last executing test programs:

7m3.908125738s ago: executing program 1 (id=50):
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]})
r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10)
lsm_set_self_attr(0x69, 0x0, 0x0, 0x20)

7m3.432569381s ago: executing program 1 (id=52):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000b80000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10)
open_tree(0xffffffffffffffff, 0x0, 0x0)

7m3.0798761s ago: executing program 1 (id=54):
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000800)={'hsr0\x00', <r2=>0x0})
r3 = socket$packet(0x11, 0x3, 0x300)
sendto$packet(r3, 0x0, 0x0, 0x40000, &(0x7f00000001c0)={0x11, 0x1c, r2, 0x1, 0x70, 0x6, @local}, 0x14)
sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@dellink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x20}}, 0x0)

7m2.561337524s ago: executing program 1 (id=55):
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8)

7m2.199795144s ago: executing program 1 (id=56):
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000280)={'gretap0\x00', 0x0})

7m1.931363482s ago: executing program 1 (id=57):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r0}, 0x10)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffc}]})
fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x1)

6m16.662096274s ago: executing program 32 (id=57):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r0}, 0x10)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffc}]})
fsopen(&(0x7f0000000040)='hugetlbfs\x00', 0x1)

5m35.748535118s ago: executing program 0 (id=136):
syz_emit_ethernet(0x66, &(0x7f0000000340)={@multicast, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02adf7", 0x30, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @time_exceed={0x2, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "fd9063", 0x0, 0x3a, 0x0, @loopback, @loopback}}}}}}}, 0x0)
r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
ptrace(0x10, r0)
ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000240)={&(0x7f0000000180)=""/120, 0xffffffffffffff28})

5m35.294616841s ago: executing program 0 (id=137):
bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10)
open_tree(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0)
rmdir(0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r2, 0x8923, &(0x7f0000000000)={'vlan0\x00', @random="0133014010ff"})

5m34.817022524s ago: executing program 0 (id=138):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r0}, 0x10)
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000000f8c0000000c0a01080000000000000000010000000900020073797a3200000000600003805c000080080003400000000250000b80200001800a00010071756f7461000000100002800c0001400000000000000000140001800c000100636f756e74657200000000000000058011e70000666c6f775f6f66666c6f6164000000000900010073797a30"], 0x110}, 0x1, 0x0, 0x0, 0x4000000}, 0x0)

5m34.20226892s ago: executing program 0 (id=139):
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000240)='kfree\x00', r0}, 0x10)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)

5m33.677173085s ago: executing program 0 (id=140):
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]})
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0, 0x0, 0xffffffffffffffff}, 0x13)
lseek(0xffffffffffffffff, 0x101, 0x0)

5m32.929565345s ago: executing program 0 (id=141):
munmap(&(0x7f0000001000/0x4000)=nil, 0x4000)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78)

4m47.113607413s ago: executing program 33 (id=141):
munmap(&(0x7f0000001000/0x4000)=nil, 0x4000)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78)

4m43.491220231s ago: executing program 2 (id=187):
r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10)
r2 = socket$inet(0x2, 0x3, 0x4)
setsockopt$inet_opts(r2, 0x0, 0x4, 0x0, 0x0)

4m42.973019965s ago: executing program 2 (id=188):
r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x111, 0x8}}, 0x20)

4m42.570722526s ago: executing program 2 (id=189):
r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000400)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10)
r2 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301)
ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f00000002c0)={0x40, 0x12, 0x7, 0x6, 0x0, 0x8, 0x0})

4m42.280813584s ago: executing program 2 (id=190):
unshare(0x2a020480)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, 0x0, 0x0)

4m41.981376292s ago: executing program 2 (id=191):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48)
bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10)
readlink(0x0, &(0x7f0000003740)=""/4080, 0xff0)

4m41.68047778s ago: executing program 2 (id=192):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10)
syz_open_procfs(0x0, &(0x7f0000000340)='net/raw6\x00')

3m56.602096138s ago: executing program 34 (id=192):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10)
syz_open_procfs(0x0, &(0x7f0000000340)='net/raw6\x00')

3m29.017259849s ago: executing program 3 (id=274):
socket$inet(0x2, 0x6, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10)
r2 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r2, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000000cc0)=@newtaction={0x84, 0x30, 0x12f, 0x0, 0x0, {0x0, 0x0, 0x1be}, [{0x70, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x5c, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x4}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x84}}, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@delnexthop={0x20, 0x69, 0xb, 0x0, 0x0, {}, [{0x8, 0x1, 0x1}]}, 0x20}}, 0x0)

3m27.211886108s ago: executing program 3 (id=279):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x50)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18)
syz_emit_ethernet(0x12, &(0x7f0000000280)={@remote, @remote, @val={@void, {0x8100, 0x2, 0x0, 0x1}}, {@mpls_mc}}, 0x0)

3m26.904060897s ago: executing program 3 (id=281):
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'nicvf0\x00', 0x2})
ioctl$TUNSETPERSIST(r0, 0x400454c9, 0x1)
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040))

3m26.611857874s ago: executing program 3 (id=283):
chdir(&(0x7f0000000140)='./file0\x00')
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000017009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000003c0)='kfree\x00', r0}, 0x10)
socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$key(0xf, 0x3, 0x2)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
socket$nl_route(0x10, 0x3, 0x0)
sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0207a20802"], 0x10}}, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x48, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0x5, "00000080000000000000000000800055"}}}]}, 0x48}}, 0x0)
setsockopt$MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0)
lchown(0x0, 0xee00, 0x0)

3m23.782424871s ago: executing program 3 (id=287):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r0, <r1=>0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000500)}, 0x20)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10)
socket$kcm(0x10, 0x2, 0x0)

3m22.214039394s ago: executing program 3 (id=288):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0xfd, 0x7ffc0002}]})
mount_setattr(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0)

