726 comm="syz.7.1310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1151.502549][ T31] audit: type=1400 audit(1406.922:1061): avc: denied { read } for pid=11746 comm="syz.7.1311" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1151.526478][T11590] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1151.544936][T11590] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1153.542889][T11590] hsr_slave_0: entered promiscuous mode [ 1153.545559][T11590] hsr_slave_1: entered promiscuous mode [ 1154.114854][T11590] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 1154.119087][T11590] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 1154.139603][T11590] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 1154.183486][T11590] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 1155.318610][T11590] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1156.494666][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 1156.496017][ T31] audit: type=1400 audit(1411.922:1076): avc: denied { open } for pid=11819 comm="syz.7.1316" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1156.499696][ T31] audit: type=1400 audit(1411.922:1077): avc: denied { ioctl } for pid=11819 comm="syz.7.1316" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1156.537279][T11929] x_tables: ip6_tables: policy.0 match: invalid size 312 (kernel) != (user) 0 [ 1161.698108][T11590] veth0_vlan: entered promiscuous mode [ 1161.740487][T11590] veth1_vlan: entered promiscuous mode [ 1161.872508][T11590] veth0_macvtap: entered promiscuous mode [ 1161.877289][T11590] veth1_macvtap: entered promiscuous mode [ 1161.928663][T11590] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1161.929311][T11590] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1161.930760][T11590] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1161.933597][T11590] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1161.999034][ T31] audit: type=1400 audit(1417.422:1078): avc: denied { mounton } for pid=11590 comm="syz-executor" path="/syzkaller.qiDQto/syz-tmp" dev="vda" ino=822 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1162.000780][ T31] audit: type=1400 audit(1417.422:1079): avc: denied { mount } for pid=11590 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1162.005134][ T31] audit: type=1400 audit(1417.432:1080): avc: denied { mounton } for pid=11590 comm="syz-executor" path="/syzkaller.qiDQto/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1162.008241][ T31] audit: type=1400 audit(1417.432:1081): avc: denied { mount } for pid=11590 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1162.019473][ T31] audit: type=1400 audit(1417.442:1082): avc: denied { mounton } for pid=11590 comm="syz-executor" path="/syzkaller.qiDQto/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1162.029570][ T31] audit: type=1400 audit(1417.452:1083): avc: denied { mounton } for pid=11590 comm="syz-executor" path="/syzkaller.qiDQto/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=17201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1162.031556][ T31] audit: type=1400 audit(1417.452:1084): avc: denied { unmount } for pid=11590 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1162.034707][ T31] audit: type=1400 audit(1417.462:1085): avc: denied { mounton } for pid=11590 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1162.041140][ T31] audit: type=1400 audit(1417.462:1086): avc: denied { mount } for pid=11590 comm="syz-executor" name="/" dev="gadgetfs" ino=2457 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1162.041329][ T31] audit: type=1400 audit(1417.462:1087): avc: denied { mount } for pid=11590 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1162.313554][T11967] tracefs: Bad value for 'mode' [ 1169.205034][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 1169.205306][ T31] audit: type=1400 audit(1424.632:1094): avc: denied { create } for pid=11983 comm="syz.7.1323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1169.237230][ T31] audit: type=1400 audit(1424.662:1095): avc: denied { name_bind } for pid=11983 comm="syz.7.1323" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1169.237520][ T31] audit: type=1400 audit(1424.662:1096): avc: denied { node_bind } for pid=11983 comm="syz.7.1323" saddr=172.20.20.170 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1169.237721][ T31] audit: type=1400 audit(1424.662:1097): avc: denied { write } for pid=11983 comm="syz.7.1323" path="/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1169.690730][ T31] audit: type=1400 audit(1425.112:1098): avc: denied { name_bind } for pid=11987 comm="syz.7.1325" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1175.053237][ T31] audit: type=1400 audit(1430.482:1099): avc: denied { write } for pid=11989 comm="syz.7.1326" name="fib_triestat" dev="proc" ino=4026532801 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1177.357776][ T31] audit: type=1400 audit(1432.782:1100): avc: denied { write } for pid=11994 comm="syz.8.1328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1177.467654][ T31] audit: type=1400 audit(1432.892:1101): avc: denied { read } for pid=11994 comm="syz.8.1328" dev="nsfs" ino=4026532670 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1177.470448][ T31] audit: type=1400 audit(1432.892:1102): avc: denied { open } for pid=11994 comm="syz.8.1328" path="net:[4026532670]" dev="nsfs" ino=4026532670 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1178.741936][ T3818] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1178.810676][ T3818] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1178.867773][ T3818] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1178.928848][ T3818] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1179.192099][ T3818] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1179.195581][ T3818] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1179.197561][ T3818] bond0 (unregistering): Released all slaves [ 1179.246631][ T3818] hsr_slave_0: left promiscuous mode [ 1179.247931][ T3818] hsr_slave_1: left promiscuous mode [ 1179.269263][ T3818] veth1_macvtap: left promiscuous mode [ 1179.269554][ T3818] veth0_macvtap: left promiscuous mode [ 1179.269720][ T3818] veth1_vlan: left promiscuous mode [ 1179.269806][ T3818] veth0_vlan: left promiscuous mode [ 1179.643271][ T31] audit: type=1400 audit(1435.062:1103): avc: denied { write } for pid=12015 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1179.643655][ T31] audit: type=1400 audit(1435.062:1104): avc: denied { open } for pid=12015 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1179.804244][ T31] audit: type=1400 audit(1435.232:1105): avc: denied { search } for pid=12016 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1179.833814][ T31] audit: type=1400 audit(1435.252:1106): avc: denied { read } for pid=12017 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1179.842014][ T31] audit: type=1400 audit(1435.262:1107): avc: denied { open } for pid=12017 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1179.842278][ T31] audit: type=1400 audit(1435.262:1108): avc: denied { getattr } for pid=12017 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1180.103725][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 1180.103948][ T31] audit: type=1400 audit(1435.532:1118): avc: denied { remove_name } for pid=12021 comm="rm" name="resolv.conf.eth25.link" dev="tmpfs" ino=83 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1180.104122][ T31] audit: type=1400 audit(1435.532:1119): avc: denied { unlink } for pid=12021 comm="rm" name="resolv.conf.eth25.link" dev="tmpfs" ino=83 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1180.345087][ T31] audit: type=1400 audit(1435.772:1120): avc: denied { ioctl } for pid=12028 comm="syz.7.1331" path="socket:[17707]" dev="sockfs" ino=17707 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1181.046200][T12047] netlink: 24 bytes leftover after parsing attributes in process `syz.7.1335'. [ 1181.046724][T12047] netlink: 24 bytes leftover after parsing attributes in process `syz.7.1335'. [ 1182.406027][ T31] audit: type=1400 audit(1437.832:1121): avc: denied { create } for pid=12062 comm="syz.7.1339" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1182.427745][ T31] audit: type=1400 audit(1437.852:1122): avc: denied { ioctl } for pid=12062 comm="syz.7.1339" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=17745 ioctlcmd=0xaa06 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1183.054711][ T31] audit: type=1400 audit(1438.482:1123): avc: denied { create } for pid=12062 comm="syz.7.1339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1183.103918][ T31] audit: type=1400 audit(1438.532:1124): avc: denied { bind } for pid=12062 comm="syz.7.1339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1183.125389][ T31] audit: type=1400 audit(1438.552:1125): avc: denied { ioctl } for pid=12062 comm="syz.7.1339" path="socket:[17747]" dev="sockfs" ino=17747 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1185.734918][ T31] audit: type=1400 audit(1441.162:1126): avc: denied { create } for pid=12083 comm="syz.7.1343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1186.911167][ T31] audit: type=1400 audit(1442.322:1127): avc: denied { connect } for pid=12083 comm="syz.7.1343" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1186.921219][ T31] audit: type=1400 audit(1442.332:1128): avc: denied { write } for pid=12083 comm="syz.7.1343" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1187.252930][ T31] audit: type=1326 audit(1442.642:1129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12090 comm="syz.8.1344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1187.254632][ T31] audit: type=1326 audit(1442.642:1130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12090 comm="syz.8.1344" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1187.256124][ T31] audit: type=1326 audit(1442.642:1131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12090 comm="syz.8.1344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1187.257406][ T31] audit: type=1326 audit(1442.642:1132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12090 comm="syz.8.1344" exe="/syz-executor" sig=0 arch=40000028 syscall=260 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1187.258708][ T31] audit: type=1326 audit(1442.642:1133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12090 comm="syz.8.1344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1187.259922][ T31] audit: type=1326 audit(1442.642:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12090 comm="syz.8.1344" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1187.261360][ T31] audit: type=1326 audit(1442.642:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12090 comm="syz.8.1344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1200.901034][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 1200.902652][ T31] audit: type=1400 audit(1456.322:1153): avc: denied { write } for pid=12147 comm="syz.8.1352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1200.905054][T12148] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=5921 sclass=netlink_xfrm_socket pid=12148 comm=syz.8.1352 [ 1201.085846][T12152] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1201.088363][T12152] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1201.105213][T12152] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1201.108187][T12152] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1201.243152][ T31] audit: type=1400 audit(1456.672:1154): avc: denied { execute } for pid=12143 comm="syz.7.1351" name="file0" dev="tmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1214.622496][T12170] veth1_macvtap: left promiscuous mode [ 1214.622762][T12170] macsec0: entered promiscuous mode [ 1235.746913][ T31] audit: type=1326 audit(1499.174:1155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12221 comm="syz.7.1368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1235.748313][ T31] audit: type=1326 audit(1499.174:1156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12221 comm="syz.7.1368" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1235.775877][ T31] audit: type=1326 audit(1499.204:1157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12221 comm="syz.7.1368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1235.806266][ T31] audit: type=1326 audit(1499.234:1158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12221 comm="syz.7.1368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1235.843695][ T31] audit: type=1326 audit(1499.274:1159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12221 comm="syz.7.1368" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1235.843961][ T31] audit: type=1326 audit(1499.274:1160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12221 comm="syz.7.1368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1235.846384][ T31] audit: type=1326 audit(1499.274:1161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12221 comm="syz.7.1368" exe="/syz-executor" sig=0 arch=40000028 syscall=226 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1235.846597][ T31] audit: type=1326 audit(1499.274:1162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12221 comm="syz.7.1368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1235.911001][ T31] audit: type=1326 audit(1499.304:1163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12221 comm="syz.7.1368" exe="/syz-executor" sig=0 arch=40000028 syscall=227 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1235.963660][ T31] audit: type=1326 audit(1499.344:1164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12221 comm="syz.7.1368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1236.127382][T12224] netlink: 12 bytes leftover after parsing attributes in process `syz.7.1369'. [ 1251.793783][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 1251.794056][ T31] audit: type=1326 audit(1515.224:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12255 comm="syz.7.1381" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1251.794220][ T31] audit: type=1326 audit(1515.224:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12255 comm="syz.7.1381" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1251.800101][ T31] audit: type=1326 audit(1515.224:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12255 comm="syz.7.1381" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1251.843047][ T31] audit: type=1326 audit(1515.274:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12255 comm="syz.7.1381" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1251.843314][ T31] audit: type=1326 audit(1515.274:1181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12255 comm="syz.7.1381" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1251.853853][ T31] audit: type=1326 audit(1515.284:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12255 comm="syz.7.1381" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1251.856482][ T31] audit: type=1326 audit(1515.284:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12255 comm="syz.7.1381" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1251.859529][ T31] audit: type=1326 audit(1515.284:1184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12255 comm="syz.7.1381" exe="/syz-executor" sig=0 arch=40000028 syscall=314 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1251.862085][ T31] audit: type=1326 audit(1515.284:1185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12255 comm="syz.7.1381" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1270.029205][ T31] audit: type=1400 audit(1533.454:1186): avc: denied { execute } for pid=12261 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1270.032664][ T31] audit: type=1400 audit(1533.464:1187): avc: denied { execute_no_trans } for pid=12261 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1270.089854][ T31] audit: type=1400 audit(1533.514:1188): avc: denied { mounton } for pid=12262 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1271.365923][T12262] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1271.373978][T12262] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1272.065716][T12262] hsr_slave_0: entered promiscuous mode [ 1272.067976][T12262] hsr_slave_1: entered promiscuous mode [ 1272.073315][T12262] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1272.073531][T12262] Cannot create hsr debugfs directory [ 1272.384160][T12262] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 1272.393428][T12262] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 1272.396779][T12262] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 1272.404473][T12262] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 1273.184082][T12262] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1274.145673][T12262] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1276.394926][T12262] veth0_vlan: entered promiscuous mode [ 1276.414602][T12262] veth1_vlan: entered promiscuous mode [ 1276.470634][T12262] veth0_macvtap: entered promiscuous mode [ 1276.477162][T12262] veth1_macvtap: entered promiscuous mode [ 1276.534736][T12262] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1276.534960][T12262] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1276.535013][T12262] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1276.535054][T12262] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1280.347219][ T31] audit: type=1400 audit(1543.774:1189): avc: denied { mount } for pid=12635 comm="syz.9.1396" name="/" dev="configfs" ino=1186 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1280.355615][ T31] audit: type=1400 audit(1543.784:1190): avc: denied { search } for pid=12635 comm="syz.9.1396" name="/" dev="configfs" ino=1186 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1280.372074][ T31] audit: type=1400 audit(1543.794:1191): avc: denied { read } for pid=12635 comm="syz.9.1396" name="/" dev="configfs" ino=1186 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1280.372413][ T31] audit: type=1400 audit(1543.794:1192): avc: denied { open } for pid=12635 comm="syz.9.1396" path="/" dev="configfs" ino=1186 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1280.592315][ T31] audit: type=1400 audit(1544.014:1193): avc: denied { mounton } for pid=12637 comm="syz.9.1397" path="/14/file0" dev="tmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1281.794186][ T31] audit: type=1400 audit(1545.224:1194): avc: denied { unmount } for pid=12262 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1281.942127][T12644] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1281.959265][T12644] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1282.366416][ T31] audit: type=1400 audit(1545.784:1195): avc: denied { allowed } for pid=12653 comm="syz.9.1400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1282.378987][ T31] audit: type=1400 audit(1545.804:1196): avc: denied { sqpoll } for pid=12653 comm="syz.9.1400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1282.415563][ T31] audit: type=1400 audit(1545.844:1197): avc: denied { mount } for pid=12653 comm="syz.9.1400" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 1288.062832][T11621] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1288.899844][T11621] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1288.956540][T11621] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1289.025103][T11621] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1289.257515][T11621] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1289.267246][T11621] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1289.273750][T11621] bond0 (unregistering): Released all slaves [ 1289.377580][T11621] hsr_slave_0: left promiscuous mode [ 1289.379657][T11621] hsr_slave_1: left promiscuous mode [ 1289.393538][T11621] veth0_macvtap: left promiscuous mode [ 1289.394131][T11621] veth1_vlan: left promiscuous mode [ 1289.394364][T11621] veth0_vlan: left promiscuous mode [ 1296.397719][ T31] audit: type=1400 audit(1559.824:1198): avc: denied { unmount } for pid=12262 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 1299.575866][T12711] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1299.584755][T12711] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1300.100325][T12711] hsr_slave_0: entered promiscuous mode [ 1300.104543][T12711] hsr_slave_1: entered promiscuous mode [ 1300.696174][T12711] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1300.707139][T12711] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1300.717561][T12711] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1300.726943][T12711] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1300.809472][ T31] audit: type=1400 audit(1564.234:1199): avc: denied { setopt } for pid=12826 comm="syz.9.1403" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1301.763973][T12711] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1302.733177][T13062] netlink: 20 bytes leftover after parsing attributes in process `syz.9.1405'. [ 1303.256411][ T31] audit: type=1400 audit(1566.684:1200): avc: denied { read } for pid=13064 comm="syz.9.1406" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=19053 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1306.770911][T12711] veth0_vlan: entered promiscuous mode [ 1306.842981][T12711] veth1_vlan: entered promiscuous mode [ 1306.846621][ T31] audit: type=1400 audit(1570.274:1201): avc: denied { unmount } for pid=12262 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1307.018662][T12711] veth0_macvtap: entered promiscuous mode [ 1307.050171][T12711] veth1_macvtap: entered promiscuous mode [ 1307.287074][T12711] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1307.302328][T12711] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1307.302887][T12711] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1307.303118][T12711] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1307.756258][ T31] audit: type=1400 audit(1571.184:1202): avc: denied { read write } for pid=12711 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1307.756876][ T31] audit: type=1400 audit(1571.184:1203): avc: denied { open } for pid=12711 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1307.757445][ T31] audit: type=1400 audit(1571.184:1204): avc: denied { ioctl } for pid=12711 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1311.175667][ T31] audit: type=1326 audit(1574.604:1205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13144 comm="syz.1.1416" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1311.177028][ T31] audit: type=1326 audit(1574.604:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13144 comm="syz.1.1416" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1311.182517][ T31] audit: type=1326 audit(1574.604:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13144 comm="syz.1.1416" exe="/syz-executor" sig=0 arch=40000028 syscall=80 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1311.201285][ T31] audit: type=1326 audit(1574.624:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13144 comm="syz.1.1416" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1311.904705][ T31] audit: type=1326 audit(1575.334:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13154 comm="syz.1.1419" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1311.906315][ T31] audit: type=1326 audit(1575.334:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13154 comm="syz.1.1419" exe="/syz-executor" sig=0 arch=40000028 syscall=23 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1311.906584][ T31] audit: type=1326 audit(1575.334:1211): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13154 comm="syz.1.1419" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1311.923054][ T31] audit: type=1326 audit(1575.354:1212): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13154 comm="syz.1.1419" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1312.372321][T13161] input: syz1 as /devices/virtual/input/input10 [ 1312.754065][T13169] netlink: 'syz.9.1422': attribute type 16 has an invalid length. [ 1312.759759][T13169] netlink: 'syz.9.1422': attribute type 17 has an invalid length. [ 1313.247811][ T31] audit: type=1400 audit(1576.674:1213): avc: denied { create } for pid=13176 