last executing test programs: 42m14.968969997s ago: executing program 0 (id=1475): r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x2, 0x3, 0x101, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x2}, 0x4004000) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r0) r2 = syz_open_dev$midi(&(0x7f0000000300), 0x0, 0x442) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000340)) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r1, 0x4, 0x70bd2a, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x2, 0x3d}}}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0xb}, @NL80211_ATTR_NAN_MASTER_PREF={0x5}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x3}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_BANDS={0x8, 0xef, 0xb}]}, 0x58}, 0x1, 0x0, 0x0, 0x4004004}, 0x820) 42m11.063374971s ago: executing program 0 (id=1477): r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x8, 0x191840) close_range(r0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x44000) 42m7.182888473s ago: executing program 0 (id=1479): r0 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x200, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x400c000) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IEEE802154_DISASSOCIATE_REQ(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x70, r1, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@IEEE802154_ATTR_REASON={0x5, 0x12, 0x10}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xfffe}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xfffe}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6}, @IEEE802154_ATTR_REASON={0x5, 0x12, 0xc1}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa3}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa1}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0x300}}]}, 0x70}, 0x1, 0x0, 0x0, 0x4080040}, 0x60000000) r2 = open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x100000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMK(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r0, 0x310, 0x70bd2b, 0x25dfdbfe, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20010050}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000740)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000007c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000540), r4}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000800)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xf11c, @local, 0xfffffff9}, {0xa, 0x4e23, 0xd, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xff}, r4, 0x6014}}, 0x48) timer_create(0x4, &(0x7f0000000980)={0x0, 0x31, 0x0, @thr={&(0x7f0000000880)="02209fd5ac95fc382d2e02d40b906449cc3cc3aa4004cbdb04b377b635e186e697d3d8d0cd79f567ba6a437a8e0bcf54de4cfbe44f5666599f048f08624c0723612868f4e7a0fdc18fcf9162b67303fcf0eaf4368a5bbbfeb8397affa2a98992c0818fa169e8c89d3f", &(0x7f0000000900)="2335cd4a0cdd233e524f3f8ea544879788727f1d102090305329dac21ba1d545736ab5773e491b12ded065d2ac411b7b7810d24088556958286bd55f8041aa3c5428e4fc8c8fbb7ce5b6feecf375c0caca0d021df29ba473592f2979c00fdb07661abe94943e2eca86f3302e12c7b09a25d614666e3109"}}, &(0x7f00000009c0)=0x0) timer_settime(r5, 0x1, &(0x7f0000000a00)={{0x77359400}, {0x0, 0x3938700}}, &(0x7f0000000a40)) read$FUSE(r2, &(0x7f0000000a80)={0x2020, 0x0, 0x0}, 0x2020) ioctl$NS_GET_OWNER_UID(r2, 0xb704, &(0x7f0000002ac0)=0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002b00)={0x0, 0x0, 0x0}, &(0x7f0000002b40)=0xc) write$FUSE_ATTR(r2, &(0x7f0000002b80)={0x78, 0x0, r6, {0x7, 0x4, 0x0, {0x0, 0xffffffffffffff43, 0xa0, 0x6, 0x7, 0x4, 0x5, 0x0, 0x8, 0xa000, 0x34a, r7, r8, 0x4, 0x2}}}, 0x78) listen(r2, 0x6) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nfc(&(0x7f0000002c40), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000002c80)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000002cc0)=0x0) sendmsg$NFC_CMD_DEP_LINK_DOWN(r9, &(0x7f0000002d80)={&(0x7f0000002c00)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000002d40)={&(0x7f0000002d00)={0x3c, r10, 0x1, 0x70bd2c, 0x3, {}, [@NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r11}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r12}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24004084}, 0x50) timer_create(0x7, &(0x7f0000002f40)={0x0, 0x38, 0x2, @thr={&(0x7f0000002dc0)="cfa673474bee04ea40b7ca0931cdb5abdd1cb514764f145f78f7112fca198e790eb9c9424fe31a84738dd9337f89b9f06e0d85102dba4e141aeef01612a9bd8231caa2827f2fecb874dae7600e7cf281a231131db2e51feaf8b69df87b1a812ce73514676e83c4589cc433ea34f34aa63ccfc9328a2387f4bb773ebe4ec6f4c34769148c98dffdee3db60493cbfcb92d0480badbc04824ad477173302221f2fa25db80afb0aeca441056cee46190bc3cec3a4927a00bf48bbca4db11676c26656e01e5b660f37ab02b14c594cfcf86c8523030b997f94df3e7dd29e689fd9840748c366be1d270d268caa08240205ad0ddce3f", &(0x7f0000002ec0)="c1607b1e4a14f26201dc1253abe419f60d399f3e0ad583afb7ba61e99ea97eecf03eec79c90f14ed5f48a02ef057c0e07963fe89dc76a4ca22cf693506e30beab97bc2f495f2931db1418be7c155028bc2b6ba5b917468fa9e1ec5f2e90d"}}, &(0x7f0000002f80)=0x0) timer_delete(r13) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f0000002fc0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000003140)={&(0x7f0000003000)={0x128, 0x4, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1}]}, @NFTA_CHAIN_USERDATA={0xf8, 0xc, "42527ade3260d1fa3243b7456c7157ab8983496bdcbf3545320291302d0ebd4c7c5ce7f312d1f3a1c8c1380ea2615659a74d4a5be27144ca993adb0efe0deb073dbf1ab930d0b7b1313d95104b8693248313f7a726895e1fb0ab80384d7956a85611ac108a170e21bf749597223112dcc0f63c55e9d47ec09e18671a3325c7d490f7d4cb71d40b04286fc5f4df5015658a4f46f1866499013571f8d528f23d0b668afcb9df0567d73ee0bfb4ef039e7869466049a476c38473a9fa01378e281c81d860174958180c12260705ee04df2f3392ed6c6631581d3f4b8cf9231f489b2b68769c1b39bbfdd36fd91f21631445bbb2383b"}]}, 0x128}, 0x1, 0x0, 0x0, 0x4004084}, 0x0) r14 = openat2$dir(0xffffff9c, &(0x7f00000031c0)='./file0\x00', &(0x7f0000003200)={0x2a2002, 0x80, 0x18}, 0x18) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r14, 0x800c6613, &(0x7f0000003240)=@v2={0x2, @aes256, 0x0, '\x00', @auto="8a192414fc67528df6524dbd5bb1fb01"}) r15 = syz_genetlink_get_family_id$ipvs(&(0x7f00000032c0), r2) sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000003400)={&(0x7f0000003280), 0xc, &(0x7f00000033c0)={&(0x7f0000003300)={0x8c, r15, 0x100, 0x3, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x40, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xd}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffff7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x80000000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2f}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xd, 0xc}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) 42m1.143073087s ago: executing program 0 (id=1481): r0 = openat$selinux_status(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r0, 0x5760, 0x1b) r1 = openat$mixer(0xffffff9c, &(0x7f0000000380), 0x20080, 0x0) r2 = dup(r1) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000040)=""/31) close_range(r0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0xa, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x4000040}, 0xc880) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x90080, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$F2FS_IOC_GARBAGE_COLLECT(r3, 0x5450, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r4 = openat$drirender128(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r4, 0x40049421, 0x3) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, 0x0) 41m57.463032809s ago: executing program 0 (id=1482): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095000000000000002d55710c64e30cd8655910b3eb2d1451a6bf4b04dc0af703f4c87963ba8f24815f140290fb3f659193ae297fdcd50b6dc8d41d9568a55e58cc6514e272e53a081168e74d7189f0e655f66e08f0e108968d80ea3cac636aa60bea16f5e27d5761f66d99ca89adacf4e13a2013988c4222d7cf1ff8682043d3d6f16b20de6f1ea6691dcee8e86fa2109aa7898fe15f2c973463c482db5da9926d158ee55592221796e273ccf22a8ce8dd3674739087015098b80e9842e82aa484b0247773b358f02338ba5950707984fb201d101bfd1f78b0ea4f397c22d94b5a34491cf3f671af9dacdf409cc1f8d960358d99d506f9b3f52ce15d0cf72083819b4a3a6dfe62b510150dfe25ef1caf21e26954118b0c2dea8b744bed8de035a056fa2d0f73"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x8800) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) vmsplice(r3, 0x0, 0x0, 0x5) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r5 = dup3(r4, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r4, &(0x7f00000000c0), &(0x7f0000000100)=@v1={0x1000000, [{0x6, 0x3}]}, 0xc, 0x2) r6 = creat(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$HIDIOCGDEVINFO(r6, 0x801c4803, 0x0) syslog(0x3, &(0x7f0000001000), 0x0) ioctl$NS_GET_OWNER_UID(r5, 0xb704, &(0x7f0000000240)=0x0) setresuid(r7, r7, r7) syz_clone(0x850e000, &(0x7f0000000b00)="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", 0x1000, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000500)="30076a132b3c4e819d4be120254e33a4a8c0d4adc4edc84ec7fd7da1f05e552c05f42303b5c9836e0eadb96077a9e515b4f12d0d32aa8257d526ea56340c2d2aef221f924bafec87a1f1533bb511e5dafe44d116a93f015a27cd70b2d5f8e9f73a3da249aa300b675fd1f8432ee3a59b00dccb36ffa21f9b24dd382fe49c2e290b055f48e745d7f8fe55f42240850c4a39c35e2f5c00477f71832624") r8 = epoll_create1(0x0) r9 = dup(r8) r10 = socket$inet6(0xa, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r10, &(0x7f0000000ac0)) epoll_ctl$EPOLL_CTL_MOD(r9, 0x3, r10, &(0x7f0000000100)) r11 = openat$sw_sync_info(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r11, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="100000000b1420008d642728bd7000ffdbdf25"], 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syslog(0x4, &(0x7f0000000180)=""/179, 0xb3) r12 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r12, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0x300, 0x70bd2c, 0x25dfdbfb}, 0x10}, 0x1, 0x0, 0x0, 0x20040800}, 0x0) 41m50.983123377s ago: executing program 0 (id=1485): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x94) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00'}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r1 = openat$drirender128(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r1, 0xc00464c9, 0x0) 41m5.642000159s ago: executing program 32 (id=1485): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x94) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00'}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r1 = openat$drirender128(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r1, 0xc00464c9, 0x0) 20m2.543815615s ago: executing program 2 (id=2213): socket$packet(0x11, 0x2, 0x300) socket$nl_generic(0x10, 0x3, 0x10) getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) epoll_pwait2(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)={[0x7]}, 0x8) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) get_robust_list(0x0, 0x0, &(0x7f00000014c0)) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='smaps\x00') pread64(r4, &(0x7f0000000180)=""/116, 0x74, 0x27e) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000300)={0x2020}, 0x2020) 19m46.233918072s ago: executing program 2 (id=2219): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2ff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x2}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19m29.616439903s ago: executing program 2 (id=2221): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth0\x00', 0x0}) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000004c0)={r1, 0x3, 0x6, @remote}, 0x10) 19m23.746038409s ago: executing program 2 (id=2222): r0 = syz_usb_connect$cdc_ncm(0x0, 0x72, 0x0, 0x0) syz_usb_disconnect(r0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x200) syz_usb_disconnect(r1) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1e71, 0x200f, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r1, 0x4004550d, 0x0) 19m21.340240508s ago: executing program 2 (id=2224): socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') preadv(r0, &(0x7f0000003380)=[{&(0x7f00000020c0)=""/168, 0xa8}], 0x1, 0xffffffc0, 0x10000) 19m20.201128099s ago: executing program 2 (id=2225): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) 18m35.130689619s ago: executing program 33 (id=2225): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) 17m32.055305206s ago: executing program 3 (id=2247): socket$netlink(0x10, 0x3, 0x0) timerfd_create(0x7, 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000040)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffffc}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x26}, 0x28) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = dup(r4) write$UHID_INPUT(r5, &(0x7f0000001040)={0xfc, {"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", 0x1000}}, 0x1006) 17m18.0311893s ago: executing program 3 (id=2249): r0 = syz_usb_connect(0x0, 0x3f, &(0x7f00000012c0)=ANY=[@ANYBLOB="11010000733336088dee1adb23610000000109024a0001100000000904000003fe03010009cd8d1f0002000000090505020006", @ANYRESHEX], 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f00000000c0)={0x34, &(0x7f00000001c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0}) 17m17.722420906s ago: executing program 3 (id=2250): r0 = syz_usb_connect$cdc_ncm(0x0, 0x72, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1201000002000040257d15a4400001040001090260004201000000090400000102090000052406000105240000000d240f01000004eaffffff1e0006031a00000804800200090581", @ANYBLOB="f7"], 0x0) syz_usb_disconnect(r0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x200) syz_usb_disconnect(r1) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1e71, 0x200f, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r1, 0x4004550d, 0x0) 17m16.992164745s ago: executing program 3 (id=2251): r0 = socket(0x10, 0x803, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r7 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000001b40)='/proc/self/attr/current\x00', 0x64, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_buf(r8, 0x29, 0x2a, &(0x7f00000004c0)=""/176, &(0x7f0000000280)=0xb0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x14}, [], {0x95, 0x0, 0x5}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) ioctl$int_out(r7, 0x5460, &(0x7f0000001b00)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newtfilter={0x7c, 0x2c, 0xd2b, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, r9, {0xf}, {}, {0x7, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0x50, 0x2, [@TCA_U32_SEL={0x44, 0x5, {0x5, 0xd, 0x3, 0x1, 0x4, 0x2, 0x6, 0x7ffffffa, [{0x200, 0x500, 0x3, 0x6}, {0x6783, 0x2, 0x8001, 0x10}, {0x0, 0x53, 0xa9, 0x1}]}}, @TCA_U32_LINK={0x8}]}}]}, 0x7c}}, 0x24040084) 17m1.897733225s ago: executing program 3 (id=2255): r0 = syz_usb_connect$cdc_ncm(0x0, 0x72, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1201000002000040257d15a4400001040001090260004201000000090400000102090000052406000105240000000d240f01000004eaffffff1e0006031a00000804800200090581", @ANYBLOB="f7"], 0x0) syz_usb_disconnect(r0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x200) syz_usb_disconnect(r1) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1e71, 0x200f, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r1, 0x4004550d, 0x0) 17m0.978641615s ago: executing program 3 (id=2258): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=@newnexthop={0x24, 0x68, 0x1, 0x2, 0x7ffffffc, {}, [@NHA_GROUP={0xc, 0x2, [{0x1, 0x4}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x24008000}, 0x4000) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@ipv4_newroute={0x24, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x10, 0x0, 0xfe, 0x4, 0x0, 0x1, 0x20000000}, [@RTA_NH_ID={0x8, 0x1e, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4a044}, 0x4010) 16m15.881457117s ago: executing program 34 (id=2258): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=@newnexthop={0x24, 0x68, 0x1, 0x2, 0x7ffffffc, {}, [@NHA_GROUP={0xc, 0x2, [{0x1, 0x4}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x24008000}, 0x4000) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@ipv4_newroute={0x24, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x10, 0x0, 0xfe, 0x4, 0x0, 0x1, 0x20000000}, [@RTA_NH_ID={0x8, 0x1e, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4a044}, 0x4010) 15m19.20188592s ago: executing program 4 (id=2283): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e80)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x20, &(0x7f0000000000)=0x7ffffffd, 0x4) write$binfmt_script(r1, 0x0, 0x6f4000) 15m17.889572321s ago: executing program 4 (id=2284): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x183341, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) flock(r1, 0x1) 15m16.911072513s ago: executing program 4 (id=2285): mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x21c0, 0x103) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file3\x00', 0xc1c0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000140)='./file4\x00', 0x11c0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000180)='./file5\x00', 0x61c0, 0x700) symlinkat(&(0x7f00000001c0)='./file2\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file6\x00') prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file2\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x200) unlinkat(0xffffffffffffff9c, &(0x7f00000003c0)='./file2\x00', 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000400)='./file7\x00', 0x21c0, 0x103) renameat2(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000480)='./file7\x00', 0x0) linkat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000500)='./file7\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000540)='./file7\x00', 0x1c0) renameat2(0xffffffffffffff9c, &(0x7f0000000580)='./file1\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file7\x00', 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000600)='./file7\x00', 0x81c0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000640)='./file2\x00', 0xffffffffffffff9c, &(0x7f0000000680)='./file7\x00', 0x0) linkat(0xffffffffffffff9c, &(0x7f00000006c0)='./file2\x00', 0xffffffffffffff9c, &(0x7f0000000700)='./file7\x00', 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000740)='./file7\x00', 0xc1c0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000780)='./file3\x00', 0xffffffffffffff9c, &(0x7f00000007c0)='./file7\x00', 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000800)='./file3\x00', 0xffffffffffffff9c, &(0x7f0000000840)='./file7\x00', 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000880)='./file7\x00', 0x11c0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000008c0)='./file4\x00', 