2m37.224981629s ago: executing program 35 (id=288):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad1f50ad32d3fd25dfd73a015e0ca6a0f68a7d007f15451dfb265a0e3ccae669e173a64bc1cfd5587d452d64e7cc957d77578f4c25235138d5521f9453559c35da860e8efbc64e57cbb7aee976f2b54421eed73d5661ca3dbe74bd09de8793dbcceef76b2e5feecf9c66c54c3b3ffe1b4ce25d7c983c044c06cd0a48dfe3e26e7a23129d6606fd28a69989d552af6d9a9df2c3af36e0360050011bbecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f163d1a13ed38ae82f87925bfacba83109753f541cd027edd68149ee99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b70a7000000e7ffffff00000000d7900a820b63278f4e9a217b98ef7042ad2a92895614cd50cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e0867958e1dd7a0defb6670c06054002238260000000000040587c1ed797aa21a38e1e389f640a0b8b0000000000a835ad0f61ba73c31b05c00fba8a4aee676d7c45bb29671a68ee2e60da7b01a2e5785a238afa4aba70c07fcd95bf8b0d71b6f72d6a8d87fb08533d97ad96d3943c4cc8306dac433a5cdf334178b04963d67dd5a5707e618a1ef9057fec00f9e930219fa8d30e716de8cde9c60f0000000c3b64d10f0939b42b788daa7075fa542242b00f6bf9b64ad460e386b6f388351fbdacb3ad074574ee9d450f9dcfaef1be95ff3c449e6482e4403174618c20e887d6f320616d31d78a0e5421d5742cc52509fd90cf2df6d1404f6b8f810d7b94d421971b77a3270153a0d57cccfe27872f3e8e44480f93c33421986a7737842627301fb2fee8cabab074adaa2024ff57e609ba2f4d83b3bbf52309484532416f48f43b31395c6f45fee8f1682a4e8d5e3b9ae634ed24fb0e8b5fadaf5cb7eea62b7bb4264e72950c9dc791d771acc24c08cdb6ef24c813d082a86d9b879bdf5aefdfd905a2bd4ea36b0b54915a68fe149db154a8340017e1855511e9c0fe62d0cf55"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0xfd, 0x7ffc0002}]})
mount_setattr(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0)

2m26.90829841s ago: executing program 4 (id=360):
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c)
mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r0, 0x0)
r1 = socket$rds(0x15, 0x5, 0x0)
bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10)
sendmsg$rds(r1, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000400)=[@mask_fadd={0x58, 0x114, 0x8, {{0xf, 0x1}, &(0x7f0000000080)=0x6, 0x0, 0x5, 0xfffffffffffffffc, 0x7, 0x3, 0x0, 0x2}}], 0x58}, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)

2m24.287201781s ago: executing program 4 (id=361):
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xa8}, 0x18)
sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="2c0000003b00090000000000cd00000001000000180003"], 0x2c}}, 0x0)

2m23.893145672s ago: executing program 4 (id=362):
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@delnexthop={0x18, 0x69, 0xb}, 0x18}}, 0x4000000)

2m23.640842099s ago: executing program 4 (id=363):
r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000002, 0x50032, 0xffffffffffffffff, 0x0)
mlock(&(0x7f0000741000/0x4000)=nil, 0x4000)
syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x114, &(0x7f0000000140), 0x0, 0x4)

2m23.519492023s ago: executing program 4 (id=364):
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x1, 0x0, 0xf, 0x2, [{0x3, 0x0, 0xb}], 'Iw'}, @datasec={0xf, 0x0, 0x0, 0xf, 0x2, [], "1760"}]}, {0x0, [0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x61, 0x61]}}, &(0x7f0000000600)=""/4, 0x4a, 0x4, 0x1, 0x0, 0x0, @void, @value}, 0x28)

2m23.25979836s ago: executing program 4 (id=365):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r0}, 0x10)
mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103)
stat(&(0x7f00000004c0)='./file0\x00', 0x0)

1m50.218699649s ago: executing program 5 (id=429):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10)
r2 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00')
r3 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x0)
mmap(&(0x7f000001a000/0x3000)=nil, 0x3000, 0xf, 0x11012, r3, 0x0)
pread64(r2, &(0x7f000001a240)=""/102400, 0x19000, 0x0)
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)

1m49.680795333s ago: executing program 5 (id=430):
r0 = socket$packet(0x11, 0x3, 0x300)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', <r1=>0x0})
r2 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="6c000000100001040000000000000000009be500", @ANYRES32=0x0, @ANYBLOB="00000000000000004400128009000100766c616e00000000340002800600010080000000280003800c00010000000000070000000cff0000c0050000000000000c000100000000000700000008000500", @ANYRES32=r1], 0x6c}}, 0x0)

1m49.389787531s ago: executing program 5 (id=431):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x7fdf, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f00000001c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r2 = dup2(r1, r0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r2}, 0x10)
timer_create(0x3, 0x0, &(0x7f0000044000)=<r3=>0x0)
timer_gettime(r3, &(0x7f0000000380))

1m48.829544287s ago: executing program 5 (id=432):
r0 = socket$inet6_mptcp(0xa, 0x1, 0x106)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffd, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c)

1m48.729146189s ago: executing program 5 (id=433):
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10)
r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)=@keyring)

