last executing test programs:

2m52.814930003s ago: executing program 0 (id=160):
r0 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x2a82)
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0)
sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7)
sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2)
r1 = getpid()
sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e)
r4 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00')
readlinkat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f00000021c0)=""/102395, 0x18ffb)
sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
socket$netlink(0x10, 0x3, 0x10)
openat(0xffffffffffffff9c, 0x0, 0x42, 0x0)
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f00000100000000000000", @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00'], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000fd00000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10)
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuset.effective_cpus\x00', 0x275a, 0x0)
ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000002c0)={r7, 0x800, {0x2a00, 0x80010000, 0x0, 0x17, 0x0, 0x0, 0x0, 0x1, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "90be8b1c5512406c7f00", [0x4, 0x40000000000000]}})
r8 = syz_open_dev$loop(&(0x7f0000000000), 0x1, 0x8000)
ioctl$LOOP_CONFIGURE(r8, 0x4c0a, &(0x7f0000000480)={r0, 0x0, {0x2a00, 0x80010000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x18, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd64c6a4b4e00d9683dda1af1ea80000000000000000000000deff0000000000000000000000000000000800", "2809e8dbe108038948224ad54afac11d875397bdb22d0000b420a1a93c7540f4767f9e01177d3dd40600000061ac00", "90be8b1c55f96400", [0x800]}})

2m46.78009826s ago: executing program 0 (id=163):
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, 0x0)
connect$unix(0xffffffffffffffff, 0x0, 0x0)
sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4)
ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000]})
r0 = memfd_create(0x0, 0x0)
write$binfmt_elf64(r0, 0x0, 0xfebe)
execveat(r0, 0x0, 0x0, 0x0, 0x1000)
creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049e9)
syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff)
unshare(0x6020400)
r1 = gettid()
timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)=<r2=>0x0)
timer_settime(r2, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
pipe(&(0x7f00000002c0)={<r3=>0xffffffffffffffff})
vmsplice(r3, &(0x7f00000001c0)=[{&(0x7f00000004c0)="7cd1", 0x2}], 0x1, 0x0)

2m43.582353283s ago: executing program 0 (id=164):
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0)
write$cgroup_type(r0, 0x0, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0)
r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000140), 0x12)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0)
r4 = openat$cgroup_type(r3, &(0x7f00000000c0), 0x2, 0x0)
write$cgroup_type(r4, &(0x7f0000000280), 0x9)

2m43.453057686s ago: executing program 0 (id=165):
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000600)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5910fae9d6dcd3292ea54c7b6ef915d564c90c200", 0x18)
r1 = accept4(r0, 0x0, 0x0, 0x0)
syz_genetlink_get_family_id$tipc2(&(0x7f0000000440), r1)
sendmsg$nl_route_sched_retired(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=@newtfilter={0x43c, 0x2c, 0x20, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xc, 0x1}, {0x9, 0x6}, {0xe}}, [@f_rsvp={{0x9}, {0x40c, 0x2, [@TCA_RSVP_POLICE={0x408, 0x5, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0xff, 0x8, 0x7, 0x0, 0x4, 0xfffffffc, 0x5, 0xfffffffa, 0x5, 0xfb29, 0x7, 0xa1, 0x2b, 0xd096, 0x9, 0x40, 0xc0000000, 0xb, 0xfff, 0x8, 0x80000000, 0x30000, 0x8, 0xfd2, 0x78f05b3e, 0x5, 0x7, 0x1ff, 0x2, 0x8001, 0x9, 0x8, 0xa3, 0x9, 0x5, 0xfffffff7, 0x2, 0x1, 0x80000000, 0x1aa, 0x5, 0x6, 0x2, 0x2, 0x1, 0x1, 0x3, 0x1, 0x1ff, 0x9, 0x101, 0x6, 0xffffffff, 0x2, 0x8, 0x9, 0x7, 0x9, 0x7, 0x8, 0x3, 0x2, 0x6, 0x8, 0xfffffffe, 0x9, 0x7ff, 0x1000, 0xdfc, 0xfd, 0x1, 0xffff, 0xe, 0x41, 0x0, 0x1, 0xfffffffe, 0x0, 0x7, 0x3, 0x1, 0x3c, 0x4c3, 0x5, 0x2a, 0x1, 0x9, 0xa, 0x200, 0x9, 0x5, 0xc8b, 0x400, 0x308, 0x3, 0x7, 0x8000, 0xd814, 0x6, 0x80000000, 0x3, 0x0, 0x9, 0x0, 0x5, 0x1, 0x4, 0x7ff, 0xfffffffa, 0x3, 0x2, 0x8000, 0x7ff, 0x0, 0x400, 0x4, 0x1000, 0xffffff3d, 0x8, 0x5, 0x800, 0xcb, 0x8, 0x4, 0x80000000, 0xbc, 0xe, 0xfffffff8, 0x6, 0x6, 0xffff, 0x0, 0xffffff6e, 0x893, 0x0, 0x401, 0x80000001, 0x3, 0x4, 0x8, 0x9, 0x69e0, 0x1, 0x5, 0x4, 0x3, 0x5657, 0x6, 0x4, 0x80000000, 0x6, 0x8, 0xaa4, 0x8, 0x7f, 0x3, 0x3b, 0xfffffffd, 0x5, 0x1, 0x7fff, 0x1, 0x3, 0xd9, 0x2, 0x9, 0x5f, 0x6, 0x4, 0xf8d5, 0x97, 0x6, 0x6, 0x3ff, 0x91fb, 0xb7, 0x1, 0x6, 0xd87, 0x7f, 0x8, 0x8, 0x3, 0x1, 0x5, 0x341ac6fc, 0x5, 0x3bf, 0x4, 0x2, 0x2, 0x5, 0x92, 0x5, 0x4, 0xfcbb, 0x80, 0x10, 0x1, 0x7, 0xe0, 0x5ed, 0x37, 0x7, 0x6, 0x8000, 0x8, 0x7ff, 0xffffffff, 0x3, 0x200, 0xc4b5, 0x1, 0x10001, 0x5, 0x2, 0x7fffffff, 0x100, 0x9, 0x10001, 0x6, 0x8abc, 0xd, 0x1000, 0x4, 0x1, 0xfffffff2, 0x4, 0x2, 0x9, 0xa65, 0x30, 0x9, 0x4, 0x10001, 0x6baeef53, 0x3242, 0xa, 0x9, 0x3, 0x1, 0x1, 0x8, 0x9, 0x80000001, 0x7, 0x8, 0xc0000000, 0x7, 0x27dd, 0x4, 0xffffffff, 0x4, 0x2, 0x592, 0x4]}]}]}}]}, 0x43c}, 0x1, 0x0, 0x0, 0x400d0}, 0x24008040)

2m40.773367246s ago: executing program 0 (id=170):
r0 = syz_clone(0x4100000, 0x0, 0x0, 0x0, 0x0, 0x0)
kcmp(r0, r0, 0x4, 0xffffffffffffffff, 0xffffffffffffffff)

2m40.693290418s ago: executing program 0 (id=171):
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x10, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37, @void, @value}, 0x94)
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6)
r0 = getpid()
sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2)
connect$unix(r1, &(0x7f0000002540)=@abs, 0x6e)
sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x8b}, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x8, 0x4, &(0x7f0000000740)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x81}]}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)={0x14, r4, 0x6c04073ee59f7719, 0x0, 0x0, {0x4}}, 0x14}}, 0x0)

