last executing test programs: 18m4.473824618s ago: executing program 32 (id=2): socket$unix(0x1, 0x1, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) ptrace$ARCH_SHSTK_LOCK(0x1e, r0, 0x3, 0x5003) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x7, 0x20400) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) 16m1.80018356s ago: executing program 33 (id=64): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000002800), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000001240)=""/200, &(0x7f0000000140)=""/92}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000000c0)=0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) 14m37.76110424s ago: executing program 34 (id=87): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)={0x14, 0x1, 0x1, 0x101, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=@can_newroute={0x34, 0x18, 0x1, 0x0, 0x0, {0x1d, 0x1, 0x2}, [@CGW_CS_XOR={0x8, 0x5, {0x4, 0xfe}}, @CGW_MOD_SET={0x15, 0x4, {{{0x4, 0x1, 0x1, 0x1}, 0x1, 0x1, 0x0, 0x0, "f8c7b569edfeb30d"}, 0x4}}]}, 0x34}}, 0x0) 13m35.644725328s ago: executing program 35 (id=107): openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_clone3(&(0x7f0000001880)={0x100000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mkdir(&(0x7f0000000240)='./file0\x00', 0x8) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}}) umount2(&(0x7f00000001c0)='./file0\x00', 0x1) 13m17.203288847s ago: executing program 5 (id=127): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = dup(r0) sendmsg$IPSET_CMD_TYPE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x24008000}, 0x20000001) 13m16.933515002s ago: executing program 5 (id=128): syz_usb_connect(0x1, 0xfffffffffffffd22, 0x0, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0xc) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)=r1) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1, r1}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000500)=""/61, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, 0x0, &(0x7f00000000c0)=""/87, &(0x7f0000000480)=""/74}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000a40)) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000000)=0x1) unshare(0x64000600) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x0, &(0x7f0000000340)}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 13m16.254600758s ago: executing program 5 (id=129): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000600)={0x2, {{0x2, 0x0, @multicast2}}, 0x0, 0x3, [{{0x2, 0x2, @remote}}, {{0x2, 0x4e24, @remote}}, {{0x2, 0x2, @loopback}}]}, 0x210) 13m16.005232241s ago: executing program 5 (id=130): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) read$FUSE(r0, &(0x7f00000083c0)={0x2020}, 0x49e8648f) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x40) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder0\x00', 0x0, 0x0) r6 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder0\x00', 0x0, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0xfcffffffffffffff, &(0x7f0000000140)="cc"}) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f00000003c0)={0xc, 0x0, &(0x7f0000000740)=[@dead_binder_done={0x40086310, 0x1000000}], 0x0, 0x0, 0x0}) 12m29.974047452s ago: executing program 36 (id=130): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) read$FUSE(r0, &(0x7f00000083c0)={0x2020}, 0x49e8648f) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x40) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder0\x00', 0x0, 0x0) r6 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder0\x00', 0x0, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0xfcffffffffffffff, &(0x7f0000000140)="cc"}) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f00000003c0)={0xc, 0x0, &(0x7f0000000740)=[@dead_binder_done={0x40086310, 0x1000000}], 0x0, 0x0, 0x0}) 10m49.184503543s ago: executing program 37 (id=154): socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e22, 0x9, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2d}}, 0x6}, 0x1c) epoll_create1(0x0) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e22, 0x7, @ipv4={'\x00', '\xff\xff', @empty}, 0x106}, 0x1c) 10m1.424953225s ago: executing program 7 (id=186): r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) 10m1.133362201s ago: executing program 7 (id=187): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001180)=ANY=[@ANYRESOCT=r0], 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0xca02}) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r1, &(0x7f0000001300)=[{&(0x7f00000000c0)=""/124, 0x4}], 0x3e8, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001a00010000000000000000000a0000003a2a5e247b00000008001900", @ANYRES32], 0x30}], 0x1}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) 9m58.264169111s ago: executing program 7 (id=188): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) close(r0) 9m57.693609692s ago: executing program 7 (id=189): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r0}, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880), 0x88000, 0x0) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) 9m57.220400356s ago: executing program 7 (id=190): setresuid(0xee01, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() sched_setaffinity(0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c00)=@framed={{}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000040)) r0 = syz_io_uring_setup(0x48be, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x3}, &(0x7f0000000000), &(0x7f0000001180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000002300)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x3100) 9m55.563502664s ago: executing program 7 (id=195): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000f0000000000000c00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000200b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x10) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000000)={0x1e, 0x0, 0x8}) sched_setscheduler(0x0, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=@newsa={0x104, 0x10, 0x7, 0x0, 0x0, {{@in6=@mcast2, @in=@multicast2, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xee00}, {@in6=@mcast1, 0x0, 0x2b}, @in6=@private0, {0x0, 0x0, 0x2}, {0x0, 0x200000, 0x7}, {0x40000, 0x0, 0xae8}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x70}, [@coaddr={0x14, 0xe, @in6=@remote}]}, 0x104}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB="040100001a00"], 0x104}}, 0x0) 9m55.184414584s ago: executing program 3 (id=196): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) epoll_create1(0x80000) 9m54.906462838s ago: executing program 3 (id=197): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454c9, 0x444d6d20800230f7) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0xb007}, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000980)={'wg2\x00', 0x0}) sendto$packet(r2, &(0x7f0000000180)="0b031407e0ff640f0200475400f6a13bb1000e00080008004803", 0x10000, 0x0, &(0x7f0000000140)={0x11, 0x0, r3}, 0x14) 9m34.023233237s ago: executing program 3 (id=198): socket$packet(0x11, 0x2, 0x300) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x58}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x60a80, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x0, 0xffffffff}, 0x10) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) r2 = socket(0x1e, 0x4, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r4, 0x201, 0x400000, 0x0, {{}, {}, {0x8, 0x11, 0x4}}}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) 9m33.232267548s ago: executing program 3 (id=199): setresuid(0xee01, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() sched_setaffinity(0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c00)=@framed={{}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000040)) r0 = syz_io_uring_setup(0x48be, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x3}, &(0x7f0000000000), &(0x7f0000001180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000002300)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x3100) 9m32.236331571s ago: executing program 3 (id=200): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'ip_vti0\x00', 0x0}) r4 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r4, &(0x7f0000000300)={&(0x7f0000000800)={0x1d, r3}, 0x10, &(0x7f0000000880)={&(0x7f0000000180)=@can={{0x2, 0x1}, 0x6, 0x3, 0x0, 0x0, "aacda1cfd0185b43"}, 0x10}}, 0x14) 9m32.083511999s ago: executing program 3 (id=201): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) 9m9.970501901s ago: executing program 38 (id=195): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000f0000000000000c00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000200b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x10) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000000)={0x1e, 0x0, 0x8}) sched_setscheduler(0x0, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=@newsa={0x104, 0x10, 0x7, 0x0, 0x0, {{@in6=@mcast2, @in=@multicast2, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xee00}, {@in6=@mcast1, 0x0, 0x2b}, @in6=@private0, {0x0, 0x0, 0x2}, {0x0, 0x200000, 0x7}, {0x40000, 0x0, 0xae8}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x70}, [@coaddr={0x14, 0xe, @in6=@remote}]}, 0x104}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB="040100001a00"], 0x104}}, 0x0) 8m46.575387694s ago: executing program 39 (id=201): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) 8m10.332474689s ago: executing program 9 (id=226): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000100)='io_uring_register\x00', r1}, 0x10) r2 = syz_io_uring_setup(0x371d, &(0x7f0000000440)={0x0, 0x0, 0x400, 0xa, 0xffffff}, &(0x7f0000000380), &(0x7f0000000400)) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) 8m9.790903947s ago: executing program 9 (id=228): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x7, &(0x7f0000000400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xfffffffd}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) 8m9.53110574s ago: executing program 9 (id=229): r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0xfffffffa}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x105) io_setup(0x800, &(0x7f0000000500)=0x0) io_submit(r3, 0x2, &(0x7f00000001c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x47, r2, 0x0, 0x0, 0x8, 0x0, 0x2}]) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000bc0)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0x401, 0xea, &(0x7f0000000980)=""/234, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x20005, 0x2}, 0x8, 0x10, 0x0, 0x0, 0xa6e1, r2, 0x0, &(0x7f0000000b40)=[0xffffffffffffffff, r2, 0xffffffffffffffff], &(0x7f0000000640), 0x10, 0x4}, 0x94) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, 0x0) open(&(0x7f00000005c0)='./file0\x00', 0x161a40, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYRESOCT=r4], &(0x7f0000000100)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) futex(&(0x7f00000006c0)=0x2, 0x0, 0x2, &(0x7f0000000140)={0x77359400}, 0x0, 0x80000002) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r5, 0xaf01, 0x0) r6 = eventfd(0x4) ioctl$VHOST_SET_VRING_BASE(r5, 0x4008af12, &(0x7f0000000080)={0x1, 0x7f}) ioctl$VHOST_SET_LOG_FD(r5, 0x4004af07, &(0x7f0000000540)=r6) ioctl$VHOST_SET_VRING_KICK(r5, 0x4008af20, &(0x7f0000000040)={0x1, r6}) userfaultfd(0x80001) ioctl$VHOST_SET_VRING_ADDR(r5, 0x4028af11, &(0x7f0000000140)={0x0, 0x1, 0x0, &(0x7f0000000600)=""/52, 0x0, 0xffff1000}) ioctl$VHOST_SET_VRING_ADDR(r5, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, &(0x7f0000000380)=""/236, &(0x7f00000000c0)=""/87, &(0x7f0000000480)=""/66}) ioctl$VHOST_SET_MEM_TABLE(r5, 0x4008af03, &(0x7f0000000680)={0x1, 0x0, [{0x0, 0xfffffeac, &(0x7f00000001c0)=""/115}]}) ioctl$VHOST_VSOCK_SET_RUNNING(r5, 0x4004af61, &(0x7f0000000780)=0x10000001) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) 8m6.794966342s ago: executing program 9 (id=230): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x40000, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r2) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) close(r4) r5 = socket$unix(0x1, 0x1, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newqdisc={0x64, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x0, 0xb}, {0xffff, 0xffff}, {0x0, 0xe}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x34, 0x2, {{0x100, 0x5, 0x6361, 0x5, 0xfffffffd, 0x6}, [@TCA_NETEM_DELAY_DIST={0x6, 0x2, "80a9"}, @TCA_NETEM_CORR={0x10, 0x1, {0x3, 0x6, 0x6}}]}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x40081}, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) 8m5.803620194s ago: executing program 9 (id=231): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x891b, &(0x7f00000001c0)) 8m4.92526076s ago: executing program 9 (id=232): openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000a00)={'syz1\x00', {0x9, 0x7, 0x5, 0x5}, 0x3f, [0x9, 0x2, 0x8, 0x2, 0x5334, 0x400, 0x80000000, 0x5, 0x8, 0x0, 0x4, 0xf3, 0xfffffffb, 0x39, 0x747d5e13, 0x8, 0xfffffb9a, 0xfffffffc, 0x4, 0x401, 0x4, 0x3, 0x4, 0xf252, 0x80, 0x800, 0x300000, 0x7, 0xe, 0x4623f, 0x6, 0x0, 0x1ff, 0x8000, 0xfffffffe, 0x3, 0xd, 0x3, 0xba55, 0x8da8, 0x2, 0x200, 0x2, 0x400008, 0xe, 0x4, 0x2, 0xde, 0x8, 0x9, 0x1, 0x199f, 0x8, 0x2, 0x9, 0xffffffff, 0x4, 0x6, 0x1000, 0x5, 0x40, 0x9, 0xa, 0x5], [0x5, 0x1e, 0x3, 0x8000, 0xfffffffe, 0x3, 0x0, 0x25, 0x7, 0xfffffffc, 0x4, 0x7fff, 0x72c, 0x1c33, 0x3, 0x5, 0x10000, 0x400, 0x8001, 0x3, 0x1, 0x297, 0x5, 0x0, 0x985, 0x4, 0x8, 0x3ff, 0x0, 0xfffffffe, 0x0, 0x1000001, 0xd, 0xfffffff9, 0xfffffffd, 0x9, 0x1, 0xffffffff, 0x6, 0x5, 0x800, 0xffff, 0x6, 0x96, 0xfffffff9, 0x2, 0x0, 0x2, 0x401, 0xc, 0x3, 0x379, 0x9, 0xe, 0x5, 0x7, 0x6, 0x2, 0x1, 0x1, 0x8, 0x6, 0x200, 0xffffffff], [0x401, 0xc584, 0xffff, 0xcd3, 0x7, 0x20, 0x404, 0x4, 0x8, 0x10, 0x7, 0x9, 0xe8b, 0x9, 0x80000001, 0x8, 0x3f92, 0x1000, 0x2, 0x10, 0x1, 0xfffffff9, 0xe55, 0x1000, 0x8, 0x0, 0xff, 0x5, 0x200003, 0x2, 0x5, 0x80, 0x9, 0x8001, 0x47, 0x3, 0x3, 0x4, 0x3, 0x6d7e, 0x3, 0x8, 0x3, 0x10000, 0x6, 0x8, 0x95e, 0x0, 0x3ff, 0x3, 0x6, 0x100fffd, 0x2005, 0x9, 0x4, 0xea, 0x9, 0x20000005, 0x6, 0xd9, 0x0, 0x7d, 0x401, 0x5], [0x108e, 0xffff, 0x3, 0x3, 0x88, 0x2, 0x6, 0x4, 0x50, 0x2, 0x763, 0xb, 0x402, 0x800, 0x5, 0x10001, 0x7f, 0x5, 0x3fa6, 0x7, 0x0, 0x5, 0x1e2, 0x4, 0xe47, 0x3, 0x1000003, 0x4, 0x200, 0x1000, 0x3b, 0x20000002, 0x5, 0x800, 0xa80a, 0x65f413f9, 0xfffffff8, 0x20008, 0x8a8, 0x2, 0x800, 0x409, 0x7, 0x4, 0x4, 0x10, 0x4, 0x0, 0x7fff, 0x8, 0xfffffff8, 0x401, 0x1, 0x200, 0x7, 0x4ecf, 0xfffffffd, 0xa, 0xe, 0x2, 0xf, 0xf, 0x136, 0x6]}, 0x45c) ioctl$UI_DEV_CREATE(r2, 0x5501) write$input_event(r2, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfe4f) 7m19.584049407s ago: executing program 40 (id=232): openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000a00)={'syz1\x00', {0x9, 0x7, 0x5, 0x5}, 0x3f, [0x9, 0x2, 0x8, 0x2, 0x5334, 0x400, 0x80000000, 0x5, 0x8, 0x0, 0x4, 0xf3, 0xfffffffb, 0x39, 0x747d5e13, 0x8, 0xfffffb9a, 0xfffffffc, 0x4, 0x401, 0x4, 0x3, 0x4, 0xf252, 0x80, 0x800, 0x300000, 0x7, 0xe, 0x4623f, 0x6, 0x0, 0x1ff, 0x8000, 0xfffffffe, 0x3, 0xd, 0x3, 0xba55, 0x8da8, 0x2, 0x200, 0x2, 0x400008, 0xe, 0x4, 0x2, 0xde, 0x8, 0x9, 0x1, 0x199f, 0x8, 0x2, 0x9, 0xffffffff, 0x4, 0x6, 0x1000, 0x5, 0x40, 0x9, 0xa, 0x5], [0x5, 0x1e, 0x3, 0x8000, 0xfffffffe, 0x3, 0x0, 0x25, 0x7, 0xfffffffc, 0x4, 0x7fff, 0x72c, 0x1c33, 0x3, 0x5, 0x10000, 0x400, 0x8001, 0x3, 0x1, 0x297, 0x5, 0x0, 0x985, 0x4, 0x8, 0x3ff, 0x0, 0xfffffffe, 0x0, 0x1000001, 0xd, 0xfffffff9, 0xfffffffd, 0x9, 0x1, 0xffffffff, 0x6, 0x5, 0x800, 0xffff, 0x6, 0x96, 0xfffffff9, 0x2, 0x0, 0x2, 0x401, 0xc, 0x3, 0x379, 0x9, 0xe, 0x5, 0x7, 0x6, 0x2, 0x1, 0x1, 0x8, 0x6, 0x200, 0xffffffff], [0x401, 0xc584, 0xffff, 0xcd3, 0x7, 0x20, 0x404, 0x4, 0x8, 0x10, 0x7, 0x9, 0xe8b, 0x9, 0x80000001, 0x8, 0x3f92, 0x1000, 0x2, 0x10, 0x1, 0xfffffff9, 0xe55, 0x1000, 0x8, 0x0, 0xff, 0x5, 0x200003, 0x2, 0x5, 0x80, 0x9, 0x8001, 0x47, 0x3, 0x3, 0x4, 0x3, 0x6d7e, 0x3, 0x8, 0x3, 0x10000, 0x6, 0x8, 0x95e, 0x0, 0x3ff, 0x3, 0x6, 0x100fffd, 0x2005, 0x9, 0x4, 0xea, 0x9, 0x20000005, 0x6, 0xd9, 0x0, 0x7d, 0x401, 0x5], [0x108e, 0xffff, 0x3, 0x3, 0x88, 0x2, 0x6, 0x4, 0x50, 0x2, 0x763, 0xb, 0x402, 0x800, 0x5, 0x10001, 0x7f, 0x5, 0x3fa6, 0x7, 0x0, 0x5, 0x1e2, 0x4, 0xe47, 0x3, 0x1000003, 0x4, 0x200, 0x1000, 0x3b, 0x20000002, 0x5, 0x800, 0xa80a, 0x65f413f9, 0xfffffff8, 0x20008, 0x8a8, 0x2, 0x800, 0x409, 0x7, 0x4, 0x4, 0x10, 0x4, 0x0, 0x7fff, 0x8, 0xfffffff8, 0x401, 0x1, 0x200, 0x7, 0x4ecf, 0xfffffffd, 0xa, 0xe, 0x2, 0xf, 0xf, 0x136, 0x6]}, 0x45c) ioctl$UI_DEV_CREATE(r2, 0x5501) write$input_event(r2, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfe4f) 6m54.333569639s ago: executing program 1 (id=244): r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x601c2, 0x0) ftruncate(r0, 0x8800000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000034c0)=[{{0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000000b80)=""/4096, 0x20001b80}, {&(0x7f0000001b80)=""/112, 0x70}], 0x2, 0x0, 0xa0028cb4}}], 0x40000000000013c, 0x700, 0x0) sendfile(r1, r0, 0x0, 0x578410e9) sendfile(r1, r0, 0x0, 0x100000000) 6m51.343914185s ago: executing program 1 (id=250): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x891b, 0x0) 6m51.013664802s ago: executing program 1 (id=251): rename(0x0, 0x0) r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000000018105e04da0700000000000109022400010000000009040000090300000009210000000122220009058103"], 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00222200000096231306e53f070d0000002a940183"], 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 6m49.433133624s ago: executing program 1 (id=252): capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x2200003, 