1m48.559998904s ago: executing program 5 (id=434):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e841cca555077e3a159110193dd2ff1fa7c3205bfedbe9d8f3bd23cd78a07e32fe0231368b2264f9c504b2f1f65515b2e1a38d522be18bd10a48b043ccc42673d06d7535f7866925d86751dfced1fd8accae669e173a659c1cfd6587d47578f4c35235138d5521f9453559c35da860e8efbcbfb42c30d294a55e1c46680bee88956f2b3599f455c7a3a49a01010000009f2f0517e4ca0e1803a20000000013d4e21b3336f1ae0796f23526ec0fd97f7325eac34c4dfafe7cc03b0864009d2e7d7ff6ff72ba8972b122b09789d99b3d0524f39d5ae913b2d22eb2c09244ba5dbe9180950f76f7049db5cb19d7962fed44e00f39ed8c13a11fa798de504e2865cd81f2b77fdd76c677f812d249c8130b018d4300000020000000db3947c85c3a9027ce9e856fa8b7fb05000000000000593d60abc9b3e67d127e56f3d3759dcfeb820634fd4d419efaefc74305b2bea2000600000051fcf5d62205561b6efaad206335a309f7b9e01446a6285f4665a7fe3cda2349f8bf400100000000000000f435f28fbeda75cf971f54a9698cf3270f420ee83f2d9babe7b922401639ce3c4ff0850a8e078374909413f3fbd3ced3285252dc81a46ef7ce29484dc6b6adfd7a4db730fc594609654d97836f171b766ffd7526847a6bfda9c648e8aa5c558aa6d463ec9d840f3914909187b6b0776952be71b0417d33d3ab25493418ba0fbacf768e07c1a939d31f606085b9e3efc93b0f58d5ec37494d9d10d76e603129e9a726579ac7d672cacd581b7ca77b3610b7403930fd42051d4b7443e5b49c000000000000007d6173050027791c9c1e04ad3711a66da2254a6f911b1469c62a6e1e3f9c1715c009a58e6eadac8f61b45853673df72dc813f7454ae22d79ac48034282f03040889500000000179dcf66d93907cedd49e0c5752f755849953957143a0335d2f62acbf18b251ce63b29fe177745448ccc925770fac12cf9e291200df6bb669d5a57dd74df817ef2f8698f710c359afe73947afebdf5536e4db8b0231d0cbc798766ec60586f14b44775bc9d250e4515cb83275d3b495fa90000e69a68b47ac4595463e1442d88e0606a060000cc914fae896ab129ccdf8792a8435972c8391d132a2fcbd40e865d62cc7c4200000000000000000000000000000800002a77fbbccfdb1ab3d8434905f09726b8145ea99c7640faab578dc98a6134df0a10a54ce7e7ddbb709a27d977d1f91ab9ee940700009594c9a50961b7fcc56d82584dc8254df7c411fa61353a6897c4f3b9f6f2ab47adb29aefecce96c94f360e129c9f2af569c794b68b2ead404bcdd4aa9cb6a128e1ad45fd4030e1e69adf4986b7860f3122d59c079f0f9a1732f691590f45512aec4ed2413f66cac7dd022301741c576dea82005b166d6c3b9ed0c297ac197a92188a618745e78dca0b3c62f1601243089d9c687563382b0b88a7d80fd7bf7fae8a690f52db1464d29b1b926414cd35705c89662c585e32c881d917b74f027674dbc017499ba15a2e2900000000000000000000000000007b593ecbdd162fee9f239a3c615b3e9a3fb0af254bdd247a5a5abdbc0123c950eec0f1800b295be71418dd65de15e11beef9630499c70fce74135a7c7c8e818b79b85ff65d59d89492d7a663d3f25651e252ab49d358eac853ffe182ee37a5db085a072647719cb8604ba2e0b80af3f1867bd8fb6afca671437e0a5a9d5a088436739262d894986882ec0fb419a377ef47f4920a5de6d8de0d3090b4cb6b773e825442d351f980eed0d997a4d98a51220c41b145e2186546c646128a3e69f52fcad83a026def90b9eb55f4a0a2251bbae428c6c017b5a47f1580831a7ce232857e6aa9e777e99da1a3ad03fdc93fa7ed96228deac5e3bce983971041297a6ba18783a2edc7e3901cc891035872c61e7ea375b0902be0c5cc7fdef968ba1ca17ce5e11f2f384cd28c1194f56d3cf074e8ba4e60e84dc2f352c3cd170581aee0c93ca8ceff84cda40325d340759e79e5c4bcec227e37f7ec2193c78877fb319ec1f2d4dcf1d46a15cde1d6cecce6ecdb0c0a3413394d51341a7b3606ad8c29b6dbf6be3265b528c3208de35161bfe19678df43a45b314e5a0f8754cfaf4f9d3fdf9c8f7b7c296bf2e632d25ba8ee6369b362a8e4c9dff176d482d32249c93680a04f6464f184acfd0376662fee9e1031e569248db9bc724cdd97976a4d7c5c5172d1383fa1e442f68a14b747a9f2597bf115dd0111fe8ba3584a43176f33bd39a408f8648b19839bba9cc47624ea19e46dbbdf0faf591bcdc8613828a0c5a40c04ae34bbf4a0e27828b0c7cb9d7a7455db030425a4bd69cf6dcb4b1d066f8ef4ea1c710e05819df82d5cc94ace6b41c2de37a2eaf24f24b3d9a7dd4d197d51407be3e90000000000000000dbc0b0d6e11ccb71437ebea7ad01d5b93a7a0561e4a1b3fa1aa9c75f3aaec4ace1b6201a3e007b657be62df59133b4d8f0f145d9fc954cc7792077268bf0977e2a699722ce3dbb97248b8a8a771dd0f7d9c97e6587524a44fd6d49330ccbc39ca277b84f7f0a39759ef0b42388bd69fe341a925e8cdc5d7b2d6ddb7331a081bd0672bf4d02255de095a179e51bf5492d4e89c3cbad59db725c0dd7e35cbd9887175286a37d7621a361eb830cc5b842b11b5d040ccceb254d6a0c9c43718d0816bb2465928e236101b8cd46b5ef9cb930378a9249cbb41bcde9bb78d71c512153d2f1d765b56d2e5ef3e3d34975787646630051074c9706747fda873ccfdb394fc269c8cfadc0a52c3402f392a38052f859ab5600000000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r0}, 0x10)
mknodat$null(0xffffffffffffff9c, 0x0, 0x0, 0x103)

1m37.470369346s ago: executing program 36 (id=365):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r0}, 0x10)
mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103)
stat(&(0x7f00000004c0)='./file0\x00', 0x0)

1m3.410461363s ago: executing program 37 (id=434):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r0}, 0x10)
mknodat$null(0xffffffffffffff9c, 0x0, 0x0, 0x103)

27.942566149s ago: executing program 6 (id=537):
connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0e00002304000000040000000400000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008230000b7040000000000008500000001000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000060ff850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000}, 0x50)
setxattr$security_selinux(&(0x7f0000000040)='./cgroup/pids.max\x00', &(0x7f0000000440), &(0x7f0000000480)='system_u:object_r:hald_log_t:s0\x00', 0x20, 0x1)
syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080))
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000"], 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]})
gettid()
timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0)

27.641584287s ago: executing program 6 (id=538):
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x2, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, <r1=>0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10)
setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000400)=0x9, 0x4)
r3 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x141341)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200))
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800"/12, @ANYRES32, @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, 0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0x439, 0x70fd2c, 0xffffffea, {0x0, 0x0, 0xe403, 0x0, 0x3, 0x610c3}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFLA_IPTUN_6RD_RELAY_PREFIXLEN={0x6, 0xe, 0x40}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000040)

27.349200245s ago: executing program 6 (id=539):
r0 = socket$l2tp(0x2, 0x2, 0x73)
sendto$l2tp(r0, &(0x7f0000000040)="e5786a0d000000000000c83b", 0xc, 0x0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10)
recvfrom$l2tp(r0, 0x0, 0x0, 0x12122, 0x0, 0x0)

24.487553953s ago: executing program 6 (id=543):
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f00000003c0)=ANY=[], 0x14}}, 0x0)
r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000188500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r5, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000"], 0x3c}}, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0)

23.628024176s ago: executing program 6 (id=545):
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x18)
r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$TIOCVHANGUP(r1, 0x5437, 0x0)

23.49887317s ago: executing program 6 (id=546):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r0}, 0x10)
r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
r2 = open(0x0, 0x14507e, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0)
fallocate(r1, 0x0, 0x0, 0x1000f4)
io_setup(0x5ff, &(0x7f0000000040)=<r3=>0x0)
io_submit(r3, 0x1, &(0x7f0000001d00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, r2}])