1m55.240876548s ago: executing program 32 (id=171):
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x10, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37, @void, @value}, 0x94)
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6)
r0 = getpid()
sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2)
connect$unix(r1, &(0x7f0000002540)=@abs, 0x6e)
sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x8b}, 0x0)
prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x8, 0x4, &(0x7f0000000740)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x81}]}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)={0x14, r4, 0x6c04073ee59f7719, 0x0, 0x0, {0x4}}, 0x14}}, 0x0)

1m35.610474158s ago: executing program 2 (id=187):
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]})
r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0)
r1 = fanotify_init(0x202, 0x0)
fanotify_mark(r1, 0x1, 0x4800003e, r0, 0x0)

1m35.192013589s ago: executing program 2 (id=202):
socket$kcm(0x10, 0x2, 0x0)
r0 = socket$inet6(0xa, 0x800000000000002, 0x0)
r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc0200000000000000ae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce896165127cb3f011a7d06602e2fc40848228567ffb400000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df2624f56da648d28ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71400fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada10eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d32940000088dde499000000fdffffff00000000000f000000ef0000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18aba6b16455a66c3b84b138efc20a546d3d5227e23b03f2a834391ade2ff3e93ee296c4082ee73e7c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1ce6d0b2fea02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0847a1ff2f7fc3c2b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f05c7f0be31491eb8c9ff68236c8600040000000000000000000066e034c81c3cab64e4fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f224baf1221c15fa12313ffbfa7c2730309f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca205081173bd03c4754fc4674812daab482fd390a1c903b5d28a1eb247b5837d7603b92495d5c569f6433c3fca5206cb0000003fdbbd3892c52c2e7612e05de32322e980a3d69931e2c9312dd517c96f2ee90362476ed853c4c9b7d4ebf13cbaa795860e92a3d7d004f2c491db38eb769f094d5d48b262cc35c40682138cf13a49aa9f27abec00002f01ba1251aaf2385416ca719300"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
ppoll(&(0x7f0000000500)=[{r1}], 0x1, 0x0, 0x0, 0x0)
pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000340)=0x61ba, 0x4)
sendmmsg$inet6(r0, &(0x7f00000002c0)=[{{&(0x7f0000000b00)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x63, 0x0}}], 0x1, 0x0)

49.832428937s ago: executing program 33 (id=202):
socket$kcm(0x10, 0x2, 0x0)
r0 = socket$inet6(0xa, 0x800000000000002, 0x0)
r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
ppoll(&(0x7f0000000500)=[{r1}], 0x1, 0x0, 0x0, 0x0)
pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000340)=0x61ba, 0x4)
sendmmsg$inet6(r0, &(0x7f00000002c0)=[{{&(0x7f0000000b00)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x63, 0x0}}], 0x1, 0x0)

35.722848693s ago: executing program 1 (id=242):
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1c9ae7fffe9a6f34}}, 0x1c)
connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @private1}, 0x1c)
pselect6(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70ee}, 0x0, &(0x7f0000000040)={0xb, 0xffffffffffffffff}, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
gettid()
ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, 0x0)
shutdown(r0, 0x1)

33.112453901s ago: executing program 1 (id=243):
mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0)
mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}})
quotactl$Q_GETQUOTA(0x2, &(0x7f0000000140)=@filename='./file0/file0/file0/file0/file0\x00', 0x0, 0x0)
read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020)
read$FUSE(r0, &(0x7f0000008bc0)={0x2020, 0x0, <r1=>0x0}, 0x205c)
write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, r1, {0x7, 0x24}}, 0x50)

30.520131518s ago: executing program 1 (id=244):
r0 = syz_open_dev$tty1(0xc, 0x4, 0x2)
ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000300))

30.331396183s ago: executing program 1 (id=245):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xc7}, 0x1c)
shutdown(r0, 0x0)

30.122883638s ago: executing program 1 (id=246):
read$FUSE(0xffffffffffffffff, 0x0, 0x0)
capset(&(0x7f0000000140)={0x20071026}, &(0x7f0000000100)={0x80, 0x80, 0x9, 0x4, 0x2, 0x5af0})
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7)
r0 = getpid()
sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2)
sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0)
recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10)
ioctl$VHOST_VDPA_GET_STATUS(0xffffffffffffffff, 0x8001af71, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000340)=""/142, 0x0, 0x8e, 0x1, 0x0, 0x0, @void, @value}, 0x28)
ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0x0)
capset(0x0, 0x0)
syz_clone3(&(0x7f00000002c0)={0x230a8000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000000)=[0x0], 0x1}, 0x58)

19.362757767s ago: executing program 1 (id=250):
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8)
r0 = getpid()
sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2)
sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7)
ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000300)={0x1, 0x1, 0x0, 0x9, 0x6, 0xffffffff})
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e)
sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0)
recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000"], 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x8, 0x3, 0x498, 0x320, 0xa, 0x148, 0x368, 0x60, 0x400, 0x2a8, 0x2a8, 0x400, 0x2a8, 0x3, 0x0, {[{{@ip={@multicast2, @multicast2, 0x0, 0x0, 'bridge0\x00', 'rose0\x00'}, 0x0, 0x2f8, 0x368, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x8601, 0x6, './file0\x00'}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x1d, 0x0, "f2f7b9f28413d9d8ad470ad2b60c45cb4ea6e7bf902bdc2ff8a9304d9f655c746adc0bdc773506378bc2d27efd6abb05175089830cc46186074d7de46d5af300"}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4f8)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r3, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10)
r4 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
sendmsg$nl_route(r4, 0x0, 0x0)

252.642934ms ago: executing program 3 (id=256):
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)

162.379156ms ago: executing program 3 (id=257):
r0 = openat$binfmt_register(0xffffff9c, &(0x7f0000000100), 0x1, 0x0)
pwritev2(r0, &(0x7f0000001480)=[{&(0x7f0000000400)="244830c4e9abf753f553b3f7b4d0d15c6ef6612e141d05cd46301dece6757219e8060707ac46244d", 0x28}], 0x1, 0x1, 0x8, 0x0)

82.392078ms ago: executing program 3 (id=258):
r0 = socket$nl_route(0x10, 0x3, 0x0)
bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x20}, 0xc)

81.995368ms ago: executing program 3 (id=259):
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0)
close(r0)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x0)
setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0, 0x200}, 0x8)

1.11999ms ago: executing program 3 (id=260):
creat(&(0x7f0000000100)='./file0\x00', 0x0)
rmdir(&(0x7f0000000140)='./file0\x00')