comm="syz.9.1423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1314.776579][T11621] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1314.788014][T11621] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1314.793525][T11621] bond0 (unregistering): Released all slaves [ 1315.718609][ T31] audit: type=1400 audit(1579.144:1214): avc: denied { getopt } for pid=13157 comm="syz.1.1420" lport=141 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1320.965100][ T31] audit: type=1400 audit(1584.394:1215): avc: denied { write } for pid=13222 comm="syz.9.1426" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1328.253629][ T31] audit: type=1400 audit(1591.684:1216): avc: denied { mount } for pid=13283 comm="syz.1.1427" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1328.273273][ T31] audit: type=1400 audit(1591.704:1217): avc: denied { mounton } for pid=13283 comm="syz.1.1427" path="/8/file0" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 1328.374637][ T31] audit: type=1400 audit(1591.804:1218): avc: denied { unmount } for pid=12711 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1328.419077][ T31] audit: type=1400 audit(1591.844:1219): avc: denied { unmount } for pid=12711 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1328.674677][T11621] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1328.773314][T11621] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1328.818385][T11621] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1328.860942][T11621] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1329.519526][T11621] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1329.543161][T11621] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1329.547951][T11621] bond0 (unregistering): Released all slaves [ 1329.689866][T11621] hsr_slave_0: left promiscuous mode [ 1329.701956][T11621] hsr_slave_1: left promiscuous mode [ 1329.708563][T11621] veth1_macvtap: left promiscuous mode [ 1329.708820][T11621] veth0_macvtap: left promiscuous mode [ 1329.709028][T11621] veth1_vlan: left promiscuous mode [ 1329.709123][T11621] veth0_vlan: left promiscuous mode [ 1331.976078][ T31] audit: type=1400 audit(1595.404:1220): avc: denied { map } for pid=13443 comm="syz.9.1431" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=19303 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1331.980212][ T31] audit: type=1400 audit(1595.404:1221): avc: denied { write } for pid=13443 comm="syz.9.1431" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=19303 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1332.474241][T13292] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1332.478328][T13292] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1334.335308][T13292] hsr_slave_0: entered promiscuous mode [ 1334.336290][T13292] hsr_slave_1: entered promiscuous mode [ 1334.638562][T13632] pim6reg1: entered promiscuous mode [ 1334.639906][T13632] pim6reg1: entered allmulticast mode [ 1335.515891][T13292] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1335.556113][T13292] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1335.632441][T13292] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1335.644131][T13292] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1337.573315][T13292] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1343.088169][T13292] veth0_vlan: entered promiscuous mode [ 1343.120865][T13292] veth1_vlan: entered promiscuous mode [ 1343.181199][T13292] veth0_macvtap: entered promiscuous mode [ 1343.204305][T13292] veth1_macvtap: entered promiscuous mode [ 1343.403947][T13292] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1343.404792][T13292] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1343.405004][T13292] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1343.405129][T13292] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1359.003914][ T31] audit: type=1326 audit(1622.434:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13818 comm="syz.2.1440" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1359.006630][ T31] audit: type=1326 audit(1622.434:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13818 comm="syz.2.1440" exe="/syz-executor" sig=0 arch=40000028 syscall=176 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1359.007863][ T31] audit: type=1326 audit(1622.434:1224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13818 comm="syz.2.1440" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1359.009335][ T31] audit: type=1326 audit(1622.434:1225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13818 comm="syz.2.1440" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1359.893087][T13832] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 1374.862175][ T31] audit: type=1400 audit(1638.284:1226): avc: denied { create } for pid=13888 comm="syz.2.1449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 1375.438663][T13896] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1375.439891][T13896] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1376.878004][ T31] audit: type=1400 audit(1640.304:1227): avc: denied { create } for pid=13909 comm="syz.2.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1376.909935][ T31] audit: type=1400 audit(1640.324:1228): avc: denied { ioctl } for pid=13909 comm="syz.2.1458" path="socket:[20426]" dev="sockfs" ino=20426 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1385.164923][T13941] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1385.175232][T13941] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1385.656017][T13941] hsr_slave_0: entered promiscuous mode [ 1385.658880][T13941] hsr_slave_1: entered promiscuous mode [ 1385.662953][T13941] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1385.663156][T13941] Cannot create hsr debugfs directory [ 1386.176199][T13941] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1386.196019][T13941] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1386.214053][T13941] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1386.219156][T13941] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1386.976043][T13941] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1387.910631][T13941] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1387.931917][T13941] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1391.824086][T13941] veth0_vlan: entered promiscuous mode [ 1391.895248][T13941] veth1_vlan: entered promiscuous mode [ 1392.028619][T13941] veth0_macvtap: entered promiscuous mode [ 1392.057406][T13941] veth1_macvtap: entered promiscuous mode [ 1392.146077][T13941] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1392.152754][T13941] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1392.154815][T13941] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1392.156303][T13941] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1392.524168][ T31] audit: type=1400 audit(1655.944:1229): avc: denied { write } for pid=14333 comm="syz.3.1461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1392.904209][ T31] audit: type=1326 audit(1656.334:1230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14339 comm="syz.3.1466" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1392.905401][ T31] audit: type=1326 audit(1656.334:1231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14339 comm="syz.3.1466" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1392.907650][ T31] audit: type=1326 audit(1656.334:1232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14339 comm="syz.3.1466" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1392.909897][ T31] audit: type=1326 audit(1656.334:1233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14339 comm="syz.3.1466" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1392.911961][ T31] audit: type=1326 audit(1656.334:1234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14339 comm="syz.3.1466" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1392.916066][ T31] audit: type=1326 audit(1656.334:1235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14339 comm="syz.3.1466" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1392.941926][ T31] audit: type=1326 audit(1656.334:1236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14339 comm="syz.3.1466" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1392.942212][ T31] audit: type=1326 audit(1656.344:1237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14339 comm="syz.3.1466" exe="/syz-executor" sig=0 arch=40000028 syscall=125 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1392.942366][ T31] audit: type=1326 audit(1656.344:1238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14339 comm="syz.3.1466" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1408.172704][T14416] pim6reg1: entered promiscuous mode [ 1408.173457][T14416] pim6reg1: entered allmulticast mode [ 1408.761000][T14422] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1408.763339][T14422] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1408.803627][T14422] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1408.805960][T14422] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1409.589132][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 1409.594608][ T31] audit: type=1326 audit(1673.014:1240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14427 comm="syz.2.1471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1409.595687][ T31] audit: type=1326 audit(1673.014:1241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14427 comm="syz.2.1471" exe="/syz-executor" sig=0 arch=40000028 syscall=260 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1409.597442][ T31] audit: type=1326 audit(1673.014:1242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14427 comm="syz.2.1471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1409.688383][ T31] audit: type=1326 audit(1673.114:1243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14427 comm="syz.2.1471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1412.111750][ T31] audit: type=1400 audit(1675.534:1244): avc: denied { bind } for pid=14441 comm="syz.3.1476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1415.167677][ T31] audit: type=1400 audit(1678.594:1245): avc: denied { nlmsg_write } for pid=14447 comm="syz.3.1478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1423.246005][T11621] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1423.300361][T11621] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1423.363688][T11621] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1423.408492][T11621] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1423.916662][T11621] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1423.927496][T11621] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1423.930766][T11621] bond0 (unregistering): Released all slaves [ 1424.036038][T11621] hsr_slave_0: left promiscuous mode [ 1424.037394][T11621] hsr_slave_1: left promiscuous mode [ 1424.053045][T11621] veth1_macvtap: left promiscuous mode [ 1424.053566][T11621] veth0_macvtap: left promiscuous mode [ 1424.053885][T11621] veth1_vlan: left promiscuous mode [ 1424.054341][T11621] veth0_vlan: left promiscuous mode [ 1457.879295][T14581] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1457.884491][T14581] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1458.766580][T14581] hsr_slave_0: entered promiscuous mode [ 1458.768145][T14581] hsr_slave_1: entered promiscuous mode [ 1458.769197][T14581] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1458.769465][T14581] Cannot create hsr debugfs directory [ 1459.617692][T14581] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1459.638165][T14581] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1459.646108][T14581] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1459.656482][T14581] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1460.970343][T14581] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1468.055381][T14581] veth0_vlan: entered promiscuous mode [ 1468.088772][T14581] veth1_vlan: entered promiscuous mode [ 1468.278302][T14581] veth0_macvtap: entered promiscuous mode [ 1468.315196][T14581] veth1_macvtap: entered promiscuous mode [ 