0xffffffffffffff9c, &(0x7f0000000900)='./file7\x00', 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000940)='./file4\x00', 0xffffffffffffff9c, &(0x7f0000000980)='./file7\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000a00)='./file5\x00', 0xffffffffffffff9c, &(0x7f0000000a40)='./file7\x00', 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000a80)='./file5\x00', 0xffffffffffffff9c, &(0x7f0000000ac0)='./file7\x00', 0x0) symlinkat(&(0x7f0000000b00)='./file2\x00', 0xffffffffffffff9c, &(0x7f0000000b40)='./file7\x00') renameat2(0xffffffffffffff9c, &(0x7f0000000b80)='./file6\x00', 0xffffffffffffff9c, &(0x7f0000000bc0)='./file7\x00', 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000c00)='./file6\x00', 0xffffffffffffff9c, &(0x7f0000000c40)='./file7\x00', 0x0) 15m15.845385611s ago: executing program 4 (id=2286): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f0000000180)=0x1, 0x86, 0x2, 0x0, 0x0, 0xfffffffc) 15m12.545598708s ago: executing program 4 (id=2288): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="4800000010001fff2bbd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="0003000098120100200012800b000100697036746e6c000010000280040013000500090004000000080004"], 0x48}}, 0x4000) 15m11.306093474s ago: executing program 4 (id=2289): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) gettid() prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xd5cd7000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, &(0x7f0000000580), 0x0}, 0x20) wait4(0x0, 0x0, 0x40000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000200040010000800014004000000", 0x58}], 0x1) 14m44.483483724s ago: executing program 1 (id=2292): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x4, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x183341, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 14m43.855888258s ago: executing program 1 (id=2293): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000cf448c627599aad28ca78e"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) 14m42.723013639s ago: executing program 1 (id=2294): r0 = syz_usb_connect$cdc_ncm(0x0, 0x72, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1201000002000040257d15a4400001040001090260004201000000090400000102090000052406000105240000000d240f01000004eaffffff1e0006031a00000804800200090581", @ANYBLOB, @ANYRESOCT], 0x0) syz_usb_disconnect(r0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x200) syz_usb_disconnect(r1) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1e71, 0x200f, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r1, 0x4004550d, 0x0) 14m39.064368915s ago: executing program 1 (id=2295): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth0\x00', 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000d00)='sched_switch\x00', r2}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000004c0)={r1, 0x3, 0x6, @remote}, 0x10) 14m37.889293919s ago: executing program 1 (id=2296): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) open(&(0x7f0000000000)='./cgroup.cpu/cpuset.cpus\x00', 0x1a1342, 0x0) 14m25.639895786s ago: executing program 35 (id=2289): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) gettid() prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xd5cd7000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, &(0x7f0000000580), 0x0}, 0x20) wait4(0x0, 0x0, 0x40000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000200040010000800014004000000", 0x58}], 0x1) 14m15.70514615s ago: executing program 1 (id=2298): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/14], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x80) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a2, &(0x7f0000000000)='bridge0\x00') ioctl$VHOST_SET_LOG_FD(r5, 0x4004af07, &(0x7f0000000240)) 13m29.679484401s ago: executing program 36 (id=2298): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/14], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x80) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a2, &(0x7f0000000000)='bridge0\x00') ioctl$VHOST_SET_LOG_FD(r5, 0x4004af07, &(0x7f0000000240)) 10m33.472338573s ago: executing program 5 (id=2366): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 10m32.881390335s ago: executing program 5 (id=2367): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000c80)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000d40)={&(0x7f00000002c0)=@ipv4_newaddr={0x34, 0x14, 0x509, 0x0, 0x25dfdbfd, {0x2, 0x20, 0x0, 0xcb, r2}, [@IFA_LOCAL={0x8, 0x2, @broadcast}, @IFA_CACHEINFO={0x14, 0x6, {0x7ff, 0xe, 0xf, 0x183c200}}]}, 0x34}}, 0x0) 10m32.166309703s ago: executing program 5 (id=2368): r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) quotactl_fd$Q_SYNC(0xffffffffffffffff, 0xffffffff80000101, 0x0, 0x0) 10m31.66002159s ago: executing program 5 (id=2369): sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'wg2\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2182, 0x0) 10m28.534505078s ago: executing program 5 (id=2370): read$FUSE(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x408880, 0x40) clock_settime(0x0, &(0x7f0000000240)={0x77359400}) clock_adjtime(0x0, &(0x7f0000000640)={0x7, 0x9, 0x380000, 0x8, 0xfffffffffffffff9, 0xfffffffffffffff7, 0x9, 0x0, 0xae, 0x6, 0x7, 0x4, 0xfffffffffffff04f, 0x7, 0x80000000, 0xfffffffffffffff8, 0xffffffffffffffff, 0x6, 0x0, 0x100, 0x4, 0x2, 0x5, 0x3, 0x8, 0x8}) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) clock_adjtime(0x0, &(0x7f0000000900)={0x6, 0x20000000e, 0xf, 0x0, 0xf, 0x8000000000000000, 0xa, 0x2, 0x9, 0x4, 0x5, 0x8000000000000000, 0xc, 0x9, 0x7, 0x9, 0x8, 0x3, 0x8, 0xfffffffffffffffa, 0x0, 0x5, 0x7, 0x7, 0x3, 0x6}) 10m28.013479686s ago: executing program 5 (id=2371): r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000100)) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r4, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r4, 0x29, 0x3e, &(0x7f00002cef88)="d84f7398", 0x4) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x23, &(0x7f0000000040)=0x2c1, 0x4) sendto$inet6(r4, &(0x7f0000000800)="51e251578851f74182a74b89b27df427aeef44966d202e4138b5a18e75a0424e7fe93b0d32c7abba87b65f97aba1c26a06b6d94c4aefd8fdca10e744391062c8e612721c20051608d9aa6dacf61e1eb331a4daad402b9885599d56130f7149fb1111fa116e94324d585a0569fbd311dad54cb4e32ff7f02216844ec3d526c878d5135ad1c9262239339c18885e2a0a95854d6cde3dd2feeaa50216af6c5760923413af81199a65a6332b02ec7bbf79d557c033cbe032fdc44f66a5c59cc4a3c5d218f5896b359d1efd60baf98df6396567478f7b817ce6e11d59a7def452a068e9607f57f626a5b8d476636ef1ee76307524009ae49be402000000000000001e80fed632155e14da1f7324d97bc61a3c1edc4431ee8a6caa2ed9f85cea5a2a9b263630c7d6fc35dda6002da571a2e51917e7c1019d8ce21a608147e408074c7c5f444fab931bda86d977d7c9ccefd881e5ef05b287f41eea526862885881c2cdc687dfff01a9b70a9b08734ac4d62c7f34465c34aa9e9f136c7f796d9eea41aa37f61830508338bb1f887089070567a1dd96cd700e7a098dabedb60f31acd17d487bc8be1a3101d2b5ac1715003793596c6daa93a27f4adb4d6fbea5669cabc206c944317ea18a2c762457f1bc945fec8f849641d44e7e2a24faeee28f3f266395fe18b0dce20c1f64e8896c8ff0e4a44a116fb32462471a0fcde143e551723d57339722765673b4163d66f473ac10f988cb252f106632f9884a47866d284b4efc6bb1aa74ed48d4a6535795f0873a99907ebc22be2337364cf9acc063e32f7d2e02fad64d04aa405d2dbdee1128ab1e4761d2dd30885ad37dd168478f10789d172feef4c817a5cd372caade57f23300e45f47e001e3ea093680ffffff802477368b9910f4e24037c871cb8251568c792287a6f49fa61b7c2600accaa0e7b40c59d88a29af5886c1f5dfc6837c58aaef12a9e100225c70441144ffa82927fa4802ed9ebb03eea8e945af5f4993f21a7f53baf7ec5bb6cc96b917dde82c18840c3500e9565f68f687b1c73d834c0d99d4acb002dc5682dbcdb1217a98f6c3ef8318b7fa93894e8a097b4511ba5c035e27c9fe8bfe7754741ac21bbc0303b81672e3117e5590fe2d92f912759b9937f64204ec5caa92e2cccb31016b13ed8d7bcabb03e176b1c9bda3bf1c1256ab74ab6f42ed9bafbbd0096263be1a7da1e1c88deec55a653d170e1e13c77dacaa60a37a6ba2383e661ebc9f13dbaade2dd884c9951819fb4608e19e70cd2496ccfb12f24c71f496cfe90400fe1bbea1e9a24b1d4664fb0776aca6269b396779680e52f86877d9209988d12ccb137be01ab7496d00547a7d4849d365a18dbb55c429cde87d33c4b74ad2273cdfee88b5418866ef327f25e9cbcd5a64d97107339f7e4cb5f8de171d2779c0f68884ae835e398f982d5749f085628d3608986656ea04b721f828202e9342bd7d19dfa091e772aebf9718030167a8c029df7c58b7f40029d7cfcaf26fd1900d8775ef373e8e2c5bf3525f907add3be426cd5a079c49abffe933e9ee213a3baf34f932d1299312691e1c53e6247ae0989ad66070d51fad22856a8b6b28954e7d41189b11c5321789eec8670de9e8db0b0473ba2e02731e60e7222697d61e052c18d4bcc6d1572fdf426f7b2fee6c1dee66c85c497b90facaf63b8ec5cde4a73400f9180bcfc0f81eca9580a7c81462a077f9034026bf72aa7c6de4b3c15d4a2dbd6fd7d87084aea9f25fb4bf5ec83eb56874a760533792dff2695407ccdd6a7375e0007230fd3f6501c152f1c1ff279b1d67cc95f2820762b7927659368e41657bdef2dd15b63498a93b787bdb26809d734aaf98b86fcf9fc643a34d03ebbe072820662d20d4774d66c5ae270adade5b8f6242a059b926221ee3d677487471c432b0d6d64dad030703475bb3ecac39b204a814f5ece5961621358e36f8a2cf7196c76959824bbb475a7cad8f57853fe05f59f341b5207cc9bb8d686982c2f158e0d8f5c7ec6cbfd500"/1453, 0x5ad, 0x0, &(0x7f0000000080)={0xa, 0x5e20, 0x3, @mcast2}, 0x1c) recvmmsg(r4, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}, 0x6}], 0x1, 0x40000000, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) ioctl$TIOCSTI(r0, 0x5412, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) r6 = fsopen(&(0x7f0000000280)='configfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) r7 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r7, &(0x7f0000000a00)={'syz1\x00', {0x9, 0x7, 0x5, 0x5}, 0x3f, [0x9, 0x2, 0x8, 0x2, 0x5334, 0x400, 0x80000000, 0x5, 0x8, 0x0, 0x4, 0xf3, 0xfffffffb, 0x39, 0x747d5e13, 0x8, 0xfffffb9a, 0xfffffffc, 0x4, 0x401, 0x4, 0x3, 0x4, 0xf252, 0x80, 0x800, 0x300000, 0x7, 0xe, 0x4623f, 0x6, 0x0, 0x1ff, 0x8000, 0xfffffffe, 0x3, 0xd, 0x3, 0xba55, 0x8da8, 0x2, 0x200, 0x2, 0x400008, 0xe, 0x4, 0x2, 0xde, 0x8, 0x9, 0x1, 0x199f, 0x8, 0x2, 0x9, 0xffffffff, 0x4, 0x6, 0x1000, 0x5, 0x40, 0x9, 0xa, 0x5], [0x5, 0x1e, 0x3, 0x8000, 0xfffffffe, 0x3, 0x0, 0x25, 0x7, 0xfffffffc, 0x4, 0x7fff, 0x72c, 0x1c33, 0x3, 0x5, 0x10000, 0x400, 0x8001, 0x3, 0x1, 0x297, 0x5, 0x0, 0x985, 0x4, 0x8, 0x3ff, 0x0, 0xfffffffe, 0x0, 0x1000001, 0xd, 0xfffffff9, 0xfffffffd, 0x9, 0x1, 0xffffffff, 0x6, 0x5, 0x800, 0xffff, 0x6, 0x96, 0xfffffff9, 0x2, 0x0, 0x2, 0x401, 0xc, 0x3, 0x379, 0x9, 0xe, 0x5, 0x7, 0x6, 0x2, 0x1, 0x1, 0x8, 0x6, 0x200, 0xffffffff], [0x401, 0xc584, 0xffff, 0xcd3, 0x7, 0x20, 0x404, 0x4, 0x8, 0x10, 0x7, 0x9, 0xe8b, 0x9, 0x80000001, 0x8, 0x3f92, 0x1000, 0x2, 0x10, 0x1, 0xfffffff9, 0xe55, 0x1000, 0x8, 0x0, 0xff, 0x5, 0x200003, 0x2, 0x5, 0x80, 0x9, 0x8001, 0x47, 0x3, 0x3, 0x4, 0x3, 0x6d7e, 0x3, 0x8, 0x3, 0x10000, 0x6, 0x8, 0x95e, 0x0, 0x3ff, 0x3, 0x6, 0x100fffd, 0x2005, 0x9, 0x4, 0xea, 0x9, 0x20000005, 0x6, 0xd9, 0x0, 0x7d, 0x401, 0x5], [0x108e, 0xffff, 0x3, 0x3, 0x88, 0x2, 0x6, 0x4, 0x50, 0x2, 0x763, 0xb, 0x402, 0x800, 0x5, 0x10001, 0x7f, 0x5, 0x3fa6, 0x7, 0x0, 0x5, 0x1e2, 0x4, 0xe47, 0x3, 0x1000003, 0x4, 0x200, 0x1000, 0x3b, 0x20000002, 0x5, 0x800, 0xa80a, 0x65f413f9, 0xfffffff8, 0x20008, 0x8a8, 0x2, 0x800, 0x409, 0x7, 0x4, 0x4, 0x10, 0x4, 0x0, 0x7fff, 0x8, 0xfffffff8, 0x401, 0x1, 0x200, 0x7, 0x4ecf, 0xfffffffd, 0xa, 0xe, 0x2, 0xf, 0xf, 0x136, 0x6]}, 0x45c) 9m42.643907762s ago: executing program 37 (id=2371): r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000100)) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r4, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r4, 0x29, 0x3e, &(0x7f00002cef88)="d84f7398", 0x4) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x23, &(0x7f0000000040)=0x2c1, 0x4) sendto$inet6(r4, &(0x7f0000000800)="51e251578851f74182a74b89b27df427aeef44966d202e4138b5a18e75a0424e7fe93b0d32c7abba87b65f97aba1c26a06b6d94c4aefd8fdca10e744391062c8e612721c20051608d9aa6dacf61e1eb331a4daad402b9885599d56130f7149fb1111fa116e94324d585a0569fbd311dad54cb4e32ff7f02216844ec3d526c878d5135ad1c9262239339c18885e2a0a95854d6cde3dd2feeaa50216af6c5760923413af81199a65a6332b02ec7bbf79d557c033cbe032fdc44f66a5c59cc4a3c5d218f5896b359d1efd60baf98df6396567478f7b817ce6e11d59a7def452a068e9607f57f626a5b8d476636ef1ee76307524009ae49be402000000000000001e80fed632155e14da1f7324d97bc61a3c1edc4431ee8a6caa2ed9f85cea5a2a9b263630c7d6fc35dda6002da571a2e51917e7c1019d8ce21a608147e408074c7c5f444fab931bda86d977d7c9ccefd881e5ef05b287f41eea526862885881c2cdc687dfff01a9b70a9b08734ac4d62c7f34465c34aa9e9f136c7f796d9eea41aa37f61830508338bb1f887089070567a1dd96cd700e7a098dabedb60f31acd17d487bc8be1a3101d2b5ac1715003793596c6daa93a27f4adb4d6fbea5669cabc206c944317ea18a2c762457f1bc945fec8f849641d44e7e2a24faeee28f3f266395fe18b0dce20c1f64e8896c8ff0e4a44a116fb32462471a0fcde143e551723d57339722765673b4163d66f473ac10f988cb252f106632f9884a47866d284b4efc6bb1aa74ed48d4a6535795f0873a99907ebc22be2337364cf9acc063e32f7d2e02fad64d04aa405d2dbdee1128ab1e4761d2dd30885ad37dd168478f10789d172feef4c817a5cd372caade57f23300e45f47e001e3ea093680ffffff802477368b9910f4e24037c871cb8251568c792287a6f49fa61b7c2600accaa0e7b40c59d88a29af5886c1f5dfc6837c58aaef12a9e100225c70441144ffa82927fa4802ed9ebb03eea8e945af5f4993f21a7f53baf7ec5bb6cc96b917dde82c18840c3500e9565f68f687b1c73d834c0d99d4acb002dc5682dbcdb1217a98f6c3ef8318b7fa93894e8a097b4511ba5c035e27c9fe8bfe7754741ac21bbc0303b81672e3117e5590fe2d92f912759b9937f64204ec5caa92e2cccb31016b13ed8d7bcabb03e176b1c9bda3bf1c1256ab74ab6f42ed9bafbbd0096263be1a7da1e1c88deec55a653d170e1e13c77dacaa60a37a6ba2383e661ebc9f13dbaade2dd884c9951819fb4608e19e70cd2496ccfb12f24c71f496cfe90400fe1bbea1e9a24b1d4664fb0776aca6269b396779680e52f86877d9209988d12ccb137be01ab7496d00547a7d4849d365a18dbb55c429cde87d33c4b74ad2273cdfee88b5418866ef327f25e9cbcd5a64d97107339f7e4cb5f8de171d2779c0f68884ae835e398f982d5749f085628d3608986656ea04b721f828202e9342bd7d19dfa091e772aebf9718030167a8c029df7c58b7f40029d7cfcaf26fd1900d8775ef373e8e2c5bf3525f907add3be426cd5a079c49abffe933e9ee213a3baf34f932d1299312691e1c53e6247ae0989ad66070d51fad22856a8b6b28954e7d41189b11c5321789eec8670de9e8db0b0473ba2e02731e60e7222697d61e052c18d4bcc6d1572fdf426f7b2fee6c1dee66c85c497b90facaf63b8ec5cde4a73400f9180bcfc0f81eca9580a7c81462a077f9034026bf72aa7c6de4b3c15d4a2dbd6fd7d87084aea9f25fb4bf5ec83eb56874a760533792dff2695407ccdd6a7375e0007230fd3f6501c152f1c1ff279b1d67cc95f2820762b7927659368e41657bdef2dd15b63498a93b787bdb26809d734aaf98b86fcf9fc643a34d03ebbe072820662d20d4774d66c5ae270adade5b8f6242a059b926221ee3d677487471c432b0d6d64dad030703475bb3ecac39b204a814f5ece5961621358e36f8a2cf7196c76959824bbb475a7cad8f57853fe05f59f341b5207cc9bb8d686982c2f158e0d8f5c7ec6cbfd500"/1453, 0x5ad, 0x0, &(0x7f0000000080)={0xa, 0x5e20, 0x3, @mcast2}, 0x1c) recvmmsg(r4, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}, 0x6}], 0x1, 0x40000000, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) ioctl$TIOCSTI(r0, 0x5412, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) r6 = fsopen(&(0x7f0000000280)='configfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) r7 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r7, &(0x7f0000000a00)={'syz1\x00', {0x9, 0x7, 0x5, 0x5}, 0x3f, [0x9, 0x2, 0x8, 0x2, 0x5334, 0x400, 0x80000000, 0x5, 0x8, 0x0, 0x4, 0xf3, 0xfffffffb, 0x39, 0x747d5e13, 0x8, 0xfffffb9a, 0xfffffffc, 0x4, 0x401, 0x4, 0x3, 0x4, 0xf252, 0x80, 0x800, 0x300000, 0x7, 0xe, 0x4623f, 0x6, 0x0, 0x1ff, 0x8000, 0xfffffffe, 0x3, 0xd, 0x3, 0xba55, 0x8da8, 0x2, 0x200, 0x2, 0x400008, 0xe, 0x4, 0x2, 0xde, 0x8, 0x9, 0x1, 0x199f, 0x8, 0x2, 0x9, 0xffffffff, 0x4, 0x6, 0x1000, 0x5, 0x40, 0x9, 0xa, 0x5], [0x5, 0x1e, 0x3, 0x8000, 0xfffffffe, 0x3, 0x0, 0x25, 0x7, 0xfffffffc, 0x4, 0x7fff, 0x72c, 0x1c33, 0x3, 0x5, 0x10000, 0x400, 0x8001, 0x3, 0x1, 0x297, 0x5, 0x0, 0x985, 0x4, 0x8, 0x3ff, 0x0, 0xfffffffe, 0x0, 0x1000001, 0xd, 0xfffffff9, 0xfffffffd, 0x9, 0x1, 0xffffffff, 0x6, 0x5, 0x800, 0xffff, 0x6, 0x96, 0xfffffff9, 0x2, 0x0, 0x2, 0x401, 0xc, 0x3, 0x379, 0x9, 0xe, 0x5, 0x7, 0x6, 0x2, 0x1, 0x1, 0x8, 0x6, 0x200, 0xffffffff], [0x401, 0xc584, 0xffff, 0xcd3, 0x7, 0x20, 0x404, 0x4, 0x8, 0x10, 0x7, 0x9, 0xe8b, 0x9, 0x80000001, 0x8, 0x3f92, 0x1000, 0x2, 0x10, 0x1, 0xfffffff9, 0xe55, 0x1000, 0x8, 0x0, 0xff, 0x5, 0x200003, 0x2, 0x5, 0x80, 0x9, 0x8001, 0x47, 0x3, 0x3, 0x4, 0x3, 0x6d7e, 0x3, 0x8, 0x3, 0x10000, 0x6, 0x8, 0x95e, 0x0, 0x3ff, 0x3, 0x6, 0x100fffd, 0x2005, 0x9, 0x4, 0xea, 0x9, 0x20000005, 0x6, 0xd9, 0x0, 0x7d, 0x401, 0x5], [0x108e, 0xffff, 0x3, 0x3, 0x88, 0x2, 0x6, 0x4, 0x50, 0x2, 0x763, 0xb, 0x402, 0x800, 0x5, 0x10001, 0x7f, 0x5, 0x3fa6, 0x7, 0x0, 0x5, 0x1e2, 0x4, 0xe47, 0x3, 0x1000003, 0x4, 0x200, 0x1000, 0x3b, 0x20000002, 0x5, 0x800, 0xa80a, 0x65f413f9, 0xfffffff8, 0x20008, 0x8a8, 0x2, 0x800, 0x409, 0x7, 0x4, 0x4, 0x10, 0x4, 0x0, 0x7fff, 0x8, 0xfffffff8, 0x401, 0x1, 0x200, 0x7, 0x4ecf, 0xfffffffd, 0xa, 0xe, 0x2, 0xf, 0xf, 0x136, 0x6]}, 0x45c) 6m17.034367512s ago: executing program 7 (id=2437): timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) poll(0x0, 0x0, 0x70) 6m16.733018757s ago: executing program 7 (id=2438): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x27}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2=0xe0000001}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 6m16.421793313s ago: executing program 7 (id=2439): r0 = getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000023896) r6 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000240), 0x35c, 0x0) preadv(r6, &(0x7f0000000300)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x5, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x19}, &(0x7f0000000200)) clock_gettime(0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000380)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) 5m56.404845321s ago: executing program 7 (id=2443): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x272, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000540)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000007000000050000000000000700000000000000000000000203000000000000000000000a0000000000000000002e"], 0x0, 0x43}, 0x28) 5m55.615915511s ago: executing program 7 (id=2444): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) getpgrp(0xffffffffffffffff) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket(0x2, 0x800, 0x7ff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="010000000400000004000000080000000000"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x18) personality(0x4000000) socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r5}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) sched_setaffinity(0x0, 0x0, 0x0) 5m37.676240801s ago: executing program 7 (id=2449): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) unshare(0x2c020400) 5m25.826409025s ago: executing program 6 (id=2451): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, 0x0) r3 = eventfd(0xfffffff9) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000240)=r3) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000040)={0x1, r3}) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000500)=""/67, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, &(0x7f0000000380)=""/246, &(0x7f00000000c0)=""/87, &(0x7f0000000480)=""/70, 0x100000}) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000680)) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000000)=0x1) 5m22.601788452s ago: executing program 6 (id=2452): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r1, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) 5m22.25612752s ago: executing program 6 (id=2453): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff0163", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='xen_mmu_set_p4d\x00', r4, 0x0, 0xd62}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b702000000000000850000008500"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000640)={'fscrypt:', @desc2}, 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000240)='timer_start\x00', r5}, 0x18) r6 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x8, 0x3, 0x210, 0xc0, 0x8, 0xfa04, 0xc0, 0x6c02, 0x178, 0x194, 0x194, 0x178, 0x194, 0x3, 0x0, {[{{@ip={@empty=0x1e00, @broadcast, 0x0, 0x0, 'erspan0\x00', 'veth0_virt_wifi\x00', {}, {}, 0x6}, 0x0, 0x98, 0xc0, 0x0, {0x0, 0x74020000}, [@common=@inet=@ecn={{0x28}, {0x10, 0x20, 0x5, 0x8}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0xffff, 0x0, 0x0, 'snmp\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x270) 5m6.072403069s ago: executing program 6 (id=2454): mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0xb2e2b000) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffdfe}, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)=ANY=[@ANYRES16, @ANYRES32=0x0], 0x48) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000040)={0x0, 0x36, 0x0, 0x17, 0x6, 0xa9, 0x0, 0x0, 0x1}) 5m4.393976746s ago: executing program 6 (id=2455): r0 = syz_usb_connect$cdc_ncm(0x0, 0x72, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1201000002000040257d15a4400001040001090260004201000000090400000102090000052406000105240000000d240f01000004eaffffff1e0006031a00000804800200090581", @ANYBLOB="f7", @ANYRESOCT], 0x0) syz_usb_disconnect(r0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x200) syz_usb_disconnect(r1) syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(r1, 0x4004550d, 0x0) 5m3.634208015s ago: executing program 6 (id=2456): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES64], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8c}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4000000}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) epoll_wait(0xffffffffffffffff, 0x0, 0xfffffffffffffe79, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) timerfd_create(0x0, 0x0) r4 = getpid() r5 = syz_pidfd_open(r4, 0x0) setns(r5, 0x24020000) umount2(&(0x7f0000000040)='.\x00', 0x2) 4m52.554707879s ago: executing program 38 (id=2449): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) unshare(0x2c020400) 4m17.660379538s ago: executing program 39 (id=2456): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES64], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8c}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4000000}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) epoll_wait(0xffffffffffffffff, 0x0, 0xfffffffffffffe79, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) timerfd_create(0x0, 0x0) r4 = getpid() r5 = syz_pidfd_open(r4, 0x0) setns(r5, 0x24020000) umount2(&(0x7f0000000040)='.\x00', 0x2) 6.321064672s ago: executing program 8 (id=2768): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd1}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r0, 0x0, 0xb}, 0x18) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280), 0x40900, 0x0) r2 = syz_io_uring_setup(0x497, &(0x7f0000000180)={0x0, 0x79af, 0x8, 0x8000, 0x400250}, &(0x7f0000000200)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000140)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x2007, @fd=r1, 0x6, &(0x7f0000000580)=""/207, 0xcf, 0x2, 0x1}) io_uring_enter(r2, 0x74d1, 0x4c3, 0x43, 0x0, 0xfffffffffffffd1d) 5.336116853s ago: executing program 8 (id=2770): prctl$PR_SET_NAME(0xf, &(0x7f00000001c0)='w\xde\xa3\x05\xff\a\x00\x00\x00\x00\x00\x00\x8f\xc0\x9b\x86\xef\\\xc0\x89\av\x9f\xd6\xd1\x98<\xc8\x18E/\x8c\x1a\xe3\xbd') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f3bbb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68000000000000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465a932b77a74e802a0dc6bf25d8a242bc6099ad2300000480006ef6c1ff0900ff0000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767192361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80af740b5b7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48bc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1f001b2cd3170400000085be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe760e717a04becff0f719197724f4fce1093b62d7e8c7123d890cec55bf404e4e1f74b7eed82571be54c72d978cf906df08f11f1c4042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f871b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9f0390a6f01e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5eaff07000000000000b99c9cc0ad1857216f000000009191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a798de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270b939b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf01cfaed9ef0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546bb2e51935ab9067ec3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f626602111b40e761fd21081920382f14d12ca3c471c7868e7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df902aeec50e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd6d89f80a4377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f000000000100000000d77480e0345effff6413258d1f6eb190aa28cbb4bafe3436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fb03b84f63e022fe755f4007a4a899eaf52c4f491f1e97c862e29e4570600000091c691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c7167d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c2499ce3ffe2fef03f7cdd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426cfce471fef821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba3c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63e4581d5cc41cbde2ba66adc1168070c8c6e18a6a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c514b37c668554d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c3340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b909006f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f1400010000ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1b0100448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483d02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e918d685a7b099a4f8ed654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732ab916a781b9912160a3fd2a2e74dd690c57bdfdc1f069f949170ef8cb9c13c12138116bca7a8c59363799be7005c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2c74664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677eff7c5c568a89d6e36b165c39132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae1676384ff799783f55d7e5a1a0920300000000000000d98440c355927629f2bcf9dc405a18ca0264400abf38e90000000000000000008faf2cddffbfa69bf32eb718e88ec75603ed7c7a8825ce0f27a114bd7a4ab74d0c7b8d90ccc1c3ca6620def782e24d75aed70eb676437f62677a69e0994cd82d72e95493c830fe9515329f40b7025326dec33a527c5d999298eaa3690fd0d38a02fc6e0bc16dbe19f353027edc014411e1138087221492f5d5e5cc9d0a1acd3f581eda9a807aa0e609f935f626d96351e0ff116686cbeb8939feecd5dac8cf45101942cc7cec21b7f337df5431bcf7e504b7c427f70a10e1cb8993a661306a0576b638a0171e6800b5b35589d676eb30ed1a72e8f7b057eb281c4504195635b6b285ebaba019913a2520e43ed790231f047f7d3789c10ae7d724929f77aec1d33d9587580268ee14396f71e7ef588cb2560d6bd0795a9b97281229eb16de086553469fad7214ffc3e416f8b8e442dce1d37f9b1c88a5d8a8d9f2fe45bd8df213ecb4194c8554aea13cadcd502e51f6fec80418e772b5bd8d0228949058038b185909ee542848680f9ad43f4057d676d5e21ae3d7e0e4a28c04f112a94707f032b35915e42993ff148291b8babe026646ee41905992db217561b90811c4702a14f312fe5d2ae7257db6be1034cc1c346b76a853ce274bf0435e18f7e86c660c18c80f30505dd4cf2ae2a1893b83c62d61bfeadc1f913e4cab2b897e096dd3fe3525090410cb23bab36cdf200a36014032cf6e5121803c5a0c4a273a19f340163fc6265425d513a1294b8439276394945d94a589708e32a1cb30f1fa4b2f08e01dc5e8c6732e6dc59b5c8cb400000000000000592c9b68f09c8f5ddb20b4ae08b4d9df548e5ed6cd47b91a4bea8b6aa52edf64576aef1e43f2958437fdc20fbbd0d4e13d8cce1193b2f9b4f107e25af178d056e1b1e40bd75b013f7484fae0bc447b1ffaf34819fe3ad1a634c94345e26e1e68dec08723a37b05d1594a66a4718a51d4d67fc880c9d640f4eacc509873f1a103c87f69"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = syz_io_uring_setup(0x49a, &(0x7f00000000c0)={0x0, 0x79af, 0x3180, 0x8000, 0x400252}, &(0x7f0000000340)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x2, 0x2000, @fd, 0x9, 0x0, 0x0, 0x2}) io_uring_enter(r1, 0x627, 0x4c1, 0x43, 0x0, 0x0) 5.145123433s ago: executing program 9 (id=2771): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@flushpolicy={0x10, 0x1d, 0x1, 0x0, 0x10000000}, 0x10}}, 0x0) 4.596646692s ago: executing program 9 (id=2772): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r0, 0x0, 0x0, 0xc0, 0x0, &(0x7f0000000140)=""/192, 0x9, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000400)="141cfb8a", 0x2, 0x0, 0x4}, 0x50) 3.987078753s ago: executing program 9 (id=2773): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) clock_nanosleep(0x2, 0x1, &(0x7f0000000000)={0x77359400}, 0xfffffffffffffffe) 3.844774561s ago: executing program 8 (id=2774): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf79d}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) setxattr$trusted_overlay_upper(0x0, &(0x7f00000001c0), 0x0, 0x835, 0x0) 3.500500378s ago: executing program 8 (id=2775): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7a, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000340), &(0x7f0000000300)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c000000100005ff00000000000000000000004a", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010062617461647600000400028008000a00", @ANYRES32=r4], 0x3c}}, 0x0) 2.976240465s ago: executing program 9 (id=2776): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x4}, 0x50) close(r2) 2.172639037s ago: executing program 9 (id=2777): r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000040000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) connect$can_bcm(r2, &(0x7f0000000200)={0x1d, r1}, 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca7e4d5d5bdbe70000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=r0, @ANYBLOB="3bf81bb9e9"], 0x20000600}}, 0x0) 1.205122037s ago: executing program 9 (id=2778): socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) socket$inet6(0xa, 0x3, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = syz_io_uring_setup(0xbc3, &(0x7f0000001480)={0x0, 0xaf1f, 0x80, 0x44, 0x1a8}, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_SYMLINKAT={0x26, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) sendmsg$unix(0xffffffffffffffff, 0x0, 0x20004011) io_uring_enter(r1, 0x47f8, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) kexec_load(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x3e00, 0x116094000, 0x41000000}], 0x0) 866.591145ms ago: executing program 8 (id=2779): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x7}, 0x18) semop(0x0, 0x0, 0x0) kexec_load(0x3e00, 0x0, 0x0, 0x0) 0s ago: executing program 8 (id=2780): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x6}, 0x18) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff53000000800395032303030"], 0x15) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x70, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[], 0x15) r2 = dup(r1) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe935"], 0x7c8) chown(&(0x7f0000000240)='./file0\x00', 0xee00, 0x0) kernel console output (not intermixed with test programs): 4711.764377][ T31] audit: type=1400 audit(2000000387.376:45302): avc: denied { getattr } for pid=15974 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth25.link" dev="tmpfs" ino=102 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4711.881227][ T31] audit: type=1400 audit(2000000387.496:45303): avc: denied { search } for pid=15974 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4711.881657][ T31] audit: type=1400 audit(2000000387.496:45304): avc: denied { search } for pid=15974 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4711.881945][ T31] audit: type=1400 audit(2000000387.496:45305): avc: denied { search } for pid=15974 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4711.882076][ T31] audit: type=1400 audit(2000000387.496:45306): avc: denied { search } for pid=15974 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4716.723307][ T31] kauditd_printk_skb: 271 callbacks suppressed [ 4716.723733][ T31] audit: type=1400 audit(2000000392.336:45578): avc: denied { search } for pid=15989 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4716.724020][ T31] audit: type=1400 audit(2000000392.336:45579): avc: denied { search } for pid=15989 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4716.724252][ T31] audit: type=1400 audit(2000000392.336:45580): avc: denied { search } for pid=15989 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4716.724488][ T31] audit: type=1400 audit(2000000392.336:45581): avc: denied { search } for pid=15989 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4716.769838][ T31] audit: type=1400 audit(2000000392.376:45582): avc: denied { search } for pid=15989 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4716.770389][ T31] audit: type=1400 audit(2000000392.376:45583): avc: denied { search } for pid=15989 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4716.770654][ T31] audit: type=1400 audit(2000000392.376:45584): avc: denied { search } for pid=15989 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4716.771020][ T31] audit: type=1400 audit(2000000392.376:45585): avc: denied { read open } for pid=15989 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4716.884646][ T31] audit: type=1400 audit(2000000392.496:45586): avc: denied { getattr } for pid=15989 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4717.031246][ T31] audit: type=1400 audit(2000000392.646:45587): avc: denied { search } for pid=15989 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4717.793455][T15646] 8021q: adding VLAN 0 to HW filter on device bond0 [ 4721.986938][ T31] kauditd_printk_skb: 129 callbacks suppressed [ 4721.987360][ T31] audit: type=1400 audit(2000000397.596:45717): avc: denied { sys_module } for pid=15646 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4721.999814][ T31] audit: type=1400 audit(2000000397.606:45718): avc: denied { module_request } for pid=15646 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4722.674244][ T31] audit: type=1400 audit(2000000398.286:45719): avc: denied { write } for pid=16002 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4722.682218][ T31] audit: type=1400 audit(2000000398.296:45720): avc: denied { write open } for pid=16002 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4723.320661][ T31] audit: type=1400 audit(2000000398.926:45721): avc: denied { write } for pid=16003 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4723.322637][ T31] audit: type=1400 audit(2000000398.926:45722): avc: denied { write open } for pid=16003 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4723.333189][ T31] audit: type=1400 audit(2000000398.946:45723): avc: denied { module_request } for pid=15646 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4723.360014][ T31] audit: type=1400 audit(2000000398.966:45724): avc: denied { search } for pid=16003 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4723.360649][ T31] audit: type=1400 audit(2000000398.966:45725): avc: denied { search } for pid=16003 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4723.360925][ T31] audit: type=1400 audit(2000000398.966:45726): avc: denied { search } for pid=16003 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4727.096682][ T31] kauditd_printk_skb: 397 callbacks suppressed [ 4727.096978][ T31] audit: type=1400 audit(2000000402.706:46124): avc: denied { search } for pid=16014 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4727.097142][ T31] audit: type=1400 audit(2000000402.706:46125): avc: denied { search } for pid=16014 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4727.097319][ T31] audit: type=1400 audit(2000000402.706:46126): avc: denied { search } for pid=16014 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4727.125963][ T31] audit: type=1400 audit(2000000402.736:46127): avc: denied { search } for pid=16003 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4727.147912][ T31] audit: type=1400 audit(2000000402.756:46128): avc: denied { module_request } for pid=15646 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4727.472788][ T31] audit: type=1400 audit(2000000403.086:46129): avc: denied { sys_module } for pid=15646 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4727.475184][ T31] audit: type=1400 audit(2000000403.086:46130): avc: denied { module_request } for pid=15646 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4727.953085][ T31] audit: type=1400 audit(2000000403.566:46131): avc: denied { module_request } for pid=15646 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4728.422959][ T31] audit: type=1400 audit(2000000404.036:46132): avc: denied { sys_module } for pid=15646 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4728.427393][ T31] audit: type=1400 audit(2000000404.036:46133): avc: denied { module_request } for pid=15646 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4732.185461][ T31] kauditd_printk_skb: 408 callbacks suppressed [ 4732.191996][ T31] audit: type=1400 audit(2000000407.796:46542): avc: denied { map_create } for pid=16024 comm="syz.8.2461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4732.206941][ T31] audit: type=1400 audit(2000000407.816:46543): avc: denied { map_read map_write } for pid=16024 comm="syz.8.2461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4732.237392][ T31] audit: type=1400 audit(2000000407.846:46544): avc: denied { create } for pid=16024 comm="syz.8.2461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4732.275277][ T31] audit: type=1400 audit(2000000407.886:46545): avc: denied { setopt } for pid=16024 comm="syz.8.2461" lport=141 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4732.320078][ T31] audit: type=1400 