0x0, 0x0, 0x3, 0x80000001}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x3, @empty}, 0x10) 6m49.045530175s ago: executing program 1 (id=253): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) lseek(r1, 0x7fff, 0x0) 6m48.604483937s ago: executing program 1 (id=254): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad1f50ad32d3fd25dfd73a015e0ca6a0f68a7d007f15451dfb265a0e3ccae669e173a64bc1cfd5587d452d64e7cc957d77578f4c25235138d5521f9453559c35da860e8efbc64e57cbb7aee976f2b54421eed73d5661ca3dbe74bd09de8793dbcceef76b2e5feecf9c66c54c3b3ffe1b4ce25d7c983c044c06cd0a48dfe3e26e7a23129d6606fd28a69989d552af6d9a9df2c3af36e0360050011bbecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f163d1a13ed38ae82f87925bfacba83109753f541cd027edd68149ee99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b70a7000000e7ffffff00000000d7900a820b63278f4e9a217b98ef7042ad2a92895614cd50cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e0867958e1dd7a0defb6670c06054002238260000000000040587c1ed797aa21a38e1e389f640a0b8b0000000000a835ad0f61ba73c31b05c00fba8a4aee676d7c45bb29671a68ee2e60da7b01a2e5785a238afa4aba70c07fcd95bf8b0d71b6f72d6a8d87fb08533d97ad96d3943c4cc8306dac433a5cdf334178b04963d67dd5a5707e618a1ef9057fec00f9e930219fa8d30e716de8cde9c60f0000000c3b64d10f0939b42b788daa7075fa542242b00f6bf9b64ad460e386b6f388351fbdacb3ad074574ee9d450f9dcfaef1be95ff3c449e6482e4403174618c20e887d6f320616d31d78a0e5421d5742cc52509fd90cf2df6d1404f6b8f810d7b94d421971b77a3270153a0d57cccfe27872f3e8e44480f93c33421986a7737842627301fb2fee8cabab074adaa2024ff57e609ba2f4d83b3bbf52309484532416f48f43b31395c6f45fee8f1682a4e8d5e3b9ae634ed24fb0e8b5fadaf5cb7eea62b7bb4264e72950c9dc791d771acc24c08cdb6ef24c813d082a86d9b879bdf5aefdfd905a2bd4ea36b0b54915a68fe149db154a8340017e1855511e9c0fe62d0cf55"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000, 0x0, 0x32}, 0x1e) 6m37.728089823s ago: executing program 8 (id=260): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000480)=@abs={0x0, 0x0, 0x8004e24}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x1c, r4, 0x200, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 6m16.364731724s ago: executing program 8 (id=261): prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0xb007}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'wg0\x00', 0x0}) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x4, 0x1}, 0x48) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x36) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000180)=0x800001, 0x4) bind$inet6(r3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[], 0x48) read$FUSE(0xffffffffffffffff, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) setgid(r4) syz_emit_ethernet(0x4a, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaaaaaaaaaac4bc9cac968686dd6000000000140600fe8000000000000000000000000000aafe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344], 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r5, &(0x7f0000000040), 0x10) sendto$packet(r1, &(0x7f0000000180)="0b03feff4f12021202004788aa96a13bb1000011000088ca1a00", 0x1fffc, 0x0, &(0x7f0000000140)={0x11, 0x0, r2}, 0x14) 6m15.964759454s ago: executing program 8 (id=262): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) setreuid(0xee01, 0x0) 6m15.603288403s ago: executing program 8 (id=263): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x0) socket$packet(0x11, 0x3, 0x300) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x94) socket$vsock_stream(0x28, 0x1, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, &(0x7f0000000240)={0x14, &(0x7f0000000500)=ANY=[@ANYBLOB="861e46000000460cc52f80df93194625350863688fdf03a42570e09205fd9a70e82b9557f0692aaefd6395584b8e3f2ea5aeb90b78cbe1b7c477944c4c40439bd94051bc03d606621c00"/86], 0x0}, 0x0) 6m15.223226893s ago: executing program 8 (id=264): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000200)='kmem_cache_free\x00', r1}, 0x18) syz_emit_ethernet(0x2416, &(0x7f0000000580)=ANY=[@ANYBLOB="e727dc07001f391e7dd7a2d786dd609907a623e02c03cb697a653e336f000000500000000000ff02000000000000000000000000000132"], 0x0) 6m14.743405228s ago: executing program 8 (id=265): r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) read$FUSE(r0, &(0x7f00000083c0)={0x2020, 0x0, 0x0}, 0x49e8648f) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1, {0x7, 0x1f, 0x0, 0x2066012}}, 0x50) syz_fuse_handle_req(r0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder0\x00', 0x0, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder0\x00', 0x0, 0x0) r9 = dup3(r8, r7, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0xfcffffffffffffff, &(0x7f0000000140)="cc"}) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 6m2.622001178s ago: executing program 41 (id=254): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000, 0x0, 0x32}, 0x1e) 5m29.180325147s ago: executing program 42 (id=265): r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) read$FUSE(r0, &(0x7f00000083c0)={0x2020, 0x0, 0x0}, 0x49e8648f) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1, {0x7, 0x1f, 0x0, 0x2066012}}, 0x50) syz_fuse_handle_req(r0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder0\x00', 0x0, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder0\x00', 0x0, 0x0) r9 = dup3(r8, r7, 0x0) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0xfcffffffffffffff, &(0x7f0000000140)="cc"}) ioctl$BINDER_WRITE_READ(r9, 0xc0306201, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 4m19.608097953s ago: executing program 2 (id=309): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x0, 0x0, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x2d) syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x75, 0x1c, 0x1, 0x10, 0xfe6, 0x9800, 0xd19a, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x29, 0x2, 0x1, 0xb4, 0x8c, 0xbb, 0x0, [], [{{0x9, 0x5, 0x4, 0x2, 0x10, 0x0, 0xfa}}]}}]}}]}}, 0x0) 4m19.08578846s ago: executing program 2 (id=310): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f00000005c0)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) io_setup(0x1000, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) socket$packet(0x11, 0x3, 0x300) 3m57.17291238s ago: executing program 0 (id=311): socket$inet6_udplite(0xa, 0x2, 0x88) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x8}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d080", 0x2}], 0x1}, 0x20000801) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) 3m54.623346742s ago: executing program 2 (id=312): seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) fspick(0xffffffffffffff9c, 0x0, 0x0) 3m54.506517569s ago: executing program 0 (id=313): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000000)={0x1}) fcntl$lock(0xffffffffffffffff, 0x25, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x80000000}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x0, 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0xb007}, 0x4) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'wg0\x00', 0x0}) sendto$packet(r3, &(0x7f0000000180)="0b03feff4f12021202004788aa96a13bb1000011000088ca1a00", 0x1fffc, 0x0, &(0x7f0000000140)={0x11, 0x0, r4}, 0x14) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x80) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) r5 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) fsmount(r5, 0x0, 0x0) syz_usb_connect(0x5, 0x2d, 0x0, 0x0) 3m54.224331504s ago: executing program 2 (id=314): prlimit64(0x0, 0xe, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r2}, 0x10) setitimer(0x2, 0x0, 0x0) 3m53.804669495s ago: executing program 2 (id=315): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000140)='sys_enter\x00', r1}, 0x10) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) 3m53.434344645s ago: executing program 2 (id=316): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@map, 0x22, 0x1, 0x3d5a, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340), 0x400, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x44, 0x86}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x800008ec0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@fallback=r1, 0xffffffffffffffff, 0x20, 0x0, 0x0, @void, @value, @void, @void, r0}, 0x20) r5 = socket(0x10, 0x3, 0x0) sendto$inet6(r5, &(0x7f0000000180)="7800000018002507b9409b14ffff00000204be04020506050e0204095c0016000400000046000045653600648d0a0012000200000049935ade4a460c89b6ec0cff3959547f509058ba86c902000000004b32000400170005000a00000000e5c2cc7f18ff2439d1ddf66ed538f252325bd059c52cd85ab6d3", 0x78, 0x0, 0x0, 0x0) 3m43.313599521s ago: executing program 0 (id=317): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0x2000000000000019, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x18) uname(&(0x7f00000002c0)=""/32) 3m43.063695654s ago: executing program 0 (id=318): setresuid(0xffffffffffffffff, 0xee00, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) 3m42.823524976s ago: executing program 0 (id=319): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = fsopen(&(0x7f0000000000)='pipefs\x00', 0x0) r3 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r3, &(0x7f00000000c0)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x40) close_range(r2, 0xffffffffffffffff, 0x0) 3m42.563869749s ago: executing program 0 (id=320): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x8000000004) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) 3m8.428840784s ago: executing program 43 (id=316): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@map, 0x22, 0x1, 0x3d5a, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340), 0x400, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x44, 0x86}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x800008ec0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@fallback=r1, 0xffffffffffffffff, 0x20, 0x0, 0x0, @void, @value, @void, @void, r0}, 0x20) r5 = socket(0x10, 0x3, 0x0) sendto$inet6(r5, &(0x7f0000000180)="7800000018002507b9409b14ffff00000204be04020506050e0204095c0016000400000046000045653600648d0a0012000200000049935ade4a460c89b6ec0cff3959547f509058ba86c902000000004b32000400170005000a00000000e5c2cc7f18ff2439d1ddf66ed538f252325bd059c52cd85ab6d3", 0x78, 0x0, 0x0, 0x0) 2m57.269915204s ago: executing program 44 (id=320): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x8000000004) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) 2m30.934331443s ago: executing program 5 (id=322): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00'}, 0x78) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r0, 0xffffffffffffffff, 0x0) 1m45.013550571s ago: executing program 45 (id=322): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00'}, 0x78) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r0, 0xffffffffffffffff, 0x0) 20.403771019s ago: executing program 4 (id=432): prctl$PR_MCE_KILL(0x23, 0x9, 0x7fffffffeffe) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000480)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000003700000008000300", @ANYRES32=r1, @ANYBLOB="08002600901500000800570080"], 0x2c}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8b18, &(0x7f0000000000)={'wlan0\x00'}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x24, r5, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) 19.144174465s ago: executing program 4 (id=433): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c00028005000100000000000800074000000001"], 0x64}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x40, 0x0, 0x1, 0x401, 0x0, 0x1a14, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_STATUS={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x40044}, 0x0) 18.905530287s ago: executing program 4 (id=434): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) r3 = dup2(r1, 0xffffffffffffffff) r4 = openat$full(0xffffff9c, &(0x7f00000000c0), 0x8000, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, r4, 0x1, 0x0, @val=@netfilter={0xa, 0x1, 0xfffffffe, 0x1}}, 0x20) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010008020000001800006600000008000300", @ANYRES32=r2, @ANYBLOB="08002600940900000800b70099"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000024c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010026bd7000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="0600cd00000000004200330000a810000802110000010802110000005050505050509c00c000c081202f020000002d1a000a0f00fbff03000000050000000000fb000000000000000000"], 0x68}, 0x1, 0x0, 0x0, 0xc0}, 0x0) 17.957042247s ago: executing program 4 (id=435): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="090008000000fedbdf25140000000c000600010000000100000008001d"], 0x4c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 17.523353809s ago: executing program 4 (id=436): ioctl$COMEDI_DEVCONFIG(0xffffffffffffffff, 0x40946400, &(0x7f0000000180)={'comedi_bond\x00', [0x4, 0xe, 0x8, 0xfffffffb, 0x1000, 0x101, 0x6623, 0x6, 0x8b, 0x0, 0xfffffffa, 0x2, 0xfffffffe, 0x8, 0x6, 0x7, 0x1, 0x7, 0x4, 0xa261, 0x10, 0x5, 0x9, 0x9, 0x5, 0x4, 0x1, 0xc005, 0x59, 0x7, 0x4]}) 17.374210367s ago: executing program 4 (id=437): socket(0x10, 0x1, 0xfffffffc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0x200, 0x70bd25, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0xb}, @IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x11}]}}}]}, 0x44}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf523", @ANYRES32=0x0, @ANYBLOB], 0x50}}, 0x4008840) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket$inet6(0xa, 0x80001, 0x0) syz_open_procfs(0x0, &(0x7f00000003c0)='net/mcfilter6\x00') r3 = inotify_init() fgetxattr(r3, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) r4 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r4, 0x1, 0x3c, &(0x7f0000000100)={0x200000000000001}, 0x8) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff00000000000000}, 0x400}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4000000) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5041e}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5, 0x3, 0x1}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4090}, 0x6000000) 5.014356879s ago: executing program 6 (id=445): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r2, 0x0, {0x2, 0x0, 0x6}, 0xfe}, 0x18) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="81b641f1f3843704b6", 0x9}], 0x1}, 0x4048081) setsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000100)=0x1, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_j1939(r4, &(0x7f0000000300)={0x1d, r5, 0x2, {0x0, 0xf0}, 0xc295a7c9ee09b05c}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x2}, 0x1c) getsockopt$nfc_llcp(r3, 0x118, 0x3, &(0x7f0000000180)=""/127, 0x7f) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@newtfilter={0x24, 0x11, 0x1, 0x70bd28, 0x0, {0x0, 0x0, 0x74, r2, {0xfffd, 0xffeb}, {0x1, 0x1}, {0xfff2, 0xd}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x4012}, 0x850) 2.034885274s ago: executing program 6 (id=446): ioctl$COMEDI_DEVCONFIG(0xffffffffffffffff, 0x40946400, &(0x7f0000000180)={'comedi_bond\x00', [0x4, 0xe, 0x8, 0xfffffffb, 0x1000, 0x101, 0x6623, 0x6, 0x8b, 0x0, 0xfffffffa, 0x2, 0xfffffffe, 0x8, 0x6, 0x7, 0x1, 0x7, 0x4, 0xa261, 0x10, 0x5, 0x9, 0x9, 0x5, 0x4, 0x1, 0xc005, 0x59, 0x7, 0x4]}) 1.834383634s ago: executing program 6 (id=447): r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x400, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{}, 0x354b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4}}}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=@newtfilter={0x94, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x64, 0x2, [@TCA_BASIC_EMATCHES={0x60, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xffff}}, @TCA_EMATCH_TREE_LIST={0x54, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x8, 0x1, 0x6}, {0xa523, 0x0, 0x0, 0x4, 0x4, 0x0, 0x1}}}, @TCF_EM_META={0x38, 0x2, 0x0, 0x0, {{0x0, 0x4, 0x4}, [@TCA_EM_META_RVALUE={0x21, 0x3, [@TCF_META_TYPE_VAR="2d3d9574cea0cb179a", @TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_INT=0x3, @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_INT=0x4, @TCF_META_TYPE_VAR, @TCF_META_TYPE_INT=0x6]}, @TCA_EM_META_RVALUE={0x8, 0x3, [@TCF_META_TYPE_INT=0x6]}]}}]}]}]}}]}, 0x94}}, 0x0) 1.392754518s ago: executing program 6 (id=448): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_newnexthop={0x20, 0x68, 0x5fb9a818fb7378e9, 0x2, 0x0, {}, [@NHA_OIF={0x8, 0x5, r2}]}, 0x20}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=@newnexthop={0x24, 0x68, 0x1, 0x2, 0x7ffffffc, {}, [@NHA_GROUP={0xc, 0x2, [{0x1, 0x4}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x24008000}, 0x4000) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@ipv4_newroute={0x2c, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x1, {0x2, 0x0, 0x10, 0x0, 0xfe, 0x4, 0x0, 0x6, 0x20000000}, [@RTA_NH_ID={0x8, 0x1e, 0x2}, @RTA_TABLE={0x8, 0xf, 0x7fff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4a044}, 0x4010) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, 0x0, 0xd0) 1.020994337s ago: executing program 6 (id=449): socket$inet(0x2, 0x0, 0xf) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000003d40), 0x4) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000003d80)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_addr=@local, @dev}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) rmdir(0x0) r2 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000180)={0x8, 0x0, 0x0, 0x0, @vifc_lcl_addr=@loopback, @dev={0xac, 0x14, 0x14, 0x40}}, 0x10) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000000)={@multicast1=0xe0000300, @local}, 0x8) syz_emit_ethernet(0x2a, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x80, 0x2, 0x0, @empty, @multicast1=0xe0000300}, @echo_reply={0x0, 0x0, 