0s ago: executing program 3 (id=261):
r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0)
ptrace(0x10, r0)
ptrace$setregs(0xf, r0, 0xca, 0x0)

kernel console output (not intermixed with test programs):

syzkaller login: [   41.995496][   T31] kauditd_printk_skb: 5 callbacks suppressed
[   41.995624][   T31] audit: type=1400 audit(41.920:68): avc:  denied  { read write } for  pid=3084 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   41.997509][   T31] audit: type=1400 audit(41.930:69): avc:  denied  { open } for  pid=3084 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
Warning: Permanently added '[localhost]:18373' (ED25519) to the list of known hosts.
[   50.715049][   T31] audit: type=1400 audit(50.640:70): avc:  denied  { name_bind } for  pid=3085 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1
[   52.215446][   T31] audit: type=1400 audit(52.150:71): avc:  denied  { execute } for  pid=3087 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[   52.225379][   T31] audit: type=1400 audit(52.160:72): avc:  denied  { execute_no_trans } for  pid=3087 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[   55.213622][   T31] audit: type=1400 audit(55.140:73): avc:  denied  { mounton } for  pid=3087 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[   55.218919][   T31] audit: type=1400 audit(55.150:74): avc:  denied  { mount } for  pid=3087 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   55.240242][ T3087] cgroup: Unknown subsys name 'net'
[   55.251971][   T31] audit: type=1400 audit(55.180:75): avc:  denied  { unmount } for  pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   55.483003][ T3087] cgroup: Unknown subsys name 'cpuset'
[   55.489490][ T3087] cgroup: Unknown subsys name 'hugetlb'
[   55.490495][ T3087] cgroup: Unknown subsys name 'rlimit'
[   55.679817][   T31] audit: type=1400 audit(55.610:76): avc:  denied  { setattr } for  pid=3087 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   55.680541][   T31] audit: type=1400 audit(55.610:77): avc:  denied  { mounton } for  pid=3087 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[   55.681149][   T31] audit: type=1400 audit(55.610:78): avc:  denied  { mount } for  pid=3087 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[   55.810332][ T3089] SELinux:  Context root:object_r:swapfile_t is not valid (left unmapped).
[   55.811194][   T31] audit: type=1400 audit(55.740:79): avc:  denied  { relabelto } for  pid=3089 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[   55.813949][   T31] audit: type=1400 audit(55.740:80): avc:  denied  { write } for  pid=3089 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
Setting up swapspace version 1, size = 127995904 bytes
[   55.836943][   T31] audit: type=1400 audit(55.770:81): avc:  denied  { read } for  pid=3087 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[   55.838323][   T31] audit: type=1400 audit(55.770:82): avc:  denied  { open } for  pid=3087 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[   60.105644][ T3087] Adding 124996k swap on ./swap-file.  Priority:0 extents:1 across:124996k 
[   62.130596][   T31] audit: type=1400 audit(62.060:83): avc:  denied  { execmem } for  pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   62.205312][   T31] audit: type=1400 audit(62.130:84): avc:  denied  { read } for  pid=3092 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[   62.206227][   T31] audit: type=1400 audit(62.130:85): avc:  denied  { open } for  pid=3092 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[   62.206987][   T31] audit: type=1400 audit(62.130:86): avc:  denied  { mounton } for  pid=3092 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[   62.226368][   T31] audit: type=1400 audit(62.150:88): avc:  denied  { module_request } for  pid=3092 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[   62.228229][   T31] audit: type=1400 audit(62.150:87): avc:  denied  { module_request } for  pid=3093 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[   62.320193][   T31] audit: type=1400 audit(62.250:89): avc:  denied  { sys_module } for  pid=3093 comm="syz-executor" capability=16  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[   62.995051][   T31] audit: type=1400 audit(62.900:90): avc:  denied  { ioctl } for  pid=3093 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   63.971971][ T3093] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   63.976434][ T3093] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   64.140465][ T3092] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   64.150371][ T3092] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   64.888531][ T3093] hsr_slave_0: entered promiscuous mode
[   64.892168][ T3093] hsr_slave_1: entered promiscuous mode
[   64.989261][ T3092] hsr_slave_0: entered promiscuous mode
[   64.991145][ T3092] hsr_slave_1: entered promiscuous mode
[   64.992250][ T3092] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[   64.992582][ T3092] Cannot create hsr debugfs directory
[   65.279559][   T31] audit: type=1400 audit(65.210:91): avc:  denied  { create } for  pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[   65.287448][   T31] audit: type=1400 audit(65.220:92): avc:  denied  { write } for  pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[   65.299516][ T3093] netdevsim netdevsim1 netdevsim0: renamed from eth0
[   65.312928][ T3093] netdevsim netdevsim1 netdevsim1: renamed from eth1
[   65.326329][ T3093] netdevsim netdevsim1 netdevsim2: renamed from eth2
[   65.337631][ T3093] netdevsim netdevsim1 netdevsim3: renamed from eth3
[   65.382266][ T3092] netdevsim netdevsim0 netdevsim0: renamed from eth0
[   65.390083][ T3092] netdevsim netdevsim0 netdevsim1: renamed from eth1
[   65.406460][ T3092] netdevsim netdevsim0 netdevsim2: renamed from eth2
[   65.413385][ T3092] netdevsim netdevsim0 netdevsim3: renamed from eth3
[   65.922533][ T3093] 8021q: adding VLAN 0 to HW filter on device bond0
[   66.219837][ T3092] 8021q: adding VLAN 0 to HW filter on device bond0
[   68.211838][ T3093] veth0_vlan: entered promiscuous mode
[   68.225329][ T3093] veth1_vlan: entered promiscuous mode
[   68.261934][ T3093] veth0_macvtap: entered promiscuous mode
[   68.273297][ T3093] veth1_macvtap: entered promiscuous mode
[   68.316895][ T3093] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[   68.317385][ T3093] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[   68.317698][ T3093] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[   68.317944][ T3093] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[   68.418305][   T31] kauditd_printk_skb: 1 callbacks suppressed
[   68.418373][   T31] audit: type=1400 audit(68.350:94): avc:  denied  { mount } for  pid=3093 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[   68.421112][   T31] audit: type=1400 audit(68.350:95): avc:  denied  { mounton } for  pid=3093 comm="syz-executor" path="/syzkaller.uFdwqp/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1
[   68.423895][   T31] audit: type=1400 audit(68.350:96): avc:  denied  { mount } for  pid=3093 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1
[   68.431247][   T31] audit: type=1400 audit(68.360:97): avc:  denied  { mounton } for  pid=3093 comm="syz-executor" path="/syzkaller.uFdwqp/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1
[   68.439320][   T31] audit: type=1400 audit(68.370:98): avc:  denied  { mounton } for  pid=3093 comm="syz-executor" path="/syzkaller.uFdwqp/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2435 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1
[   68.448393][   T31] audit: type=1400 audit(68.380:99): avc:  denied  { unmount } for  pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[   68.452058][   T31] audit: type=1400 audit(68.380:100): avc:  denied  { mounton } for  pid=3093 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[   68.464943][   T31] audit: type=1400 audit(68.390:101): avc:  denied  { mount } for  pid=3093 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1
[   68.465549][   T31] audit: type=1400 audit(68.390:102): avc:  denied  { mounton } for  pid=3093 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1
[   68.466167][   T31] audit: type=1400 audit(68.390:103): avc:  denied  { mount } for  pid=3093 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1