audit(2000000407.926:46546): avc: denied { create } for pid=16024 comm="syz.8.2461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4732.970054][ T31] audit: type=1400 audit(2000000408.506:46547): avc: denied { module_request } for pid=15646 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4733.066312][ T31] audit: type=1400 audit(2000000408.676:46548): avc: denied { search } for pid=16038 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4733.072349][ T31] audit: type=1400 audit(2000000408.686:46549): avc: denied { search } for pid=16038 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4733.072805][ T31] audit: type=1400 audit(2000000408.686:46550): avc: denied { search } for pid=16038 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4733.074341][ T31] audit: type=1400 audit(2000000408.686:46551): avc: denied { getattr } for pid=16038 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth28.link" dev="tmpfs" ino=105 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4736.022011][T15646] veth0_vlan: entered promiscuous mode [ 4736.138637][T15646] veth1_vlan: entered promiscuous mode [ 4736.575754][T15646] veth0_macvtap: entered promiscuous mode [ 4736.658136][T15646] veth1_macvtap: entered promiscuous mode [ 4736.948300][T15646] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 4736.959824][T15646] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 4736.960917][T15646] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 4736.961794][T15646] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 4737.252376][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 4737.252749][ T31] audit: type=1400 audit(2000000412.866:46576): avc: denied { mounton } for pid=15646 comm="syz-executor" path="/syzkaller.RKU3ob/syz-tmp" dev="vda" ino=824 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 4737.263459][ T31] audit: type=1400 audit(2000000412.876:46577): avc: denied { mount } for pid=15646 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 4737.290033][ T31] audit: type=1400 audit(2000000412.896:46578): avc: denied { write } for pid=16051 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4737.293346][ T31] audit: type=1400 audit(2000000412.906:46579): avc: denied { mounton } for pid=15646 comm="syz-executor" path="/syzkaller.RKU3ob/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 4737.307162][ T31] audit: type=1400 audit(2000000412.916:46580): avc: denied { write open } for pid=16051 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4737.320204][ T31] audit: type=1400 audit(2000000412.926:46581): avc: denied { mounton } for pid=15646 comm="syz-executor" path="/syzkaller.RKU3ob/syz-tmp/newroot/proc" dev="tmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 4737.349734][ T31] audit: type=1400 audit(2000000412.956:46582): avc: denied { mount } for pid=15646 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 4737.386437][ T31] audit: type=1400 audit(2000000412.966:46583): avc: denied { mounton } for pid=15646 comm="syz-executor" path="/syzkaller.RKU3ob/syz-tmp/newroot/selinux" dev="tmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 4737.430393][ T31] audit: type=1400 audit(2000000413.036:46584): avc: denied { mounton } for pid=15646 comm="syz-executor" path="/syzkaller.RKU3ob/syz-tmp/newroot/sys" dev="tmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 4737.436062][ T31] audit: type=1400 audit(2000000413.046:46585): avc: denied { mounton } for pid=15646 comm="syz-executor" path="/syzkaller.RKU3ob/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 4742.145484][T16060] netlink: 24 bytes leftover after parsing attributes in process `syz.9.2459'. [ 4742.628188][ T31] kauditd_printk_skb: 47 callbacks suppressed [ 4742.628635][ T31] audit: type=1400 audit(2000000418.236:46633): avc: denied { bpf } for pid=16057 comm="syz.9.2459" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4746.036388][ T31] audit: type=1400 audit(2000000421.646:46634): avc: denied { prog_load } for pid=16067 comm="syz.8.2462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4746.045122][ T31] audit: type=1400 audit(2000000421.656:46635): avc: denied { bpf } for pid=16067 comm="syz.8.2462" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4746.051110][ T31] audit: type=1400 audit(2000000421.666:46636): avc: denied { map_create } for pid=16067 comm="syz.8.2462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4746.064720][ T31] audit: type=1400 audit(2000000421.666:46637): avc: denied { bpf } for pid=16067 comm="syz.8.2462" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4746.065128][ T31] audit: type=1400 audit(2000000421.666:46638): avc: denied { map_read map_write } for pid=16067 comm="syz.8.2462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4746.097135][ T31] audit: type=1400 audit(2000000421.706:46639): avc: denied { prog_load } for pid=16067 comm="syz.8.2462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4746.143337][ T31] audit: type=1400 audit(2000000421.756:46640): avc: denied { bpf } for pid=16067 comm="syz.8.2462" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4746.272124][ T31] audit: type=1400 audit(2000000421.886:46641): avc: denied { prog_load } for pid=16067 comm="syz.8.2462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4746.275554][ T31] audit: type=1400 audit(2000000421.886:46642): avc: denied { bpf } for pid=16067 comm="syz.8.2462" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4747.476870][T12082] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4747.603491][T12082] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4747.703210][T12082] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4747.765241][T12082] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4747.857341][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 4747.857764][ T31] audit: type=1400 audit(2000000423.466:46653): avc: denied { write } for pid=16090 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4747.879756][ T31] audit: type=1400 audit(2000000423.486:46654): avc: denied { write open } for pid=16090 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4747.892192][ T31] audit: type=1400 audit(2000000423.506:46655): avc: denied { search } for pid=16090 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4747.892599][ T31] audit: type=1400 audit(2000000423.506:46656): avc: denied { search } for pid=16090 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4747.892848][ T31] audit: type=1400 audit(2000000423.506:46657): avc: denied { search } for pid=16090 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4747.892950][ T31] audit: type=1400 audit(2000000423.506:46658): avc: denied { search } for pid=16090 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4748.346771][ T31] audit: type=1400 audit(2000000423.956:46659): avc: denied { search } for pid=16107 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4748.347634][ T31] audit: type=1400 audit(2000000423.956:46660): avc: denied { search } for pid=16107 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4748.348043][ T31] audit: type=1400 audit(2000000423.956:46661): avc: denied { search } for pid=16107 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4748.352795][ T31] audit: type=1400 audit(2000000423.966:46662): avc: denied { read open } for pid=16107 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4748.508453][T12082] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 4748.542665][T12082] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 4748.547390][T12082] bond0 (unregistering): Released all slaves [ 4748.767426][T16108] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16108 comm=syz.8.2463 [ 4748.770275][T12082] hsr_slave_0: left promiscuous mode [ 4748.800034][T12082] hsr_slave_1: left promiscuous mode [ 4748.875133][T12082] veth1_macvtap: left promiscuous mode [ 4748.875599][T12082] veth0_macvtap: left promiscuous mode [ 4748.876263][T12082] veth1_vlan: left promiscuous mode [ 4748.876638][T12082] veth0_vlan: left promiscuous mode [ 4751.231217][T16114] futex_wake_op: syz.8.2464 tries to shift op by -1; fix this program [ 4753.258920][ T31] kauditd_printk_skb: 395 callbacks suppressed [ 4753.260021][ T31] audit: type=1400 audit(2000000428.866:47058): avc: denied { search } for pid=16117 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4753.260666][ T31] audit: type=1400 audit(2000000428.866:47059): avc: denied { search } for pid=16117 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4753.260933][ T31] audit: type=1400 audit(2000000428.866:47060): avc: denied { search } for pid=16117 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4753.271556][ T31] audit: type=1400 audit(2000000428.886:47061): avc: denied { create } for pid=16118 comm="syz.8.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4753.331559][ T31] audit: type=1400 audit(2000000428.926:47062): avc: denied { execmem } for pid=16118 comm="syz.8.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 4753.764709][ T31] audit: type=1400 audit(2000000429.356:47063): avc: denied { search } for pid=16090 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4754.624228][ T31] audit: type=1400 audit(2000000430.236:47064): avc: denied { write } for pid=16123 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4754.626774][ T31] audit: type=1400 audit(2000000430.236:47065): avc: denied { write open } for pid=16123 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4754.661499][ T31] audit: type=1400 audit(2000000430.276:47066): avc: denied { search } for pid=16123 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4754.661912][ T31] audit: type=1400 audit(2000000430.276:47067): avc: denied { search } for pid=16123 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4758.512334][ T31] kauditd_printk_skb: 391 callbacks suppressed [ 4758.512756][ T31] audit: type=1400 audit(2000000434.126:47459): avc: denied { unmount } for pid=15288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4758.922281][ T31] audit: type=1400 audit(2000000434.536:47460): avc: denied { search } for pid=16128 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4758.924333][ T31] audit: type=1400 audit(2000000434.536:47461): avc: denied { search } for pid=16128 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4758.928560][ T31] audit: type=1400 audit(2000000434.536:47462): avc: denied { search } for pid=16128 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4758.934449][ T31] audit: type=1400 audit(2000000434.536:47463): avc: denied { getattr } for pid=16128 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth25.ipv4ll" dev="tmpfs" ino=107 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4758.950284][ T31] audit: type=1400 audit(2000000434.536:47464): avc: denied { search } for pid=16128 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4758.950802][ T31] audit: type=1400 audit(2000000434.556:47465): avc: denied { search } for pid=16128 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4758.951135][ T31] audit: type=1400 audit(2000000434.556:47466): avc: denied { search } for pid=16128 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4758.951387][ T31] audit: type=1400 audit(2000000434.556:47467): avc: denied { search } for pid=16128 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4758.951643][ T31] audit: type=1400 audit(2000000434.556:47468): avc: denied { remove_name search } for pid=16128 comm="rm" name="resolv.conf.eth25.ipv4ll" dev="tmpfs" ino=107 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4763.622953][ T31] kauditd_printk_skb: 461 callbacks suppressed [ 4763.629368][ T31] audit: type=1400 audit(2000000439.236:47930): avc: denied { sys_module } for pid=16146 comm="syz.9.2469" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4763.644671][ T31] audit: type=1400 audit(2000000439.256:47931): avc: denied { module_request } for pid=16146 comm="syz.9.2469" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4763.705195][ T31] audit: type=1400 audit(2000000439.316:47932): avc: denied { search } for pid=16155 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4763.706706][ T31] audit: type=1400 audit(2000000439.316:47933): avc: denied { search } for pid=16155 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4763.712999][ T31] audit: type=1400 audit(2000000439.316:47934): avc: denied { search } for pid=16155 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4763.713311][ T31] audit: type=1400 audit(2000000439.316:47935): avc: denied { getattr } for pid=16155 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth27.ipv4ll" dev="tmpfs" ino=108 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4763.785448][ T31] audit: type=1400 audit(2000000439.386:47936): avc: denied { search } for pid=16155 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4763.821488][ T31] audit: type=1400 audit(2000000439.406:47937): avc: denied { search } for pid=16155 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4763.822255][ T31] audit: type=1400 audit(2000000439.406:47938): avc: denied { search } for pid=16155 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4763.823139][ T31] audit: type=1400 audit(2000000439.406:47939): avc: denied { search } for pid=16155 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4768.635631][ T31] kauditd_printk_skb: 295 callbacks suppressed [ 4768.637831][ T31] audit: type=1400 audit(2000000444.246:48235): avc: denied { search } for pid=16172 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4768.670463][ T31] audit: type=1400 audit(2000000444.246:48236): avc: denied { search } for pid=16172 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4768.671001][ T31] audit: type=1400 audit(2000000444.246:48237): avc: denied { search } for pid=16172 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4768.671259][ T31] audit: type=1400 audit(2000000444.246:48238): avc: denied { search } for pid=16172 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4768.774405][ T31] audit: type=1400 audit(2000000444.386:48239): avc: denied { search } for pid=16172 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4768.775202][ T31] audit: type=1400 audit(2000000444.386:48240): avc: denied { search } for pid=16172 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4768.775802][ T31] audit: type=1400 audit(2000000444.386:48241): avc: denied { search } for pid=16172 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4768.831379][ T31] audit: type=1400 audit(2000000444.386:48242): avc: denied { read open } for pid=16172 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4768.869677][ T31] audit: type=1400 audit(2000000444.476:48243): avc: denied { getattr } for pid=16172 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4768.925936][ T31] audit: type=1400 audit(2000000444.536:48244): avc: denied { search } for pid=16172 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4774.175721][ T31] kauditd_printk_skb: 147 callbacks suppressed [ 4774.175991][ T31] audit: type=1400 audit(2000000449.786:48392): avc: denied { create } for pid=16201 comm="syz.8.2483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4774.265359][ T31] audit: type=1400 audit(2000000449.876:48393): avc: denied { read write } for pid=16201 comm="syz.8.2483" name="vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4774.287423][ T31] audit: type=1400 audit(2000000449.896:48394): avc: denied { create } for pid=16203 comm="syz.9.2484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4774.293174][ T31] audit: type=1400 audit(2000000449.906:48395): avc: denied { write } for pid=16203 comm="syz.9.2484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4774.393131][ T31] audit: type=1400 audit(2000000449.996:48396): avc: denied { read write open } for pid=16201 comm="syz.8.2483" path="/dev/vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4774.393579][ T31] audit: type=1400 audit(2000000449.996:48397): avc: denied { ioctl } for pid=16201 comm="syz.8.2483" path="/dev/vhost-net" dev="devtmpfs" ino=707 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4774.445370][ T31] audit: type=1400 audit(2000000450.056:48398): avc: denied { create } for pid=16201 comm="syz.8.2483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4774.545503][ T31] audit: type=1400 audit(2000000450.156:48399): avc: denied { write } for pid=16201 comm="syz.8.2483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4774.572687][ T31] audit: type=1400 audit(2000000450.186:48400): avc: denied { module_request } for pid=16201 comm="syz.8.2483" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4774.977716][ T31] audit: type=1400 audit(2000000450.586:48401): avc: denied { ioctl } for pid=16201 comm="syz.8.2483" path="/dev/vhost-net" dev="devtmpfs" ino=707 ioctlcmd=0xaf11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4776.902462][T16218] binder: 16217:16218 unknown command 0 [ 4776.910485][T16218] binder: 16217:16218 ioctl c0306201 200003c0 returned -22 [ 4779.522535][ T31] kauditd_printk_skb: 450 callbacks suppressed [ 4779.523230][ T31] audit: type=1400 audit(2000000455.126:48852): avc: denied { search } for pid=16345 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4779.532247][ T31] audit: type=1400 audit(2000000455.146:48853): avc: denied { search } for pid=16345 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4779.538339][ T31] audit: type=1400 audit(2000000455.146:48854): avc: denied { search } for pid=16345 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4779.543051][ T31] audit: type=1400 audit(2000000455.156:48855): avc: denied { getattr } for pid=16345 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth29.link" dev="tmpfs" ino=110 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4779.547494][ T31] audit: type=1400 audit(2000000455.156:48856): avc: denied { search } for pid=16345 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4779.548838][ T31] audit: type=1400 audit(2000000455.156:48857): avc: denied { search } for pid=16345 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4779.550787][ T31] audit: type=1400 audit(2000000455.166:48858): avc: denied { search } for pid=16345 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4779.552115][ T31] audit: type=1400 audit(2000000455.166:48859): avc: denied { search } for pid=16345 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4779.558344][ T31] audit: type=1400 audit(2000000455.166:48860): avc: denied { remove_name search } for pid=16345 comm="rm" name="resolv.conf.eth29.link" dev="tmpfs" ino=110 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4779.561326][ T31] audit: type=1400 audit(2000000455.176:48861): avc: denied { unlink } for pid=16345 comm="rm" name="resolv.conf.eth29.link" dev="tmpfs" ino=110 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4784.538459][ T31] kauditd_printk_skb: 690 callbacks suppressed [ 4784.538876][ T31] audit: type=1400 audit(2000000460.146:49552): avc: denied { search } for pid=16389 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4784.539781][ T31] audit: type=1400 audit(2000000460.146:49553): avc: denied { search } for pid=16389 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4784.539889][ T31] audit: type=1400 audit(2000000460.146:49554): avc: denied { search } for pid=16389 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4784.559924][ T31] audit: type=1400 audit(2000000460.156:49555): avc: denied { read open } for pid=16389 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4784.560562][ T31] audit: type=1400 audit(2000000460.166:49556): avc: denied { getattr } for pid=16389 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4784.579551][ T31] audit: type=1400 audit(2000000460.186:49557): avc: denied { search } for pid=16389 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4784.580109][ T31] audit: type=1400 audit(2000000460.186:49558): avc: denied { search } for pid=16389 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4784.580367][ T31] audit: type=1400 audit(2000000460.186:49559): avc: denied { search } for pid=16389 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4784.580471][ T31] audit: type=1400 audit(2000000460.186:49560): avc: denied { search } for pid=16389 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4784.602196][ T31] audit: type=1400 audit(2000000460.206:49561): avc: denied { search } for pid=16389 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4789.615749][ T31] kauditd_printk_skb: 656 callbacks suppressed [ 4789.625204][ T31] audit: type=1400 audit(2000000465.226:50218): avc: denied { write } for pid=16416 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4789.625629][ T31] audit: type=1400 audit(2000000465.236:50219): avc: denied { write open } for pid=16416 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4789.816130][ T31] audit: type=1400 audit(2000000465.426:50220): avc: denied { read write } for pid=16419 comm="syz.8.2501" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4789.833206][ T31] audit: type=1400 audit(2000000465.436:50221): avc: denied { read write open } for pid=16419 comm="syz.8.2501" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4790.064004][ T31] audit: type=1400 audit(2000000465.676:50222): avc: denied { write } for pid=16420 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4790.068775][ T31] audit: type=1400 audit(2000000465.676:50223): avc: denied { write open } for pid=16420 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4790.202729][ T31] audit: type=1400 audit(2000000465.816:50224): avc: denied { name_bind } for pid=16422 comm="syz.8.2502" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 4790.206673][ T31] audit: type=1400 audit(2000000465.816:50225): avc: denied { node_bind } for pid=16422 comm="syz.8.2502" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 4790.230580][ T31] audit: type=1400 audit(2000000465.846:50226): avc: denied { create } for pid=16422 comm="syz.8.2502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4790.235962][ T31] audit: type=1400 audit(2000000465.846:50227): avc: denied { write } for pid=16422 comm="syz.8.2502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4792.701094][ C0] vcan0: j1939_tp_rxtimer: 0x85902d00: rx timeout, send abort [ 4793.201745][ C0] vcan0: j1939_tp_rxtimer: 0x85902d00: abort rx timeout. Force session deactivation [ 4793.347812][ C1] vcan0: j1939_tp_rxtimer: 0x858cf100: rx timeout, send abort [ 4793.349681][ C1] vcan0: j1939_tp_rxtimer: 0x858cf900: rx timeout, send abort [ 4793.351051][ C1] vcan0: j1939_xtp_rx_abort_one: 0x858cf100: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4793.351848][ C1] vcan0: j1939_xtp_rx_abort_one: 0x858cf900: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4793.632667][T16454] random: crng reseeded on system resumption [ 4794.597160][T16486] netlink: 16 bytes leftover after parsing attributes in process `syz.9.2515'. [ 4794.947789][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 4794.948072][ T31] audit: type=1400 audit(2000000470.556:50289): avc: denied { create } for pid=16492 comm="syz.9.2516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4794.955987][ T31] audit: type=1400 audit(2000000470.566:50290): avc: denied { bind } for pid=16492 comm="syz.9.2516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4794.962625][ T31] audit: type=1400 audit(2000000470.576:50291): avc: denied { write } for pid=16492 comm="syz.9.2516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4795.813380][ T31] audit: type=1400 audit(2000000471.426:50292): avc: denied { unmount } for pid=15288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4796.045587][ T31] audit: type=1400 audit(2000000471.656:50293): avc: denied { create } for pid=16495 comm="syz.8.2517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4796.060639][ T31] audit: type=1400 audit(2000000471.666:50294): avc: denied { write } for pid=16495 comm="syz.8.2517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4796.067407][ T31] audit: type=1400 audit(2000000471.676:50295): avc: denied { module_request } for pid=16495 comm="syz.8.2517" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4796.541047][ C1] vcan0: j1939_tp_rxtimer: 0x85882f00: rx timeout, send abort [ 4796.541776][ C1] vcan0: j1939_tp_rxtimer: 0x85882c00: rx timeout, send abort [ 4796.542629][ C1] vcan0: j1939_xtp_rx_abort_one: 0x85882f00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4796.543337][ C1] vcan0: j1939_xtp_rx_abort_one: 0x85882c00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4796.554400][ T31] audit: type=1400 audit(2000000472.166:50296): avc: denied { read } for pid=2909 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4796.557875][ T31] audit: type=1400 audit(2000000472.166:50297): avc: denied { search } for pid=2909 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4796.561369][ T31] audit: type=1400 audit(2000000472.166:50298): avc: denied { append } for pid=2909 comm="syslogd" name="messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4799.815030][T16513] block nbd8: shutting down sockets [ 4800.212313][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 4800.212764][ T31] audit: type=1400 audit(2000000475.826:50321): avc: denied { create } for pid=16521 comm="syz.8.2524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4800.225481][ T31] audit: type=1400 audit(2000000475.836:50322): avc: denied { bind } for pid=16521 comm="syz.8.2524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4800.231766][ T31] audit: type=1400 audit(2000000475.846:50323): avc: denied { node_bind } for pid=16521 comm="syz.8.2524" saddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 4800.255920][ T31] audit: type=1400 audit(2000000475.866:50324): avc: denied { prog_load } for pid=16521 comm="syz.8.2524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4800.257960][ T31] audit: type=1400 audit(2000000475.866:50325): avc: denied { bpf } for pid=16521 comm="syz.8.2524" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4800.518619][ C0] vcan0: j1939_tp_rxtimer: 0x85902d00: rx timeout, send abort [ 4800.520864][ C0] vcan0: j1939_tp_rxtimer: 0x85902000: rx timeout, send abort [ 4800.522433][ C0] vcan0: j1939_xtp_rx_abort_one: 0x85902d00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4800.523607][ C0] vcan0: j1939_xtp_rx_abort_one: 0x85902000: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4800.540227][ T31] audit: type=1400 audit(2000000476.146:50326): avc: denied { create } for pid=16523 comm="syz.8.2525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4800.550118][ T31] audit: type=1400 audit(2000000476.156:50327): avc: denied { write } for pid=16523 comm="syz.8.2525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4800.561102][ T31] audit: type=1400 audit(2000000476.166:50329): avc: denied { module_request } for pid=16523 comm="syz.8.2525" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4800.583633][ T31] audit: type=1400 audit(2000000476.156:50328): avc: denied { read } for pid=2909 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4800.584312][ T31] audit: type=1400 audit(2000000476.196:50330): avc: denied { search } for pid=2909 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4800.965047][T16528] batadv_slave_1: entered promiscuous mode [ 4801.007369][T16528] geneve2: entered promiscuous mode [ 4801.007783][T16528] geneve2: entered allmulticast mode [ 4801.141458][T16527] batadv_slave_1: left promiscuous mode [ 4804.091999][ C0] vcan0: j1939_tp_rxtimer: 0x85993b00: rx timeout, send abort [ 4804.092597][ C0] vcan0: j1939_tp_rxtimer: 0x85993100: rx timeout, send abort [ 4804.092925][ C0] vcan0: j1939_xtp_rx_abort_one: 0x85993b00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4804.093197][ C0] vcan0: j1939_xtp_rx_abort_one: 0x85993100: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4805.223382][ T31] kauditd_printk_skb: 631 callbacks suppressed [ 4805.223849][ T31] audit: type=1400 audit(2000000480.836:50962): avc: denied { getattr } for pid=16584 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4805.237981][ T31] audit: type=1400 audit(2000000480.846:50963): avc: denied { search } for pid=16584 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4805.240749][ T31] audit: type=1400 audit(2000000480.856:50964): avc: denied { search } for pid=16584 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4805.241161][ T31] audit: type=1400 audit(2000000480.856:50965): avc: denied { search } for pid=16584 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4805.260775][ T31] audit: type=1400 audit(2000000480.866:50966): avc: denied { search } for pid=16584 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4805.261302][ T31] audit: type=1400 audit(2000000480.866:50967): avc: denied { search } for pid=16584 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4805.261652][ T31] audit: type=1400 audit(2000000480.866:50968): avc: denied { search } for pid=16584 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4805.261832][ T31] audit: type=1400 audit(2000000480.866:50969): avc: denied { search } for pid=16584 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4805.273832][ T31] audit: type=1400 audit(2000000480.866:50970): avc: denied { read open } for pid=16584 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4805.275357][ T31] audit: type=1400 audit(2000000480.886:50971): avc: denied { getattr } for pid=16584 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4809.180922][T16604] block nbd9: shutting down sockets [ 4810.231837][ T31] kauditd_printk_skb: 806 callbacks suppressed [ 4810.232246][ T31] audit: type=1400 audit(2000000485.846:51778): avc: denied { read open } for pid=16641 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.234999][ T31] audit: type=1400 audit(2000000485.846:51779): avc: denied { getattr } for pid=16641 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.244930][ T31] audit: type=1400 audit(2000000485.856:51780): avc: denied { search } for pid=16641 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.245328][ T31] audit: type=1400 audit(2000000485.856:51781): avc: denied { search } for pid=16641 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.245627][ T31] audit: type=1400 audit(2000000485.856:51782): avc: denied { search } for pid=16641 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.245769][ T31] audit: type=1400 audit(2000000485.856:51783): avc: denied { search } for pid=16641 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.262540][ T31] audit: type=1400 audit(2000000485.876:51784): avc: denied { search } for pid=16641 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.262995][ T31] audit: type=1400 audit(2000000485.876:51785): avc: denied { search } for pid=16641 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.263240][ T31] audit: type=1400 audit(2000000485.876:51786): avc: denied { search } for pid=16641 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.280361][ T31] audit: type=1400 audit(2000000485.876:51787): avc: denied { read open } for pid=16641 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4815.547008][ T31] kauditd_printk_skb: 432 callbacks suppressed [ 4815.560271][ T31] audit: type=1400 audit(2000000491.156:52220): avc: denied { create } for pid=16684 comm="syz.9.2552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4815.602286][ T31] audit: type=1400 audit(2000000491.196:52221): avc: denied { ioctl } for pid=16684 comm="syz.9.2552" path="socket:[32376]" dev="sockfs" ino=32376 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4815.635473][ T31] audit: type=1400 audit(2000000491.246:52222): avc: denied { module_request } for pid=16684 comm="syz.9.2552" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4815.948100][ T31] audit: type=1400 audit(2000000491.556:52223): avc: denied { read } for pid=16684 comm="syz.9.2552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4816.133653][ T31] audit: type=1400 audit(2000000491.746:52224): avc: denied { write } for pid=16684 comm="syz.9.2552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4816.482449][ T31] audit: type=1400 audit(2000000492.086:52225): avc: denied { sys_module } for pid=16684 comm="syz.9.2552" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4816.485914][ T31] audit: type=1400 audit(2000000492.096:52226): avc: denied { module_request } for pid=16684 comm="syz.9.2552" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4817.281171][ T31] audit: type=1400 audit(2000000492.886:52227): avc: denied { read write } for pid=16691 comm="syz.8.2553" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4817.285670][ T31] audit: type=1400 audit(2000000492.896:52228): avc: denied { read write open } for pid=16691 comm="syz.8.2553" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4817.303345][ T31] audit: type=1400 audit(2000000492.916:52229): avc: denied { mounton } for pid=16691 comm="syz.8.2553" path="/53/file0" dev="tmpfs" ino=293 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 4817.895652][T16697] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4817.896452][T16697] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4818.328289][T16705] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4818.347822][T16705] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4822.814012][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 4822.814427][ T31] audit: type=1400 audit(2000000498.426:52266): avc: denied { unmount } for pid=15288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4823.064560][ T31] audit: type=1400 audit(2000000498.676:52267): avc: denied { write } for pid=16722 comm="syz.8.2562" name="rtc0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4823.079924][ T31] audit: type=1400 audit(2000000498.676:52268): avc: denied { write open } for pid=16722 comm="syz.8.2562" path="/dev/rtc0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4823.083622][ T31] audit: type=1400 audit(2000000498.696:52269): avc: denied { ioctl } for pid=16722 comm="syz.8.2562" path="/dev/rtc0" dev="devtmpfs" ino=697 ioctlcmd=0x700b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4823.288780][ T31] audit: type=1400 audit(2000000498.896:52270): avc: denied { read write } for pid=16724 comm="syz.8.2563" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4823.305025][ T31] audit: type=1400 audit(2000000498.916:52271): avc: denied { read write open } for pid=16724 comm="syz.8.2563" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4823.317983][ T31] audit: type=1400 audit(2000000498.926:52272): avc: denied { module_request } for pid=16724 comm="syz.8.2563" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4823.791588][ T31] audit: type=1400 audit(2000000499.406:52273): avc: denied { read write } for pid=16727 comm="syz.8.2564" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4823.795427][ T31] audit: type=1400 audit(2000000499.406:52274): avc: denied { read write open } for pid=16727 comm="syz.8.2564" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4823.814308][ T31] audit: type=1400 audit(2000000499.426:52275): avc: denied { mounton } for pid=16727 comm="syz.8.2564" path="/58/file0" dev="tmpfs" ino=321 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 4827.825973][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 4827.826372][ T31] audit: type=1400 audit(2000000503.436:52292): avc: denied { allowed } for pid=16747 comm="syz.8.2572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 4827.843632][ T31] audit: type=1400 audit(2000000503.456:52293): avc: denied { create } for pid=16748 comm="syz.9.2573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4827.847606][ T31] audit: type=1400 audit(2000000503.456:52294): avc: denied { sqpoll } for pid=16747 comm="syz.8.2572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 4827.853964][ T31] audit: type=1400 audit(2000000503.466:52295): avc: denied { create } for pid=16748 comm="syz.9.2573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4827.865719][ T31] audit: type=1400 audit(2000000503.476:52296): avc: denied { create } for pid=16748 comm="syz.9.2573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4827.876845][ T31] audit: type=1400 audit(2000000503.486:52297): avc: denied { create } for pid=16747 comm="syz.8.2572" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4827.882574][ T31] audit: type=1400 audit(2000000503.496:52298): avc: denied { write } for pid=16748 comm="syz.9.2573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4827.886311][ T31] audit: type=1400 audit(2000000503.496:52299): avc: denied { map } for pid=16747 comm="syz.8.2572" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=32446 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4827.891750][ T31] audit: type=1400 audit(2000000503.506:52300): avc: denied { module_request } for pid=16748 comm="syz.9.2573" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4827.898386][ T31] audit: type=1400 audit(2000000503.506:52301): avc: denied { read write } for pid=16747 comm="syz.8.2572" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=32446 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4829.884719][T16770] ======================================================= [ 