0x0, 0x64, 0xd2}}}}}, 0x0) setsockopt$MRT_ADD_MFC_PROXY(r2, 0x0, 0xd2, &(0x7f0000000200)={@empty, @multicast2=0xe0000300, 0x0, "028a3f6c58b274e6d8451697efe42811ee1df06e9264f7d866b1970548fc3c7b", 0xb2, 0xfffffff7, 0x4, 0x40000006}, 0x3c) 0s ago: executing program 6 (id=450): syz_open_dev$loop(0x0, 0x81, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x70bd2b, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7b, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() write$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)=0x3, 0x12) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$netlink(0x10, 0x3, 0xc) r3 = syz_open_dev$dri(&(0x7f0000000140), 0x1, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000040), 0x20000000, 0x40800) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r4, 0xc04064a0, &(0x7f0000000000)={0x0, &(0x7f00000001c0)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCRTC(r4, 0xc06864a1, &(0x7f0000000240)={0x0, 0x0, r5, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r4, 0xc06864ce, &(0x7f0000000380)={r6, 0x0, 0x1ff, 0x0, 0x0, [0x0], [0x9, 0x0, 0x0, 0x8], [0x3, 0x20000000, 0x100, 0xd], [0x1000010000000, 0x0, 0x7fffffffffffffff]}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r4, 0xc00c642d, &(0x7f0000000080)={r7, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r8}) kernel console output (not intermixed with test programs): t:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.410699][ T31] audit: type=1400 audit(62.320:60): avc: denied { execute_no_trans } for pid=3097 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.811683][ T31] audit: type=1400 audit(65.720:61): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 65.816783][ T31] audit: type=1400 audit(65.720:62): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 65.836205][ T3097] cgroup: Unknown subsys name 'net' [ 65.846808][ T31] audit: type=1400 audit(65.750:63): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 65.992413][ T3097] cgroup: Unknown subsys name 'cpuset' [ 65.996194][ T3097] cgroup: Unknown subsys name 'hugetlb' [ 65.996784][ T3097] cgroup: Unknown subsys name 'rlimit' [ 66.233554][ T31] audit: type=1400 audit(66.140:64): avc: denied { setattr } for pid=3097 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.239567][ T31] audit: type=1400 audit(66.140:65): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.240043][ T31] audit: type=1400 audit(66.140:66): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 66.449255][ T3099] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 66.453429][ T31] audit: type=1400 audit(66.360:67): avc: denied { relabelto } for pid=3099 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.457244][ T31] audit: type=1400 audit(66.360:68): avc: denied { write } for pid=3099 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 66.503545][ T31] audit: type=1400 audit(66.410:69): avc: denied { read } for pid=3097 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.505976][ T31] audit: type=1400 audit(66.410:70): avc: denied { open } for pid=3097 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.192254][ T3097] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.018129][ T31] audit: type=1400 audit(76.920:71): avc: denied { execmem } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.053039][ T31] audit: type=1400 audit(76.960:72): avc: denied { read } for pid=3102 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.058576][ T31] audit: type=1400 audit(76.960:73): avc: denied { open } for pid=3102 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.061756][ T31] audit: type=1400 audit(76.970:74): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.083931][ T31] audit: type=1400 audit(76.990:75): avc: denied { module_request } for pid=3103 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.084342][ T31] audit: type=1400 audit(76.990:76): avc: denied { module_request } for pid=3102 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.163408][ T31] audit: type=1400 audit(77.070:77): avc: denied { sys_module } for pid=3103 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 77.633338][ T31] audit: type=1400 audit(77.540:78): avc: denied { ioctl } for pid=3103 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.113739][ T3103] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.124660][ T3102] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.131781][ T3103] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.136890][ T3102] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.096045][ T3102] hsr_slave_0: entered promiscuous mode [ 80.100868][ T3102] hsr_slave_1: entered promiscuous mode [ 80.186560][ T3103] hsr_slave_0: entered promiscuous mode [ 80.191156][ T3103] hsr_slave_1: entered promiscuous mode [ 80.193372][ T3103] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 80.193822][ T3103] Cannot create hsr debugfs directory [ 80.616758][ T31] audit: type=1400 audit(80.520:79): avc: denied { create } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.621800][ T31] audit: type=1400 audit(80.530:80): avc: denied { write } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.639094][ T3102] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.660992][ T3102] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.670140][ T3102] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 80.685837][ T3102] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 80.746778][ T3103] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 80.755897][ T3103] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 80.765594][ T3103] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 80.774925][ T3103] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.401184][ T3103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.533256][ T3102] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.014706][ T3103] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 84.021927][ T3103] veth0_vlan: entered promiscuous mode [ 84.039971][ T3103] veth1_vlan: entered promiscuous mode [ 84.113514][ T3103] veth0_macvtap: entered promiscuous mode [ 84.125834][ T3103] veth1_macvtap: entered promiscuous mode [ 84.194014][ T3103] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.195705][ T3103] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.202198][ T3103] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.204503][ T3103] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.362523][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 84.364890][ T31] audit: type=1400 audit(84.270:82): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.366971][ T31] audit: type=1400 audit(84.270:83): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.YMv3V2/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.372975][ T31] audit: type=1400 audit(84.280:84): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.386230][ T31] audit: type=1400 audit(84.290:85): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.YMv3V2/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.390135][ T31] audit: type=1400 audit(84.300:86): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.YMv3V2/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1885 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.416524][ T31] audit: type=1400 audit(84.320:87): avc: denied { unmount } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.425941][ T31] audit: type=1400 audit(84.330:88): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=770 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.432195][ T31] audit: type=1400 audit(84.340:89): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="gadgetfs" ino=1886 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.434682][ T3102] veth0_vlan: entered promiscuous mode [ 84.441949][ T31] audit: type=1400 audit(84.350:90): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.444458][ T31] audit: type=1400 audit(84.350:91): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.460486][ T3102] veth1_vlan: entered promiscuous mode [ 84.526639][ T3103] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 84.539761][ T3102] veth0_macvtap: entered promiscuous mode [ 84.557136][ T3102] veth1_macvtap: entered promiscuous mode [ 84.627452][ T3102] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.629769][ T3102] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.630842][ T3102] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.631847][ T3102] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.330977][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 95.332426][ T31] audit: type=1400 audit(95.240:105): avc: denied { create } for pid=3799 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 95.351997][ T31] audit: type=1400 audit(95.260:106): avc: denied { shutdown } for pid=3799 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 106.247346][ T31] audit: type=1400 audit(106.150:107): avc: denied { create } for pid=3816 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 106.261740][ T31] audit: type=1400 audit(106.170:108): avc: denied { write } for pid=3816 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 106.921871][ T31] audit: type=1400 audit(106.830:109): avc: denied { create } for pid=3821 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 106.928546][ T31] audit: type=1400 audit(106.830:110): avc: denied { setopt } for pid=3821 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 106.939674][ T31] audit: type=1400 audit(106.850:111): avc: denied { ioctl } for pid=3821 comm="syz.0.11" path="socket:[2372]" dev="sockfs" ino=2372 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 106.944786][ T31] audit: type=1400 audit(106.850:112): avc: denied { allowed } for pid=3821 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 106.960309][ T31] audit: type=1400 audit(106.870:113): avc: denied { create } for pid=3821 comm="syz.0.11" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 106.968542][ T31] audit: type=1400 audit(106.870:114): avc: denied { map } for pid=3821 comm="syz.0.11" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2373 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 106.968942][ T31] audit: type=1400 audit(106.870:115): avc: denied { read write } for pid=3821 comm="syz.0.11" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2373 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 107.008444][ T31] audit: type=1400 audit(106.910:116): avc: denied { write } for pid=3821 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 112.209776][ T3828] input: syz1 as /devices/virtual/input/input3 [ 112.944613][ T31] audit: type=1326 audit(112.850:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3837 comm="syz.0.15" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 112.959293][ T31] audit: type=1326 audit(112.850:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3837 comm="syz.0.15" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 112.962070][ T31] audit: type=1326 audit(112.870:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3837 comm="syz.0.15" exe="/syz-executor" sig=0 arch=40000028 syscall=105 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 112.962407][ T31] audit: type=1326 audit(112.870:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3837 comm="syz.0.15" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 113.118296][ T31] audit: type=1400 audit(113.020:121): avc: denied { create } for pid=3841 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 113.129882][ T31] audit: type=1400 audit(113.040:122): avc: denied { write } for pid=3841 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 113.131147][ T3842] netlink: 324 bytes leftover after parsing attributes in process `syz.0.16'. [ 115.090324][ T3847] netlink: 20 bytes leftover after parsing attributes in process `syz.0.18'. [ 115.307609][ T31] audit: type=1400 audit(115.210:123): avc: denied { create } for pid=3846 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 116.293896][ T31] audit: type=1400 audit(116.200:124): avc: denied { create } for pid=3853 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 116.310687][ T31] audit: type=1400 audit(116.210:125): avc: denied { write } for pid=3853 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 116.601309][ T31] audit: type=1326 audit(116.510:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.0.20" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 117.033311][ T3802] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 117.254586][ T3802] usb 1-1: Using ep0 maxpacket: 32 [ 117.306239][ T3802] usb 1-1: config 0 has an invalid interface number: 184 but max is 0 [ 117.309131][ T3802] usb 1-1: config 0 has no interface number 0 [ 117.310528][ T3802] usb 1-1: config 0 interface 184 has no altsetting 0 [ 117.351543][ T3802] usb 1-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=69.ee [ 117.359202][ T3802] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 117.360192][ T3802] usb 1-1: Product: syz [ 117.362181][ T3802] usb 1-1: Manufacturer: syz [ 117.362859][ T3802] usb 1-1: SerialNumber: syz [ 117.373774][ T3802] usb 1-1: config 0 descriptor?? [ 117.403165][ T3802] smsc75xx v1.0.0 [ 118.120870][ T31] kauditd_printk_skb: 75 callbacks suppressed [ 118.121344][ T31] audit: type=1326 audit(118.010:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.0.20" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 118.131785][ T31] audit: type=1326 audit(118.040:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.0.20" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x13198c code=0x7ffc0000 [ 118.132359][ T31] audit: type=1326 audit(118.040:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.0.20" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x13198c code=0x7ffc0000 [ 118.135207][ T3802] smsc75xx 1-1:0.184 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000040: -61 [ 118.136458][ T3802] smsc75xx 1-1:0.184 (unnamed net_device) (uninitialized): Error reading E2P_CMD [ 118.138128][ T31] audit: type=1326 audit(118.040:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.0.20" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fa74 code=0x7ffc0000 [ 118.342965][ T3802] smsc75xx 1-1:0.184 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000014: -32 [ 118.344858][ T31] audit: type=1326 audit(118.250:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.0.20" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 118.345564][ T31] audit: type=1326 audit(118.250:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.0.20" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 118.345716][ T31] audit: type=1326 audit(118.250:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.0.20" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x13198c code=0x7ffc0000 [ 118.345833][ T31] audit: type=1326 audit(118.250:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.0.20" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x13198c code=0x7ffc0000 [ 118.345931][ T31] audit: type=1326 audit(118.250:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.0.20" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 118.346045][ T31] audit: type=1326 audit(118.250:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.0.20" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x13198c code=0x7ffc0000 [ 118.373150][ T3802] smsc75xx 1-1:0.184 (unnamed net_device) (uninitialized): Failed to read PMT_CTL: -32 [ 118.378177][ T3802] smsc75xx 1-1:0.184 (unnamed net_device) (uninitialized): device not ready in smsc75xx_reset [ 118.379414][ T3802] smsc75xx 1-1:0.184 (unnamed net_device) (uninitialized): smsc75xx_reset error -32 [ 118.382980][ T3802] smsc75xx 1-1:0.184: probe with driver smsc75xx failed with error -32 [ 125.363573][ T31] audit: type=1400 audit(125.270:212): avc: denied { connect } for pid=3855 comm="syz.0.20" laddr=172.20.20.170 lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 132.549758][ T3851] usb 1-1: USB disconnect, device number 2 [ 134.325562][ T3867] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 134.352917][ T3867] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 136.362661][ T3867] hsr_slave_0: entered promiscuous mode [ 136.379970][ T3867] hsr_slave_1: entered promiscuous mode [ 136.389196][ T3867] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 136.390582][ T3867] Cannot create hsr debugfs directory [ 137.096712][ T3867] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 137.172798][ T3867] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 137.187088][ T3867] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 137.213936][ T3867] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 138.537139][ T3867] 8021q: adding VLAN 0 to HW filter on device bond0 [ 146.512030][ T3867] veth0_vlan: entered promiscuous mode [ 146.560169][ T3867] veth1_vlan: entered promiscuous mode [ 146.625727][ T3867] veth0_macvtap: entered promiscuous mode [ 146.642459][ T3867] veth1_macvtap: entered promiscuous mode [ 146.694715][ T3867] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 146.696444][ T3867] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 146.698186][ T3867] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 146.699348][ T3867] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.160568][ T31] audit: type=1400 audit(152.070:213): avc: denied { write } for pid=4225 comm="syz.2.23" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 152.825126][ T31] audit: type=1400 audit(152.730:214): avc: denied { ioctl } for pid=4229 comm="syz.2.25" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=2679 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 154.168684][ T31] audit: type=1400 audit(154.040:215): avc: denied { setopt } for pid=4231 comm="syz.2.26" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 154.210221][ T4234] Zero length message leads to an empty skb [ 155.425639][ T31] audit: type=1400 audit(155.320:216): avc: denied { create } for pid=4241 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 155.425949][ T31] audit: type=1400 audit(155.330:217): avc: denied { sys_admin } for pid=4241 comm="syz.0.28" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 156.312888][ T31] audit: type=1326 audit(156.220:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4246 comm="syz.0.30" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 156.350647][ T31] audit: type=1326 audit(156.260:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4246 comm="syz.0.30" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 156.383043][ T31] audit: type=1326 audit(156.290:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4248 comm="syz.0.30" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fa74 code=0x7ffc0000 [ 156.420246][ T31] audit: type=1326 audit(156.330:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4246 comm="syz.0.30" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 156.429006][ T31] audit: type=1326 audit(156.330:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4246 comm="syz.0.30" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 157.628823][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 157.646255][ T31] audit: type=1400 audit(157.510:228): avc: denied { name_bind } for pid=4253 comm="syz.0.33" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 157.649422][ T31] audit: type=1400 audit(157.510:229): avc: denied { node_bind } for pid=4253 comm="syz.0.33" saddr=255.255.255.255 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 157.932128][ T31] audit: type=1326 audit(157.840:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4248 comm="syz.0.30" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 159.410570][ T31] audit: type=1400 audit(159.320:231): avc: denied { read } for pid=4261 comm="syz.0.