1468.449046][T14581] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1468.449481][T14581] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1468.453497][T14581] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1468.455887][T14581] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1469.730971][ T31] audit: type=1400 audit(1733.154:1246): avc: denied { relabelfrom } for pid=14970 comm="syz.0.1490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1469.738475][ T31] audit: type=1400 audit(1733.154:1247): avc: denied { relabelto } for pid=14970 comm="syz.0.1490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1482.521823][ T31] audit: type=1326 audit(1745.934:1248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15015 comm="syz.0.1497" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1482.522103][ T31] audit: type=1326 audit(1745.934:1249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15015 comm="syz.0.1497" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1482.527754][ T31] audit: type=1326 audit(1745.954:1250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15015 comm="syz.0.1497" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1482.527958][ T31] audit: type=1326 audit(1745.954:1251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15015 comm="syz.0.1497" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1482.528088][ T31] audit: type=1326 audit(1745.954:1252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15015 comm="syz.0.1497" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1482.539306][ T31] audit: type=1326 audit(1745.964:1253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15015 comm="syz.0.1497" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1482.542566][ T31] audit: type=1326 audit(1745.964:1254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15015 comm="syz.0.1497" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1482.542678][ T31] audit: type=1326 audit(1745.964:1255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15015 comm="syz.0.1497" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1482.549365][ T31] audit: type=1326 audit(1745.974:1256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15015 comm="syz.0.1497" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1482.549651][ T31] audit: type=1326 audit(1745.974:1257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15015 comm="syz.0.1497" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1501.105225][T15052] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1501.110139][T15052] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1505.062795][T15052] hsr_slave_0: entered promiscuous mode [ 1505.073049][T15052] hsr_slave_1: entered promiscuous mode [ 1505.086916][T15052] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1505.087287][T15052] Cannot create hsr debugfs directory [ 1507.248915][T15052] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1507.356087][T15052] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1507.377198][T15052] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1507.419808][T15052] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1510.252724][T15052] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1525.833704][T15052] veth0_vlan: entered promiscuous mode [ 1525.888239][T15052] veth1_vlan: entered promiscuous mode [ 1526.087111][T15052] veth0_macvtap: entered promiscuous mode [ 1526.127081][T15052] veth1_macvtap: entered promiscuous mode [ 1526.358314][T15052] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1526.358752][T15052] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1526.382650][T15052] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1526.383123][T15052] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1547.473124][T15519] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1547.576661][T15519] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1547.624416][T11621] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1547.775717][T11621] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1548.116006][T11621] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1548.230568][T11621] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1548.992593][T11621] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1548.996788][T11621] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1549.000536][T11621] bond0 (unregistering): Released all slaves [ 1549.146435][T11621] hsr_slave_0: left promiscuous mode [ 1549.148579][T11621] hsr_slave_1: left promiscuous mode [ 1549.160100][T11621] veth1_macvtap: left promiscuous mode [ 1549.172565][T11621] veth0_macvtap: left promiscuous mode [ 1549.173160][T11621] veth1_vlan: left promiscuous mode [ 1549.176054][T11621] veth0_vlan: left promiscuous mode [ 1550.875028][T11621] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1550.954713][T11621] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1551.174799][T11621] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1551.252646][T15519] hsr_slave_0: entered promiscuous mode [ 1551.253601][T15519] hsr_slave_1: entered promiscuous mode [ 1551.256564][T15519] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1551.256766][T15519] Cannot create hsr debugfs directory [ 1551.263811][T11621] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1552.203336][T11621] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1552.209574][T11621] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1552.215587][T11621] bond0 (unregistering): Released all slaves [ 1552.288860][T11621] hsr_slave_0: left promiscuous mode [ 1552.290336][T11621] hsr_slave_1: left promiscuous mode [ 1552.323159][T11621] veth1_macvtap: left promiscuous mode [ 1552.323897][T11621] veth0_macvtap: left promiscuous mode [ 1552.324732][T11621] veth1_vlan: left promiscuous mode [ 1552.325398][T11621] veth0_vlan: left promiscuous mode [ 1554.786820][T15519] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 1554.823569][T15519] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 1554.831331][T15519] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 1554.853040][T15519] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 1556.865559][T15519] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1562.475832][T15949] syzkaller0: entered promiscuous mode [ 1562.476131][T15949] syzkaller0: entered allmulticast mode [ 1564.925823][T15519] veth0_vlan: entered promiscuous mode [ 1565.008193][T15519] veth1_vlan: entered promiscuous mode [ 1565.214801][T15519] veth0_macvtap: entered promiscuous mode [ 1565.247937][T15519] veth1_macvtap: entered promiscuous mode [ 1565.447056][T15519] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1565.447552][T15519] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1565.447668][T15519] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1565.447895][T15519] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1566.368371][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 1566.368686][ T31] audit: type=1400 audit(1829.794:1262): avc: denied { execute_no_trans } for pid=15974 comm="syz.6.1502" path="/0/file0" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1567.072584][ T31] audit: type=1326 audit(1830.494:1263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.6.1506" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1567.077875][ T31] audit: type=1326 audit(1830.504:1264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.6.1506" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1567.088758][ T31] audit: type=1326 audit(1830.514:1265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.6.1506" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1567.108541][ T31] audit: type=1326 audit(1830.534:1266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.6.1506" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1567.125867][ T31] audit: type=1326 audit(1830.534:1267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.6.1506" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1567.126328][ T31] audit: type=1326 audit(1830.544:1268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.6.1506" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1567.126600][ T31] audit: type=1326 audit(1830.544:1269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.6.1506" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1567.126701][ T31] audit: type=1326 audit(1830.544:1270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.6.1506" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1567.156070][ T31] audit: type=1326 audit(1830.584:1271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.6.1506" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1571.244609][T16029] SELinux: failed to load policy [ 1571.525317][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 1571.525900][ T31] audit: type=1400 audit(1834.954:1292): avc: denied { create } for pid=16035 comm="syz.6.1519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1571.717351][T16036] binder: 16035:16036 ioctl c00c620f 20000000 returned -22 [ 1571.743555][ T31] audit: type=1400 audit(1835.164:1293): avc: denied { bind } for pid=16035 comm="syz.6.1519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1571.744040][ T31] audit: type=1400 audit(1835.164:1294): avc: denied { node_bind } for pid=16035 comm="syz.6.1519" saddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1571.790470][T16037] netlink: 976 bytes leftover after parsing attributes in process `syz.5.1518'. [ 1572.139126][ T31] audit: type=1400 audit(1835.564:1295): avc: denied { write } for pid=16044 comm="syz.5.1521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1572.157504][ T31] audit: type=1400 audit(1835.584:1296): avc: denied { connect } for pid=16044 comm="syz.5.1521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1572.157977][ T31] audit: type=1400 audit(1835.584:1297): avc: denied { name_connect } for pid=16044 comm="syz.5.1521" dest=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1573.299192][ T31] audit: type=1326 audit(1836.714:1298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16050 comm="syz.6.1523" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1573.312099][ T31] audit: type=1326 audit(1836.734:1299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16050 comm="syz.6.1523" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1573.324695][ T31] audit: type=1326 audit(1836.744:1300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16050 comm="syz.6.1523" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1573.325137][ T31] audit: type=1326 audit(1836.754:1301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16050 comm="syz.6.1523" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1574.827134][T16073] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1524'. [ 1576.495728][T16094] netlink: 'syz.5.1530': attribute type 1 has an invalid length. [ 1576.498104][T16094] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1530'. [ 1581.565693][T16130] SELinux: Context Ü is not valid (left unmapped). [ 1581.565764][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 1581.565854][ T31] audit: type=1400 audit(1844.994:1341): avc: denied { mac_admin } for pid=16129 comm="syz.5.1536" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1586.566348][ T31] audit: type=1400 audit(1849.994:1342): avc: denied { create } for pid=16163 comm="syz.5.1540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1586.590254][ T31] audit: type=1400 audit(1850.014:1343): avc: denied { setopt } for pid=16163 comm="syz.5.1540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1590.805448][ T31] audit: type=1326 audit(1854.234:1344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1590.816195][ T31] audit: type=1326 audit(1854.244:1345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1590.834915][ T31] audit: type=1326 audit(1854.264:1346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1590.835543][ T31] audit: type=1326 audit(1854.264:1347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1590.836279][ T31] audit: type=1326 audit(1854.264:1348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1590.863338][ T31] audit: type=1326 