4829.884719][T16770] WARNING: The mand mount option has been deprecated and [ 4829.884719][T16770] and is ignored by this kernel. Remove the mand [ 4829.884719][T16770] option from the mount to silence this warning. [ 4829.884719][T16770] ======================================================= [ 4829.926456][T16770] GUP no longer grows the stack in syz.9.2580 (16770): 20002000-2000a000 (20001000) [ 4829.928174][T16770] CPU: 0 UID: 0 PID: 16770 Comm: syz.9.2580 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 4829.928286][T16770] Hardware name: ARM-Versatile Express [ 4829.928312][T16770] Call trace: [ 4829.928350][T16770] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4829.928449][T16770] r7:dff21e30 r6:00000000 r5:60000013 r4:8225b4f4 [ 4829.928470][T16770] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 4829.928535][T16770] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 4829.928586][T16770] r5:00000000 r4:20001000 [ 4829.928602][T16770] [<8021fe1c>] (dump_stack) from [<804b5214>] (gup_vma_lookup+0xb4/0xb8) [ 4829.928660][T16770] [<804b5160>] (gup_vma_lookup) from [<804b7008>] (__get_user_pages+0xfc/0x6c4) [ 4829.928709][T16770] r4:002d0001 [ 4829.928726][T16770] [<804b6f0c>] (__get_user_pages) from [<804b82f0>] (__gup_longterm_locked+0xd4/0x990) [ 4829.928778][T16770] r10:dff21e30 r9:dff21e34 r8:86117300 r7:00000001 r6:00000000 r5:20001000 [ 4829.928800][T16770] r4:86117300 [ 4829.928816][T16770] [<804b821c>] (__gup_longterm_locked) from [<804b9560>] (pin_user_pages_remote+0x80/0xa4) [ 4829.928870][T16770] r10:000000bd r9:00000001 r8:dff21e34 r7:dff21e30 r6:00000001 r5:20001000 [ 4829.928891][T16770] r4:86117300 [ 4829.928909][T16770] [<804b94e0>] (pin_user_pages_remote) from [<804e99d0>] (process_vm_rw_core.constprop.0+0x1c0/0x470) [ 4829.928975][T16770] r8:00000001 r7:00000001 r6:dff21eb8 r5:00000340 r4:86117384 [ 4829.929091][T16770] [<804e9810>] (process_vm_rw_core.constprop.0) from [<804e9dac>] (process_vm_rw+0x12c/0x150) [ 4829.929188][T16770] r10:dff21ed4 r9:00000000 r8:dff21f14 r7:00000085 r6:200015c0 r5:dff21f14 [ 4829.929214][T16770] r4:000000d5 [ 4829.929234][T16770] [<804e9c80>] (process_vm_rw) from [<804e9e30>] (sys_process_vm_writev+0x2c/0x34) [ 4829.929296][T16770] r10:00000179 r9:856e0000 r8:8020029c r7:00000179 r6:002f630c r5:00000000 [ 4829.929318][T16770] r4:00000002 [ 4829.929335][T16770] [<804e9e04>] (sys_process_vm_writev) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4829.929513][T16770] Exception stack(0xdff21fa8 to 0xdff21ff0) [ 4829.929567][T16770] 1fa0: 00000002 00000000 00000085 200012c0 00000002 200015c0 [ 4829.929604][T16770] 1fc0: 00000002 00000000 002f630c 00000179 002e0000 00000000 00006364 76bd70bc [ 4829.929631][T16770] 1fe0: 76bd6ec0 76bd6eb0 000193a4 00131fc0 [ 4832.270802][T16796] input: syz1 as /devices/virtual/input/input19 [ 4832.905418][ T31] kauditd_printk_skb: 84 callbacks suppressed [ 4832.905870][ T31] audit: type=1400 audit(2000000508.516:52386): avc: denied { read } for pid=16809 comm="syz.9.2597" name="event0" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4832.908203][ T31] audit: type=1400 audit(2000000508.516:52387): avc: denied { read open } for pid=16809 comm="syz.9.2597" path="/dev/input/event0" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4832.915802][ T31] audit: type=1400 audit(2000000508.526:52388): avc: denied { ioctl } for pid=16809 comm="syz.9.2597" path="/dev/input/event0" dev="devtmpfs" ino=701 ioctlcmd=0x4503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4832.956613][ T31] audit: type=1400 audit(2000000508.566:52389): avc: denied { read append } for pid=16810 comm="syz.8.2596" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4832.957014][ T31] audit: type=1400 audit(2000000508.566:52390): avc: denied { read append open } for pid=16810 comm="syz.8.2596" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4832.964548][ T31] audit: type=1400 audit(2000000508.576:52391): avc: denied { ioctl } for pid=16810 comm="syz.8.2596" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x5431 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4832.967780][ T31] audit: type=1400 audit(2000000508.576:52392): avc: denied { ioctl } for pid=16810 comm="syz.8.2596" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x5430 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4832.978934][ T31] audit: type=1400 audit(2000000508.586:52393): avc: denied { read } for pid=16810 comm="syz.8.2596" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4832.984356][ T31] audit: type=1400 audit(2000000508.596:52394): avc: denied { read open } for pid=16810 comm="syz.8.2596" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4832.993722][T16812] binder: 16810:16812 ioctl c0306201 0 returned -14 [ 4832.995878][ T31] audit: type=1400 audit(2000000508.606:52395): avc: denied { ioctl } for pid=16810 comm="syz.8.2596" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4833.507575][T16818] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4833.512074][T16818] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4834.920524][T16840] fuse: Bad value for 'fd' [ 4835.216919][T16842] binder: 16841:16842 ioctl c0306201 0 returned -14 [ 4835.406733][T16844] input: syz1 as /devices/virtual/input/input21 [ 4835.591750][T16850] binder: 16849:16850 ioctl c0306201 200001c0 returned -14 [ 4838.666520][ C1] vcan0: j1939_tp_rxtimer: 0x84decb00: rx timeout, send abort [ 4838.667368][ C1] vcan0: j1939_tp_rxtimer: 0x84dec200: rx timeout, send abort [ 4838.668173][ C1] vcan0: j1939_xtp_rx_abort_one: 0x84decb00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4838.668609][ C1] vcan0: j1939_xtp_rx_abort_one: 0x84dec200: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4838.686267][ T31] kauditd_printk_skb: 67 callbacks suppressed [ 4838.686658][ T31] audit: type=1400 audit(2000000514.296:52463): avc: denied { read } for pid=2909 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4838.706377][ T31] audit: type=1400 audit(2000000514.316:52464): avc: denied { search } for pid=2909 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4838.706912][ T31] audit: type=1400 audit(2000000514.316:52465): avc: denied { append } for pid=2909 comm="syslogd" name="messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4838.707202][ T31] audit: type=1400 audit(2000000514.316:52466): avc: denied { append open } for pid=2909 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4838.722961][ T31] audit: type=1400 audit(2000000514.336:52467): avc: denied { getattr } for pid=2909 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4838.807754][ T31] audit: type=1400 audit(2000000514.416:52468): avc: denied { unmount } for pid=15646 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4839.070784][ T31] audit: type=1400 audit(2000000514.686:52469): avc: denied { read write } for pid=16867 comm="syz.9.2615" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4839.075533][ T31] audit: type=1400 audit(2000000514.686:52470): avc: denied { read write open } for pid=16867 comm="syz.9.2615" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4839.090989][ T31] audit: type=1400 audit(2000000514.696:52471): avc: denied { ioctl } for pid=16867 comm="syz.9.2615" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4839.094658][ T31] audit: type=1400 audit(2000000514.706:52472): avc: denied { ioctl } for pid=16867 comm="syz.9.2615" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4839.100284][T16868] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4839.104297][T16868] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4839.350114][T16868] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4839.351910][T16868] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4843.983831][ C1] vcan0: j1939_tp_rxtimer: 0x84dec900: rx timeout, send abort [ 4843.984648][ C1] vcan0: j1939_tp_rxtimer: 0x84dec800: rx timeout, send abort [ 4843.986814][ C1] vcan0: j1939_xtp_rx_abort_one: 0x84dec900: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4843.987306][ C1] vcan0: j1939_xtp_rx_abort_one: 0x84dec800: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4843.997845][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 4843.998259][ T31] audit: type=1400 audit(2000000519.606:52488): avc: denied { read } for pid=2909 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4844.004493][ T31] audit: type=1400 audit(2000000519.616:52489): avc: denied { search } for pid=2909 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4844.013673][ T31] audit: type=1400 audit(2000000519.626:52490): avc: denied { append } for pid=2909 comm="syslogd" name="messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4844.022137][ T31] audit: type=1400 audit(2000000519.636:52491): avc: denied { append open } for pid=2909 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4844.037294][ T31] audit: type=1400 audit(2000000519.646:52492): avc: denied { getattr } for pid=2909 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4844.285064][ T31] audit: type=1400 audit(2000000519.896:52493): avc: denied { read } for pid=16883 comm="syz.8.2619" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4844.288236][ T31] audit: type=1400 audit(2000000519.896:52494): avc: denied { read open } for pid=16883 comm="syz.8.2619" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4844.307578][ T31] audit: type=1400 audit(2000000519.916:52495): avc: denied { ioctl } for pid=16883 comm="syz.8.2619" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4844.322600][ T31] audit: type=1400 audit(2000000519.936:52496): avc: denied { ioctl } for pid=16883 comm="syz.8.2619" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64a1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4844.334747][ T31] audit: type=1400 audit(2000000519.946:52497): avc: denied { ioctl } for pid=16883 comm="syz.8.2619" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64ce scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4844.603938][T16886] sit0: entered promiscuous mode [ 4844.616132][T16886] netlink: 'syz.8.2620': attribute type 1 has an invalid length. [ 4844.616607][T16886] netlink: 1 bytes leftover after parsing attributes in process `syz.8.2620'. [ 4849.173296][ C0] vcan0: j1939_tp_rxtimer: 0x857f3100: rx timeout, send abort [ 4849.173848][ C0] vcan0: j1939_tp_rxtimer: 0x857f3500: rx timeout, send abort [ 4849.174180][ C0] vcan0: j1939_xtp_rx_abort_one: 0x857f3100: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4849.174504][ C0] vcan0: j1939_xtp_rx_abort_one: 0x857f3500: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4849.208022][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 4849.208472][ T31] audit: type=1400 audit(2000000524.816:52511): avc: denied { read } for pid=2909 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4849.220285][ T31] audit: type=1400 audit(2000000524.826:52512): avc: denied { search } for pid=2909 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4849.237301][ T31] audit: type=1400 audit(2000000524.846:52513): avc: denied { append } for pid=2909 comm="syslogd" name="messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4849.246930][ T31] audit: type=1400 audit(2000000524.856:52514): avc: denied { append open } for pid=2909 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4849.257565][ T31] audit: type=1400 audit(2000000524.866:52515): avc: denied { getattr } for pid=2909 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4849.533225][ T31] audit: type=1400 audit(2000000525.146:52516): avc: denied { prog_load } for pid=16896 comm="syz.8.2624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4849.537278][ T31] audit: type=1400 audit(2000000525.146:52517): avc: denied { bpf } for pid=16896 comm="syz.8.2624" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4849.544167][ T31] audit: type=1400 audit(2000000525.156:52518): avc: denied { prog_load } for pid=16896 comm="syz.8.2624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4849.547795][ T31] audit: type=1400 audit(2000000525.156:52519): avc: denied { bpf } for pid=16896 comm="syz.8.2624" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4849.554533][ T31] audit: type=1400 audit(2000000525.166:52520): avc: denied { prog_load } for pid=16896 comm="syz.8.2624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4853.923829][ C0] vcan0: j1939_tp_rxtimer: 0x857f3500: rx timeout, send abort [ 4853.925387][ C0] vcan0: j1939_tp_rxtimer: 0x857f3100: rx timeout, send abort [ 4853.925842][ C0] vcan0: j1939_xtp_rx_abort_one: 0x857f3500: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4853.926128][ C0] vcan0: j1939_xtp_rx_abort_one: 0x857f3100: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4854.491839][ T31] kauditd_printk_skb: 89 callbacks suppressed [ 4854.494496][ T31] audit: type=1400 audit(2000000530.096:52610): avc: denied { map_create } for pid=16911 comm="syz.9.2630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4854.509825][ T31] audit: type=1400 audit(2000000530.116:52611): avc: denied { bpf } for pid=16911 comm="syz.9.2630" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4854.627765][ T31] audit: type=1400 audit(2000000530.226:52612): avc: denied { map_read map_write } for pid=16911 comm="syz.9.2630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4854.715823][ T31] audit: type=1400 audit(2000000530.316:52613): avc: denied { prog_load } for pid=16911 comm="syz.9.2630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4854.788099][ T31] audit: type=1400 audit(2000000530.396:52614): avc: denied { bpf } for pid=16911 comm="syz.9.2630" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4854.913192][ T31] audit: type=1400 audit(2000000530.516:52615): avc: denied { prog_load } for pid=16911 comm="syz.9.2630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4854.989840][ T31] audit: type=1400 audit(2000000530.596:52616): avc: denied { bpf } for pid=16911 comm="syz.9.2630" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4854.995210][ T31] audit: type=1400 audit(2000000530.606:52617): avc: denied { perfmon } for pid=16911 comm="syz.9.2630" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4855.001185][ T31] audit: type=1400 audit(2000000530.606:52618): avc: denied { perfmon } for pid=16911 comm="syz.9.2630" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4855.034381][ T31] audit: type=1400 audit(2000000530.646:52619): avc: denied { perfmon } for pid=16911 comm="syz.9.2630" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4859.534183][ T31] kauditd_printk_skb: 138 callbacks suppressed [ 4859.534677][ T31] audit: type=1400 audit(2000000535.146:52758): avc: denied { prog_load } for pid=16935 comm="syz.9.2638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4859.538570][ T31] audit: type=1400 audit(2000000535.146:52759): avc: denied { bpf } for pid=16935 comm="syz.9.2638" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4859.622721][ T31] audit: type=1400 audit(2000000535.236:52760): avc: denied { map_create } for pid=16935 comm="syz.9.2638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4859.624484][ T31] audit: type=1400 audit(2000000535.236:52761): avc: denied { bpf } for pid=16935 comm="syz.9.2638" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4859.642904][ T31] audit: type=1400 audit(2000000535.256:52762): avc: denied { map_read map_write } for pid=16935 comm="syz.9.2638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4859.686656][ T31] audit: type=1400 audit(2000000535.296:52763): avc: denied { prog_load } for pid=16936 comm="syz.8.2639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4859.697317][ T31] audit: type=1400 audit(2000000535.306:52764): avc: denied { prog_load } for pid=16935 comm="syz.9.2638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4859.717647][ T31] audit: type=1400 audit(2000000535.326:52765): avc: denied { bpf } for pid=16935 comm="syz.9.2638" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4859.744029][ T31] audit: type=1400 audit(2000000535.336:52766): avc: denied { bpf } for pid=16936 comm="syz.8.2639" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4859.832969][ T31] audit: type=1400 audit(2000000535.426:52767): avc: denied { perfmon } for pid=16936 comm="syz.8.2639" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4862.980672][ C1] vcan0: j1939_tp_rxtimer: 0x84b24400: rx timeout, send abort [ 4862.981355][ C1] vcan0: j1939_tp_rxtimer: 0x84b24f00: rx timeout, send abort [ 4862.983219][ C1] vcan0: j1939_xtp_rx_abort_one: 0x84b24400: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4862.983813][ C1] vcan0: j1939_xtp_rx_abort_one: 0x84b24f00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4864.931830][ T31] kauditd_printk_skb: 162 callbacks suppressed [ 4864.932385][ T31] audit: type=1400 audit(2000000540.546:52930): avc: denied { prog_load } for pid=16961 comm="syz.8.2647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4864.938225][ T31] audit: type=1400 audit(2000000540.546:52931): avc: denied { prog_load } for pid=16959 comm="syz.9.2646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4864.959861][ T31] audit: type=1400 audit(2000000540.566:52932): avc: denied { bpf } for pid=16959 comm="syz.9.2646" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4864.960391][ T31] audit: type=1400 audit(2000000540.566:52933): avc: denied { bpf } for pid=16961 comm="syz.8.2647" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4864.967255][ T31] audit: type=1400 audit(2000000540.576:52934): avc: denied { perfmon } for pid=16959 comm="syz.9.2646" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4864.986298][ T31] audit: type=1400 audit(2000000540.596:52935): avc: denied { perfmon } for pid=16959 comm="syz.9.2646" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4864.988742][ T31] audit: type=1400 audit(2000000540.596:52936): avc: denied { perfmon } for pid=16959 comm="syz.9.2646" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4864.999954][ T31] audit: type=1400 audit(2000000540.606:52937): avc: denied { prog_load } for pid=16961 comm="syz.8.2647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4865.002245][ T31] audit: type=1400 audit(2000000540.606:52938): avc: denied { bpf } for pid=16961 comm="syz.8.2647" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4865.018911][ T31] audit: type=1400 audit(2000000540.626:52939): avc: denied { perfmon } for pid=16959 comm="syz.9.2646" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4869.684318][ C0] vcan0: j1939_tp_rxtimer: 0x84b1a800: rx timeout, send abort [ 4869.684994][ C0] vcan0: j1939_tp_rxtimer: 0x84b1a600: rx