3.581126402s ago: executing program 7 (id=572):
r0 = socket$l2tp(0x2, 0x2, 0x73)
bind$l2tp(r0, 0x0, 0x0)
sendto$l2tp(r0, &(0x7f0000000040)="e5786a0d000000000000c83b", 0xc, 0x0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10)
recvfrom$l2tp(r0, 0x0, 0x0, 0x12122, 0x0, 0x0)

970.952693ms ago: executing program 7 (id=573):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000b80000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10)
syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff)

759.740019ms ago: executing program 7 (id=574):
connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0e00002304000000040000000400000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008230000b7040000000000008500000001000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000060ff850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000}, 0x50)
setxattr$security_selinux(&(0x7f0000000040)='./cgroup/pids.max\x00', &(0x7f0000000440), &(0x7f0000000480)='system_u:object_r:hald_log_t:s0\x00', 0x20, 0x1)
syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080))
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000"], 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]})
gettid()
timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0)
fcntl$lock(r3, 0x26, &(0x7f0000000380)={0x0, 0x0, 0x103ff, 0x2000000})

511.265315ms ago: executing program 7 (id=575):
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]})
r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, <r1=>0xffffffffffffffff}, 0x4)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10)
fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1)

330.128211ms ago: executing program 7 (id=576):
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10)
bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB="000000000000848bbea1c0de5d66000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"], 0x48)

0s ago: executing program 7 (id=577):
r0 = socket$l2tp(0x2, 0x2, 0x73)
bind$l2tp(r0, 0x0, 0x0)
sendto$l2tp(r0, &(0x7f0000000040)="e5786a0d000000000000c83b", 0xc, 0x0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10)
recvfrom$l2tp(r0, 0x0, 0x0, 0x12122, 0x0, 0x0)

kernel console output (not intermixed with test programs):