[   68.508495][ T3093] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[   68.772381][ T3092] veth0_vlan: entered promiscuous mode
[   68.782977][ T3092] veth1_vlan: entered promiscuous mode
[   68.820819][ T3092] veth0_macvtap: entered promiscuous mode
[   68.827399][ T3092] veth1_macvtap: entered promiscuous mode
[   68.867778][ T3092] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[   68.868130][ T3092] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[   68.868368][ T3092] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[   68.868630][ T3092] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[   70.835678][ T3777] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[   74.333429][   T31] kauditd_printk_skb: 11 callbacks suppressed
[   74.333541][   T31] audit: type=1400 audit(74.260:115): avc:  denied  { create } for  pid=3781 comm="syz.1.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[   74.341930][   T31] audit: type=1400 audit(74.270:116): avc:  denied  { write } for  pid=3781 comm="syz.1.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[   74.665986][ T2888] usb 2-1: new high-speed USB device number 2 using dummy_hcd
[   74.844100][ T2888] usb 2-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7
[   74.845424][ T2888] usb 2-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 47
[   74.846183][ T2888] usb 2-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d
[   74.846539][ T2888] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[   74.866964][ T3784] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22
[   74.880617][ T2888] usb 2-1: Quirk or no altset; falling back to MIDI 1.0
[   75.196567][ T3772] usb 2-1: USB disconnect, device number 2
[   75.325830][ T3816] syz.1.5 uses obsolete (PF_INET,SOCK_PACKET)
[   75.330416][   T31] audit: type=1400 audit(75.260:117): avc:  denied  { ioctl } for  pid=3815 comm="syz.1.5" path="socket:[2465]" dev="sockfs" ino=2465 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[   75.332632][ T3816] syzkaller1: entered promiscuous mode
[   75.333176][ T3816] syzkaller1: entered allmulticast mode
[   75.519355][   T31] audit: type=1400 audit(75.450:118): avc:  denied  { perfmon } for  pid=3821 comm="syz.1.6" capability=38  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[   75.533213][   T31] audit: type=1400 audit(75.460:119): avc:  denied  { bind } for  pid=3821 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[   75.553417][   T31] audit: type=1400 audit(75.480:120): avc:  denied  { setopt } for  pid=3821 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[   75.907720][ T3824] netlink: 12 bytes leftover after parsing attributes in process `syz.1.7'.
[   75.909368][   T31] audit: type=1400 audit(75.840:121): avc:  denied  { create } for  pid=3827 comm="syz.0.8" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[   75.912400][   T31] audit: type=1400 audit(75.840:122): avc:  denied  { map } for  pid=3827 comm="syz.0.8" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2473 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[   75.913970][   T31] audit: type=1400 audit(75.840:123): avc:  denied  { read write } for  pid=3827 comm="syz.0.8" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2473 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[   77.009930][   T31] audit: type=1400 audit(76.940:124): avc:  denied  { map_create } for  pid=3829 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[   94.720305][   T31] kauditd_printk_skb: 2 callbacks suppressed
[   94.720405][   T31] audit: type=1400 audit(94.650:127): avc:  denied  { create } for  pid=3848 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[   94.745048][   T31] audit: type=1400 audit(94.670:128): avc:  denied  { write } for  pid=3848 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[   99.127532][   T31] audit: type=1400 audit(99.060:129): avc:  denied  { create } for  pid=3854 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1
[   99.820326][   T31] audit: type=1400 audit(99.750:130): avc:  denied  { ioctl } for  pid=3860 comm="syz.0.17" path="socket:[2521]" dev="sockfs" ino=2521 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[   99.823808][   T31] audit: type=1400 audit(99.750:131): avc:  denied  { bind } for  pid=3860 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[   99.831464][   T31] audit: type=1400 audit(99.760:132): avc:  denied  { setopt } for  pid=3860 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[   99.836350][   T31] audit: type=1400 audit(99.770:133): avc:  denied  { write } for  pid=3860 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  101.445466][   T31] audit: type=1400 audit(101.370:134): avc:  denied  { create } for  pid=3869 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  101.485956][   T31] audit: type=1400 audit(101.420:135): avc:  denied  { getopt } for  pid=3869 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  101.634088][   T31] audit: type=1400 audit(101.560:136): avc:  denied  { create } for  pid=3858 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  101.649999][   T31] audit: type=1400 audit(101.580:137): avc:  denied  { ioctl } for  pid=3858 comm="syz.1.16" path="socket:[2541]" dev="sockfs" ino=2541 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  101.683502][   T31] audit: type=1400 audit(101.610:138): avc:  denied  { connect } for  pid=3858 comm="syz.1.16" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  101.704192][   T31] audit: type=1400 audit(101.630:139): avc:  denied  { setopt } for  pid=3858 comm="syz.1.16" laddr=::1 lport=7 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  105.472860][   T31] kauditd_printk_skb: 1 callbacks suppressed
[  105.472950][   T31] audit: type=1400 audit(105.400:141): avc:  denied  { create } for  pid=3869 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[  105.510719][   T31] audit: type=1400 audit(105.440:142): avc:  denied  { bind } for  pid=3869 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[  112.515207][   T31] audit: type=1400 audit(112.430:143): avc:  denied  { name_bind } for  pid=3889 comm="syz.0.25" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1
[  112.516169][   T31] audit: type=1400 audit(112.430:144): avc:  denied  { node_bind } for  pid=3889 comm="syz.0.25" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[  112.563224][ T3890] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.
[  113.596220][ T3885] [U] ^C
[  118.793552][ T3897] trusted_key: encrypted_key: insufficient parameters specified
[  118.809716][   T31] audit: type=1400 audit(118.740:145): avc:  denied  { create } for  pid=3895 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[  118.820264][   T31] audit: type=1400 audit(118.750:146): avc:  denied  { name_bind } for  pid=3895 comm="syz.1.27" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1
[  121.473182][ T3905] netlink: 28 bytes leftover after parsing attributes in process `syz.0.30'.
[  121.473812][ T3905] netlink: 28 bytes leftover after parsing attributes in process `syz.0.30'.
[  121.485854][ T3905] Zero length message leads to an empty skb
[  121.772371][   T31] audit: type=1400 audit(121.700:147): avc:  denied  { write } for  pid=3906 comm="syz.0.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  122.775777][   T31] audit: type=1400 audit(122.710:148): avc:  denied  { create } for  pid=3919 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1
[  125.295151][ T3923] input: syz1 as /devices/virtual/input/input3
[  126.818794][   T31] audit: type=1400 audit(126.750:149): avc:  denied  { create } for  pid=3921 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[  127.467706][   T31] audit: type=1400 audit(127.400:150): avc:  denied  { create } for  pid=3921 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[  127.472724][ T3931] netlink: 8 bytes leftover after parsing attributes in process `syz.1.37'.
[  147.521209][   T31] audit: type=1400 audit(147.450:151): avc:  denied  { unmount } for  pid=3961 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1
[  153.609088][   T31] audit: type=1400 audit(153.540:152): avc:  denied  { create } for  pid=3995 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1
[  153.610402][ T3996] netlink: 16 bytes leftover after parsing attributes in process `syz.1.55'.
[  153.611637][   T31] audit: type=1400 audit(153.540:153): avc:  denied  { write } for  pid=3995 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1