timeout, send abort [ 4869.685347][ C0] vcan0: j1939_xtp_rx_abort_one: 0x84b1a800: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4869.685757][ C0] vcan0: j1939_xtp_rx_abort_one: 0x84b1a600: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4870.970581][ T31] kauditd_printk_skb: 83 callbacks suppressed [ 4870.971149][ T31] audit: type=1400 audit(2000000546.586:53023): avc: denied { map_create } for pid=16971 comm="syz.8.2650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4871.663406][ T31] audit: type=1400 audit(2000000547.276:53024): avc: denied { create } for pid=16973 comm="syz.8.2651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4871.712943][ T31] audit: type=1400 audit(2000000547.326:53025): avc: denied { write } for pid=16973 comm="syz.8.2651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4871.736465][ T31] audit: type=1400 audit(2000000547.346:53026): avc: denied { write } for pid=16973 comm="syz.8.2651" lport=53365 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4873.111500][ T31] audit: type=1400 audit(2000000548.726:53027): avc: denied { prog_load } for pid=16976 comm="syz.8.2652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4873.113371][ T31] audit: type=1400 audit(2000000548.726:53028): avc: denied { bpf } for pid=16976 comm="syz.8.2652" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4873.140499][ T31] audit: type=1400 audit(2000000548.746:53029): avc: denied { map_create } for pid=16976 comm="syz.8.2652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4873.154065][ T31] audit: type=1400 audit(2000000548.766:53030): avc: denied { map_read map_write } for pid=16976 comm="syz.8.2652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4873.177211][ T31] audit: type=1400 audit(2000000548.786:53031): avc: denied { prog_load } for pid=16976 comm="syz.8.2652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4873.186457][ T31] audit: type=1400 audit(2000000548.796:53032): avc: denied { bpf } for pid=16976 comm="syz.8.2652" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4877.438325][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 4877.438762][ T31] audit: type=1400 audit(2000000553.046:53069): avc: denied { create } for pid=16988 comm="syz.8.2656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4877.474177][ T31] audit: type=1400 audit(2000000553.086:53070): avc: denied { write } for pid=16988 comm="syz.8.2656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4877.491631][ T31] audit: type=1400 audit(2000000553.106:53071): avc: denied { write } for pid=16988 comm="syz.8.2656" lport=55926 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4878.135235][ T31] audit: type=1400 audit(2000000553.746:53072): avc: denied { unmount } for pid=15646 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4878.335062][ T31] audit: type=1400 audit(2000000553.946:53073): avc: denied { write } for pid=16991 comm="syz.8.2657" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4878.341542][ T31] audit: type=1400 audit(2000000553.946:53074): avc: denied { write open } for pid=16991 comm="syz.8.2657" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4878.359613][ T31] audit: type=1400 audit(2000000553.966:53075): avc: denied { map_create } for pid=16991 comm="syz.8.2657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4878.360089][ T31] audit: type=1400 audit(2000000553.966:53076): avc: denied { map_read map_write } for pid=16991 comm="syz.8.2657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4878.381893][ T31] audit: type=1400 audit(2000000553.996:53077): avc: denied { prog_load } for pid=16991 comm="syz.8.2657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4878.384085][ T31] audit: type=1400 audit(2000000553.996:53078): avc: denied { bpf } for pid=16991 comm="syz.8.2657" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4880.165240][ C0] vkms_vblank_simulate: vblank timer overrun [ 4882.622186][ T31] kauditd_printk_skb: 125 callbacks suppressed [ 4882.622759][ T31] audit: type=1400 audit(2000000558.236:53204): avc: denied { read } for pid=17013 comm="syz.8.2664" name="card0" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4882.676869][ T31] audit: type=1400 audit(2000000558.286:53205): avc: denied { read open } for pid=17013 comm="syz.8.2664" path="/dev/dri/card0" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4882.736201][ T31] audit: type=1400 audit(2000000558.346:53206): avc: denied { read } for pid=17013 comm="syz.8.2664" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4882.745635][ T31] audit: type=1400 audit(2000000558.356:53207): avc: denied { read open } for pid=17013 comm="syz.8.2664" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4882.816684][ T31] audit: type=1400 audit(2000000558.426:53208): avc: denied { ioctl } for pid=17013 comm="syz.8.2664" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4882.861797][ T31] audit: type=1400 audit(2000000558.476:53209): avc: denied { ioctl } for pid=17013 comm="syz.8.2664" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64a1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4882.961454][ T31] audit: type=1400 audit(2000000558.566:53210): avc: denied { ioctl } for pid=17013 comm="syz.8.2664" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64ce scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4883.062811][ T31] audit: type=1400 audit(2000000558.676:53211): avc: denied { ioctl } for pid=17013 comm="syz.8.2664" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x642d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4883.373913][ T31] audit: type=1400 audit(2000000558.966:53212): avc: denied { unmount } for pid=15646 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4883.984800][ T31] audit: type=1400 audit(2000000559.596:53213): avc: denied { mounton } for pid=17016 comm="syz.8.2665" path="/112/file0" dev="tmpfs" ino=595 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 4883.988489][T17018] fuse: Bad value for 'fd' [ 4885.272211][ C0] vkms_vblank_simulate: vblank timer overrun [ 4887.651052][ T31] kauditd_printk_skb: 186 callbacks suppressed [ 4887.664474][ T31] audit: type=1400 audit(2000000563.246:53400): avc: denied { perfmon } for pid=17031 comm="syz.8.2673" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4887.707855][ T31] audit: type=1400 audit(2000000563.316:53401): avc: denied { perfmon } for pid=17031 comm="syz.8.2673" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4887.731086][ T31] audit: type=1400 audit(2000000563.326:53402): avc: denied { perfmon } for pid=17031 comm="syz.8.2673" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4887.757083][ T31] audit: type=1400 audit(2000000563.366:53403): avc: denied { perfmon } for pid=17031 comm="syz.8.2673" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4887.809760][ T31] audit: type=1400 audit(2000000563.416:53404): avc: denied { bpf } for pid=17031 comm="syz.8.2673" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4887.812856][ T31] audit: type=1400 audit(2000000563.426:53405): avc: denied { bpf } for pid=17031 comm="syz.8.2673" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4887.855930][ T31] audit: type=1400 audit(2000000563.446:53406): avc: denied { prog_run } for pid=17031 comm="syz.8.2673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4887.909999][ T31] audit: type=1400 audit(2000000563.516:53407): avc: denied { map_create } for pid=17031 comm="syz.8.2673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4889.050323][ T31] audit: type=1400 audit(2000000564.646:53408): avc: denied { map_create } for pid=17035 comm="syz.8.2674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4889.062132][ T31] audit: type=1400 audit(2000000564.676:53409): avc: denied { map_read map_write } for pid=17035 comm="syz.8.2674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4892.848358][ T31] kauditd_printk_skb: 107 callbacks suppressed [ 4892.848772][ T31] audit: type=1400 audit(2000000568.456:53517): avc: denied { map_create } for pid=17047 comm="syz.9.2680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4892.859976][ T31] audit: type=1400 audit(2000000568.466:53518): avc: denied { map_read map_write } for pid=17047 comm="syz.9.2680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4893.821016][ T31] audit: type=1400 audit(2000000569.426:53519): avc: denied { read } for pid=17049 comm="syz.9.2681" name="card0" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4893.824399][ T31] audit: type=1400 audit(2000000569.436:53520): avc: denied { read open } for pid=17049 comm="syz.9.2681" path="/dev/dri/card0" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4893.834241][ T31] audit: type=1400 audit(2000000569.446:53521): avc: denied { read } for pid=17049 comm="syz.9.2681" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4893.839983][ T31] audit: type=1400 audit(2000000569.456:53522): avc: denied { read open } for pid=17049 comm="syz.9.2681" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4893.844955][ T31] audit: type=1400 audit(2000000569.456:53523): avc: denied { ioctl } for pid=17049 comm="syz.9.2681" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4893.848200][ T31] audit: type=1400 audit(2000000569.456:53524): avc: denied { ioctl } for pid=17049 comm="syz.9.2681" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64a1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4893.852102][ T31] audit: type=1400 audit(2000000569.466:53525): avc: denied { ioctl } for pid=17049 comm="syz.9.2681" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64ce scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4893.857921][ T31] audit: type=1400 audit(2000000569.466:53526): avc: denied { ioctl } for pid=17049 comm="syz.9.2681" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x642d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4894.824412][T17053] pim6reg1: entered promiscuous mode [ 4894.825248][T17053] pim6reg1: entered allmulticast mode [ 4895.343594][T17061] fuse: Bad value for 'fd' [ 4897.477866][T17076] pim6reg1: entered promiscuous mode [ 4897.478600][T17076] pim6reg1: entered allmulticast mode [ 4898.027894][ T31] kauditd_printk_skb: 109 callbacks suppressed [ 4898.029078][ T31] audit: type=1400 audit(2000000573.636:53636): avc: denied { read write } for pid=17084 comm="syz.8.2690" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4898.052902][ T31] audit: type=1400 audit(2000000573.656:53637): avc: denied { read write open } for pid=17084 comm="syz.8.2690" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4898.185556][ T31] audit: type=1400 audit(2000000573.796:53638): avc: denied { mounton } for pid=17084 comm="syz.8.2690" path="/124/file0" dev="tmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4898.211106][ T31] audit: type=1400 audit(2000000573.816:53639): avc: denied { mount } for pid=17084 comm="syz.8.2690" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4898.821200][ T31] audit: type=1400 audit(2000000574.436:53640): avc: denied { prog_load } for pid=17087 comm="syz.9.2691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4898.825177][ T31] audit: type=1400 audit(2000000574.436:53641): avc: denied { bpf } for pid=17087 comm="syz.9.2691" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4898.982713][ T31] audit: type=1400 audit(2000000574.596:53642): avc: denied { prog_load } for pid=17087 comm="syz.9.2691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4898.985919][ T31] audit: type=1400 audit(2000000574.596:53643): avc: denied { bpf } for pid=17087 comm="syz.9.2691" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4899.055132][ T31] audit: type=1400 audit(2000000574.656:53644): avc: denied { perfmon } for pid=17087 comm="syz.9.2691" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4899.096599][ T31] audit: type=1400 audit(2000000574.706:53645): avc: denied { perfmon } for pid=17087 comm="syz.9.2691" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4903.143516][ T31] kauditd_printk_skb: 86 callbacks suppressed [ 4903.143951][ T31] audit: type=1400 audit(2000000578.756:53732): avc: denied { read append } for pid=17100 comm="syz.9.2695" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4903.158056][ T31] audit: type=1400 audit(2000000578.766:53733): avc: denied { read append open } for pid=17100 comm="syz.9.2695" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4903.255254][ T31] audit: type=1400 audit(2000000578.866:53734): avc: denied { ioctl } for pid=17100 comm="syz.9.2695" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4903.467138][ T31] audit: type=1400 audit(2000000579.076:53735): avc: denied { ioctl } for pid=17100 comm="syz.9.2695" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54d9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4903.476831][ T31] audit: type=1400 audit(2000000579.086:53736): avc: denied { ioctl } for pid=17100 comm="syz.9.2695" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54d9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4904.013724][ T31] audit: type=1400 audit(2000000579.626:53737): avc: denied { read write } for pid=17107 comm="syz.8.2696" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4904.017045][ T31] audit: type=1400 audit(2000000579.626:53738): avc: denied { read write open } for pid=17107 comm="syz.8.2696" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4904.037296][ T31] audit: type=1400 audit(2000000579.646:53739): avc: denied { mounton } for pid=17107 comm="syz.8.2696" path="/127/file0" dev="tmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4904.100176][ T31] audit: type=1400 audit(2000000579.706:53740): avc: denied { mount } for pid=17107 comm="syz.8.2696" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4904.952211][ T31] audit: type=1400 audit(2000000580.566:53741): avc: denied { prog_load } for pid=17110 comm="syz.9.2697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4908.161749][ T31] kauditd_printk_skb: 83 callbacks suppressed [ 4908.162147][ T31] audit: type=1400 audit(2000000583.776:53825): avc: denied { prog_load } for pid=17124 comm="syz.9.2702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4908.169702][ T31] audit: type=1400 audit(2000000583.776:53826): avc: denied { bpf } for pid=17124 comm="syz.9.2702" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4908.193251][ T31] audit: type=1400 audit(2000000583.806:53827): avc: denied { perfmon } for pid=17124 comm="syz.9.2702" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4908.209534][ T31] audit: type=1400 audit(2000000583.806:53828): avc: denied { perfmon } for pid=17124 comm="syz.9.2702" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4908.210270][ T31] audit: type=1400 audit(2000000583.816:53829): avc: denied { perfmon } for pid=17124 comm="syz.9.2702" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4908.249841][ T31] audit: type=1400 audit(2000000583.846:53830): avc: denied { perfmon } for pid=17124 comm="syz.9.2702" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4908.250291][ T31] audit: type=1400 audit(2000000583.846:53831): avc: denied { perfmon } for pid=17124 comm="syz.9.2702" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4908.250547][ T31] audit: type=1400 audit(2000000583.846:53832): avc: denied { bpf } for pid=17124 comm="syz.9.2702" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4908.253950][ T31] audit: type=1400 audit(2000000583.866:53833): avc: denied { bpf } for pid=17124 comm="syz.9.2702" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4908.265300][ T31] audit: type=1400 audit(2000000583.876:53834): avc: denied { prog_run } for pid=17124 comm="syz.9.2702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4913.181727][ T31] kauditd_printk_skb: 62 callbacks suppressed [ 4913.182181][ T31] audit: type=1400 audit(2000000588.796:53897): avc: denied { bpf } for pid=17142 comm="syz.9.2707" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4913.198130][ T31] audit: type=1400 audit(2000000588.806:53898): avc: denied { prog_load } for pid=17142 comm="syz.9.2707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4913.222825][ T31] audit: type=1400 audit(2000000588.826:53899): avc: denied { bpf } for pid=17142 comm="syz.9.2707" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4913.227292][ T31] audit: type=1400 audit(2000000588.836:53900): avc: denied { perfmon } for pid=17142 comm="syz.9.2707" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4913.261547][ T31] audit: type=1400 audit(2000000588.866:53901): avc: denied { perfmon } for pid=17142 comm="syz.9.2707" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4913.265533][ T31] audit: type=1400 audit(2000000588.876:53902): avc: denied { perfmon } for pid=17142 comm="syz.9.2707" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4913.300061][ T31] audit: type=1400 audit(2000000588.906:53903): avc: denied { perfmon } for pid=17142 comm="syz.9.2707" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4913.305351][ T31] audit: type=1400 audit(2000000588.916:53904): avc: denied { perfmon } for pid=17142 comm="syz.9.2707" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4913.326763][ T31] audit: type=1400 audit(2000000588.936:53905): avc: denied { bpf } for pid=17142 comm="syz.9.2707" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4913.338959][ T31] audit: type=1400 audit(2000000588.946:53906): avc: denied { map_create } for pid=17138 comm="syz.8.2706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4918.657969][ T31] kauditd_printk_skb: 516 callbacks suppressed [ 4918.658331][ T31] audit: type=1400 audit(2000000594.266:54423): avc: denied { map_create } for pid=17296 comm="syz.8.2713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4918.684454][ T31] audit: type=1400 audit(2000000594.296:54424): avc: denied { perfmon } for pid=17296 comm="syz.8.2713" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4918.694122][ T31] audit: type=1400 audit(2000000594.306:54425): avc: denied { map_read map_write } for pid=17296 comm="syz.8.2713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4918.722063][ T31] audit: type=1400 audit(2000000594.336:54426): avc: denied { map_create } for pid=17296 comm="syz.8.2713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4918.725456][ T31] audit: type=1400 audit(2000000594.336:54427): avc: denied { bpf } for pid=17296 comm="syz.8.2713" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4918.744431][ T31] audit: type=1400 audit(2000000594.356:54428): avc: denied { map_read map_write } for pid=17296 comm="syz.8.2713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4918.799787][ T31] audit: type=1400 audit(2000000594.406:54429): avc: denied { map_create } for pid=17296 comm="syz.8.2713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4918.800187][ T31] audit: type=1400 audit(2000000594.406:54430): avc: denied { bpf } for pid=17296 comm="syz.8.2713" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4918.814616][ T31] audit: type=1400 audit(2000000594.426:54431): avc: denied { prog_load } for pid=17311 comm="syz.9.2714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4918.815110][ T31] audit: type=1400 audit(2000000594.426:54432): avc: denied { bpf } for pid=17311 comm="syz.9.2714" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4920.820599][T17318] pim6reg1: entered promiscuous mode [ 4920.821115][T17318] pim6reg1: entered allmulticast mode [ 4923.929031][ T31] kauditd_printk_skb: 140 callbacks suppressed [ 4923.940050][ T31] audit: type=1400 audit(2000000599.536:54573): avc: denied { map_create } for pid=17334 comm="syz.9.2720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4923.957013][ T31] audit: type=1400 audit(2000000599.566:54574): avc: denied { map_read map_write } for pid=17334 comm="syz.9.2720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4923.982520][ T31] audit: type=1400 audit(2000000599.596:54575): avc: denied { prog_load } for pid=17334 comm="syz.9.2720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4923.987071][ T31] audit: type=1400 audit(2000000599.596:54576): avc: denied { bpf } for pid=17334 comm="syz.9.2720" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4923.998729][ T31] audit: type=1400 audit(2000000599.606:54577): avc: denied { perfmon } for pid=17334 comm="syz.9.2720" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4924.004545][ T31] audit: type=1400 audit(2000000599.616:54578): avc: denied { perfmon } for pid=17334 comm="syz.9.2720" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4924.008922][ T31] audit: type=1400 audit(2000000599.616:54579): avc: denied { perfmon } for pid=17334 comm="syz.9.2720" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4924.016455][ T31] audit: type=1400 audit(2000000599.626:54580): avc: denied { perfmon } for pid=17334 comm="syz.9.2720" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4924.018249][ T31] audit: type=1400 audit(2000000599.626:54581): avc: denied { perfmon } for pid=17334 comm="syz.9.2720" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4924.045544][ T31] audit: type=1400 audit(2000000599.656:54582): avc: denied { bpf } for pid=17334 comm="syz.9.2720" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4925.612933][T17345] netlink: 'syz.8.2724': attribute type 21 has an invalid length. [ 4925.614284][T17345] netlink: 132 bytes leftover after parsing attributes in process `syz.8.2724'. [ 4925.614927][T17345] netlink: 20 bytes leftover after parsing attributes in process `syz.8.2724'. [ 4926.326921][T17351] netlink: 32 bytes leftover after parsing attributes in process `syz.8.2726'. [ 4928.955901][ T31] kauditd_printk_skb: 152 callbacks suppressed [ 4928.989929][ T31] audit: type=1400 audit(2000000604.566:54735): avc: denied { ioctl } for pid=17362 comm="syz.9.2731" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64a1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4928.999590][ T31] audit: type=1400 audit(2000000604.606:54736): avc: denied { ioctl } for pid=17362 comm="syz.9.2731" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64ce scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4929.015259][ T31] audit: type=1400 audit(2000000604.626:54737): avc: denied { ioctl } for pid=17362 comm="syz.9.2731" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x642d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4929.892702][ T31] audit: type=1400 audit(2000000605.506:54738): avc: denied { map_create } for pid=17365 comm="syz.9.2732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4929.936587][ T31] audit: type=1400 audit(2000000605.546:54739): avc: denied { map_read map_write } for pid=17365 comm="syz.9.2732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4929.980186][ T31] audit: type=1400 audit(2000000605.586:54740): avc: denied { prog_load } for pid=17365 comm="syz.9.2732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4929.994190][ T31] audit: type=1400 audit(2000000605.606:54741): avc: denied { bpf } for pid=17365 comm="syz.9.2732" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4929.998321][ T31] audit: type=1400 audit(2000000605.606:54742): avc: denied { perfmon } for pid=17365 comm="syz.9.2732" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4930.009644][ T31] audit: type=1400 audit(2000000605.616:54743): avc: denied { perfmon } for pid=17365 comm="syz.9.2732" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4930.025840][ T31] audit: type=1400 audit(2000000605.636:54744): avc: denied { perfmon } for pid=17365 comm="syz.9.2732" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4934.325453][ T31] kauditd_printk_skb: 72 callbacks suppressed [ 4934.339893][ T31] audit: type=1400 audit(2000000609.936:54817): avc: denied { sys_module } for pid=17386 comm="syz.9.2741" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4934.348099][ T31] audit: type=1400 audit(2000000609.956:54818): avc: denied { module_request } for pid=17386 comm="syz.9.2741" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4934.436133][ T31] audit: type=1400 audit(2000000610.046:54819): avc: denied { map_create } for pid=17390 comm="syz.8.2742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4934.438359][ T31] audit: type=1400 audit(2000000610.046:54820): avc: denied { perfmon } for pid=17390 comm="syz.8.2742" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4934.460112][ T31] audit: type=1400 audit(2000000610.066:54821): avc: denied { map_read map_write } for pid=17390 comm="syz.8.2742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4934.475146][ T31] audit: type=1400 audit(2000000610.086:54822): avc: denied { prog_load } for pid=17390 comm="syz.8.2742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4934.509650][ T31] audit: type=1400 audit(2000000610.116:54823): avc: denied { bpf } for pid=17390 comm="syz.8.2742" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4934.510121][ T31] audit: type=1400 audit(2000000610.116:54824): avc: denied { map_create } for pid=17390 comm="syz.8.2742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4934.551742][ T31] audit: type=1400 audit(2000000610.166:54825): avc: denied { module_request } for pid=17390 comm="syz.8.2742" kmod="net-pf-16-proto-27" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4934.965047][ T31] audit: type=1400 audit(2000000610.566:54826): avc: denied { create } for pid=17390 comm="syz.8.2742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4935.008798][T17393] netlink: 'syz.8.2742': attribute type 27 has an invalid length. [ 4935.057533][T17393] sit0: left promiscuous mode [ 4935.823478][T17393] netdevsim netdevsim8 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 4935.824808][T17393] netdevsim netdevsim8 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 4935.825866][T17393] netdevsim netdevsim8 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 4935.826943][T17393] netdevsim netdevsim8 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 4937.180337][T17404] fuse: Bad value for 'fd' [ 4937.384935][T17403] SELinux: syz.8.2744 (17403) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 4939.230025][T17415] fuse: Bad value for 'fd' [ 4939.965501][ T31] kauditd_printk_skb: 79 callbacks suppressed [ 4939.966088][ T31] audit: type=1400 audit(2000000615.576:54906): avc: denied { map_create } for pid=17418 comm="syz.8.2753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4939.977525][ T31] audit: type=1400 audit(2000000615.586:54907): avc: denied { bpf } for pid=17418 comm="syz.8.2753" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4939.992515][ T31] audit: type=1400 audit(2000000615.606:54908): avc: denied { map_read map_write } for pid=17418 comm="syz.8.2753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4940.090470][ T31] audit: type=1400 audit(2000000615.696:54909): avc: denied { prog_load } for pid=17418 comm="syz.8.2753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4940.092438][ T31] audit: type=1400 audit(2000000615.696:54910): avc: denied { bpf } for pid=17418 comm="syz.8.2753" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4940.101196][ T31] audit: type=1400 audit(2000000615.696:54911): avc: denied { perfmon } for pid=17418 comm="syz.8.2753" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4940.109672][ T31] audit: type=1400 audit(2000000615.716:54912): avc: denied { create } for pid=17419 comm="syz.9.2752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4940.114002][ T31] audit: type=1400 audit(2000000615.716:54913): avc: denied { perfmon } for pid=17418 comm="syz.8.2753" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4940.116210][ T31] audit: type=1400 audit(2000000615.726:54914): avc: denied { perfmon } for pid=17418 comm="syz.8.2753" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4940.118612][ T31] audit: type=1400 audit(2000000615.726:54915): avc: denied { perfmon } for pid=17418 comm="syz.8.2753" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4941.847179][T17429] fuse: Bad value for 'fd' [ 4945.888252][ T31] kauditd_printk_skb: 109 callbacks suppressed [ 4945.888727][ T31] audit: type=1400 audit(2000000621.496:55025): avc: denied { create } for pid=17446 comm="syz.8.2763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4945.902657][ T31] audit: type=1400 audit(2000000621.516:55026): avc: denied { setopt } for pid=17446 comm="syz.8.2763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4946.390954][ T31] audit: type=1400 audit(2000000622.006:55027): avc: denied { create } for pid=17448 comm="syz.8.2764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4946.411356][T17450] netlink: 12 bytes leftover after parsing attributes in process `syz.8.2764'. [ 4946.413304][ T31] audit: type=1400 audit(2000000622.006:55028): avc: denied { write } for pid=17448 comm="syz.8.2764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4946.731911][ T31] audit: type=1400 audit(2000000622.346:55029): avc: denied { bpf } for pid=17451 comm="syz.9.2765" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4946.743482][ T31] audit: type=1400 audit(2000000622.356:55030): avc: denied { prog_load } for pid=17451 comm="syz.9.2765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4946.763242][ T31] audit: type=1400 audit(2000000622.366:55031): avc: denied { bpf } for pid=17451 comm="syz.9.2765" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4946.794154][ T31] audit: type=1400 audit(2000000622.406:55032): avc: denied { map_create } for pid=17451 comm="syz.9.2765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4946.797516][ T31] audit: type=1400 audit(2000000622.406:55033): avc: denied { perfmon } for pid=17451 comm="syz.9.2765" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4946.822152][ T31] audit: type=1400 audit(2000000622.426:55034): avc: denied { map_read map_write } for pid=17451 comm="syz.9.2765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4951.109970][ T31] kauditd_printk_skb: 141 callbacks suppressed [ 4951.110453][ T31] audit: type=1400 audit(2000000626.716:55176): avc: denied { map_create } for pid=17482 comm="syz.9.2776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4951.123682][ T31] audit: type=1400 audit(2000000626.736:55177): avc: denied { map_read map_write } for pid=17482 comm="syz.9.2776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4951.132370][ T31] audit: type=1400 audit(2000000626.746:55178): avc: denied { prog_load } for pid=17482 comm="syz.9.2776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4951.150027][ T31] audit: type=1400 audit(2000000626.756:55179): avc: denied { bpf } for pid=17482 comm="syz.9.2776" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4951.154767][ T31] audit: type=1400 audit(2000000626.766:55180): avc: denied { prog_load } for pid=17482 comm="syz.9.2776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4951.165302][ T31] audit: type=1400 audit(2000000626.776:55181): avc: denied { bpf } for pid=17482 comm="syz.9.2776" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4951.179821][ T31] audit: type=1400 audit(2000000626.786:55182): avc: denied { perfmon } for pid=17482 comm="syz.9.2776" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4951.180375][ T31] audit: type=1400 audit(2000000626.786:55183): avc: denied { perfmon } for pid=17482 comm="syz.9.2776" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4951.180504][ T31] audit: type=1400 audit(2000000626.786:55184): avc: denied { perfmon } for pid=17482 comm="syz.9.2776" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4951.195442][ T31] audit: type=1400 audit(2000000626.806:55185): avc: denied { perfmon } for pid=17482 comm="syz.9.2776" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 Connection to localhost closed by remote host. [ 4955.168508][T10851] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4955.293177][T10851] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4955.509827][T10851] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4955.638891][T10851] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4956.320225][T10851] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 4956.328213][T10851] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 4956.338024][T10851] bond0 (unregistering): Released all slaves [ 4956.409748][T10851] hsr_slave_0: left promiscuous mode [ 4956.414991][T10851] hsr_slave_1: left promiscuous mode [ 4956.423115][T10851] veth1_macvtap: left promiscuous mode [ 4956.423509][T10851] veth0_macvtap: left promiscuous mode [ 4956.423747][T10851] veth1_vlan: left promiscuous mode [ 4956.423928][T10851] veth0_vlan: left promiscuous mode [ 4958.330233][T10851] ------------[ cut here ]------------ [ 4958.336146][T10851] WARNING: CPU: 1 PID: 10851 at net/xfrm/xfrm_state.c:3284 xfrm_state_fini+0xd4/0x15c [ 4958.340632][T10851] Modules linked in: [ 4958.341425][T10851] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 4958.341949][T10851] CPU: 1 UID: 0 PID: 10851 Comm: kworker/u8:0 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 4958.342270][T10851] Hardware name: ARM-Versatile Express [ 4958.342623][T10851] Workqueue: netns cleanup_net [ 4958.343223][T10851] Call trace: [ 4958.343383][T10851] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 4958.343969][T10851] r7:00000000 r6:8282083c r5:00000000 r4:8225b4f4 [ 4958.344166][T10851] [<80201ae4>] (show_stack) from [<8021fdf4>] (dump_stack_lvl+0x54/0x7c) [ 4958.344414][T10851] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 4958.344994][T10851] r5:00000000 r4:82a6dd18 [ 4958.345172][T10851] [<8021fe1c>] (dump_stack) from [<80202614>] (panic+0x120/0x374) [ 4958.345621][T10851] [<802024f4>] (panic) from [<80258578>] (get_taint+0x0/0x1c) [ 4958.345942][T10851] r3:8280c684 r2:00000001 r1:8224203c r0:822499d4 [ 4958.346176][T10851] r7:817eac48 [ 4958.346331][T10851] [<80258504>] (check_panic_on_warn) from [<802586dc>] (__warn+0x80/0x188) [ 4958.346643][T10851] [<8025865c>] (__warn) from [<8025895c>] (warn_slowpath_fmt+0x178/0x1f4) [ 4958.347034][T10851] r8:00000009 r7:82437d24 r6:ea941dd4 r5:840fa400 r4:00000000 [ 4958.347393][T10851] [<802587e8>] (warn_slowpath_fmt) from [<817eac48>] (xfrm_state_fini+0xd4/0x15c) [ 4958.347819][T10851] r10:00000001 r9:00000001 r8:829d1d80 r7:829e44d0 r6:829d1d80 r5:84c62700 [ 4958.348138][T10851] r4:84c62700 [ 4958.348275][T10851] [<817eab74>] (xfrm_state_fini) from [<817dbde0>] (xfrm_net_exit+0x2c/0x40) [ 4958.348608][T10851] r5:84c62700 r4:84c62700 [ 4958.348774][T10851] [<817dbdb4>] (xfrm_net_exit) from [<8154b1f8>] (ops_undo_list+0xe8/0x238) [ 4958.349379][T10851] r5:84c62700 r4:ea941e98 [ 4958.349578][T10851] [<8154b110>] (ops_undo_list) from [<8154d428>] (cleanup_net+0x20c/0x384) [ 4958.350119][T10851] r10:00000000 r9:ffffffd4 r8:85714e00 r7:829d1ca8 r6:829d1c80 r5:82c1c600 [ 4958.352559][T10851] r4:84c62720 [ 4958.355780][T10851] [<8154d21c>] (cleanup_net) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 4958.359630][T10851] r10:8300f070 r9:8301bc15 r8:840fa400 r7:8300e600 r6:8301bc00 r5:829d1c98 [ 4958.360114][T10851] r4:84af6200 [ 4958.360348][T10851] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 4958.360751][T10851] r10:61c88647 r9:840fa400 r8:84af622c r7:82804d40 r6:8300e600 r5:8300e620 [ 4958.361124][T10851] r4:84af6200 [ 4958.361286][T10851] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 4958.361725][T10851] r10:00000000 r9:84af6200 r8:8027ecf4 r7:dfa49e60 r6:84b63b80 r5:840fa400 [ 4958.362067][T10851] r4:00000001 [ 4958.362313][T10851] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 4958.362640][T10851] Exception stack(0xea941fb0 to 0xea941ff8) [ 4958.362927][T10851] 1fa0: 00000000 00000000 00000000 00000000 [ 4958.363341][T10851] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4958.363671][T10851] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4958.363990][T10851] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 4958.364324][T10851] r4:85973040 [ 4958.367125][T10851] Rebooting in 86400 seconds.. VM DIAGNOSIS: 11:20:06 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=600b0013 R02=ec4e5bcc R03=81a30630 R04=82ad1b50 R05=ec4e5bcc R06=0000019e R07=0000039f R08=82ad1cd8 R09=807845d4 R10=82ad1cdc R11=ec4e5c2c R12=ec4e5c48 R13=ec4e5c08 R14=8022be64 R15=81a30740 PSR=600b0013 -ZC- A S svc32 s00=2d2d2d2d s01=2d2d2d2d d00=2d2d2d2d2d2d2d2d s02=31545b5d s03=31353830 d01=3135383031545b5d s04=6f62205d s05=2030646e d02=2030646e6f62205d s06=726e7528 s07=73696765 d03=73696765726e7528 s08=69726574 s09=3a29676e d04=3a29676e69726574 s10=6c732820 s11=20657661 d05=206576616c732820 s12=646e6f62 s13=616c735f d06=616c735f646e6f62 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=00000002 R02=eb1ed030 R03=00000030 R04=84124440 R05=ea941b4c R06=8295a2b0 R07=00000001 R08=82828458 R09=00000000 R10=00003243 R11=ea941ae8 R12=ea941a8c R13=ea941acc R14=81a30afc R15=80a6ac68 PSR=800f0193 N--- A S svc32 s00=73756f75 s01=646f6d20 d00=646f6d2073756f75 s02=31545b5d s03=31353830 d01=3135383031545b5d s04=6f62205d s05=2030646e d02=2030646e6f62205d s06=726e7528 s07=73696765 d03=73696765726e7528 s08=69726574 s09=3a29676e d04=3a29676e69726574 s10=6c732820 s11=20657661 d05=206576616c732820 s12=646e6f62 s13=616c735f d06=616c735f646e6f62 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000