99): avc:  denied  { mounton } for  pid=3093 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[   87.977947][   T31] audit: type=1400 audit(87.880:100): avc:  denied  { mount } for  pid=3093 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1
[   87.979517][   T31] audit: type=1400 audit(87.880:101): avc:  denied  { mounton } for  pid=3093 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1
[   87.980537][   T31] audit: type=1400 audit(87.880:102): avc:  denied  { mount } for  pid=3093 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1
[   88.030145][ T3093] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[   88.046722][ T3092] veth0_macvtap: entered promiscuous mode
[   88.067343][ T3092] veth1_macvtap: entered promiscuous mode
[   88.194749][ T3092] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[   88.196015][ T3092] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[   88.199256][ T3092] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[   88.199726][ T3092] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[   88.726463][ T3779] netlink: 16186 bytes leftover after parsing attributes in process `syz.0.1'.
[   91.878966][ T3805] syz.1.12[3805] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   91.879669][ T3805] syz.1.12[3805] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   91.895013][ T3805] syz.1.12[3805] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   95.744922][   T31] kauditd_printk_skb: 82 callbacks suppressed
[   95.745041][   T31] audit: type=1400 audit(95.650:185): avc:  denied  { open } for  pid=3812 comm="syz.1.14" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   95.784070][   T31] audit: type=1400 audit(95.690:186): avc:  denied  { wake_alarm } for  pid=3812 comm="syz.1.14" capability=35  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[   95.873440][   T31] audit: type=1400 audit(95.770:187): avc:  denied  { ioctl } for  pid=3812 comm="syz.1.14" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   96.450363][   T31] audit: type=1400 audit(96.350:188): avc:  denied  { write } for  pid=3812 comm="syz.1.14" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   96.787493][ T3811] usb 2-1: new high-speed USB device number 2 using dummy_hcd
[   96.972615][ T3811] usb 2-1: device descriptor read/64, error -71
[   97.268848][ T3811] usb 2-1: new high-speed USB device number 3 using dummy_hcd
[   97.424866][ T3811] usb 2-1: device descriptor read/64, error -71
[   97.544510][ T3811] usb usb2-port1: attempt power cycle
[   97.923206][ T3811] usb 2-1: new high-speed USB device number 4 using dummy_hcd
[   97.947745][ T3811] usb 2-1: device descriptor read/8, error -71
[   98.120072][   T31] audit: type=1400 audit(98.010:189): avc:  denied  { ioctl } for  pid=3828 comm="syz.0.17" path="socket:[3125]" dev="sockfs" ino=3125 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[   98.230003][ T3811] usb 2-1: new high-speed USB device number 5 using dummy_hcd
[   98.290002][ T3811] usb 2-1: device descriptor read/8, error -71
[   98.401705][ T3811] usb usb2-port1: unable to enumerate USB device
[   99.151838][   T31] audit: type=1400 audit(99.040:190): avc:  denied  { sys_module } for  pid=3834 comm="syz.0.18" capability=16  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[   99.152749][   T31] audit: type=1400 audit(99.060:191): avc:  denied  { module_request } for  pid=3834 comm="syz.0.18" kmod="tty-ldisc-3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[   99.732364][   T31] audit: type=1400 audit(99.630:192): avc:  denied  { execmem } for  pid=3834 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[  101.051454][    C1] hrtimer: interrupt took 7931344 ns
[  106.574441][   T31] audit: type=1400 audit(106.480:193): avc:  denied  { lock } for  pid=3847 comm="syz.1.20" path="socket:[3144]" dev="sockfs" ino=3144 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1
[  107.212022][   T31] audit: type=1400 audit(107.100:194): avc:  denied  { write } for  pid=3853 comm="+}[@" path="socket:[3157]" dev="sockfs" ino=3157 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  107.416905][   T31] audit: type=1326 audit(107.320:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3856 comm="syz.1.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  107.433456][   T31] audit: type=1326 audit(107.330:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3856 comm="syz.1.24" exe="/syz-executor" sig=0 arch=40000028 syscall=308 compat=0 ip=0x133450 code=0x7ffc0000
[  107.434478][   T31] audit: type=1326 audit(107.330:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3856 comm="syz.1.24" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  107.731707][   T31] audit: type=1400 audit(107.630:198): avc:  denied  { read } for  pid=3862 comm="syz.1.26" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  107.732303][   T31] audit: type=1400 audit(107.630:199): avc:  denied  { open } for  pid=3862 comm="syz.1.26" path="net:[4026532661]" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  107.889825][   T31] audit: type=1400 audit(107.790:200): avc:  denied  { mounton } for  pid=3865 comm="syz.0.27" path="/9/file0" dev="tmpfs" ino=62 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1
[  107.890686][   T31] audit: type=1400 audit(107.790:201): avc:  denied  { mount } for  pid=3865 comm="syz.0.27" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[  108.023530][   T31] audit: type=1400 audit(107.930:202): avc:  denied  { unmount } for  pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[  112.245066][   T31] kauditd_printk_skb: 13 callbacks suppressed
[  112.245260][   T31] audit: type=1400 audit(112.150:216): avc:  denied  { unmount } for  pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1
[  112.568253][   T31] audit: type=1326 audit(112.470:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3909 comm="syz.0.39" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0
[  112.752281][   T31] audit: type=1326 audit(112.640:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.40" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  112.753681][   T31] audit: type=1326 audit(112.640:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.40" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  112.755529][   T31] audit: type=1326 audit(112.640:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.40" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  112.757256][   T31] audit: type=1326 audit(112.640:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.40" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  112.784437][   T31] audit: type=1326 audit(112.690:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.40" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  112.815782][   T31] audit: type=1326 audit(112.720:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.40" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  112.821870][   T31] audit: type=1326 audit(112.720:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.40" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  112.832816][   T31] audit: type=1326 audit(112.740:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3911 comm="syz.1.40" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  116.762541][ T3941] sch_tbf: burst 19872 is lower than device lo mtu (65550) !
[  117.276550][   T31] kauditd_printk_skb: 29 callbacks suppressed
[  117.276678][   T31] audit: type=1326 audit(117.180:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  117.283019][   T31] audit: type=1326 audit(117.190:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  117.332456][   T31] audit: type=1326 audit(117.240:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  117.375792][   T31] audit: type=1326 audit(117.280:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  117.376500][   T31] audit: type=1326 audit(117.280:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  117.404793][   T31] audit: type=1326 audit(117.310:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  117.406177][   T31] audit: type=1326 audit(117.310:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  117.410147][   T31] audit: type=1326 audit(117.310:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  117.428022][   T31] audit: type=1326 audit(117.320:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  117.429272][   T31] audit: type=1326 audit(117.330:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3947 comm="syz.1.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  118.123391][ T3959] hsr_slave_0: left promiscuous mode
[  118.149084][ T3959] hsr_slave_1: left promiscuous mode
[  122.149471][ T4002] syz.0.66[4002] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  122.150104][ T4002] syz.0.66[4002] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  122.151423][ T4002] syz.0.66[4002] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  122.753943][ T4010] syz.0.69 uses obsolete (PF_INET,SOCK_PACKET)
[  122.786169][   T31] kauditd_printk_skb: 32 callbacks suppressed
[  122.786340][   T31] audit: type=1400 audit(122.690:297): avc:  denied  { setopt } for  pid=4008 comm="syz.0.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  123.327932][   T31] audit: type=1400 audit(123.230:298): avc:  denied  { create } for  pid=4012 comm="syz.0.70" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  123.345754][   T31] audit: type=1400 audit(123.250:299): avc:  denied  { map } for  pid=4012 comm="syz.0.70" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2482 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  123.362110][   T31] audit: type=1400 audit(123.250:300): avc:  denied  { read write } for  pid=4012 comm="syz.0.70" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2482 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  123.948228][   T31] audit: type=1326 audit(123.850:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4012 comm="syz.0.70" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  123.958222][   T31] audit: type=1326 audit(123.860:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4012 comm="syz.0.70" exe="/syz-executor" sig=0 arch=40000028 syscall=306 compat=0 ip=0x133450 code=0x7ffc0000