audit(1854.284:1349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1590.863857][ T31] audit: type=1326 audit(1854.284:1350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1590.863986][ T31] audit: type=1326 audit(1854.284:1351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=337 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1590.864120][ T31] audit: type=1326 audit(1854.294:1352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1591.592850][ T31] kauditd_printk_skb: 197 callbacks suppressed [ 1591.593250][ T31] audit: type=1326 audit(1855.014:1550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=276 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1591.604772][ T31] audit: type=1326 audit(1855.034:1551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127d2c code=0x7ffc0000 [ 1591.605148][ T31] audit: type=1326 audit(1855.034:1552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef178 code=0x7ffc0000 [ 1591.606424][ T31] audit: type=1326 audit(1855.034:1553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=276 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1591.644679][ T31] audit: type=1326 audit(1855.034:1554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127d2c code=0x7ffc0000 [ 1591.644938][ T31] audit: type=1326 audit(1855.074:1555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef178 code=0x7ffc0000 [ 1591.645132][ T31] audit: type=1326 audit(1855.074:1556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127d2c code=0x7ffc0000 [ 1591.645261][ T31] audit: type=1326 audit(1855.074:1557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef178 code=0x7ffc0000 [ 1591.645309][ T31] audit: type=1326 audit(1855.074:1558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=276 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1591.658361][ T31] audit: type=1326 audit(1855.084:1559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16201 comm="syz.5.1549" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127d2c code=0x7ffc0000 [ 1598.065016][ T31] kauditd_printk_skb: 459 callbacks suppressed [ 1598.065307][ T31] audit: type=1326 audit(1861.494:2019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16262 comm="syz.5.1565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1598.065743][ T31] audit: type=1326 audit(1861.494:2020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16262 comm="syz.5.1565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1598.085209][ T31] audit: type=1326 audit(1861.514:2021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16262 comm="syz.5.1565" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x12fecc code=0x7ffc0000 [ 1598.085816][ T31] audit: type=1326 audit(1861.514:2022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16262 comm="syz.5.1565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1598.113594][ T31] audit: type=1326 audit(1861.544:2023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16262 comm="syz.5.1565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1598.135583][ T31] audit: type=1326 audit(1861.564:2024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16262 comm="syz.5.1565" exe="/syz-executor" sig=0 arch=40000028 syscall=331 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1598.135924][ T31] audit: type=1326 audit(1861.564:2025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16262 comm="syz.5.1565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1598.136065][ T31] audit: type=1326 audit(1861.564:2026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16262 comm="syz.5.1565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1598.138170][ T31] audit: type=1326 audit(1861.564:2027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16262 comm="syz.5.1565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1598.138352][ T31] audit: type=1326 audit(1861.564:2028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16262 comm="syz.5.1565" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1599.609772][T16286] netlink: 'syz.5.1570': attribute type 1 has an invalid length. [ 1600.073864][T16292] netlink: 24 bytes leftover after parsing attributes in process `syz.5.1572'. [ 1604.196870][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 1604.197163][ T31] audit: type=1400 audit(1867.624:2035): avc: denied { create } for pid=16334 comm="syz.5.1578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1608.736408][ T12] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1608.897231][ T12] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1609.013456][ T12] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1609.084422][ T12] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1609.693891][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1609.709982][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1609.757517][ T12] bond0 (unregistering): Released all slaves [ 1609.912399][ T12] hsr_slave_0: left promiscuous mode [ 1609.942544][ T12] hsr_slave_1: left promiscuous mode [ 1609.975759][ T12] veth1_macvtap: left promiscuous mode [ 1609.976331][ T12] veth0_macvtap: left promiscuous mode [ 1609.976694][ T12] veth1_vlan: left promiscuous mode [ 1609.976901][ T12] veth0_vlan: left promiscuous mode [ 1622.954572][T16407] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1622.977779][T16407] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1625.645022][T11621] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1625.767380][T16407] hsr_slave_0: entered promiscuous mode [ 1625.774691][T16407] hsr_slave_1: entered promiscuous mode [ 1625.804978][T11621] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1626.124871][T11621] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1626.258669][T11621] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1627.431064][T11621] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1627.438009][T11621] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1627.455910][T11621] bond0 (unregistering): Released all slaves [ 1627.572751][T11621] hsr_slave_0: left promiscuous mode [ 1627.583695][T11621] hsr_slave_1: left promiscuous mode [ 1627.614067][T11621] veth1_macvtap: left promiscuous mode [ 1627.614568][T11621] veth0_macvtap: left promiscuous mode [ 1627.614797][T11621] veth1_vlan: left promiscuous mode [ 1627.614981][T11621] veth0_vlan: left promiscuous mode [ 1628.005151][T16750] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1628.400282][T16754] netlink: 232 bytes leftover after parsing attributes in process `syz.5.1582'. [ 1629.398779][T16407] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1629.433994][T16407] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1629.447739][T16407] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1629.468631][T16407] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1631.298358][T16407] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1640.885794][T16407] veth0_vlan: entered promiscuous mode [ 1640.929865][T16407] veth1_vlan: entered promiscuous mode [ 1641.084765][T16407] veth0_macvtap: entered promiscuous mode [ 1641.106884][T16407] veth1_macvtap: entered promiscuous mode [ 1641.238966][T16407] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1641.239371][T16407] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1641.239698][T16407] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1641.239824][T16407] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1641.929056][ T31] audit: type=1326 audit(1905.354:2036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16857 comm="syz.4.1580" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1641.954021][ T31] audit: type=1326 audit(1905.374:2037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16857 comm="syz.4.1580" exe="/syz-executor" sig=0 arch=40000028 syscall=378 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1641.962986][ T31] audit: type=1326 audit(1905.384:2038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16857 comm="syz.4.1580" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1641.965051][ T31] audit: type=1326 audit(1905.384:2039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16857 comm="syz.4.1580" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1641.967170][ T31] audit: type=1326 audit(1905.384:2040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16857 comm="syz.4.1580" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12fd28 code=0x7ffc0000 [ 1641.970570][ T31] audit: type=1326 audit(1905.394:2041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16857 comm="syz.4.1580" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1641.974491][ T31] audit: type=1326 audit(1905.404:2042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16857 comm="syz.4.1580" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1646.545700][T16892] ALSA: seq fatal error: cannot create timer (-19) [ 1646.913852][ T31] audit: type=1400 audit(1910.344:2043): avc: denied { mount } for pid=16895 comm="syz.4.1595" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1646.916906][ T31] audit: type=1400 audit(1910.344:2044): avc: denied { unmount } for pid=16895 comm="syz.4.1595" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1648.333614][ T31] audit: type=1400 audit(1911.764:2045): avc: denied { mount } for pid=16906 comm="syz.4.1599" name="/" dev="ramfs" ino=24287 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1651.982405][ T31] audit: type=1400 audit(1915.404:2046): avc: denied { getopt } for pid=16933 comm="syz.4.1608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1652.219699][ T31] audit: type=1326 audit(1915.644:2047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16935 comm="syz.4.1609" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1652.233910][ T31] audit: type=1326 audit(1915.664:2048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16935 comm="syz.4.1609" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1652.240224][ T31] audit: type=1326 audit(1915.664:2049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16935 comm="syz.4.1609" exe="/syz-executor" sig=0 arch=40000028 syscall=16 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1652.243899][ T31] audit: type=1326 audit(1915.664:2050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16935 comm="syz.4.1609" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1652.246799][ T31] audit: type=1326 audit(1915.664:2051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16935 comm="syz.4.1609" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1654.001797][T16947] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 1654.002728][T16947] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 1654.004403][T16947] netdevsim netdevsim4: Falling back to sysfs fallback for: . [ 1654.004997][ T31] audit: type=1400 audit(1917.434:2052): avc: denied { firmware_load } for pid=16945 comm="syz.4.1612" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1656.994345][T16955] IPv6: Can't replace route, no match found [ 1657.669378][T16961] x_tables: duplicate underflow at hook 4 [ 1658.986451][ T31] audit: type=1326 audit(1922.414:2053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16972 comm="syz.4.1619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1658.990817][ T31] audit: type=1326 audit(1922.414:2054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16972 comm="syz.4.1619" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1658.994831][ T31] audit: type=1326 audit(1922.424:2055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16972 comm="syz.4.1619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1659.004516][ T31] audit: type=1326 audit(1922.434:2056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16972 comm="syz.4.1619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1659.008882][ T31] audit: type=1326 audit(1922.434:2057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16972 comm="syz.4.1619" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1659.019495][ T31] audit: type=1326 audit(1922.444:2058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16972 comm="syz.4.1619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1659.024876][ T31] audit: type=1326 