[  161.502101][   T31] audit: type=1400 audit(161.430:154): avc:  denied  { append } for  pid=4005 comm="syz.0.58" name="dsp" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  167.605330][    T8] usb 1-1: new full-speed USB device number 2 using dummy_hcd
[  167.781853][    T8] usb 1-1: config 1 interface 0 has no altsetting 0
[  167.818437][    T8] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40
[  167.819326][    T8] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[  167.819742][    T8] usb 1-1: Product: syz
[  167.820902][    T8] usb 1-1: Manufacturer: syz
[  167.822250][    T8] usb 1-1: SerialNumber: syz
[  168.467882][    T8] usblp 1-1:1.0: usblp0: USB Unidirectional printer dev 2 if 0 alt 253 proto 1 vid 0x0525 pid 0xA4A8
[  168.692806][    T8] usb 1-1: USB disconnect, device number 2
[  168.717031][    T8] usblp0: removed
[  171.816150][   T50] usb 1-1: new high-speed USB device number 3 using dummy_hcd
[  172.106209][   T50] usb 1-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7
[  172.106534][   T50] usb 1-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 47
[  172.106729][   T50] usb 1-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d
[  172.106888][   T50] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  172.111724][ T4057] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22
[  172.117127][   T50] usb 1-1: Quirk or no altset; falling back to MIDI 1.0
[  172.495937][ T1781] usb 1-1: USB disconnect, device number 3
[  175.363788][   T31] audit: type=1400 audit(175.290:155): avc:  denied  { ioctl } for  pid=4098 comm="syz.0.76" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=2806 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  188.715564][    T8] usb 1-1: new high-speed USB device number 4 using dummy_hcd
[  188.865852][    T8] usb 1-1: Using ep0 maxpacket: 32
[  188.882798][    T8] usb 1-1: config index 0 descriptor too short (expected 29220, got 36)
[  188.883181][    T8] usb 1-1: config 0 has too many interfaces: 81, using maximum allowed: 32
[  188.883433][    T8] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 81
[  188.883732][    T8] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0
[  188.883987][    T8] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0
[  188.884231][    T8] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18
[  188.890857][    T8] usb 1-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40
[  188.891138][    T8] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  188.896870][    T8] usb 1-1: config 0 descriptor??
[  189.118218][    T8] usblp 1-1:0.0: usblp0: USB Bidirectional printer dev 4 if 0 alt 0 proto 3 vid 0x03F0 pid 0x6C17
[  189.128469][    T8] usb 1-1: USB disconnect, device number 4
[  189.136732][    T8] usblp0: removed
[  189.540868][   T31] audit: type=1400 audit(189.470:156): avc:  denied  { write } for  pid=4137 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  189.543529][   T31] audit: type=1400 audit(189.470:157): avc:  denied  { accept } for  pid=4137 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  189.546868][   T31] audit: type=1400 audit(189.480:158): avc:  denied  { create } for  pid=4137 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  189.550929][   T31] audit: type=1400 audit(189.480:159): avc:  denied  { shutdown } for  pid=4137 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  189.553257][   T31] audit: type=1400 audit(189.480:160): avc:  denied  { connect } for  pid=4137 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  189.553673][   T31] audit: type=1400 audit(189.480:161): avc:  denied  { name_connect } for  pid=4137 comm="syz.1.81" dest=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1
[  189.596207][  T105] usb 1-1: new high-speed USB device number 5 using dummy_hcd
[  189.755387][  T105] usb 1-1: Using ep0 maxpacket: 8
[  189.768100][  T105] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid maxpacket 1536, setting to 1024
[  189.768684][  T105] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 1024
[  189.769113][  T105] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32
[  189.769868][  T105] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3
[  189.770958][  T105] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23
[  189.771239][  T105] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  189.988304][  T105] usb 1-1: usb_control_msg returned -32
[  189.988614][  T105] usbtmc 1-1:16.0: can't read capabilities
[  195.765008][  T105] usb 2-1: new high-speed USB device number 3 using dummy_hcd
[  195.929261][  T105] usb 2-1: config 1 has too many interfaces: 66, using maximum allowed: 32
[  195.929730][  T105] usb 2-1: config 1 has an invalid descriptor of length 55, skipping remainder of the config
[  195.930061][  T105] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 66
[  195.930382][  T105] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 55, changing to 9
[  195.930704][  T105] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 8496, setting to 1024
[  195.944953][  T105] usb 2-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40
[  195.945412][  T105] usb 2-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0
[  195.945732][  T105] usb 2-1: Product: syz
[  195.945939][  T105] usb 2-1: Manufacturer: syz
[  195.953536][  T105] cdc_wdm 2-1:1.0: skipping garbage
[  195.953902][  T105] cdc_wdm 2-1:1.0: skipping garbage
[  195.959741][  T105] cdc_wdm 2-1:1.0: cdc-wdm1: USB WDM device
[  196.160160][  T105] usb 2-1: USB disconnect, device number 3
[  196.238847][   T31] audit: type=1400 audit(196.170:162): avc:  denied  { nlmsg_write } for  pid=4172 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1
[  202.366025][   T31] audit: type=1400 audit(202.280:163): avc:  denied  { mounton } for  pid=4185 comm="syz.1.89" path="/52/file0" dev="tmpfs" ino=280 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1
[  203.515098][   T50] usb 1-1: USB disconnect, device number 5
[  206.947494][ T4198] syz.0.90[4198] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  206.947856][ T4198] syz.0.90[4198] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  206.948418][ T4198] syz.0.90[4198] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  219.134879][   T31] audit: type=1400 audit(219.060:164): avc:  denied  { unmount } for  pid=4211 comm="syz.0.94" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[  219.520495][   T31] audit: type=1400 audit(219.450:165): avc:  denied  { nlmsg_write } for  pid=4217 comm="syz.0.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  220.405181][   T31] audit: type=1400 audit(220.330:166): avc:  denied  { watch } for  pid=4207 comm="syz.1.92" path="/54/file0" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=dir permissive=1
[  221.476182][   T31] audit: type=1400 audit(221.410:167): avc:  denied  { connect } for  pid=4219 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[  221.481016][   T31] audit: type=1400 audit(221.410:168): avc:  denied  { write } for  pid=4219 comm="syz.0.98" path="socket:[3210]" dev="sockfs" ino=3210 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[  221.492793][   T31] audit: type=1400 audit(221.420:169): avc:  denied  { shutdown } for  pid=4219 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[  226.437084][   T31] audit: type=1400 audit(226.370:170): avc:  denied  { create } for  pid=4224 comm="syz.0.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1
[  227.333284][   T31] audit: type=1400 audit(227.260:171): avc:  denied  { unmount } for  pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1
[  230.537141][   T31] audit: type=1400 audit(230.470:172): avc:  denied  { mounton } for  pid=4248 comm="syz.0.105" path="/47/file0" dev="tmpfs" ino=257 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1
[  235.849926][ T4261] capability: warning: `syz.0.107' uses deprecated v2 capabilities in a way that may be insecure
[  235.853781][   T31] audit: type=1400 audit(235.780:173): avc:  denied  { create } for  pid=4255 comm="syz.0.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[  244.670542][   T31] audit: type=1400 audit(244.600:174): avc:  denied  { create } for  pid=4277 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1
[  245.290350][ T4283] netlink: 148 bytes leftover after parsing attributes in process `syz.0.115'.
[  251.701723][    C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies.