[  123.971032][   T31] audit: type=1326 audit(123.870:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4012 comm="syz.0.70" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  123.974773][   T31] audit: type=1326 audit(123.880:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4012 comm="syz.0.70" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  126.409060][   T31] audit: type=1326 audit(126.310:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4017 comm="syz.0.71" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  126.432219][   T31] audit: type=1326 audit(126.310:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4017 comm="syz.0.71" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  130.504462][   T31] kauditd_printk_skb: 17 callbacks suppressed
[  130.504630][   T31] audit: type=1326 audit(130.410:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000
[  130.509995][   T31] audit: type=1326 audit(130.410:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x133450 code=0x7fc00000
[  130.546200][   T31] audit: type=1326 audit(130.430:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000
[  130.581835][   T31] audit: type=1326 audit(130.430:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000
[  130.585000][   T31] audit: type=1326 audit(130.430:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000
[  130.595415][   T31] audit: type=1326 audit(130.430:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000
[  130.597195][   T31] audit: type=1326 audit(130.430:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000
[  130.617907][   T31] audit: type=1326 audit(130.430:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000
[  130.619758][   T31] audit: type=1326 audit(130.430:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000
[  130.622841][   T31] audit: type=1326 audit(130.430:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.0.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000
[  135.812021][   T31] kauditd_printk_skb: 80 callbacks suppressed
[  135.812088][   T31] audit: type=1400 audit(135.700:414): avc:  denied  { mount } for  pid=4051 comm="syz.0.82" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1
[  135.879060][   T31] audit: type=1400 audit(135.730:415): avc:  denied  { unmount } for  pid=4051 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1
[  136.656973][   T31] audit: type=1326 audit(136.560:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4053 comm="syz.0.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  136.673879][   T31] audit: type=1326 audit(136.560:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4053 comm="syz.0.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  136.693383][   T31] audit: type=1326 audit(136.570:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4053 comm="syz.0.83" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x1313ec code=0x7ffc0000
[  136.696173][   T31] audit: type=1326 audit(136.570:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4053 comm="syz.0.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  136.698668][   T31] audit: type=1326 audit(136.580:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4053 comm="syz.0.83" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x133450 code=0x7ffc0000
[  136.700186][   T31] audit: type=1326 audit(136.580:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4053 comm="syz.0.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  136.718435][   T31] audit: type=1326 audit(136.580:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4053 comm="syz.0.83" exe="/syz-executor" sig=0 arch=40000028 syscall=70 compat=0 ip=0x133450 code=0x7ffc0000
[  136.733378][   T31] audit: type=1326 audit(136.580:423): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4053 comm="syz.0.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  143.408856][ T4076] usb usb1: usbfs: interface 0 claimed by hub while 'syz.0.89' sets config #0
[  154.115355][   T31] kauditd_printk_skb: 22 callbacks suppressed
[  154.115459][   T31] audit: type=1400 audit(154.020:446): avc:  denied  { create } for  pid=4080 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  154.131615][   T31] audit: type=1400 audit(154.030:447): avc:  denied  { connect } for  pid=4080 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  154.133776][   T31] audit: type=1400 audit(154.040:448): avc:  denied  { name_connect } for  pid=4080 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1
[  154.155030][   T31] audit: type=1400 audit(154.060:449): avc:  denied  { listen } for  pid=4080 comm="syz.0.91" lport=60717 faddr=::ffff:10.1.1.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  154.463648][   T31] audit: type=1400 audit(154.370:450): avc:  denied  { create } for  pid=4080 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[  154.468253][   T31] audit: type=1400 audit(154.370:451): avc:  denied  { write } for  pid=4080 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[  154.470382][ T4081] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=4081 comm=syz.0.91
[  154.476808][   T31] audit: type=1400 audit(154.380:452): avc:  denied  { read } for  pid=4080 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[  154.480432][   T31] audit: type=1400 audit(154.380:453): avc:  denied  { nlmsg_read } for  pid=4080 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[  154.640294][   T31] audit: type=1326 audit(154.540:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4085 comm="syz.0.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  154.646099][   T31] audit: type=1326 audit(154.550:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4085 comm="syz.0.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  164.382979][   T31] kauditd_printk_skb: 12 callbacks suppressed
[  164.383064][   T31] audit: type=1400 audit(164.270:468): avc:  denied  { execute } for  pid=4106 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[  164.406638][   T31] audit: type=1400 audit(164.310:469): avc:  denied  { execute_no_trans } for  pid=4106 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[  164.507268][   T31] audit: type=1400 audit(164.410:470): avc:  denied  { mounton } for  pid=4107 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[  169.800892][ T4107] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  169.833087][ T4107] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  170.465953][   T31] audit: type=1400 audit(170.370:471): avc:  denied  { create } for  pid=4295 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[  170.478922][   T31] audit: type=1400 audit(170.380:472): avc:  denied  { map } for  pid=4295 comm="syz.0.104" path="socket:[3554]" dev="sockfs" ino=3554 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[  170.480415][   T31] audit: type=1400 audit(170.380:473): avc:  denied  { read } for  pid=4295 comm="syz.0.104" path="socket:[3554]" dev="sockfs" ino=3554 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[  173.166148][ T4107] hsr_slave_0: entered promiscuous mode
[  173.175983][ T4107] hsr_slave_1: entered promiscuous mode
[  174.030750][ T4107] netdevsim netdevsim2 netdevsim0: renamed from eth0
[  174.064077][ T4107] netdevsim netdevsim2 netdevsim1: renamed from eth1
[  174.082533][ T4107] netdevsim netdevsim2 netdevsim2: renamed from eth2
[  174.123924][ T4107] netdevsim netdevsim2 netdevsim3: renamed from eth3
[  177.050457][ T4107] 8021q: adding VLAN 0 to HW filter on device bond0
[  188.295469][ T4107] veth0_vlan: entered promiscuous mode
[  188.348348][ T4107] veth1_vlan: entered promiscuous mode
[  188.772542][ T4107] veth0_macvtap: entered promiscuous mode
[  188.795981][ T4107] veth1_macvtap: entered promiscuous mode
[  188.962629][ T4107] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  188.963614][ T4107] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  188.964544][ T4107] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  188.965229][ T4107] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  189.873691][   T31] audit: type=1400 audit(189.740:474): avc:  denied  { mounton } for  pid=4107 comm="syz-executor" path="/syzkaller.4ZgLZX/syz-tmp" dev="vda" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[  189.875197][   T31] audit: type=1400 audit(189.740:475): avc:  denied  { mount } for  pid=4107 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[  189.881346][   T31] audit: type=1400 audit(189.780:476): avc:  denied  { mount } for  pid=4107 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1
[  189.882422][   T31] audit: type=1400 audit(189.780:477): avc:  denied  { mounton } for  pid=4107 comm="syz-executor" path="/syzkaller.4ZgLZX/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1
[  189.910701][   T31] audit: type=1400 audit(189.810:478): avc:  denied  { mounton } for  pid=4107 comm="syz-executor" path="/syzkaller.4ZgLZX/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1
[  189.912934][   T31] audit: type=1400 audit(189.810:479): avc:  denied  { unmount } for  pid=4107 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[  189.944071][   T31] audit: type=1400 audit(189.830:480): avc:  denied  { mounton } for  pid=4107 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[  189.945371][   T31] audit: type=1400 audit(189.830:481): avc:  denied  { mount } for  pid=4107 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1
[  189.946441][   T31] audit: type=1400 audit(189.830:482): avc:  denied  { mounton } for  pid=4107 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1
[  190.823697][   T31] audit: type=1400 audit(190.710:483): avc:  denied  { create } for  pid=4485 comm="syz.2.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1
[  192.993543][ T4503] Zero length message leads to an empty skb
[  195.372870][ T4524] mmap: syz.0.119 (4524) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst.
[  197.736294][   T31] kauditd_printk_skb: 21 callbacks suppressed
[  197.736786][   T31] audit: type=1400 audit(197.630:505): avc:  denied  { create } for  pid=4532 comm="syz.0.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[  197.782050][   T31] audit: type=1400 audit(197.680:506): avc:  denied  { bind } for  pid=4532 comm="syz.0.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[  198.132930][ T4537] netlink: 'syz.0.122': attribute type 27 has an invalid length.