audit(1922.454:2059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16972 comm="syz.4.1619" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1659.030694][ T31] audit: type=1326 audit(1922.454:2060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16972 comm="syz.4.1619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1659.034557][ T31] audit: type=1326 audit(1922.464:2061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16972 comm="syz.4.1619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1659.043278][ T31] audit: type=1326 audit(1922.474:2062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16972 comm="syz.4.1619" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1659.046495][ T31] audit: type=1326 audit(1922.474:2063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16972 comm="syz.4.1619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1659.052935][ T31] audit: type=1326 audit(1922.474:2064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16972 comm="syz.4.1619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1659.058026][ T31] audit: type=1326 audit(1922.484:2065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16972 comm="syz.4.1619" exe="/syz-executor" sig=0 arch=40000028 syscall=311 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1659.065486][ T31] audit: type=1326 audit(1922.484:2066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16972 comm="syz.4.1619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1659.068760][ T31] audit: type=1326 audit(1922.494:2067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16972 comm="syz.4.1619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1659.763312][T16981] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 0) [ 1659.765746][T16981] SELinux: failed to load policy [ 1665.765808][T17010] pim6reg1: entered promiscuous mode [ 1665.766358][T17010] pim6reg1: entered allmulticast mode [ 1669.951971][ T31] audit: type=1326 audit(1933.364:2068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17051 comm="syz.4.1642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1669.955516][ T31] audit: type=1326 audit(1933.384:2069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17051 comm="syz.4.1642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1669.958089][ T31] audit: type=1326 audit(1933.384:2070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17051 comm="syz.4.1642" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1669.976768][ T31] audit: type=1326 audit(1933.394:2071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17051 comm="syz.4.1642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1669.977045][ T31] audit: type=1326 audit(1933.394:2072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17051 comm="syz.4.1642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1669.992551][ T31] audit: type=1326 audit(1933.414:2073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17051 comm="syz.4.1642" exe="/syz-executor" sig=0 arch=40000028 syscall=6 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1669.993040][ T31] audit: type=1326 audit(1933.414:2074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17051 comm="syz.4.1642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1669.993411][ T31] audit: type=1326 audit(1933.414:2075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17051 comm="syz.4.1642" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1669.996232][ T31] audit: type=1326 audit(1933.424:2076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17051 comm="syz.4.1642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1670.014585][ T31] audit: type=1326 audit(1933.444:2077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17051 comm="syz.4.1642" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1675.216645][T17098] netlink: 'syz.4.1651': attribute type 10 has an invalid length. [ 1675.454164][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 1675.454801][ T31] audit: type=1400 audit(1938.884:2095): avc: denied { mounton } for pid=17100 comm="syz.4.1652" path="/68/bus" dev="tmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 1675.556555][ T31] audit: type=1400 audit(1938.984:2096): avc: denied { unmount } for pid=16407 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1677.940394][T17079] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1677.965922][T17079] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1680.384710][T17079] hsr_slave_0: entered promiscuous mode [ 1680.403159][T17079] hsr_slave_1: entered promiscuous mode [ 1680.405949][T17079] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1680.407096][T17079] Cannot create hsr debugfs directory [ 1680.587610][ T31] audit: type=1400 audit(1944.014:2097): avc: denied { create } for pid=17366 comm="syz.4.1661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1680.588068][ T31] audit: type=1400 audit(1944.014:2098): avc: denied { connect } for pid=17366 comm="syz.4.1661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1681.888738][T17079] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 1681.928469][T17079] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 1681.958189][T17079] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 1682.015335][T17079] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 1682.816981][ T31] audit: type=1400 audit(1946.244:2099): avc: denied { connect } for pid=17474 comm="syz.4.1668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1682.825341][ T31] audit: type=1400 audit(1946.254:2100): avc: denied { write } for pid=17474 comm="syz.4.1668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1683.228325][ T31] audit: type=1326 audit(1946.654:2101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17479 comm="syz.4.1669" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1683.255788][ T31] audit: type=1326 audit(1946.684:2102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17479 comm="syz.4.1669" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1683.256343][ T31] audit: type=1326 audit(1946.684:2103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17479 comm="syz.4.1669" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1683.260571][ T31] audit: type=1326 audit(1946.684:2104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17479 comm="syz.4.1669" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1683.270014][ T31] audit: type=1326 audit(1946.694:2105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17479 comm="syz.4.1669" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1683.270540][ T31] audit: type=1326 audit(1946.694:2106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17479 comm="syz.4.1669" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1683.896421][T17079] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1686.069797][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 1686.070222][ T31] audit: type=1400 audit(1949.494:2119): avc: denied { create } for pid=17505 comm="syz.4.1674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1686.114192][ T31] audit: type=1400 audit(1949.544:2120): avc: denied { create } for pid=17505 comm="syz.4.1674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1686.119028][ T31] audit: type=1400 audit(1949.544:2121): avc: denied { setopt } for pid=17505 comm="syz.4.1674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1686.141912][ T31] audit: type=1400 audit(1949.564:2122): avc: denied { connect } for pid=17505 comm="syz.4.1674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1690.645300][T17079] veth0_vlan: entered promiscuous mode [ 1690.723790][T17079] veth1_vlan: entered promiscuous mode [ 1690.904062][T17079] veth0_macvtap: entered promiscuous mode [ 1690.908903][T17079] veth1_macvtap: entered promiscuous mode [ 1691.103145][T17079] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1691.103473][T17079] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1691.103724][T17079] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1691.103853][T17079] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1691.865554][T17544] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1680'. [ 1692.925092][ T31] audit: type=1326 audit(1956.354:2123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.4.1683" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1692.925676][ T31] audit: type=1326 audit(1956.354:2124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.4.1683" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1692.930909][ T31] audit: type=1326 audit(1956.354:2125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.4.1683" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1692.935401][ T31] audit: type=1326 audit(1956.364:2126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.4.1683" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1692.935949][ T31] audit: type=1326 audit(1956.364:2127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.4.1683" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1692.941276][ T31] audit: type=1326 audit(1956.364:2128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.4.1683" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1692.942148][ T31] audit: type=1326 audit(1956.374:2129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.4.1683" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1692.943750][ T31] audit: type=1326 audit(1956.374:2130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.4.1683" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1692.944517][ T31] audit: type=1326 audit(1956.374:2131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.4.1683" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1692.947788][ T31] audit: type=1326 audit(1956.374:2132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17583 comm="syz.4.1683" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1692.950508][T17584] netlink: 'syz.4.1683': attribute type 13 has an invalid length. [ 1698.220167][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 1698.220648][ T31] audit: type=1400 audit(1961.644:2167): avc: denied { remove_name } for pid=17640 comm="rm" name="resolv.conf.eth25.link" dev="tmpfs" ino=261 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1698.242006][ T31] audit: type=1400 audit(1961.664:2168): avc: denied { unlink } for pid=17640 comm="rm" name="resolv.conf.eth25.link" dev="tmpfs" ino=261 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1698.439078][ T31] audit: type=1400 audit(1961.864:2169): avc: denied { create } for pid=17643 comm="syz.4.1696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1698.465654][ T31] audit: type=1400 audit(1961.894:2170): avc: denied { write } for pid=17643 comm="syz.4.1696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1698.467725][ T31] audit: type=1400 audit(1961.894:2171): avc: denied { read } for pid=17643 comm="syz.4.1696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1698.509510][T17647] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1698.597123][T17647] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1698.733032][T17647] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1698.882279][T17647] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1699.010736][T17647] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1699.033084][T17647] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1699.050167][T17647] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1699.073262][T17647] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1700.036823][ T31] audit: type=1400 audit(1963.464:2172): avc: denied { write } for pid=17676 comm="syz.4.1699" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1700.037658][ T31] audit: type=1400 audit(1963.464:2173): avc: denied { open } for pid=17676 comm="syz.4.1699" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1700.601578][ T31] audit: type=1400 audit(1964.014:2174): avc: denied { create } for pid=17682 comm="syz.8.1700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1700.669747][ T31] audit: type=1400 audit(1964.094:2175): avc: denied { ioctl } for pid=17676 comm="syz.4.1699" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x5431 