[  251.958184][   T31] audit: type=1400 audit(251.890:175): avc:  denied  { connect } for  pid=4305 comm="syz.1.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[  265.655811][ T4110] usb 2-1: new high-speed USB device number 4 using dummy_hcd
[  265.835870][ T4110] usb 2-1: Using ep0 maxpacket: 16
[  265.848858][ T4110] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config
[  265.855668][ T4110] usb 2-1: New USB device found, idVendor=045e, idProduct=0721, bcdDevice=90.c4
[  265.855947][ T4110] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[  265.856255][ T4110] usb 2-1: Product: syz
[  265.856460][ T4110] usb 2-1: Manufacturer: syz
[  265.856665][ T4110] usb 2-1: SerialNumber: syz
[  265.866864][ T4110] usb 2-1: config 0 descriptor??
[  266.758103][   T31] audit: type=1400 audit(266.690:176): avc:  denied  { create } for  pid=4343 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[  269.363466][   T31] audit: type=1400 audit(269.290:177): avc:  denied  { setopt } for  pid=4348 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  269.365962][   T31] audit: type=1400 audit(269.300:178): avc:  denied  { bind } for  pid=4348 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  269.375048][   T31] audit: type=1400 audit(269.300:179): avc:  denied  { name_bind } for  pid=4348 comm="syz.0.133" src=65532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1
[  269.377906][   T31] audit: type=1400 audit(269.310:180): avc:  denied  { node_bind } for  pid=4348 comm="syz.0.133" saddr=::1 src=65532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1
[  279.281618][ T4357] usb 2-1: USB disconnect, device number 4
[  292.710427][ T4387] capability: warning: `syz.1.142' uses 32-bit capabilities (legacy support in use)
[  298.318761][    C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies.
[  298.985032][ T4110] usb 1-1: new high-speed USB device number 6 using dummy_hcd
[  299.155614][ T4110] usb 1-1: Using ep0 maxpacket: 8
[  299.169931][ T4110] usb 1-1: New USB device found, idVendor=0ccd, idProduct=00b3, bcdDevice=2d.ee
[  299.170323][ T4110] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[  299.170517][ T4110] usb 1-1: Product: syz
[  299.170641][ T4110] usb 1-1: Manufacturer: syz
[  299.170737][ T4110] usb 1-1: SerialNumber: syz
[  299.181217][ T4110] usb 1-1: config 0 descriptor??
[  300.903532][   T31] audit: type=1400 audit(300.830:181): avc:  denied  { bind } for  pid=4411 comm="syz.1.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  300.909500][ T4412] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[  302.184150][   T31] audit: type=1326 audit(302.110:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.1.150" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0
[  309.403486][   T24] usb 1-1: USB disconnect, device number 6
[  310.118743][    C1] hrtimer: interrupt took 13189952 ns
[  318.995368][   T31] audit: type=1400 audit(318.900:183): avc:  denied  { nlmsg_read } for  pid=4442 comm="syz.1.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1
[  334.147262][   T31] audit: type=1400 audit(334.080:184): avc:  denied  { write } for  pid=4478 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[  334.150486][   T31] audit: type=1400 audit(334.080:185): avc:  denied  { read } for  pid=4478 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[  377.592008][   T31] audit: type=1400 audit(377.520:186): avc:  denied  { write } for  pid=4538 comm="syz.1.186" name="mcfilter" dev="proc" ino=4026532681 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1
[  382.683991][   T31] audit: type=1400 audit(382.610:187): avc:  denied  { create } for  pid=4550 comm="syz.1.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  385.448290][ T4544] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  385.482228][ T4544] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  387.936445][ T4544] hsr_slave_0: entered promiscuous mode
[  387.947589][ T4544] hsr_slave_1: entered promiscuous mode
[  387.957170][ T4544] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  387.957660][ T4544] Cannot create hsr debugfs directory
[  388.540709][ T4544] netdevsim netdevsim2 netdevsim0: renamed from eth0
[  388.566868][ T4544] netdevsim netdevsim2 netdevsim1: renamed from eth1
[  388.590094][ T4544] netdevsim netdevsim2 netdevsim2: renamed from eth2
[  388.617203][ T4544] netdevsim netdevsim2 netdevsim3: renamed from eth3
[  389.217410][   T31] audit: type=1400 audit(389.050:188): avc:  denied  { read } for  pid=4883 comm="syz.1.198" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1
[  389.217976][   T31] audit: type=1400 audit(389.050:189): avc:  denied  { open } for  pid=4883 comm="syz.1.198" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1
[  389.218464][   T31] audit: type=1400 audit(389.110:190): avc:  denied  { setopt } for  pid=4883 comm="syz.1.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  389.218776][   T31] audit: type=1400 audit(389.130:191): avc:  denied  { bind } for  pid=4883 comm="syz.1.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  389.466764][   T31] audit: type=1326 audit(389.400:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  389.478365][   T31] audit: type=1326 audit(389.400:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x7ffc0000
[  389.479048][   T31] audit: type=1326 audit(389.400:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x7ffc0000
[  389.479380][   T31] audit: type=1326 audit(389.400:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=369 compat=0 ip=0x133450 code=0x7ffc0000
[  389.479735][   T31] audit: type=1326 audit(389.400:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  389.480202][   T31] audit: type=1326 audit(389.400:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  390.747358][ T4544] 8021q: adding VLAN 0 to HW filter on device bond0
[  397.445539][ T2942] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  397.530084][ T2942] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  397.597243][ T2942] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  397.678882][ T2942] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  398.320077][ T2942] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  398.331112][ T2942] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  398.333440][ T2942] bond0 (unregistering): Released all slaves
[  398.465594][ T2942] hsr_slave_0: left promiscuous mode
[  398.513279][ T2942] hsr_slave_1: left promiscuous mode
[  398.521662][ T2942] veth1_macvtap: left promiscuous mode
[  398.522060][ T2942] veth0_macvtap: left promiscuous mode
[  398.522289][ T2942] veth1_vlan: left promiscuous mode
[  398.522688][ T2942] veth0_vlan: left promiscuous mode
[  400.727841][ T4544] veth0_vlan: entered promiscuous mode
[  400.800639][ T4544] veth1_vlan: entered promiscuous mode
[  400.990372][ T4544] veth0_macvtap: entered promiscuous mode
[  401.041318][ T4544] veth1_macvtap: entered promiscuous mode
[  401.296291][ T4544] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  401.297355][ T4544] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  401.297751][ T4544] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  401.298123][ T4544] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  402.221758][   T31] kauditd_printk_skb: 604 callbacks suppressed
[  402.221872][   T31] audit: type=1326 audit(402.150:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.2.187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  402.263194][   T31] audit: type=1326 audit(402.190:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.2.187" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000
[  402.264157][   T31] audit: type=1326 audit(402.190:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.2.187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  402.284383][   T31] audit: type=1326 audit(402.200:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.2.187" exe="/syz-executor" sig=0 arch=40000028 syscall=367 compat=0 ip=0x133450 code=0x7ffc0000
[  402.285850][   T31] audit: type=1326 audit(402.200:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.2.187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  402.303715][   T31] audit: type=1326 audit(402.220:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.2.187" exe="/syz-executor" sig=0 arch=40000028 syscall=368 compat=0 ip=0x133450 code=0x7ffc0000