[  198.424493][    C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies.
[  199.485444][ T4537] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0
[  199.486134][ T4537] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0
[  199.486536][ T4537] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0
[  199.486884][ T4537] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0
[  199.734170][ T4538] 8021q: adding VLAN 0 to HW filter on device bond0
[  199.929946][ T4538] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  199.930678][ T4538] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  199.955547][ T4538] veth1_vlan: left promiscuous mode
[  199.957421][ T4538] veth0_vlan: left promiscuous mode
[  199.967060][ T4538] veth0_vlan: entered promiscuous mode
[  199.976774][ T4538] veth1_vlan: entered promiscuous mode
[  200.003086][ T4538] veth1_macvtap: left promiscuous mode
[  200.043608][ T4538] veth0_macvtap: left promiscuous mode
[  200.045639][ T4538] veth0_macvtap: entered promiscuous mode
[  200.047167][ T4538] veth1_macvtap: entered promiscuous mode
[  200.049266][ T4538] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  200.049859][ T4538] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  200.050356][ T4538] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  200.050912][ T4538] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  200.700903][ T4544] IPv6: NLM_F_CREATE should be specified when creating new route
[  200.936492][   T31] audit: type=1326 audit(200.830:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  200.973938][   T31] audit: type=1326 audit(200.870:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  200.993270][   T31] audit: type=1326 audit(200.870:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  200.995975][   T31] audit: type=1326 audit(200.870:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  200.997453][   T31] audit: type=1326 audit(200.870:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  201.000424][   T31] audit: type=1326 audit(200.890:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  201.062064][   T31] audit: type=1326 audit(200.910:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  201.065537][   T31] audit: type=1326 audit(200.920:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.0.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  202.075468][ T4561] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  202.190060][ T4561] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  202.271501][ T4561] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  202.357008][ T4561] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  202.463791][ T4561] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0
[  202.496252][ T4561] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0
[  202.525360][ T4561] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0
[  202.578894][ T4561] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0
[  202.592016][ T4580] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[  204.798874][   T31] kauditd_printk_skb: 16 callbacks suppressed
[  204.798942][   T31] audit: type=1400 audit(204.700:531): avc:  denied  { name_bind } for  pid=4592 comm="syz.0.135" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1
[  206.042340][ T4599] @�: renamed from vlan0 (while UP)
[  206.596357][ T4602] netlink: 4 bytes leftover after parsing attributes in process `syz.0.138'.
[  206.597723][ T4602] netlink: 4 bytes leftover after parsing attributes in process `syz.0.138'.
[  206.600003][ T4602] netlink: 4 bytes leftover after parsing attributes in process `syz.0.138'.
[  207.759604][   T31] audit: type=1326 audit(207.660:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  207.773249][   T31] audit: type=1326 audit(207.670:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  207.814396][   T31] audit: type=1326 audit(207.670:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  207.832597][   T31] audit: type=1326 audit(207.680:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  207.852442][   T31] audit: type=1326 audit(207.690:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  207.882596][   T31] audit: type=1326 audit(207.700:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  207.884950][   T31] audit: type=1326 audit(207.720:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  207.887386][   T31] audit: type=1326 audit(207.720:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  207.889559][   T31] audit: type=1326 audit(207.720:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  219.250846][ T4615] vlan2: entered allmulticast mode
[  219.253909][ T4615] bridge_slave_0: entered allmulticast mode
[  219.277345][ T4615] bridge_slave_0: left allmulticast mode
[  221.346112][   T31] kauditd_printk_skb: 3 callbacks suppressed
[  221.346312][   T31] audit: type=1326 audit(221.250:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  221.364087][   T31] audit: type=1326 audit(221.260:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  221.370216][   T31] audit: type=1326 audit(221.270:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  221.383758][   T31] audit: type=1326 audit(221.290:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  221.396403][   T31] audit: type=1326 audit(221.300:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  221.407957][   T31] audit: type=1326 audit(221.300:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  221.420511][   T31] audit: type=1326 audit(221.310:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  221.430451][   T31] audit: type=1326 audit(221.320:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  221.441955][   T31] audit: type=1326 audit(221.320:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  221.444103][   T31] audit: type=1326 audit(221.330:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4632 comm="syz.2.147" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  238.100430][ T4645] netlink: 12 bytes leftover after parsing attributes in process `syz.2.150'.
[  238.780082][ T4648] syz.2.151[4648] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  238.780742][ T4648] syz.2.151[4648] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  238.787794][ T4648] syz.2.151[4648] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  238.809893][ T4648] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.151'.
[  238.822753][ T4647] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.151'.
[  239.055593][   T31] kauditd_printk_skb: 7 callbacks suppressed
[  239.055691][   T31] audit: type=1400 audit(238.960:561): avc:  denied  { name_bind } for  pid=4649 comm="syz.2.152" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1
[  239.529150][ T4660] netlink: 140 bytes leftover after parsing attributes in process `syz.2.155'.
[  239.665118][   T31] audit: type=1326 audit(239.560:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  239.677714][   T31] audit: type=1326 audit(239.570:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  239.688274][   T31] audit: type=1326 audit(239.570:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  239.698546][   T31] audit: type=1326 audit(239.590:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=257 compat=0 ip=0x133450 code=0x7ffc0000
[  239.706457][   T31] audit: type=1326 audit(239.590:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  239.709805][   T31] audit: type=1326 audit(239.590:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  239.716531][   T31] audit: type=1326 audit(239.590:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=177 compat=0 ip=0x133450 code=0x7ffc0000
[  240.213543][   T31] audit: type=1326 audit(240.120:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x7ffc0000
[  240.233555][   T31] audit: type=1326 audit(240.120:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4661 comm="syz.2.156" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x7ffc0000
[  245.612840][ T4672] netlink: 24 bytes leftover after parsing attributes in process `syz.2.159'.
[  247.055712][   T31] kauditd_printk_skb: 1117 callbacks suppressed
[  247.055831][   T31] audit: type=1326 audit(246.960:1688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  247.060329][   T31] audit: type=1326 audit(246.960:1689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  247.075956][   T31] audit: type=1326 audit(246.980:1690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  247.092083][   T31] audit: type=1326 audit(246.990:1691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  247.110016][   T31] audit: type=1326 audit(247.010:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  247.117424][   T31] audit: type=1326 audit(247.010:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  247.119430][   T31] audit: type=1326 audit(247.020:1694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  247.146878][   T31] audit: type=1326 audit(247.020:1695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  247.149302][   T31] audit: type=1326 audit(247.040:1696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=331 compat=0 ip=0x133450 code=0x7ffc0000
[  247.175415][   T31] audit: type=1326 audit(247.050:1697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4691 comm="syz.2.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  249.683400][ T4706] netlink: 12 bytes leftover after parsing attributes in process `syz.2.167'.
[  255.003882][   T31] kauditd_printk_skb: 56 callbacks suppressed