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1700.670163][ T31] audit: type=1400 audit(1964.094:2176): avc: denied { connect } for pid=17682 comm="syz.8.1700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1701.078251][T17687] pim6reg1: entered promiscuous mode [ 1701.079093][T17687] pim6reg1: entered allmulticast mode [ 1702.433170][T17712] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1706'. [ 1706.147944][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 1706.148350][ T31] audit: type=1326 audit(1969.574:2187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17731 comm="syz.4.1712" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1706.150495][ T31] audit: type=1326 audit(1969.574:2188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17731 comm="syz.4.1712" exe="/syz-executor" sig=0 arch=40000028 syscall=237 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1706.150862][ T31] audit: type=1326 audit(1969.574:2189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17731 comm="syz.4.1712" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1706.293072][T17711] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 1706.295896][ T31] audit: type=1400 audit(1969.724:2190): avc: denied { mac_admin } for pid=17708 comm="syz.8.1707" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1706.299642][ T31] audit: type=1400 audit(1969.724:2191): avc: denied { relabelto } for pid=17708 comm="syz.8.1707" name="9" dev="tmpfs" ino=58 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 1706.299981][ T31] audit: type=1400 audit(1969.724:2192): avc: denied { associate } for pid=17708 comm="syz.8.1707" name="9" dev="tmpfs" ino=58 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 1706.502791][ T31] audit: type=1400 audit(1969.904:2193): avc: denied { write } for pid=17079 comm="syz-executor" name="9" dev="tmpfs" ino=58 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 1706.505758][ T31] audit: type=1400 audit(1969.924:2194): avc: denied { remove_name } for pid=17079 comm="syz-executor" name="binderfs" dev="tmpfs" ino=62 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 1706.509571][ T31] audit: type=1400 audit(1969.924:2195): avc: denied { rmdir } for pid=17079 comm="syz-executor" name="9" dev="tmpfs" ino=58 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 1706.893332][ T31] audit: type=1400 audit(1970.324:2196): avc: denied { create } for pid=17741 comm="syz.8.1715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1707.399415][T17753] netlink: 'syz.8.1718': attribute type 4 has an invalid length. [ 1711.180214][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 1711.182951][ T31] audit: type=1400 audit(1974.604:2241): avc: denied { create } for pid=17804 comm="syz.4.1731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1711.232357][ T31] audit: type=1400 audit(1974.654:2242): avc: denied { write } for pid=17804 comm="syz.4.1731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1711.232830][ T31] audit: type=1400 audit(1974.654:2243): avc: denied { connect } for pid=17804 comm="syz.4.1731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1711.233216][ T31] audit: type=1400 audit(1974.654:2244): avc: denied { name_connect } for pid=17804 comm="syz.4.1731" dest=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1711.303496][ T31] audit: type=1400 audit(1974.734:2245): avc: denied { shutdown } for pid=17804 comm="syz.4.1731" laddr=fe80::11 lport=38485 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1711.323634][ T31] audit: type=1400 audit(1974.754:2246): avc: denied { setopt } for pid=17804 comm="syz.4.1731" laddr=fe80::11 lport=38485 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1711.475999][ T31] audit: type=1400 audit(1974.904:2247): avc: denied { open } for pid=17809 comm="syz.8.1732" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1711.480346][ T31] audit: type=1400 audit(1974.904:2248): avc: denied { ioctl } for pid=17809 comm="syz.8.1732" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1711.594986][ T31] audit: type=1400 audit(1975.024:2249): avc: denied { create } for pid=17813 comm="syz.4.1733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1711.637212][ T31] audit: type=1400 audit(1975.064:2250): avc: denied { ioctl } for pid=17813 comm="syz.4.1733" path="socket:[26915]" dev="sockfs" ino=26915 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1714.246231][T17862] netlink: 'syz.8.1743': attribute type 13 has an invalid length. [ 1715.255421][T17862] netdevsim netdevsim8 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1715.255871][T17862] netdevsim netdevsim8 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1715.256016][T17862] netdevsim netdevsim8 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1715.256116][T17862] netdevsim netdevsim8 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1716.768804][ T31] kauditd_printk_skb: 603 callbacks suppressed [ 1716.769174][ T31] audit: type=1400 audit(1980.194:2854): avc: denied { read } for pid=17903 comm="syz.4.1752" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1716.769637][ T31] audit: type=1400 audit(1980.194:2855): avc: denied { open } for pid=17903 comm="syz.4.1752" path="net:[4026532688]" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1716.773934][ T31] audit: type=1400 audit(1980.194:2856): avc: denied { create } for pid=17903 comm="syz.4.1752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1716.796297][ T31] audit: type=1400 audit(1980.224:2857): avc: denied { bind } for pid=17903 comm="syz.4.1752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1717.957698][ T31] audit: type=1400 audit(1981.384:2858): avc: denied { name_bind } for pid=17937 comm="syz.4.1755" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1719.503221][ T31] audit: type=1400 audit(1982.934:2859): avc: denied { create } for pid=17957 comm="syz.4.1759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1719.535620][ T31] audit: type=1400 audit(1982.954:2860): avc: denied { setopt } for pid=17957 comm="syz.4.1759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1721.065945][ T31] audit: type=1326 audit(1984.494:2861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17984 comm="syz.4.1765" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1721.095437][ T31] audit: type=1326 audit(1984.514:2862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17984 comm="syz.4.1765" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1721.101134][ T31] audit: type=1326 audit(1984.524:2863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17984 comm="syz.4.1765" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1722.046625][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 1722.047108][ T31] audit: type=1400 audit(1985.474:2881): avc: denied { relabelfrom } for pid=18002 comm="syz.8.1768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1722.047316][ T31] audit: type=1400 audit(1985.474:2882): avc: denied { relabelto } for pid=18002 comm="syz.8.1768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1725.763412][T18063] hid-generic 0000:0004:0000.000D: unknown main item tag 0x0 [ 1725.764884][T18063] hid-generic 0000:0004:0000.000D: unknown main item tag 0x0 [ 1725.769242][T18063] hid-generic 0000:0004:0000.000D: unknown main item tag 0x0 [ 1725.782440][T18063] hid-generic 0000:0004:0000.000D: hidraw0: HID v0.00 Device [syz0] on syz1 [ 1726.077938][ T31] audit: type=1400 audit(1989.504:2883): avc: denied { create } for pid=18086 comm="syz.8.1778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1726.083955][ T31] audit: type=1400 audit(1989.514:2884): avc: denied { write } for pid=18086 comm="syz.8.1778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1727.045049][ T31] audit: type=1400 audit(1990.474:2885): avc: denied { create } for pid=18093 comm="syz.8.1780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1727.373364][T18120] netlink: 16178 bytes leftover after parsing attributes in process `syz.8.1781'. [ 1727.753439][ T31] audit: type=1400 audit(1991.184:2886): avc: denied { create } for pid=18034 comm="syz.4.1773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1727.756921][ T31] audit: type=1400 audit(1991.184:2887): avc: denied { bind } for pid=18034 comm="syz.4.1773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1727.765558][ T31] audit: type=1400 audit(1991.194:2888): avc: denied { create } for pid=18122 comm="syz.8.1782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1727.774307][ T31] audit: type=1400 audit(1991.194:2889): avc: denied { write } for pid=18034 comm="syz.4.1773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1728.122456][T18123] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1782'. [ 1729.199116][ T31] audit: type=1326 audit(1992.624:2890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18138 comm="syz.4.1785" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1729.217344][ T31] audit: type=1326 audit(1992.624:2891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18138 comm="syz.4.1785" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1729.221217][ T31] audit: type=1326 audit(1992.644:2892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18138 comm="syz.4.1785" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1729.229135][ T31] audit: type=1326 audit(1992.654:2893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18138 comm="syz.4.1785" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1729.229597][ T31] audit: type=1326 audit(1992.654:2894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18138 comm="syz.4.1785" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1729.247020][ T31] audit: type=1326 audit(1992.674:2895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18138 comm="syz.4.1785" exe="/syz-executor" sig=0 arch=40000028 syscall=21 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1735.276456][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 1735.276957][ T31] audit: type=1326 audit(1998.704:2915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18196 comm="syz.8.1802" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1735.280797][ T31] audit: type=1326 audit(1998.704:2916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18196 comm="syz.8.1802" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1735.288687][ T31] audit: type=1326 audit(1998.714:2917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18196 comm="syz.8.1802" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1735.302266][ T31] audit: type=1326 audit(1998.724:2918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18196 comm="syz.8.1802" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1735.305204][ T31] audit: type=1326 audit(1998.734:2919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18196 comm="syz.8.1802" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1735.335986][ T31] audit: type=1326 audit(1998.744:2920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18196 comm="syz.8.1802" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1735.338477][ T31] audit: type=1326 audit(1998.744:2921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18196 comm="syz.8.1802" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1735.338600][ T31] audit: type=1326 audit(1998.744:2922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18196 comm="syz.8.1802" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1735.352081][ T31] audit: type=1326 audit(1998.764:2923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18196 comm="syz.8.1802" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1735.352584][ T31] audit: type=1326 audit(1998.774:2924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18196 comm="syz.8.1802" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1735.748456][T18201] netlink: 100 bytes leftover after parsing attributes in process `syz.4.1801'. [ 1740.285602][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 1740.285924][ T31] audit: type=1400 audit(2003.714:2962): avc: denied { create } for pid=18252 comm="syz.4.1812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1740.643519][T18257] syz.8.1806 (18257): /proc/18214/oom_adj is deprecated, please use /proc/18214/oom_score_adj instead. [ 1741.864260][ T31] audit: type=1326 audit(2005.294:2963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18265 comm="syz.4.