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 159.451163][ T4262] netlink: 12 bytes leftover after parsing attributes in process `syz.0.35'. [ 173.128952][ T31] audit: type=1400 audit(173.030:232): avc: denied { create } for pid=4281 comm="syz.2.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 173.131421][ T31] audit: type=1400 audit(173.040:233): avc: denied { setopt } for pid=4281 comm="syz.2.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 174.969577][ T4303] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 174.970682][ T4303] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 175.267072][ T4308] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 175.269789][ T4308] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 175.994969][ T4314] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 176.004775][ T4314] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 177.001631][ T31] audit: type=1400 audit(176.910:234): avc: denied { append } for pid=4322 comm="syz.2.50" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 178.586477][ T4329] netlink: 8 bytes leftover after parsing attributes in process `syz.2.51'. [ 180.728189][ T4339] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 180.729046][ T4339] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 181.768312][ T31] audit: type=1326 audit(181.660:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4348 comm="syz.2.56" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 181.768851][ T31] audit: type=1326 audit(181.660:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4348 comm="syz.2.56" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 181.773116][ T31] audit: type=1326 audit(181.680:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4348 comm="syz.2.56" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 181.798200][ T31] audit: type=1326 audit(181.690:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4348 comm="syz.2.56" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 181.798753][ T31] audit: type=1326 audit(181.700:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4348 comm="syz.2.56" exe="/syz-executor" sig=0 arch=40000028 syscall=180 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 181.803769][ T31] audit: type=1326 audit(181.700:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4348 comm="syz.2.56" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 199.199696][ T4361] wg2: entered promiscuous mode [ 199.200278][ T4361] wg2: entered allmulticast mode [ 203.294296][ T4363] pim6reg1: entered promiscuous mode [ 203.294756][ T4363] pim6reg1: entered allmulticast mode [ 203.539347][ T12] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 203.724696][ T12] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 203.744793][ T31] audit: type=1326 audit(203.650:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4370 comm="syz.2.60" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 203.759303][ T31] audit: type=1326 audit(203.670:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4370 comm="syz.2.60" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 203.871442][ T31] audit: type=1326 audit(203.780:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4370 comm="syz.2.60" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 203.882530][ T31] audit: type=1326 audit(203.780:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4370 comm="syz.2.60" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 203.883003][ T31] audit: type=1326 audit(203.780:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4370 comm="syz.2.60" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 203.883095][ T31] audit: type=1326 audit(203.790:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4370 comm="syz.2.60" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 203.885806][ T31] audit: type=1326 audit(203.790:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4370 comm="syz.2.60" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 203.886795][ T31] audit: type=1326 audit(203.790:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4370 comm="syz.2.60" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 203.923401][ T31] audit: type=1326 audit(203.810:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4370 comm="syz.2.60" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 204.039497][ T31] audit: type=1326 audit(203.930:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4370 comm="syz.2.60" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 204.104711][ T12] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 204.196347][ T12] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 204.983826][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 205.034030][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 205.046881][ T12] bond0 (unregistering): Released all slaves [ 205.191557][ T12] hsr_slave_0: left promiscuous mode [ 205.193969][ T12] hsr_slave_1: left promiscuous mode [ 205.207377][ T12] veth1_macvtap: left promiscuous mode [ 205.210041][ T12] veth0_macvtap: left promiscuous mode [ 205.213042][ T12] veth1_vlan: left promiscuous mode [ 205.213638][ T12] veth0_vlan: left promiscuous mode [ 230.671509][ T31] kauditd_printk_skb: 59 callbacks suppressed [ 230.671976][ T31] audit: type=1400 audit(230.580:310): avc: denied { mounton } for pid=4471 comm="syz.0.68" path="/37/file0" dev="tmpfs" ino=206 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 231.750632][ T31] audit: type=1400 audit(231.660:311): avc: denied { execute } for pid=4471 comm="syz.0.68" dev="tmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 231.753371][ T4472] process 'syz.0.68' launched '/dev/fd/5' with NULL argv: empty string added [ 231.755892][ T31] audit: type=1400 audit(231.660:312): avc: denied { execute_no_trans } for pid=4471 comm="syz.0.68" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 231.802945][ T31] audit: type=1400 audit(231.710:313): avc: denied { unmount } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 236.598238][ T31] audit: type=1400 audit(236.500:314): avc: denied { ioctl } for pid=4493 comm="syz.0.72" path="socket:[2903]" dev="sockfs" ino=2903 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 236.994519][ T31] audit: type=1400 audit(236.900:315): avc: denied { map } for pid=4493 comm="syz.0.72" path="socket:[2906]" dev="sockfs" ino=2906 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 248.199537][ T31] audit: type=1400 audit(248.110:316): avc: denied { ioctl } for pid=4514 comm="syz.0.73" path="socket:[2914]" dev="sockfs" ino=2914 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 248.200598][ T4515] syzkaller0: entered promiscuous mode [ 248.200722][ T4515] syzkaller0: entered allmulticast mode [ 253.392408][ T4538] veth0_vlan: entered allmulticast mode [ 258.874790][ T4539] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 258.915777][ T4539] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 261.360965][ T4539] hsr_slave_0: entered promiscuous mode [ 261.365711][ T4539] hsr_slave_1: entered promiscuous mode [ 261.369024][ T4539] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 261.370073][ T4539] Cannot create hsr debugfs directory [ 262.124436][ T4539] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 262.145621][ T4539] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 262.154358][ T4539] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 262.175134][ T4539] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 265.684559][ T4539] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.771655][ T4539] veth0_vlan: entered promiscuous mode [ 271.811442][ T4539] veth1_vlan: entered promiscuous mode [ 271.922463][ T4539] veth0_macvtap: entered promiscuous mode [ 271.940998][ T4539] veth1_macvtap: entered promiscuous mode [ 272.042277][ T4539] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 272.042689][ T4539] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 272.044637][ T4539] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 272.045080][ T4539] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 272.972522][ T31] audit: type=1400 audit(272.880:317): avc: denied { create } for pid=4886 comm="syz.3.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 276.129106][ T31] audit: type=1400 audit(276.030:318): avc: denied { connect } for pid=4914 comm="syz.3.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 277.166563][ T31] audit: type=1400 audit(277.070:319): avc: denied { read } for pid=4939 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 277.558347][ T31] audit: type=1400 audit(277.460:320): avc: denied { map_create } for pid=4941 comm="syz.3.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 277.596386][ T31] audit: type=1400 audit(277.500:321): avc: denied { map_read map_write } for pid=4941 comm="syz.3.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 277.602663][ T31] audit: type=1400 audit(277.510:322): avc: denied { prog_load } for pid=4941 comm="syz.3.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 277.620744][ T31] audit: type=1400 audit(277.530:323): avc: denied { bpf } for pid=4941 comm="syz.3.85" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 277.621045][ T31] audit: type=1400 audit(277.530:324): avc: denied { perfmon } for pid=4941 comm="syz.3.85" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 277.621332][ T31] audit: type=1400 audit(277.530:325): avc: denied { prog_run } for pid=4941 comm="syz.3.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 277.871039][ T31] audit: type=1400 audit(277.780:326): avc: denied { append } for pid=4943 comm="syz.3.86" name="001" dev="devtmpfs" ino=687 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 291.504395][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 291.504770][ T31] audit: type=1400 audit(291.410:330): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 291.520343][ T31] audit: type=1400 audit(291.420:331): avc: denied { open } for pid=3102 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 291.520781][ T31] audit: type=1400 audit(291.420:332): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 295.570121][ T31] audit: type=1400 audit(295.480:333): avc: denied { create } for pid=4948 comm="syz.0.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 295.575738][ T31] audit: type=1400 audit(295.480:334): avc: denied { write } for pid=4948 comm="syz.0.87" path="/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 295.630260][ T31] audit: type=1400 audit(295.540:335): avc: denied { create } for pid=4948 comm="syz.0.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 295.634213][ T31] audit: type=1400 audit(295.540:336): avc: denied { write } for pid=4948 comm="syz.0.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 301.788213][ T31] audit: type=1400 audit(301.690:337): avc: denied { map } for pid=4954 comm="syz.3.89" path="socket:[3939]" dev="sockfs" ino=3939 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 302.077350][ T31] audit: type=1400 audit(301.980:338): avc: denied { create } for pid=4956 comm="syz.3.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 302.098326][ T31] audit: type=1400 audit(302.000:339): avc: denied { connect } for pid=4956 comm="syz.3.90" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 306.254133][ T31] audit: type=1400 audit(306.160:340): avc: denied { read } for pid=4961 comm="syz.3.92" dev="nsfs" ino=4026532660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 306.256461][ T31] audit: type=1400 audit(306.160:341): avc: denied { open } for pid=4961 comm="syz.3.92" path="net:[4026532660]" dev="nsfs" ino=4026532660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 306.272430][ T31] audit: type=1400 audit(306.180:342): avc: denied { create } for pid=4961 comm="syz.3.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 306.338879][ T31] audit: type=1400 audit(306.240:343): avc: denied { read } for pid=4961 comm="syz.3.92" path="socket:[3954]" dev="sockfs" ino=3954 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 310.594881][ T31] audit: type=1400 audit(310.500:344): avc: denied { allowed } for pid=4963 comm="syz.3.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 310.617238][ T31] audit: type=1400 audit(310.520:345): avc: denied { create } for pid=4963 comm="syz.3.93" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 310.620778][ T31] audit: type=1400 audit(310.530:346): avc: denied { map } for pid=4963 comm="syz.3.93" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4195 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 310.629170][ T31] audit: type=1400 audit(310.540:347): avc: denied { read write } for pid=4963 comm="syz.3.93" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4195 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 335.623259][ T12] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 335.771422][ T12] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 335.942952][ T12] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 336.059605][ T12] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 336.639655][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 336.653227][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 336.662378][ T12] bond0 (unregistering): Released all slaves [ 336.771358][ T12] hsr_slave_0: left promiscuous mode [ 336.779778][ T12] hsr_slave_1: left promiscuous mode [ 336.800514][ T12] veth1_macvtap: left promiscuous mode [ 336.801777][ T12] veth0_macvtap: left promiscuous mode [ 336.804159][ T12] veth1_vlan: left promiscuous mode [ 336.806025][ T12] veth0_vlan: left promiscuous mode [ 337.279239][ T31] audit: type=1400 audit(337.180:348): avc: denied { execute } for pid=4987 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 337.303453][ T31] audit: type=1400 audit(337.210:349): avc: denied { execute_no_trans } for pid=4987 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 337.454937][ T31] audit: type=1400 audit(337.360:350): avc: denied { mounton } for pid=4988 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 337.584228][ T31] audit: type=1400 audit(337.480:351): avc: denied { module_request } for pid=4988 comm="syz-executor" kmod="netdev-nr4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 337.967165][ T31] audit: type=1400 audit(337.870:352): avc: denied { sys_module } for pid=4988 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 338.211099][ T31] audit: type=1400 audit(338.120:353): avc: denied { write } for pid=4990 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 338.213616][ T31] audit: type=1400 audit(338.120:354): avc: denied { open } for pid=4990 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 338.988324][ T31] audit: type=1400 audit(338.890:355): avc: denied { search } for pid=4993 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 338.990696][ T31] audit: type=1400 audit(338.890:356): avc: denied { search } for pid=4993 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 338.995141][ T31] audit: type=1400 audit(338.890:357): avc: denied { search } for pid=4993 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 342.321206][ T4988] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 342.335357][ T4988] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 344.110388][ T4988] hsr_slave_0: entered promiscuous mode [ 344.119789][ T4988] hsr_slave_1: entered promiscuous mode [ 