[  402.313774][   T31] audit: type=1326 audit(402.240:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.2.187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  413.339778][ T4987] netlink: 'syz.1.203': attribute type 1 has an invalid length.
[  413.375104][ T4987] 8021q: adding VLAN 0 to HW filter on device bond1
[  413.390268][ T4987] 8021q: adding VLAN 0 to HW filter on device bond1
[  413.392237][ T4987] bond1: (slave ip6tnl1): The slave device specified does not support setting the MAC address
[  413.400962][ T4987] bond1: (slave ip6tnl1): Error -95 calling set_mac_address
[  415.940276][   T31] audit: type=1400 audit(415.870:809): avc:  denied  { create } for  pid=5041 comm="syz.1.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1
[  432.215323][ T5103] netlink: 64 bytes leftover after parsing attributes in process `syz.1.217'.
[  450.405858][ T5131] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  450.416640][ T5131] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  451.651069][ T5131] hsr_slave_0: entered promiscuous mode
[  451.652962][ T5131] hsr_slave_1: entered promiscuous mode
[  451.669213][ T5131] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  451.669499][ T5131] Cannot create hsr debugfs directory
[  452.152896][ T5131] netdevsim netdevsim3 netdevsim0: renamed from eth0
[  452.169441][ T5131] netdevsim netdevsim3 netdevsim1: renamed from eth1
[  452.173895][ T5131] netdevsim netdevsim3 netdevsim2: renamed from eth2
[  452.190591][ T5131] netdevsim netdevsim3 netdevsim3: renamed from eth3
[  453.272986][ T5131] 8021q: adding VLAN 0 to HW filter on device bond0
[  456.326874][ T5131] veth0_vlan: entered promiscuous mode
[  456.377062][ T5131] veth1_vlan: entered promiscuous mode
[  456.444415][ T5131] veth0_macvtap: entered promiscuous mode
[  456.459698][ T5131] veth1_macvtap: entered promiscuous mode
[  456.520098][ T5131] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  456.520492][ T5131] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  456.520937][ T5131] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  456.521222][ T5131] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  460.448930][ T5508] Driver unsupported XDP return value 0 on prog  (id 39) dev N/A, expect packet loss!
[  460.505457][   T31] audit: type=1400 audit(460.430:810): avc:  denied  { bind } for  pid=5509 comm="syz.3.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[  460.509956][   T31] audit: type=1400 audit(460.440:811): avc:  denied  { connect } for  pid=5509 comm="syz.3.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[  461.868812][   T31] audit: type=1400 audit(461.800:812): avc:  denied  { name_connect } for  pid=5525 comm="syz.1.242" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1
[  469.123069][    C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies.
[  497.612036][ T5591] usercopy: Kernel memory overwrite attempt detected to SLUB object 'task_struct' (offset 80, size 116)!
[  497.613179][ T5591] ------------[ cut here ]------------
[  497.613401][ T5591] kernel BUG at mm/usercopy.c:102!
[  497.613627][ T5591] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM
[  497.613969][ T5591] Modules linked in:
[  497.615777][ T5591] CPU: 1 UID: 0 PID: 5591 Comm: syz.3.261 Not tainted 6.12.0-syzkaller #0
[  497.616037][ T5591] Hardware name: ARM-Versatile Express
[  497.616284][ T5591] PC is at usercopy_abort+0x98/0x9c
[  497.619814][ T5591] LR is at __wake_up_klogd.part.0+0x7c/0xac
[  497.620050][ T5591] pc : [<819be580>]    lr : [<802be434>]    psr: 60000013
[  497.620258][ T5591] sp : dfab9e38  ip : dfab9d78  fp : dfab9e5c
[  497.620404][ T5591] r10: 0000001a  r9 : 847e1800  r8 : 847e6c50
[  497.620577][ T5591] r7 : dde9ab80  r6 : 00000000  r5 : 00000074  r4 : 00000050
[  497.620796][ T5591] r3 : 847e1800  r2 : 00000000  r1 : 00000000  r0 : 00000066
[  497.621067][ T5591] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment none
[  497.621328][ T5591] Control: 30c5387d  Table: 850fb280  DAC: 00000000
[  497.621622][ T5591] Register r0 information: non-paged memory
[  497.622152][ T5591] Register r1 information: NULL pointer
[  497.622310][ T5591] Register r2 information: NULL pointer
[  497.622493][ T5591] Register r3 information: slab task_struct start 847e1800 pointer offset 0 size 3072
[  497.623459][ T5591] Register r4 information: non-paged memory
[  497.623826][ T5591] Register r5 information: non-paged memory
[  497.624146][ T5591] Register r6 information: NULL pointer
[  497.624355][ T5591] Register r7 information: non-slab/vmalloc memory
[  497.624812][ T5591] Register r8 information: slab task_struct start 847e6c00 pointer offset 80 size 3072
[  497.625192][ T5591] Register r9 information: slab task_struct start 847e1800 pointer offset 0 size 3072
[  497.625643][ T5591] Register r10 information: non-paged memory
[  497.625814][ T5591] Register r11 information: 2-page vmalloc region starting at 0xdfab8000 allocated at kernel_clone+0xac/0x3e4
[  497.626215][ T5591] Register r12 information: 2-page vmalloc region starting at 0xdfab8000 allocated at kernel_clone+0xac/0x3e4
[  497.626574][ T5591] Process syz.3.261 (pid: 5591, stack limit = 0xdfab8000)
[  497.626952][ T5591] Stack: (0xdfab9e38 to 0xdfaba000)
[  497.627280][ T5591] 9e20:                                                       8205f678 82030fcc
[  497.627610][ T5591] 9e40: 820464dc 00000050 00000074 847e1800 dfab9e8c dfab9e60 804d5d54 819be4f4
[  497.627865][ T5591] 9e60: 00000074 dfab9e70 80214800 847e6c50 00000074 00000000 847e6cc4 dde9ab80
[  497.628127][ T5591] 9e80: dfab9ec4 dfab9e90 80514b34 804d5c88 00000074 000000ca dfab9eb4 847e6c50
[  497.628362][ T5591] 9ea0: 00000074 000000ca 00000000 00000000 847e1800 0000001a dfab9ef4 dfab9ec8
[  497.628758][ T5591] 9ec0: 80209db4 805148b8 847e6c00 ddde4180 dfab9ef4 dfab9ee0 819e37e4 00000000
[  497.629184][ T5591] 9ee0: 0000000c 000000ca dfab9f6c dfab9ef8 8020a468 80209d30 00000000 00000000
[  497.629494][ T5591] 9f00: dfab9f1c dfab9f10 819e36b0 8027c778 dfab9f6c dfab9f20 802813ec 819e368c
[  497.629767][ T5591] 9f20: dfab9f54 00000000 8027e354 60000013 81990410 819a7694 dfab9f54 b45b1c86
[  497.630026][ T5591] 9f40: 0000000f 847e6c00 0000000f b45b1c86 847e6c00 0000000f 000000ca 00000000
[  497.630212][ T5591] 9f60: dfab9fa4 dfab9f70 80252fdc 8020a140 80202cc0 b45b1c86 dfab9fac 00000000
[  497.630488][ T5591] 9f80: 00000000 002862f4 0000001a 8020029c 847e1800 0000001a 00000000 dfab9fa8
[  497.630804][ T5591] 9fa0: 80200060 80252db0 00000000 00000000 0000000f 00000039 000000ca 00000000
[  497.631173][ T5591] 9fc0: 00000000 00000000 002862f4 0000001a 00000000 00006364 003d0f00 76b9d0bc
[  497.631576][ T5591] 9fe0: 76b9cec0 76b9ceb0 00018af0 00133450 60000010 0000000f 00000000 00000000
[  497.632049][ T5591] Call trace: 
[  497.632532][ T5591] [<819be4e8>] (usercopy_abort) from [<804d5d54>] (__check_heap_object+0xd8/0xf4)
[  497.633380][ T5591] [<804d5c7c>] (__check_heap_object) from [<80514b34>] (__check_object_size+0x288/0x304)
[  497.633938][ T5591]  r8:dde9ab80 r7:847e6cc4 r6:00000000 r5:00000074 r4:847e6c50
[  497.634272][ T5591] [<805148ac>] (__check_object_size) from [<80209db4>] (fpa_set+0x90/0x118)
[  497.635062][ T5591]  r10:0000001a r9:847e1800 r8:00000000 r7:00000000 r6:000000ca r5:00000074
[  497.635703][ T5591]  r4:847e6c50
[  497.635887][ T5591] [<80209d24>] (fpa_set) from [<8020a468>] (arch_ptrace+0x334/0x424)
[  497.636238][ T5591]  r6:000000ca r5:0000000c r4:00000000
[  497.636460][ T5591] [<8020a134>] (arch_ptrace) from [<80252fdc>] (sys_ptrace+0x238/0x4dc)
[  497.636852][ T5591]  r7:00000000 r6:000000ca r5:0000000f r4:847e6c00
[  497.637127][ T5591] [<80252da4>] (sys_ptrace) from [<80200060>] (ret_fast_syscall+0x0/0x1c)
[  497.637493][ T5591] Exception stack(0xdfab9fa8 to 0xdfab9ff0)
[  497.637791][ T5591] 9fa0:                   00000000 00000000 0000000f 00000039 000000ca 00000000
[  497.638268][ T5591] 9fc0: 00000000 00000000 002862f4 0000001a 00000000 00006364 003d0f00 76b9d0bc
[  497.638593][ T5591] 9fe0: 76b9cec0 76b9ceb0 00018af0 00133450
[  497.638881][ T5591]  r10:0000001a r9:847e1800 r8:8020029c r7:0000001a r6:002862f4 r5:00000000
[  497.639222][ T5591]  r4:00000000
[  497.639699][ T5591] Code: e30f067c e3480205 e58dc000 ebfff265 (e7f001f2) 
[  497.640453][ T5591] ---[ end trace 0000000000000000 ]---
[  497.641189][ T5591] Kernel panic - not syncing: Fatal exception
[  497.644727][ T5591] Rebooting in 86400 seconds..