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1741.888513][ T31] audit: type=1326 audit(2005.314:2964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18265 comm="syz.4.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1741.890186][ T31] audit: type=1326 audit(2005.314:2965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18265 comm="syz.4.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1742.008738][ T31] audit: type=1326 audit(2005.364:2966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18265 comm="syz.4.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1742.009560][ T31] audit: type=1326 audit(2005.434:2967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18265 comm="syz.4.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1742.009669][ T31] audit: type=1326 audit(2005.434:2968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18265 comm="syz.4.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1742.009745][ T31] audit: type=1326 audit(2005.434:2969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18265 comm="syz.4.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1742.009907][ T31] audit: type=1326 audit(2005.434:2970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18265 comm="syz.4.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1742.010072][ T31] audit: type=1326 audit(2005.434:2971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18265 comm="syz.4.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1748.232070][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 1748.232662][ T31] audit: type=1400 audit(2011.654:2993): avc: denied { create } for pid=18347 comm="syz.4.1827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1748.244475][ T31] audit: type=1400 audit(2011.664:2994): avc: denied { setopt } for pid=18347 comm="syz.4.1827" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1748.244988][ T31] audit: type=1400 audit(2011.664:2995): avc: denied { connect } for pid=18347 comm="syz.4.1827" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1748.245107][ T31] audit: type=1400 audit(2011.674:2996): avc: denied { write } for pid=18347 comm="syz.4.1827" laddr=fe80::1096:88ff:fe06:ba04 lport=58 faddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1748.775042][ T31] audit: type=1400 audit(2012.204:2997): avc: denied { getopt } for pid=18354 comm="syz.4.1829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1750.390552][ T31] audit: type=1400 audit(2013.814:2998): avc: denied { setopt } for pid=18372 comm="syz.4.1834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1753.518646][T18391] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1839'. [ 1753.520076][ T31] audit: type=1326 audit(2016.944:2999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18389 comm="syz.4.1839" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1753.520324][ T31] audit: type=1326 audit(2016.944:3000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18389 comm="syz.4.1839" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1753.520433][ T31] audit: type=1326 audit(2016.944:3001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18389 comm="syz.4.1839" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1753.695124][ T31] audit: type=1326 audit(2017.124:3002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18389 comm="syz.4.1839" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 1758.934339][T18405] 8<--- cut here --- [ 1758.934610][T18405] Unable to handle kernel NULL pointer dereference at virtual address 0000000e when read [ 1758.937320][T18405] [0000000e] *pgd=8740c003, *pmd=ea5b3003 [ 1758.938362][T18405] Internal error: Oops: 205 [#1] SMP ARM [ 1758.939633][T18405] Modules linked in: [ 1758.940529][T18405] CPU: 1 UID: 0 PID: 18405 Comm: syz.8.1842 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 1758.941287][T18405] Hardware name: ARM-Versatile Express [ 1758.941683][T18405] PC is at io_ring_buffers_peek+0x24/0x258 [ 1758.944102][T18405] LR is at io_buffers_select+0x94/0xfc [ 1758.944464][T18405] pc : [<8088956c>] lr : [<80889be0>] psr: 20000013 [ 1758.944923][T18405] sp : dfcb1db0 ip : dfcb1df8 fp : dfcb1df4 [ 1758.945304][T18405] r10: f7eeffff r9 : 00000000 r8 : 84051980 [ 1758.945855][T18405] r7 : 00000000 r6 : 00004040 r5 : dfcb1e44 r4 : 8b110000 [ 1758.946284][T18405] r3 : 00000001 r2 : 84ad8a0c r1 : dfcb1e44 r0 : 8b110000 [ 1758.946953][T18405] Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1758.947445][T18405] Control: 30c5387d Table: 855a3ec0 DAC: 00000000 [ 1758.947939][T18405] Register r0 information: slab io_kiocb start 8b110000 pointer offset 0 size 192 [ 1758.949309][T18405] Register r1 information: 2-page vmalloc region starting at 0xdfcb0000 allocated at kernel_clone+0xac/0x3e4 [ 1758.950097][T18405] Register r2 information: slab kmalloc-256 start 84ad8a00 pointer offset 12 size 256 [ 1758.950743][T18405] Register r3 information: non-paged memory [ 1758.951189][T18405] Register r4 information: slab io_kiocb start 8b110000 pointer offset 0 size 192 [ 1758.952140][T18405] Register r5 information: 2-page vmalloc region starting at 0xdfcb0000 allocated at kernel_clone+0xac/0x3e4 [ 1758.952696][T18405] Register r6 information: non-paged memory [ 1758.953057][T18405] Register r7 information: NULL pointer [ 1758.953369][T18405] Register r8 information: slab kmalloc-64 start 84051980 pointer offset 0 size 64 [ 1758.953948][T18405] Register r9 information: NULL pointer [ 1758.954279][T18405] Register r10 information: vmalloc memory [ 1758.954621][T18405] Register r11 information: 2-page vmalloc region starting at 0xdfcb0000 allocated at kernel_clone+0xac/0x3e4 [ 1758.955175][T18405] Register r12 information: 2-page vmalloc region starting at 0xdfcb0000 allocated at kernel_clone+0xac/0x3e4 [ 1758.955775][T18405] Process syz.8.1842 (pid: 18405, stack limit = 0xdfcb0000) [ 1758.956406][T18405] Stack: (0xdfcb1db0 to 0xdfcb2000) [ 1758.956823][T18405] 1da0: 81a4be34 8030cb0c 84f02900 00000000 [ 1758.957302][T18405] 1dc0: 00000000 84ad8a0c 00000000 8b110000 84051980 00004040 00000000 dfcb1e44 [ 1758.957758][T18405] 1de0: 84f02800 f7eeffff dfcb1e24 dfcb1df8 80889be0 80889554 00000001 00000000 [ 1758.958200][T18405] 1e00: 8b110000 00004040 84ad8a00 80000001 00000000 f7eeffff dfcb1e84 dfcb1e28 [ 1758.958768][T18405] 1e20: 8089263c 80889b58 8089ec2c 000000e8 dfcb1e5c dfcb1e40 84ad8a0c 851bf680 [ 1758.959215][T18405] 1e40: 8b110000 84ad8a0c 00000000 200440c0 00000001 c50c155b 80886a40 8b110000 [ 1758.959716][T18405] 1e60: 81cf0c94 00000000 80000001 81cf0b5c 0000001a 84a65400 dfcb1ebc dfcb1e88 [ 1758.960171][T18405] 1e80: 80886bd8 80892328 8b110000 8b140000 8b110000 84f02800 8b11006c 8b110000 [ 1758.960744][T18405] 1ea0: 8b140000 00000000 00000000 84a65400 dfcb1f14 dfcb1ec0 808877a8 80886b7c [ 1758.961166][T18405] 1ec0: 8088e164 81a4bdd8 dfcb1f24 dfcb1ed8 00000001 00000001 81cf0b5c 00000001 [ 1758.962021][T18405] 1ee0: 84f02800 c50c155b 847fccc0 00000000 84f02800 000027e2 847fccc0 00000000 [ 1758.962683][T18405] 1f00: 84a65400 00000000 dfcb1fa4 dfcb1f18 80888250 808875a8 ecac8b10 84f02840 [ 1758.963140][T18405] 1f20: 00000000 00000000 81a4fbb0 81a4fa80 dfcb1f54 dfcb1f40 8026b438 8029ce1c [ 1758.963543][T18405] 1f40: dfcb1fb0 40000000 dfcb1f84 dfcb1f58 802229dc 8026b3f4 00000000 8281d05c [ 1758.963970][T18405] 1f60: dfcb1fb0 0014c490 ecac8b10 80222930 00000000 c50c155b dfcb1fac 00000000 [ 1758.964392][T18405] 1f80: 00000000 002e630c 000001aa 8020029c 84a65400 000001aa 00000000 dfcb1fa8 [ 1758.964781][T18405] 1fa0: 80200060 80888124 00000000 00000000 00000003 000027e2 00000000 00000000 [ 1758.965157][T18405] 1fc0: 00000000 00000000 002e630c 000001aa 002d0000 00000000 00006364 76b180bc [ 1758.965541][T18405] 1fe0: 76b17ec0 76b17eb0 0001939c 00131f30 60000010 00000003 00000000 00000000 [ 1758.966045][T18405] Call trace: [ 1758.966471][T18405] [<80889548>] (io_ring_buffers_peek) from [<80889be0>] (io_buffers_select+0x94/0xfc) [ 1758.967329][T18405] r10:f7eeffff r9:84f02800 r8:dfcb1e44 r7:00000000 r6:00004040 r5:84051980 [ 1758.967773][T18405] r4:8b110000 [ 1758.968052][T18405] [<80889b4c>] (io_buffers_select) from [<8089263c>] (io_send+0x320/0x490) [ 1758.968470][T18405] r10:f7eeffff r9:00000000 r8:80000001 r7:84ad8a00 r6:00004040 r5:8b110000 [ 1758.968834][T18405] r4:00000000 r3:00000001 [ 1758.969054][T18405] [<8089231c>] (io_send) from [<80886bd8>] (io_issue_sqe+0x68/0x658) [ 1758.969437][T18405] r10:84a65400 r9:0000001a r8:81cf0b5c r7:80000001 r6:00000000 r5:81cf0c94 [ 1758.969804][T18405] r4:8b110000 [ 1758.970010][T18405] [<80886b70>] (io_issue_sqe) from [<808877a8>] (io_submit_sqes+0x20c/0x938) [ 1758.970469][T18405] r10:84a65400 r9:00000000 r8:00000000 r7:8b140000 r6:8b110000 r5:8b11006c [ 1758.970875][T18405] r4:84f02800 [ 1758.971092][T18405] [<8088759c>] (io_submit_sqes) from [<80888250>] (sys_io_uring_enter+0x138/0x780) [ 1758.971792][T18405] r10:00000000 r9:84a65400 r8:00000000 r7:847fccc0 r6:000027e2 r5:84f02800 [ 1758.972316][T18405] r4:00000000 [ 1758.972540][T18405] [<80888118>] (sys_io_uring_enter) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1758.972985][T18405] Exception stack(0xdfcb1fa8 to 0xdfcb1ff0) [ 1758.973296][T18405] 1fa0: 00000000 00000000 00000003 000027e2 00000000 00000000 [ 1758.973821][T18405] 1fc0: 00000000 00000000 002e630c 000001aa 002d0000 00000000 00006364 76b180bc [ 1758.974258][T18405] 1fe0: 76b17ec0 76b17eb0 0001939c 00131f30 [ 1758.974578][T18405] r10:000001aa r9:84a65400 r8:8020029c r7:000001aa r6:002e630c r5:00000000 [ 1758.974974][T18405] r4:00000000 [ 1758.975491][T18405] Code: e1a08002 e5912000 e50b2030 e1a05001 (e1d920be) [ 1758.977942][T18405] ---[ end trace 0000000000000000 ]--- [ 1759.002486][ T31] audit: type=1400 audit(2022.414:3003): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1759.002903][ T31] audit: type=1400 audit(2022.414:3004): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1759.003016][ T31] audit: type=1400 audit(2022.414:3005): avc: denied { write } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1759.003101][ T31] audit: type=1400 audit(2022.414:3006): avc: denied { add_name } for pid=2907 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1759.003202][ T31] audit: type=1400 audit(2022.414:3007): avc: denied { create } for pid=2907 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1759.003287][ T31] audit: type=1400 audit(2022.414:3008): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1759.003398][ T31] audit: type=1400 audit(2022.414:3009): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1759.103883][T18405] Kernel panic - not syncing: Fatal exception [ 1759.107080][T18405] Rebooting in 86400 seconds.. VM DIAGNOSIS: 04:39:29 Registers: info registers vcpu 0 CPU#0 R00=840ef0c0 R01=00000400 R02=00000001 R03=df9f1400 R04=840ef0c0 R05=83347800 R06=00000000 R07=83217000 R08=83217000 R09=00000040 R10=83217008 R11=df801644 R12=df801630 R13=df801630 R14=80a06274 R15=80a0627c PSR=60000113 -ZC- A S svc32 s00=000000ff s01=00000000 d00=00000000000000ff s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=63538263 s11=37010135 d05=3701013563538263 s12=0379010e s13=1a0f0c06 d06=1a0f0c060379010e s14=3633211c s15=39773b3a d07=39773b3a3633211c s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 80000010 info registers vcpu 1 CPU#1 R00=841b0f80 R01=00000000 R02=00000000 R03=84a65400 R04=83cc7cc0 R05=a0090093 R06=8295b320 R07=00000001 R08=8282a2b8 R09=00000000 R10=00000bdf R11=dfcb19f4 R12=dfcb19f8 R13=dfcb19d8 R14=809e9140 R15=809e2e90 PSR=a0090093 N-C- A S svc32 s00=206e6568 s01=64616572 d00=64616572206e6568 s02=31545b5d s03=35303438 d01=3530343831545b5d s04=6e55205d s05=656c6261 d02=656c62616e55205d s06=206f7420 s07=646e6168 d03=646e6168206f7420 s08=6b20656c s09=656e7265 d04=656e72656b20656c s10=554e206c s11=70204c4c d05=70204c4c554e206c s12=746e696f s13=64207265 d06=64207265746e696f s14=66657265 s15=6e657265 d07=6e65726566657265 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000