344.121403][ T4988] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 344.121695][ T4988] Cannot create hsr debugfs directory [ 344.775942][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 344.776352][ T31] audit: type=1400 audit(344.680:371): avc: denied { write } for pid=4988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 344.779796][ T31] audit: type=1400 audit(344.690:372): avc: denied { read } for pid=4988 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 344.782943][ T4988] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 344.802189][ T4988] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 344.832369][ T4988] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 344.860527][ T4988] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 346.165784][ T4988] 8021q: adding VLAN 0 to HW filter on device bond0 [ 349.555154][ T5364] netlink: 32 bytes leftover after parsing attributes in process `syz.3.96'. [ 350.123549][ T31] audit: type=1326 audit(350.030:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.3.99" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 350.138495][ T31] audit: type=1326 audit(350.040:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.3.99" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 350.151860][ T31] audit: type=1326 audit(350.060:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.3.99" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 350.152239][ T31] audit: type=1326 audit(350.060:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.3.99" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 350.183194][ T31] audit: type=1326 audit(350.090:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.3.99" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 350.188284][ T31] audit: type=1326 audit(350.090:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.3.99" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 350.190980][ T31] audit: type=1326 audit(350.090:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.3.99" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 350.194731][ T31] audit: type=1326 audit(350.090:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.3.99" exe="/syz-executor" sig=0 arch=40000028 syscall=233 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 350.196503][ T31] audit: type=1326 audit(350.090:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.3.99" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 350.198857][ T31] audit: type=1326 audit(350.090:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.3.99" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 352.505707][ T4988] veth0_vlan: entered promiscuous mode [ 352.548458][ T4988] veth1_vlan: entered promiscuous mode [ 352.664314][ T4988] veth0_macvtap: entered promiscuous mode [ 352.689291][ T4988] veth1_macvtap: entered promiscuous mode [ 352.850667][ T4988] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 352.852117][ T4988] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 352.853189][ T4988] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 352.855536][ T4988] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 355.688659][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 355.689125][ T31] audit: type=1400 audit(355.520:407): avc: denied { unmount } for pid=5419 comm="syz.4.107" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 367.297462][ T5462] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 367.310109][ T5462] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 375.178923][ T31] audit: type=1400 audit(375.070:408): avc: denied { read write } for pid=5473 comm="syz.3.116" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 375.228582][ T31] audit: type=1400 audit(375.070:409): avc: denied { open } for pid=5473 comm="syz.3.116" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 375.268025][ T31] audit: type=1400 audit(375.170:410): avc: denied { name_bind } for pid=5473 comm="syz.3.116" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 375.339963][ T31] audit: type=1400 audit(375.220:411): avc: denied { node_bind } for pid=5473 comm="syz.3.116" saddr=::ffff:127.0.0.1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 376.159015][ T5478] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 376.161977][ T5478] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 376.178375][ T31] audit: type=1326 audit(376.080:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5477 comm="syz.3.118" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 376.183984][ T31] audit: type=1326 audit(376.090:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5477 comm="syz.3.118" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 376.198619][ T31] audit: type=1326 audit(376.100:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5477 comm="syz.3.118" exe="/syz-executor" sig=0 arch=40000028 syscall=105 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 376.199085][ T31] audit: type=1326 audit(376.100:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5477 comm="syz.3.118" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 376.199394][ T31] audit: type=1326 audit(376.110:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5477 comm="syz.3.118" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 376.205492][ T31] audit: type=1326 audit(376.110:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5477 comm="syz.3.118" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x13198c code=0x7ffc0000 [ 377.251401][ T5484] netlink: 96 bytes leftover after parsing attributes in process `syz.3.120'. [ 381.278496][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 381.278899][ T31] audit: type=1400 audit(380.930:447): avc: denied { create } for pid=5485 comm="syz.3.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 381.279203][ T31] audit: type=1400 audit(380.970:448): avc: denied { setopt } for pid=5485 comm="syz.3.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 393.382014][ T5490] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 393.390582][ T5490] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 400.286259][ T31] audit: type=1400 audit(400.190:449): avc: denied { execute } for pid=5500 comm="syz.3.126" name="file0" dev="tmpfs" ino=220 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 400.304282][ T31] audit: type=1400 audit(400.210:450): avc: denied { execute_no_trans } for pid=5500 comm="syz.3.126" path="/40/file0" dev="tmpfs" ino=220 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 405.091981][ T5504] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 405.110616][ T5504] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 407.773202][ T5504] hsr_slave_0: entered promiscuous mode [ 407.778635][ T5504] hsr_slave_1: entered promiscuous mode [ 407.781037][ T5504] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 407.798728][ T5504] Cannot create hsr debugfs directory [ 408.816648][ T5504] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 408.851718][ T5504] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 408.888724][ T5504] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 408.912595][ T5504] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 410.815199][ T5504] 8021q: adding VLAN 0 to HW filter on device bond0 [ 417.042812][ T5504] veth0_vlan: entered promiscuous mode [ 417.100133][ T5504] veth1_vlan: entered promiscuous mode [ 417.225965][ T5504] veth0_macvtap: entered promiscuous mode [ 417.252450][ T5504] veth1_macvtap: entered promiscuous mode [ 417.366230][ T5504] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 417.366745][ T5504] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 417.378599][ T5504] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 417.379099][ T5504] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 417.861445][ T31] audit: type=1400 audit(417.770:451): avc: denied { name_bind } for pid=5857 comm="syz.5.127" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 420.661372][ T31] audit: type=1400 audit(420.570:452): avc: denied { name_bind 0x1000000 } for pid=5886 comm=5B5B2D5C8D25BC2B path="socket:[5771]" dev="sockfs" ino=5771 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 420.688633][ T31] audit: type=1400 audit(420.600:453): avc: denied { name_bind } for pid=5886 comm=5B5B2D5C8D25BC2B src=1024 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 421.413768][ T2949] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 421.520865][ T2949] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 421.616469][ T2949] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 421.671384][ T2949] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 421.875037][ T2949] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 421.885084][ T2949] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 421.892277][ T2949] bond0 (unregistering): Released all slaves [ 421.965510][ T2949] hsr_slave_0: left promiscuous mode [ 421.967958][ T2949] hsr_slave_1: left promiscuous mode [ 421.982472][ T2949] veth1_macvtap: left promiscuous mode [ 421.983593][ T2949] veth0_macvtap: left promiscuous mode [ 421.984235][ T2949] veth1_vlan: left promiscuous mode [ 422.664785][ T31] audit: type=1400 audit(422.570:454): avc: denied { ioctl } for pid=5884 comm="syz.5.130" path="/dev/binderfs/binder0" dev="binder" ino=13 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 437.666306][ T5946] wg2: entered promiscuous mode [ 437.676287][ T5946] wg2: entered allmulticast mode [ 458.530782][ T5981] x_tables: duplicate underflow at hook 4 [ 472.331291][ T5999] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 472.340344][ T5999] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 474.660651][ T5999] hsr_slave_0: entered promiscuous mode [ 474.679580][ T5999] hsr_slave_1: entered promiscuous mode [ 475.460884][ T5999] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 475.474996][ T5999] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 475.503281][ T5999] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 475.541758][ T5999] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 477.473875][ T5999] 8021q: adding VLAN 0 to HW filter on device bond0 [ 482.781211][ T2949] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 482.862401][ T2949] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 482.925053][ T2949] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.016518][ T2949] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.303330][ T2949] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 483.315753][ T2949] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 483.322302][ T2949] bond0 (unregistering): Released all slaves [ 483.365424][ T5999] veth0_vlan: entered promiscuous mode [ 483.417234][ T2949] hsr_slave_0: left promiscuous mode [ 483.421980][ T2949] hsr_slave_1: left promiscuous mode [ 483.432802][ T2949] veth1_macvtap: left promiscuous mode [ 483.434001][ T2949] veth0_macvtap: left promiscuous mode [ 483.436586][ T2949] veth1_vlan: left promiscuous mode [ 483.439678][ T2949] veth0_vlan: left promiscuous mode [ 483.701022][ T5999] veth1_vlan: entered promiscuous mode [ 483.805714][ T5999] veth0_macvtap: entered promiscuous mode [ 483.833622][ T5999] veth1_macvtap: entered promiscuous mode [ 483.915505][ T5999] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 483.917443][ T5999] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 483.924820][ T5999] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 483.931353][ T5999] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 509.884858][ T31] audit: type=1400 audit(509.790:455): avc: denied { load_policy } for pid=6436 comm="syz.3.146" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 509.898298][ T6437] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 509.899303][ T6437] SELinux: failed to load policy [ 510.128529][ T31] audit: type=1400 audit(510.030:456): avc: denied { create } for pid=6438 comm="syz.3.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 510.130737][ T31] audit: type=1400 audit(510.040:457): avc: denied { ioctl } for pid=6438 comm="syz.3.148" path="socket:[7189]" dev="sockfs" ino=7189 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 510.136095][ T31] audit: type=1400 audit(510.040:458): avc: denied { write } for pid=6438 comm="syz.3.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 510.211904][ T31] audit: type=1400 audit(510.120:459): avc: denied { ioctl } for pid=6441 comm="syz.6.147" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 510.542268][ T31] audit: type=1400 audit(510.450:460): avc: denied { ioctl } for pid=6443 comm="syz.3.149" path="socket:[6386]" dev="sockfs" ino=6386 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 518.465605][ T31] audit: type=1400 audit(518.370:461): avc: denied { create } for pid=6458 comm="syz.6.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 518.466020][ T31] audit: type=1400 audit(518.370:462): avc: denied { write } for pid=6458 comm="syz.6.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 518.466240][ T31] audit: type=1400 audit(518.370:463): avc: denied { nlmsg_write } for pid=6458 comm="syz.6.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 532.813463][ T31] audit: type=1400 audit(532.720:464): avc: denied { set_context_mgr } for pid=6472 comm="syz.3.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 537.351111][ T6475] binder_alloc: 6472: binder_alloc_buf, no vma [ 537.358212][ T31] audit: type=1400 audit(537.260:465): avc: denied { call } for pid=6472 comm="syz.3.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 545.835512][ T4908] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 545.913875][ T4908] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 545.967065][ T4908] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 546.042740][ T4908] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 546.418106][ T4908] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 546.438649][ T4908] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 546.446001][ T4908] bond0 (unregistering): Released all slaves [ 546.540047][ T4908] hsr_slave_0: left promiscuous mode [ 546.543053][ T4908] hsr_slave_1: left promiscuous mode [ 546.565957][ T4908] veth1_macvtap: left promiscuous mode [ 546.566949][ T4908] veth0_macvtap: left promiscuous mode [ 546.569148][ T4908] veth1_vlan: left promiscuous mode [ 546.570121][ T4908] veth0_vlan: left promiscuous mode [ 563.627158][ T31] audit: type=1400 audit(563.530:466): avc: denied { setopt } for pid=6540 comm="syz.3.159" lport=59 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 570.912748][ T6547] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 570.916345][ T6547] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 573.261478][ T6547] hsr_slave_0: entered promiscuous mode [ 573.267128][ T6547] hsr_slave_1: entered promiscuous mode [ 573.300247][ T6547] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 573.300683][ T6547] Cannot create hsr debugfs directory [ 574.229399][ T6547] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 574.320976][ T6547] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 574.335226][ T6547] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 574.448931][ T6547] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 577.229512][ T6547] 8021q: adding VLAN 0 to HW filter on device bond0 [ 585.780548][ T6547] veth0_vlan: entered promiscuous mode [ 585.831835][ T6547] veth1_vlan: entered promiscuous mode [ 585.960713][ T6547] veth0_macvtap: entered promiscuous mode [ 586.060546][ T6547] veth1_macvtap: entered promiscuous mode [ 586.361256][ T6547] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.361707][ T6547] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.362041][ T6547] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.362183][ T6547] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.278786][ T6934] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 587.279803][ T6934] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 588.615750][ T31] audit: type=1400 audit(588.520:467): avc: denied { watch watch_reads } for pid=6942 comm="syz.7.166" path="/2" dev="tmpfs" ino=24 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 590.093105][ T6949] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 590.096843][ T6949] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 590.183595][ T6949] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 590.198803][ T6949] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 590.489073][ T31] audit: type=1400 audit(590.390:468): avc: denied { create } for pid=6954 comm="syz.7.