VM DIAGNOSIS:
18:41:41  Registers:
info registers vcpu 0

CPU#0
R00=ffffffff R01=00000004 R02=000001e4 R03=00000000
R04=00000000 R05=00000000 R06=00000000 R07=00000000
R08=00000000 R09=00006364 R10=003d0f00 R11=76ba50bc
R12=20001490 R13=20001490 R14=00018b8c R15=00018b8c
PSR=20000010 --C- A S usr32
s00=00000000 s01=00000000 d00=0000000000000000
s02=00000000 s03=00000000 d01=0000000000000000
s04=00000000 s05=00000000 d02=0000000000000000
s06=00000000 s07=00000000 d03=0000000000000000
s08=00000000 s09=00000000 d04=0000000000000000
s10=00000000 s11=00000000 d05=0000000000000000
s12=00000000 s13=00000000 d06=0000000000000000
s14=00000000 s15=00000000 d07=0000000000000000
s16=005127e9 s17=00000000 d08=00000000005127e9
s18=00000000 s19=00000000 d09=0000000000000000
s20=00000000 s21=00000000 d10=0000000000000000
s22=00000000 s23=00000000 d11=0000000000000000
s24=00000000 s25=00000000 d12=0000000000000000
s26=00000000 s27=00000000 d13=0000000000000000
s28=00000000 s29=00000000 d14=0000000000000000
s30=00000000 s31=00000000 d15=0000000000000000
s32=cbac1206 s33=381d2444 d16=381d2444cbac1206
s34=e48a95f9 s35=f8d12ccb d17=f8d12ccbe48a95f9
s36=8a67b6b1 s37=21c10727 d18=21c107278a67b6b1
s38=5056cf35 s39=95c57972 d19=95c579725056cf35
s40=5eb3107c s41=28b9489f d20=28b9489f5eb3107c
s42=67bdd6a9 s43=468bede1 d21=468bede167bdd6a9
s44=86c0cfcd s45=2b82771a d22=2b82771a86c0cfcd
s46=af5ec0bb s47=2fe0e672 d23=2fe0e672af5ec0bb
s48=00000001 s49=00000000 d24=0000000000000001
s50=00000000 s51=00000000 d25=0000000000000000
s52=000cffff s53=00010000 d26=00010000000cffff
s54=00000000 s55=00000300 d27=0000030000000000
s56=ffba0000 s57=0008ffff d28=0008ffffffba0000
s58=00000000 s59=00000300 d29=0000030000000000
s60=ffea0000 s61=000cffff d30=000cffffffea0000
s62=00010000 s63=00000000 d31=0000000000010000
FPSCR: 00000000
info registers vcpu 1

CPU#1
R00=83dc7c40 R01=00000038 R02=ebbf7000 R03=ebbf7018
R04=8287744e R05=83dc7c40 R06=809f5e5c R07=82877454
R08=8287741c R09=00000039 R10=00000001 R11=dfab9b5c
R12=00000002 R13=dfab9b50 R14=8275b574 R15=809f5e6c
PSR=80000093 N--- A S svc32
s00=00000000 s01=00000000 d00=0000000000000000
s02=00000000 s03=00000000 d01=0000000000000000
s04=00000000 s05=00000000 d02=0000000000000000
s06=00000000 s07=00000000 d03=0000000000000000
s08=00000000 s09=00000000 d04=0000000000000000
s10=00000000 s11=00000000 d05=0000000000000000
s12=00000000 s13=00000000 d06=0000000000000000
s14=00000000 s15=00000000 d07=0000000000000000
s16=00000000 s17=00000000 d08=0000000000000000
s18=00000000 s19=00000000 d09=0000000000000000
s20=00000000 s21=00000000 d10=0000000000000000
s22=00000000 s23=00000000 d11=0000000000000000
s24=00000000 s25=00000000 d12=0000000000000000
s26=00000000 s27=00000000 d13=0000000000000000
s28=00000000 s29=00000000 d14=0000000000000000
s30=00000000 s31=00000000 d15=0000000000000000
s32=00000000 s33=00000000 d16=0000000000000000
s34=00000000 s35=00000000 d17=0000000000000000
s36=00000000 s37=00000000 d18=0000000000000000
s38=00000000 s39=00000000 d19=0000000000000000
s40=00000000 s41=00000000 d20=0000000000000000
s42=00000000 s43=00000000 d21=0000000000000000
s44=00000000 s45=00000000 d22=0000000000000000
s46=00000000 s47=00000000 d23=0000000000000000
s48=00000000 s49=00000000 d24=0000000000000000
s50=00000000 s51=00000000 d25=0000000000000000
s52=00000000 s53=00000000 d26=0000000000000000
s54=00000000 s55=00000000 d27=0000000000000000
s56=00000000 s57=00000000 d28=0000000000000000
s58=00000000 s59=00000000 d29=0000000000000000
s60=00000000 s61=00000000 d30=0000000000000000
s62=00000000 s63=00000000 d31=0000000000000000
FPSCR: 00000000