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 593.518541][ T31] audit: type=1400 audit(593.420:469): avc: denied { write } for pid=6960 comm="syz.7.170" name="ip_mr_vif" dev="proc" ino=4026532986 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 607.359799][ T6989] veth0: entered promiscuous mode [ 607.365518][ T6989] netlink: 4 bytes leftover after parsing attributes in process `syz.7.177'. [ 607.856130][ T6995] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 607.935717][ T31] audit: type=1400 audit(607.840:470): avc: denied { ioctl } for pid=6994 comm="syz.7.178" path="socket:[7778]" dev="sockfs" ino=7778 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 611.682666][ T31] audit: type=1326 audit(611.590:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.7.184" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 611.718540][ T31] audit: type=1326 audit(611.620:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.7.184" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 611.719101][ T31] audit: type=1326 audit(611.620:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.7.184" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 611.728351][ T31] audit: type=1326 audit(611.630:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.7.184" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 611.751295][ T31] audit: type=1326 audit(611.660:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.7.184" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 611.769821][ T31] audit: type=1326 audit(611.680:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.7.184" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 611.770240][ T31] audit: type=1326 audit(611.680:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.7.184" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 611.775611][ T31] audit: type=1326 audit(611.680:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.7.184" exe="/syz-executor" sig=0 arch=40000028 syscall=50 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 611.776709][ T31] audit: type=1326 audit(611.680:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.7.184" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 614.515676][ T7017] netlink: 12 bytes leftover after parsing attributes in process `syz.7.187'. [ 618.894461][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 618.900011][ T31] audit: type=1326 audit(618.800:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 618.928460][ T31] audit: type=1326 audit(618.830:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 618.928990][ T31] audit: type=1326 audit(618.830:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.192" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 618.929392][ T31] audit: type=1326 audit(618.830:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 618.929671][ T31] audit: type=1326 audit(618.830:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 618.929950][ T31] audit: type=1326 audit(618.830:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.192" exe="/syz-executor" sig=0 arch=40000028 syscall=431 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 618.958477][ T31] audit: type=1400 audit(618.860:487): avc: denied { mount } for pid=7037 comm="syz.3.192" name="/" dev="ramfs" ino=7830 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 618.961147][ T31] audit: type=1326 audit(618.860:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 618.963451][ T31] audit: type=1326 audit(618.860:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7037 comm="syz.3.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 619.179955][ T31] audit: type=1400 audit(619.090:490): avc: denied { mount } for pid=7040 comm="syz.3.193" name="/" dev="configfs" ino=96 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 642.795593][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 642.808219][ T31] audit: type=1400 audit(642.700:499): avc: denied { write } for pid=7065 comm="syz.3.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 648.510187][ T4908] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 648.710473][ T4908] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 648.830389][ T4908] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 648.874141][ T4908] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 649.361468][ T4908] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 649.378315][ T4908] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 649.383735][ T4908] bond0 (unregistering): Released all slaves [ 649.510771][ T4908] hsr_slave_0: left promiscuous mode [ 649.522103][ T4908] hsr_slave_1: left promiscuous mode [ 649.549347][ T4908] veth1_macvtap: left promiscuous mode [ 649.549934][ T4908] veth0_macvtap: left promiscuous mode [ 649.550223][ T4908] veth1_vlan: left promiscuous mode [ 649.550410][ T4908] veth0_vlan: left promiscuous mode [ 667.511211][ T7122] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 667.516858][ T7122] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 668.850363][ T7122] hsr_slave_0: entered promiscuous mode [ 668.852975][ T7122] hsr_slave_1: entered promiscuous mode [ 669.382481][ T7122] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 669.395001][ T7122] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 669.406587][ T7122] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 669.417212][ T7122] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 670.456040][ T7122] 8021q: adding VLAN 0 to HW filter on device bond0 [ 671.390599][ T7122] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 675.842698][ T7122] veth0_vlan: entered promiscuous mode [ 675.869852][ T7122] veth1_vlan: entered promiscuous mode [ 675.962384][ T7122] veth0_macvtap: entered promiscuous mode [ 676.000364][ T7122] veth1_macvtap: entered promiscuous mode [ 676.112634][ T7122] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 676.112908][ T7122] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 676.129701][ T7122] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 676.130104][ T7122] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 684.338292][ T31] audit: type=1400 audit(684.240:500): avc: denied { create } for pid=7516 comm="syz.8.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 693.470357][ T7523] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 693.483588][ T7523] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 695.975347][ T7523] hsr_slave_0: entered promiscuous mode [ 695.977188][ T7523] hsr_slave_1: entered promiscuous mode [ 695.990023][ T7523] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 695.993403][ T7523] Cannot create hsr debugfs directory [ 696.833750][ T7523] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 696.866909][ T7523] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 696.932675][ T7523] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 696.971738][ T7523] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 698.927100][ T7523] 8021q: adding VLAN 0 to HW filter on device bond0 [ 708.774073][ T7523] veth0_vlan: entered promiscuous mode [ 708.871453][ T7523] veth1_vlan: entered promiscuous mode [ 709.145973][ T7523] veth0_macvtap: entered promiscuous mode [ 709.192744][ T7523] veth1_macvtap: entered promiscuous mode [ 709.443129][ T7523] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 709.448724][ T7523] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 709.449154][ T7523] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 709.449410][ T7523] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 710.162829][ T7885] syz.9.209 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 713.093672][ T7901] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 713.118869][ T7901] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 714.758477][ T31] audit: type=1400 audit(714.650:501): avc: denied { create } for pid=7910 comm="syz.9.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 714.759061][ T31] audit: type=1400 audit(714.650:502): avc: denied { accept } for pid=7910 comm="syz.9.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 722.273837][ T31] audit: type=1326 audit(722.180:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7921 comm="syz.8.224" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x0 [ 723.280742][ T31] audit: type=1400 audit(723.180:504): avc: denied { create } for pid=7921 comm="syz.8.224" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 724.430673][ T7931] fuse: Bad value for 'fd' [ 724.431620][ T31] audit: type=1400 audit(724.340:505): avc: denied { mounton } for pid=7927 comm="syz.9.225" path="/12/file0" dev="tmpfs" ino=79 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 724.823814][ T31] audit: type=1400 audit(724.730:506): avc: denied { unlink } for pid=7122 comm="syz-executor" name="file0" dev="tmpfs" ino=69 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 728.908579][ T31] audit: type=1400 audit(728.810:507): avc: denied { ioctl } for pid=7944 comm="syz.9.230" path="socket:[9430]" dev="sockfs" ino=9430 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 728.928713][ T7945] syzkaller0: entered promiscuous mode [ 728.929822][ T7945] syzkaller0: entered allmulticast mode [ 736.338115][ T7961] input: syz1 as /devices/virtual/input/input4 [ 748.668579][ T31] audit: type=1400 audit(748.570:508): avc: denied { write } for pid=7967 comm="syz.8.233" path="socket:[9447]" dev="sockfs" ino=9447 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 748.887527][ T31] audit: type=1400 audit(748.790:509): avc: denied { setopt } for pid=7969 comm="syz.8.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 748.915544][ T31] audit: type=1400 audit(748.820:510): avc: denied { bind } for pid=7969 comm="syz.8.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 752.205479][ T2949] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 752.269364][ T2949] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 752.319318][ T2949] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 752.371109][ T2949] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 752.479079][ T31] audit: type=1400 audit(752.340:511): avc: denied { mounton } for pid=7971 comm="syz.8.235" path="/14/file0" dev="tmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 753.088603][ T2949] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 753.104579][ T2949] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 753.122262][ T2949] bond0 (unregistering): Released all slaves [ 753.224280][ T2949] hsr_slave_0: left promiscuous mode [ 753.230618][ T2949] hsr_slave_1: left promiscuous mode [ 753.251947][ T2949] veth1_macvtap: left promiscuous mode [ 753.252495][ T2949] veth0_macvtap: left promiscuous mode [ 753.252749][ T2949] veth1_vlan: left promiscuous mode [ 753.252921][ T2949] veth0_vlan: left promiscuous mode [ 769.879752][ T8032] serio: Serial port ptm0 [ 771.485871][ T31] audit: type=1404 audit(771.390:512): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 771.557305][ T31] audit: type=1404 audit(771.460:513): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 772.626452][ T31] audit: type=1400 audit(772.530:514): avc: denied { execmem } for pid=8048 comm="syz.8.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 775.429257][ T31] audit: type=1400 audit(775.330:515): avc: denied { execute } for pid=8050 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 775.429688][ T31] audit: type=1400 audit(775.330:516): avc: denied { execute_no_trans } for pid=8050 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 775.568111][ T31] audit: type=1400 audit(775.470:517): avc: denied { read } for pid=8051 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 775.569970][ T31] audit: type=1400 audit(775.470:518): avc: denied { open } for pid=8051 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 775.602153][ T31] audit: type=1400 audit(775.510:519): avc: denied { mounton } for pid=8051 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 775.652242][ T31] audit: type=1400 audit(775.560:520): avc: denied { module_request } for pid=8051 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 776.058374][ T31] audit: type=1400 audit(775.960:521): avc: denied { sys_module } for pid=8051 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 776.509801][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 776.528207][ T31] audit: type=1400 audit(776.400:528): avc: denied { read open } for pid=8056 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 776.528674][ T31] audit: type=1400 audit(776.400:529): avc: denied { getattr } for pid=8056 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 776.918625][ T31] audit: type=1400 audit(776.820:530): avc: denied { add_name } for pid=8053 comm="dhcpcd-run-hook" name="resolv.conf.eth28.ipv4ll" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 776.958558][ T31] audit: type=1400 audit(776.850:531): avc: denied { create } for pid=8053 comm="dhcpcd-run-hook" name="resolv.conf.eth28.ipv4ll" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 776.959002][ T31] audit: type=1400 audit(776.850:532): avc: denied { write open } for pid=8053 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth28.ipv4ll" dev="tmpfs" ino=87 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 776.959315][ T31] audit: type=1400 audit(776.850:533): avc: denied { append } for pid=8053 comm="dhcpcd-run-hook" name="resolv.conf.eth28.ipv4ll" dev="tmpfs" ino=87 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 776.988331][ T31] audit: type=1400 audit(776.890:534): avc: denied { getattr } for pid=8053 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 777.067497][ T31] audit: type=1400 audit(776.970:535): avc: denied { getattr } for pid=8053 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 777.080965][ T31] audit: type=1400 audit(776.980:536): avc: denied { ioctl } for pid=8053 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 777.495043][ T31] audit: type=1400 audit(777.400:537): avc: denied { read } for pid=8059 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 779.761752][ T4908] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 779.931681][ T4908] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 780.090944][ T4908] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 780.254527][ T4908] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 781.119977][ T4908] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 781.125573][ T4908] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 781.219470][ T4908] bond0 (unregistering): Released all slaves [ 781.888637][ T4908] hsr_slave_0: left promiscuous mode [ 781.891622][ T4908] hsr_slave_1: left promiscuous mode [ 781.907057][ T4908] veth1_macvtap: left promiscuous mode [ 781.910934][ T4908] veth0_macvtap: left promiscuous mode [ 781.911521][ T4908] veth1_vlan: left promiscuous mode [ 781.911782][ T4908] veth0_vlan: left promiscuous mode [ 783.192169][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 783.192829][ T31] audit: type=1400 audit(783.100:549): avc: denied { create } for pid=8195 comm="syz.8.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 783.230265][ T31] audit: type=1400 audit(783.140:550): avc: denied { write } for pid=8195 comm="syz.8.247" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 783.685861][ T31] audit: type=1400 audit(783.590:551): avc: denied { load_policy } for pid=8214 comm="syz.8.248" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 784.842061][ T8051] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 784.873107][ T8051] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 788.090895][ T8051] hsr_slave_0: entered promiscuous mode [ 788.093731][ T8051] hsr_slave_1: entered promiscuous mode [ 788.098926][ T8051] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 788.113207][ T8051] Cannot create hsr debugfs directory [ 789.594165][ T8051] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 789.599998][ T31] audit: type=1400 audit(789.500:552): avc: denied { create } for pid=8051 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 789.609353][ T31] audit: type=1400 audit(789.500:553): avc: denied { write } for pid=8051 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 789.612421][ T31] audit: type=1400 audit(789.500:554): avc: denied { read } for pid=8051 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 789.621140][ T8051] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 789.645419][ T8051] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 789.671596][ T8051] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 790.504561][ T31] audit: type=1400 audit(790.410:555): avc: denied { create } for pid=8218 comm="syz.8.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 791.916007][ T8051] 8021q: adding VLAN 0 to HW filter on device bond0 [ 799.652249][ T8051] veth0_vlan: entered promiscuous mode [ 799.683563][ T8051] veth1_vlan: entered promiscuous mode [ 799.814227][ T8051] veth0_macvtap: entered promiscuous mode [ 799.836842][ T8051] veth1_macvtap: entered promiscuous mode [ 799.951351][ T8051] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 799.958664][ T8051] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 799.959797][ T8051] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 799.960956][ T8051] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 800.139543][ T31] audit: type=1400 audit(800.040:556): avc: denied { mounton } for pid=8051 comm="syz-executor" path="/syzkaller.vwltEa/syz-tmp" dev="vda" ino=824 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 800.141451][ T31] audit: type=1400 audit(800.040:557): avc: denied { mount } for pid=8051 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 800.143326][ T31] audit: type=1400 audit(800.040:558): avc: denied { mounton } for pid=8051 comm="syz-executor" path="/syzkaller.vwltEa/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 800.145095][ T31] audit: type=1400 audit(800.040:559): avc: denied { mount } for pid=8051 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 800.161949][ T31] audit: type=1400 audit(800.070:560): avc: denied { mounton } for pid=8051 comm="syz-executor" path="/syzkaller.vwltEa/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 800.166100][ T31] audit: type=1400 audit(800.070:561): avc: denied { mounton } for pid=8051 comm="syz-executor" path="/syzkaller.vwltEa/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=8978 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 800.193166][ T31] audit: type=1400 audit(800.100:562): avc: denied { unmount } for pid=8051 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 800.269662][ T31] audit: type=1400 audit(800.180:563): avc: denied { mounton } for pid=8051 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=770 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 800.272141][ T31] audit: type=1400 audit(800.180:564): avc: denied { mount } for pid=8051 comm="syz-executor" name="/" dev="gadgetfs" ino=1886 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 800.281081][ T31] audit: type=1400 audit(800.190:565): avc: denied { mount } for pid=8051 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 804.410369][ T3863] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 804.568608][ T3863] usb 2-1: Using ep0 maxpacket: 16 [ 804.583514][ T3863] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 804.584861][ T3863] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 804.586139][ T3863] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 804.589084][ T3863] usb 2-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 804.590111][ T3863] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 804.595903][ T3863] usb 2-1: config 0 descriptor?? [ 805.094847][ T3863] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 805.109536][ T3863] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 805.110752][ T3863] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 805.111749][ T3863] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 805.112734][ T3863] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 805.113679][ T3863] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 805.114648][ T3863] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 805.115601][ T3863] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 805.116633][ T3863] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 805.121081][ T3863] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 805.122272][ T3863] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 805.128646][ T3863] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 805.129695][ T3863] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 805.131463][ T3863] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 805.132450][ T3863] microsoft 0003:045E:07DA.0001: unknown main item tag 0x0 [ 805.178737][ T3863] input: HID 045e:07da as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:045E:07DA.0001/input/input5 [ 805.199742][ T3863] microsoft 0003:045E:07DA.0001: input,hidraw0: USB HID v0.00 Device [HID 045e:07da] on usb-dummy_hcd.1-1/input0 [ 805.345756][ T8502] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 805.370712][ T3826] usb 2-1: USB disconnect, device number 2 [ 805.719631][ T8538] capability: warning: `syz.1.252' uses deprecated v2 capabilities in a way that may be insecure [ 805.794481][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 805.794939][ T31] audit: type=1400 audit(805.700:571): avc: denied { name_bind } for pid=8536 comm="syz.1.252" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=udp_socket permissive=1 [ 806.130583][ T31] audit: type=1326 audit(806.030:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8539 comm="syz.1.253" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 806.141749][ T31] audit: type=1326 audit(806.050:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8539 comm="syz.1.253" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 806.144173][ T31] audit: type=1326 audit(806.050:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8539 comm="syz.1.253" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 806.145952][ T31] audit: type=1326 audit(806.050:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8539 comm="syz.1.253" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 806.170566][ T31] audit: type=1326 audit(806.070:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8539 comm="syz.1.253" exe="/syz-executor" sig=0 arch=40000028 syscall=19 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 806.171042][ T31] audit: type=1326 audit(806.070:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8539 comm="syz.1.253" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 816.149263][ T31] audit: type=1400 audit(816.050:578): avc: denied { create } for pid=8574 comm="syz.8.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 816.210368][ T31] audit: type=1400 audit(816.100:579): avc: denied { write } for pid=8574 comm="syz.8.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 816.554501][ T31] audit: type=1400 audit(816.460:580): avc: denied { setopt } for pid=8577 comm="syz.8.258" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 816.594840][ T31] audit: type=1400 audit(816.500:581): avc: denied { read } for pid=8577 comm="syz.8.258" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 838.738347][ T31] audit: type=1400 audit(838.640:582): avc: denied { create } for pid=8641 comm="syz.8.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 838.739012][ T31] audit: type=1400 audit(838.640:583): avc: denied { setopt } for pid=8641 comm="syz.8.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 838.762886][ T31] audit: type=1400 audit(838.660:584): avc: denied { ioctl } for pid=8641 comm="syz.8.261" path="socket:[10005]" dev="sockfs" ino=10005 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 838.850690][ T31] audit: type=1400 audit(838.760:585): avc: denied { bind } for pid=8641 comm="syz.8.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 838.868464][ T31] audit: type=1400 audit(838.770:586): avc: denied { write } for pid=8641 comm="syz.8.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 839.208541][ T31] audit: type=1326 audit(839.110:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8643 comm="syz.8.262" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 839.210507][ T31] audit: type=1326 audit(839.110:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8643 comm="syz.8.262" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 839.219405][ T31] audit: type=1326 audit(839.130:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8643 comm="syz.8.262" exe="/syz-executor" sig=0 arch=40000028 syscall=70 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 839.221418][ T31] audit: type=1326 audit(839.130:590): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8643 comm="syz.8.262" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 839.224605][ T31] audit: type=1326 audit(839.130:591): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8643 comm="syz.8.262" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 839.548225][ T8647] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 839.558641][ T8647] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 844.978546][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 844.978945][ T31] audit: type=1400 audit(844.880:593): avc: denied { read } for pid=8655 comm="syz.8.265" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 844.979219][ T31] audit: type=1400 audit(844.880:594): avc: denied { open } for pid=8655 comm="syz.8.265" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 845.002061][ T31] audit: type=1400 audit(844.910:595): avc: denied { ioctl } for pid=8655 comm="syz.8.265" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 857.806393][ T8684] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 857.831330][ T8684] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 860.613426][ T8684] hsr_slave_0: entered promiscuous mode [ 860.618599][ T8684] hsr_slave_1: entered promiscuous mode [ 860.628339][ T8684] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 860.628575][ T8684] Cannot create hsr debugfs directory [ 862.448998][ T8684] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 862.456054][ T8684] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 862.473832][ T8684] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 862.485963][ T8684] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 864.035064][ T8684] 8021q: adding VLAN 0 to HW filter on device bond0 [ 869.095821][ T4908] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 869.981537][ T4908] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 870.155067][ T4908] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 870.301526][ T4908] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 870.780128][ T4908] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 870.799430][ T4908] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 870.803289][ T4908] bond0 (unregistering): Released all slaves [ 870.921748][ T4908] hsr_slave_0: left promiscuous mode [ 870.929835][ T4908] hsr_slave_1: left promiscuous mode [ 870.948652][ T4908] veth1_macvtap: left promiscuous mode [ 870.949009][ T4908] veth0_macvtap: left promiscuous mode [ 870.949486][ T4908] veth1_vlan: left promiscuous mode [ 870.949713][ T4908] veth0_vlan: left promiscuous mode [ 872.692861][ T8684] veth0_vlan: entered promiscuous mode [ 872.749043][ T8684] veth1_vlan: entered promiscuous mode [ 872.915241][ T8684] veth0_macvtap: entered promiscuous mode [ 872.940827][ T8684] veth1_macvtap: entered promiscuous mode [ 873.101782][ T8684] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 873.102168][ T8684] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 873.111367][ T8684] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 873.111818][ T8684] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 873.865935][ T31] audit: type=1400 audit(873.770:596): avc: denied { connect } for pid=9106 comm="syz.2.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 873.916993][ T31] audit: type=1400 audit(873.810:597): avc: denied { setopt } for pid=9106 comm="syz.2.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 874.376495][ T31] audit: type=1400 audit(874.280:598): avc: denied { ioctl } for pid=9110 comm="syz.2.267" path="socket:[11363]" dev="sockfs" ino=11363 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 874.488609][ T9111] wireguard0: entered promiscuous mode [ 874.488958][ T9111] wireguard0: entered allmulticast mode [ 875.124232][ T9120] SELinux: ebitmap: truncated map [ 875.171733][ T9120] SELinux: failed to load policy [ 876.219374][ T9128] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 876.220418][ T9128] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 876.474382][ T9128] pim6reg1: entered promiscuous mode [ 876.474933][ T9128] pim6reg1: entered allmulticast mode [ 876.952041][ T31] audit: type=1400 audit(876.860:599): avc: denied { create } for pid=9136 comm="syz.2.272" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 876.958320][ T31] audit: type=1400 audit(876.860:600): avc: denied { ioctl } for pid=9136 comm="syz.2.272" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=10398 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 881.288316][ T31] audit: type=1400 audit(881.190:601): avc: denied { execute } for pid=9162 comm="syz.2.277" name="file0" dev="tmpfs" ino=74 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 881.328454][ T31] audit: type=1400 audit(881.190:602): avc: denied { execute_no_trans } for pid=9162 comm="syz.2.277" path="/11/file0" dev="tmpfs" ino=74 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 884.255307][ T31] audit: type=1400 audit(884.160:603): avc: denied { unmount } for pid=8684 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 890.299844][ T4908] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 890.472222][ T4908] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 890.539994][ T4908] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 890.669711][ T4908] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 891.240817][ T4908] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 891.250059][ T4908] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 891.259464][ T4908] bond0 (unregistering): Released all slaves [ 891.423699][ T4908] hsr_slave_0: left promiscuous mode [ 891.430272][ T4908] hsr_slave_1: left promiscuous mode [ 891.454154][ T4908] veth1_macvtap: left promiscuous mode [ 891.454644][ T4908] veth0_macvtap: left promiscuous mode [ 891.455233][ T4908] veth1_vlan: left promiscuous mode [ 891.455408][ T4908] veth0_vlan: left promiscuous mode [ 892.859985][ T9193] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 892.880803][ T9193] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 896.041426][ T9193] hsr_slave_0: entered promiscuous mode [ 896.047081][ T9193] hsr_slave_1: entered promiscuous mode [ 896.052740][ T9193] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 896.053151][ T9193] Cannot create hsr debugfs directory [ 897.454067][ T9193] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 897.511398][ T9193] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 897.542429][ T9193] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 897.590208][ T9193] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 899.760962][ T9193] 8021q: adding VLAN 0 to HW filter on device bond0 [ 908.073601][ T9193] veth0_vlan: entered promiscuous mode [ 908.142193][ T9193] veth1_vlan: entered promiscuous mode [ 908.300818][ T9193] veth0_macvtap: entered promiscuous mode [ 908.330899][ T9193] veth1_macvtap: entered promiscuous mode [ 908.531449][ T9193] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 908.531886][ T9193] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 908.532244][ T9193] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 908.532332][ T9193] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 909.137037][ T31] audit: type=1326 audit(909.040:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9622 comm="syz.0.283" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 909.150079][ T31] audit: type=1326 audit(909.040:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9622 comm="syz.0.283" exe="/syz-executor" sig=0 arch=40000028 syscall=184 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 909.151948][ T31] audit: type=1326 audit(909.040:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9622 comm="syz.0.283" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 914.960098][ T31] audit: type=1400 audit(914.870:607): avc: denied { connect } for pid=9658 comm="syz.2.290" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 916.003460][ T31] audit: type=1400 audit(915.910:608): avc: denied { mounton } for pid=9668 comm="syz.2.293" path="/20/file0" dev="tmpfs" ino=123 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 917.421721][ T9687] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 917.424956][ T9687] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 920.695932][ T9703] Invalid ELF header magic: != ELF [ 920.696973][ T31] audit: type=1400 audit(920.600:609): avc: denied { module_load } for pid=9702 comm="syz.2.299" path="/sys/firmware/fdt" dev="sysfs" ino=35772 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 951.501407][ T31] audit: type=1400 audit(951.410:610): avc: denied { lock } for pid=9799 comm="syz.2.304" path="socket:[10876]" dev="sockfs" ino=10876 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 955.150925][ T31] audit: type=1400 audit(955.060:611): avc: denied { name_bind } for pid=9821 comm="syz.2.308" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 955.153010][ T31] audit: type=1400 audit(955.060:612): avc: denied { node_bind } for pid=9821 comm="syz.2.308" saddr=::1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 955.728883][ T9826] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 955.729949][ T9826] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 957.940515][ T31] audit: type=1400 audit(957.850:613): avc: denied { allowed } for pid=9800 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 981.395145][ T31] audit: type=1400 audit(981.300:614): avc: denied { mount } for pid=9927 comm="syz.0.313" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 981.685198][ T31] audit: type=1400 audit(981.580:615): avc: denied { append } for pid=9938 comm="syz.2.316" name="rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 985.917882][ C1] hrtimer: interrupt took 5716352 ns [ 992.028293][ T31] audit: type=1400 audit(991.930:616): avc: denied { create } for pid=9948 comm="syz.0.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 992.040072][ T31] audit: type=1400 audit(991.940:617): avc: denied { setopt } for pid=9948 comm="syz.0.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 994.785239][ T9079] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 994.888976][ T9079] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 995.100790][ T9079] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 995.185140][ T9079] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 995.563508][ T9079] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 995.569305][ T9079] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 995.579386][ T9079] bond0 (unregistering): Released all slaves [ 995.659518][ T9079] hsr_slave_0: left promiscuous mode [ 995.665706][ T9079] hsr_slave_1: left promiscuous mode [ 995.694790][ T9079] veth1_macvtap: left promiscuous mode [ 995.696367][ T9079] veth0_macvtap: left promiscuous mode [ 995.702585][ T9079] veth1_vlan: left promiscuous mode [ 995.705459][ T9079] veth0_vlan: left promiscuous mode [ 1031.568555][T10034] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1031.582028][T10034] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1036.099682][T10034] hsr_slave_0: entered promiscuous mode [ 1036.103434][T10034] hsr_slave_1: entered promiscuous mode [ 1037.099527][ T2949] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1037.231259][ T2949] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1037.310727][ T2949] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1037.471397][ T2949] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1038.455590][ T2949] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1038.508859][ T2949] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1038.541586][ T2949] bond0 (unregistering): Released all slaves [ 1038.748837][ T2949] hsr_slave_0: left promiscuous mode [ 1038.751704][ T2949] hsr_slave_1: left promiscuous mode [ 1038.780810][ T2949] veth1_macvtap: left promiscuous mode [ 1038.781307][ T2949] veth0_macvtap: left promiscuous mode [ 1038.781567][ T2949] veth1_vlan: left promiscuous mode [ 1038.781743][ T2949] veth0_vlan: left promiscuous mode [ 1040.394597][T10034] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1040.476857][T10034] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1040.546219][T10034] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1040.603029][T10034] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1043.339239][T10034] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1044.279278][T10356] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1044.286428][T10356] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1046.691040][T10356] hsr_slave_0: entered promiscuous mode [ 1046.701754][T10356] hsr_slave_1: entered promiscuous mode [ 1046.705092][T10356] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1046.713553][T10356] Cannot create hsr debugfs directory [ 1048.724281][T10356] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1048.873027][T10356] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1048.932597][T10356] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1049.023303][T10356] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1051.952071][T10356] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1054.475749][T10034] veth0_vlan: entered promiscuous mode [ 1054.538637][T10034] veth1_vlan: entered promiscuous mode [ 1054.656696][T10034] veth0_macvtap: entered promiscuous mode [ 1054.689054][T10034] veth1_macvtap: entered promiscuous mode [ 1054.830074][T10034] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1054.831520][T10034] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1054.835686][T10034] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1054.837027][T10034] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1062.912252][T10356] veth0_vlan: entered promiscuous mode [ 1062.996341][T10356] veth1_vlan: entered promiscuous mode [ 1063.245408][T10356] veth0_macvtap: entered promiscuous mode [ 1063.274154][T10356] veth1_macvtap: entered promiscuous mode [ 1063.416793][T10356] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1063.417329][T10356] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1063.429395][T10356] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1063.429754][T10356] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1116.403056][T10997] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1116.422070][T10997] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1117.081212][ T4908] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1117.230314][ T4908] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1117.323859][ T4908] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1117.423966][ T4908] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1118.144482][ T4908] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1118.164892][ T4908] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1118.175337][ T4908] bond0 (unregistering): Released all slaves [ 1118.309322][ T4908] hsr_slave_0: left promiscuous mode [ 1118.322680][ T4908] hsr_slave_1: left promiscuous mode [ 1118.341404][ T4908] veth1_macvtap: left promiscuous mode [ 1118.348772][ T4908] veth0_macvtap: left promiscuous mode [ 1118.349887][ T4908] veth1_vlan: left promiscuous mode [ 1118.351029][ T4908] veth0_vlan: left promiscuous mode [ 1119.730673][T10997] hsr_slave_0: entered promiscuous mode [ 1119.733202][T10997] hsr_slave_1: entered promiscuous mode [ 1119.736655][T10997] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1119.738862][T10997] Cannot create hsr debugfs directory [ 1120.156775][ T31] audit: type=1326 audit(1120.060:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11276 comm="syz.4.328" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1120.161127][ T31] audit: type=1326 audit(1120.070:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11276 comm="syz.4.328" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1120.166819][ T31] audit: type=1326 audit(1120.070:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11276 comm="syz.4.328" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1120.172202][ T31] audit: type=1326 audit(1120.070:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11276 comm="syz.4.328" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1120.176332][ T31] audit: type=1326 audit(1120.070:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11276 comm="syz.4.328" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1120.182576][ T31] audit: type=1326 audit(1120.090:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11276 comm="syz.4.328" exe="/syz-executor" sig=0 arch=40000028 syscall=179 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1120.199866][ T31] audit: type=1326 audit(1120.110:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11276 comm="syz.4.328" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1120.205120][ T31] audit: type=1326 audit(1120.110:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11276 comm="syz.4.328" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1121.544542][T10997] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 1121.556418][T10997] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 1121.590591][T10997] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 1121.636224][T10997] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 1123.904744][ T9079] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1123.995418][ T9079] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1124.062727][T10997] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1124.109935][ T9079] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1124.222609][ T9079] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1125.059036][ T9079] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1125.104277][ T9079] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1125.116720][ T9079] bond0 (unregistering): Released all slaves [ 1125.261550][ T9079] hsr_slave_0: left promiscuous mode [ 1125.278814][ T9079] hsr_slave_1: left promiscuous mode [ 1125.301830][ T9079] veth1_macvtap: left promiscuous mode [ 1125.302307][ T9079] veth0_macvtap: left promiscuous mode [ 1125.302819][ T9079] veth1_vlan: left promiscuous mode [ 1125.302999][ T9079] veth0_vlan: left promiscuous mode [ 1134.461150][T10997] veth0_vlan: entered promiscuous mode [ 1134.536371][T10997] veth1_vlan: entered promiscuous mode [ 1134.723007][T10997] veth0_macvtap: entered promiscuous mode [ 1134.755350][T10997] veth1_macvtap: entered promiscuous mode [ 1134.932085][T10997] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1134.932481][T10997] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1134.932635][T10997] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1134.932732][T10997] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1143.531769][T11553] netlink: 8 bytes leftover after parsing attributes in process `syz.4.362'. [ 1144.798373][ T31] audit: type=1400 audit(1144.700:626): avc: denied { create } for pid=11563 comm="syz.4.366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1145.858538][T11572] netlink: 'syz.4.367': attribute type 39 has an invalid length. [ 1148.763615][ T31] audit: type=1400 audit(1148.670:627): avc: denied { create } for pid=11593 comm="syz.4.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1149.320918][ T31] audit: type=1400 audit(1149.230:628): avc: denied { ioctl } for pid=11593 comm="syz.4.374" path="socket:[14102]" dev="sockfs" ino=14102 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1149.338827][ T31] audit: type=1400 audit(1149.230:629): avc: denied { write } for pid=11593 comm="syz.4.374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1152.072395][ T31] audit: type=1400 audit(1151.970:630): avc: denied { create } for pid=11607 comm="syz.4.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1161.765311][T11670] Driver unsupported XDP return value 0 on prog (id 216) dev N/A, expect packet loss! [ 1162.259170][ T31] audit: type=1400 audit(1162.160:631): avc: denied { create } for pid=11677 comm="syz.6.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1162.259696][ T31] audit: type=1400 audit(1162.160:632): avc: denied { write } for pid=11677 comm="syz.6.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1166.123422][ T31] audit: type=1400 audit(1166.030:633): avc: denied { ioctl } for pid=11731 comm="syz.4.410" path="socket:[14234]" dev="sockfs" ino=14234 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1183.568817][ T31] audit: type=1326 audit(1183.410:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11797 comm="syz.6.421" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef1f8 code=0x7ffc0000 [ 1183.569513][ T31] audit: type=1326 audit(1183.470:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11797 comm="syz.6.421" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef1f8 code=0x7ffc0000 [ 1183.569633][ T31] audit: type=1326 audit(1183.470:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11797 comm="syz.6.421" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef1f8 code=0x7ffc0000 [ 1183.571597][ T31] audit: type=1326 audit(1183.470:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11797 comm="syz.6.421" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef1f8 code=0x7ffc0000 [ 1183.571709][ T31] audit: type=1326 audit(1183.470:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11797 comm="syz.6.421" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef1f8 code=0x7ffc0000 [ 1183.572700][ T31] audit: type=1326 audit(1183.470:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11797 comm="syz.6.421" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef1f8 code=0x7ffc0000 [ 1183.595328][ T31] audit: type=1326 audit(1183.470:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11797 comm="syz.6.421" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef1f8 code=0x7ffc0000 [ 1183.595886][ T31] audit: type=1326 audit(1183.470:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11797 comm="syz.6.421" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef1f8 code=0x7ffc0000 [ 1183.596252][ T31] audit: type=1326 audit(1183.470:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11797 comm="syz.6.421" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef1f8 code=0x7ffc0000 [ 1183.596392][ T31] audit: type=1326 audit(1183.470:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11797 comm="syz.6.421" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef1f8 code=0x7ffc0000 [ 1194.463010][T11836] comedi comedi0: Minor 14 could not be opened [ 1198.659649][T11874] netlink: 12 bytes leftover after parsing attributes in process `syz.4.437'. [ 1199.231203][ T31] kauditd_printk_skb: 511 callbacks suppressed [ 1199.231620][ T31] audit: type=1400 audit(1199.140:1155): avc: denied { write } for pid=11866 comm="syz.4.437" name="mcfilter6" dev="proc" ino=4026532811 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1210.151279][ T31] audit: type=1400 audit(1210.060:1156): avc: denied { ioctl } for pid=11923 comm="syz.6.445" path="socket:[15495]" dev="sockfs" ino=15495 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1210.155737][ T31] audit: type=1400 audit(1210.060:1157): avc: denied { setopt } for pid=11923 comm="syz.6.445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1210.161255][ T31] audit: type=1400 audit(1210.060:1158): avc: denied { write } for pid=11923 comm="syz.6.445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1210.309346][T11925] netlink: 4 bytes leftover after parsing attributes in process `syz.6.445'. [ 1213.129977][T11940] netlink: 4 bytes leftover after parsing attributes in process `syz.6.447'. [ 1213.142610][T11940] netlink: 12 bytes leftover after parsing attributes in process `syz.6.447'. [ 1214.772128][T11949] syz_tun: entered allmulticast mode [ 1214.808438][T11946] lo: entered allmulticast mode [ 1214.854340][T11945] syz_tun: left allmulticast mode [ 1214.855258][T11945] lo: left allmulticast mode [ 1217.514198][T11955] ------------[ cut here ]------------ [ 1217.514779][T11955] WARNING: CPU: 1 PID: 11955 at kernel/dma/direct.h:87 dma_direct_map_sg+0x374/0x404 [ 1217.516306][T11955] Modules linked in: [ 1217.517436][T11955] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1217.518934][T11955] CPU: 1 UID: 0 PID: 11955 Comm: syz.6.450 Not tainted 6.16.0-rc6-syzkaller #0 PREEMPT [ 1217.519830][T11955] Hardware name: ARM-Versatile Express [ 1217.520711][T11955] Call trace: [ 1217.521651][T11955] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1217.522311][T11955] r7:00000000 r6:8282083c r5:00000000 r4:8225b448 [ 1217.522652][T11955] [<80201ae4>] (show_stack) from [<8021fdf4>] (dump_stack_lvl+0x54/0x7c) [ 1217.523146][T11955] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 1217.523543][T11955] r5:00000000 r4:82a6dd18 [ 1217.523763][T11955] [<8021fe1c>] (dump_stack) from [<80202614>] (panic+0x120/0x374) [ 1217.524107][T11955] [<802024f4>] (panic) from [<80258578>] (get_taint+0x0/0x1c) [ 1217.524448][T11955] r3:8280c684 r2:00000001 r1:82241f90 r0:82249928 [ 1217.524717][T11955] r7:80317874 [ 1217.524907][T11955] [<80258504>] (check_panic_on_warn) from [<802586dc>] (__warn+0x80/0x188) [ 1217.525328][T11955] [<8025865c>] (__warn) from [<8025895c>] (warn_slowpath_fmt+0x178/0x1f4) [ 1217.525715][T11955] r8:00000009 r7:82255720 r6:e04ddc0c r5:833aa400 r4:00000000 [ 1217.526040][T11955] [<802587e8>] (warn_slowpath_fmt) from [<80317874>] (dma_direct_map_sg+0x374/0x404) [ 1217.526497][T11955] r10:82ab9b30 r9:00000000 r8:00000000 r7:8380f410 r6:858740c0 r5:00018000 [ 1217.526860][T11955] r4:85b161c0 [ 1217.527022][T11955] [<80317500>] (dma_direct_map_sg) from [<80315fd4>] (__dma_map_sg_attrs+0x4c/0x2fc) [ 1217.527457][T11955] r10:85886100 r9:8380fb48 r8:00000001 r7:858740c0 r6:00000000 r5:8380f410 [ 1217.528044][T11955] r4:85b161c0 [ 1217.528266][T11955] [<80315f88>] (__dma_map_sg_attrs) from [<803162d8>] (dma_map_sgtable+0x2c/0x40) [ 1217.528678][T11955] r10:85886100 r9:8380fb48 r8:858861c0 r7:85b16c80 r6:85b16c80 r5:00000000 [ 1217.529033][T11955] r4:85b161c0 [ 1217.529231][T11955] [<803162ac>] (dma_map_sgtable) from [<80acdd8c>] (drm_gem_map_dma_buf+0x58/0xc4) [ 1217.529631][T11955] r4:85b161c0 [ 1217.529818][T11955] [<80acdd34>] (drm_gem_map_dma_buf) from [<80b8f394>] (dma_buf_map_attachment+0x50/0x164) [ 1217.530259][T11955] r7:85b16c80 r6:00000000 r5:00000000 r4:85b16c80 [ 1217.530549][T11955] [<80b8f344>] (dma_buf_map_attachment) from [<80b8f4e4>] (dma_buf_map_attachment_unlocked+0x3c/0x78) [ 1217.531029][T11955] r7:85b16c80 r6:8380f800 r5:00000000 r4:85b16c80 [ 1217.531295][T11955] [<80b8f4a8>] (dma_buf_map_attachment_unlocked) from [<80ace66c>] (drm_gem_prime_import_dev+0x88/0x1a0) [ 1217.531792][T11955] r5:84a06900 r4:862f7a80 [ 1217.531998][T11955] [<80ace5e4>] (drm_gem_prime_import_dev) from [<80acecc0>] (drm_gem_prime_fd_to_handle+0x184/0x230) [ 1217.532470][T11955] r9:8380fb48 r8:858861c0 r7:e04dde64 r6:8380f800 r5:85886100 r4:862f7a80 [ 1217.532836][T11955] [<80aceb3c>] (drm_gem_prime_fd_to_handle) from [<80acee80>] (drm_prime_fd_to_handle_ioctl+0x34/0x38) [ 1217.533401][T11955] r9:833aa400 r8:8380f800 r7:e04dde64 r6:80acee4c r5:85886100 r4:00000000 [ 1217.533806][T11955] [<80acee4c>] (drm_prime_fd_to_handle_ioctl) from [<80ac03d8>] (drm_ioctl_kernel+0xb8/0x120) [ 1217.534262][T11955] r5:85886100 r4:00000020 [ 1217.534479][T11955] [<80ac0320>] (drm_ioctl_kernel) from [<80ac06a4>] (drm_ioctl+0x264/0x5b0) [ 1217.534976][T11955] r8:81d38b28 r7:8380f800 r6:c00c642e r5:0000000c r4:0000000c [ 1217.535296][T11955] [<80ac0440>] (drm_ioctl) from [<8056798c>] (sys_ioctl+0x130/0xdc8) [ 1217.535759][T11955] r10:833aa400 r9:84dcbcc0 r8:00000006 r7:200000c0 r6:84dcbcc1 r5:00000000 [ 1217.536120][T11955] r4:c00c642e [ 1217.536306][T11955] [<8056785c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1217.536774][T11955] Exception stack(0xe04ddfa8 to 0xe04ddff0) [ 1217.537243][T11955] dfa0: 00000000 00000000 00000006 c00c642e 200000c0 00000000 [ 1217.537799][T11955] dfc0: 00000000 00000000 002f6430 00000036 002e0000 00000000 00006364 76b860bc [ 1217.538389][T11955] dfe0: 76b85ec0 76b85eb0 000193a4 00131fc0 [ 1217.538705][T11955] r10:00000036 r9:833aa400 r8:8020029c r7:00000036 r6:002f6430 r5:00000000 [ 1217.539057][T11955] r4:00000000 [ 1217.542196][T11955] Rebooting in 86400 seconds.. VM DIAGNOSIS: 11:01:01 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=dfd19ee0 R02=00000000 R03=00000002 R04=dfd19ee0 R05=85c56100 R06=85c5633c R07=00000002 R08=00000002 R09=dfd19cc4 R10=85c56188 R11=dfd19c34 R12=dfd19c10 R13=dfd19c10 R14=8022cee4 R15=8022be40 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=83322880 R01=00000000 R02=00000000 R03=833aa400 R04=83dbc480 R05=a0000093 R06=8295a2b0 R07=00000001 R08=82828458 R09=00000000 R10=000006ef R11=e04dd92c R12=e04dd930 R13=e04dd910 R14=809f06b4 R15=809ea404 PSR=a0000093 N-C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000