[  255.003979][   T31] audit: type=1326 audit(254.910:1754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.2.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  255.016910][   T31] audit: type=1326 audit(254.910:1755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.2.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  255.020065][   T31] audit: type=1326 audit(254.920:1756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.2.179" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  255.040182][   T31] audit: type=1326 audit(254.940:1757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.2.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  255.058559][   T31] audit: type=1326 audit(254.940:1758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.2.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  255.082222][   T31] audit: type=1326 audit(254.940:1759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.2.179" exe="/syz-executor" sig=0 arch=40000028 syscall=218 compat=0 ip=0x133450 code=0x7ffc0000
[  255.084919][   T31] audit: type=1326 audit(254.940:1760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.2.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  255.368887][   T31] audit: type=1400 audit(255.270:1761): avc:  denied  { getopt } for  pid=4749 comm="syz.2.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  256.705478][   T31] audit: type=1400 audit(256.600:1762): avc:  denied  { create } for  pid=4766 comm="syz.2.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1
[  259.844080][ T4739] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  259.877348][ T4739] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  261.289311][ T4739] hsr_slave_0: entered promiscuous mode
[  261.297449][ T4739] hsr_slave_1: entered promiscuous mode
[  261.304238][ T4739] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  261.305116][ T4739] Cannot create hsr debugfs directory
[  263.339452][ T4739] netdevsim netdevsim3 netdevsim0: renamed from eth0
[  263.547793][ T4739] netdevsim netdevsim3 netdevsim1: renamed from eth1
[  263.570867][ T4739] netdevsim netdevsim3 netdevsim2: renamed from eth2
[  263.667120][ T4739] netdevsim netdevsim3 netdevsim3: renamed from eth3
[  265.425967][ T4739] 8021q: adding VLAN 0 to HW filter on device bond0
[  271.066081][ T4739] veth0_vlan: entered promiscuous mode
[  271.098461][ T4739] veth1_vlan: entered promiscuous mode
[  271.248686][ T4739] veth0_macvtap: entered promiscuous mode
[  271.273980][ T4739] veth1_macvtap: entered promiscuous mode
[  271.385445][ T4739] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  271.387625][ T4739] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  271.388504][ T4739] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  271.389195][ T4739] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  275.787728][   T31] audit: type=1400 audit(275.690:1763): avc:  denied  { create } for  pid=5127 comm="syz.3.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1
[  277.530554][   T31] audit: type=1400 audit(277.430:1764): avc:  denied  { bind } for  pid=5137 comm="syz.3.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[  277.550668][   T31] audit: type=1400 audit(277.450:1765): avc:  denied  { write } for  pid=5137 comm="syz.3.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[  277.747129][   T31] audit: type=1326 audit(277.650:1766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5139 comm="syz.3.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  277.767610][   T31] audit: type=1326 audit(277.660:1767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5139 comm="syz.3.198" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000
[  277.768757][   T31] audit: type=1326 audit(277.660:1768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5139 comm="syz.3.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  277.784500][   T31] audit: type=1326 audit(277.660:1769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5139 comm="syz.3.198" exe="/syz-executor" sig=0 arch=40000028 syscall=377 compat=0 ip=0x133450 code=0x7ffc0000
[  277.785443][   T31] audit: type=1326 audit(277.660:1770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5139 comm="syz.3.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  277.788243][   T31] audit: type=1326 audit(277.670:1771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5139 comm="syz.3.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  277.939858][   T31] audit: type=1400 audit(277.840:1772): avc:  denied  { write } for  pid=5143 comm="syz.3.199" name="file0" dev="tmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1
[  281.627955][   T31] kauditd_printk_skb: 1 callbacks suppressed
[  281.634069][   T31] audit: type=1326 audit(281.530:1774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  281.653367][   T31] audit: type=1326 audit(281.530:1775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  281.696554][   T31] audit: type=1326 audit(281.560:1776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  281.698494][   T31] audit: type=1326 audit(281.600:1777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  281.712634][   T31] audit: type=1326 audit(281.610:1778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  281.727329][   T31] audit: type=1326 audit(281.630:1779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  281.743557][   T31] audit: type=1326 audit(281.640:1780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  281.749826][   T31] audit: type=1326 audit(281.640:1781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  281.769492][   T31] audit: type=1326 audit(281.640:1782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  281.780124][   T31] audit: type=1326 audit(281.660:1783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5155 comm="syz.3.202" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  283.994000][ T5196] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET.
[  284.229383][ T5202] pim6reg1: entered promiscuous mode
[  284.230715][ T5202] pim6reg1: entered allmulticast mode
[  289.845156][ T5245] bond1: entered promiscuous mode
[  289.846161][ T5245] bond1: entered allmulticast mode
[  289.848440][ T5245] 8021q: adding VLAN 0 to HW filter on device bond1
[  289.897728][ T5245] bond1 (unregistering): Released all slaves
[  290.142210][   T31] kauditd_printk_skb: 59 callbacks suppressed
[  290.142332][   T31] audit: type=1400 audit(290.040:1843): avc:  denied  { ioctl } for  pid=5312 comm="syz.3.226" path="socket:[5517]" dev="sockfs" ino=5517 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  291.375321][ T5326] netlink: 16 bytes leftover after parsing attributes in process `syz.3.230'.
[  291.716558][   T31] audit: type=1400 audit(291.620:1844): avc:  denied  { write } for  pid=5331 comm="syz.3.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  291.722486][   T31] audit: type=1400 audit(291.620:1845): avc:  denied  { nlmsg_write } for  pid=5331 comm="syz.3.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  292.192990][   T31] audit: type=1400 audit(292.100:1846): avc:  denied  { execute } for  pid=5336 comm="+}[@" path="/41/memory.events" dev="tmpfs" ino=224 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1
[  292.444795][ T5340] netlink: 'syz.3.234': attribute type 10 has an invalid length.
[  295.032970][ T5360] syz.3.241[5360] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  295.033360][ T5360] syz.3.241[5360] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  295.034687][ T5360] syz.3.241[5360] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  296.742051][   T31] audit: type=1326 audit(296.630:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  296.744434][   T31] audit: type=1326 audit(296.630:1848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  296.773297][   T31] audit: type=1326 audit(296.650:1849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  296.778040][   T31] audit: type=1326 audit(296.650:1850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  296.812596][   T31] audit: type=1326 audit(296.650:1851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  296.815354][   T31] audit: type=1326 audit(296.660:1852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  296.818105][   T31] audit: type=1326 audit(296.660:1853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  296.872167][   T31] audit: type=1326 audit(296.670:1854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  296.874123][   T31] audit: type=1326 audit(296.680:1855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  296.876818][   T31] audit: type=1326 audit(296.700:1856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5366 comm="syz.3.244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  299.435162][ T5388] netlink: 8 bytes leftover after parsing attributes in process `syz.3.251'.
[  306.791766][   T31] kauditd_printk_skb: 6 callbacks suppressed
[  306.791825][   T31] audit: type=1400 audit(306.670:1863): avc:  denied  { bind } for  pid=5415 comm="syz.3.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[  306.864252][   T31] audit: type=1326 audit(306.760:1864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  306.865484][   T31] audit: type=1326 audit(306.770:1865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=15 compat=0 ip=0x133450 code=0x7ffc0000
[  306.876765][   T31] audit: type=1326 audit(306.770:1866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  306.879376][   T31] audit: type=1326 audit(306.780:1867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  306.901778][   T31] audit: type=1326 audit(306.780:1868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  306.903625][   T31] audit: type=1326 audit(306.780:1869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  306.914294][   T31] audit: type=1326 audit(306.800:1870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133450 code=0x7ffc0000
[  306.916938][   T31] audit: type=1326 audit(306.800:1871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  306.927246][   T31] audit: type=1326 audit(306.800:1872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.3.260" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x133450 code=0x7ffc0000
[  307.476334][ T5453] IPv6: Can't replace route, no match found
[  310.937205][ T5401] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  310.973982][ T5401] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  313.757709][ T5401] hsr_slave_0: entered promiscuous mode
[  313.769068][ T5401] hsr_slave_1: entered promiscuous mode
[  313.789186][ T5401] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  313.790179][ T5401] Cannot create hsr debugfs directory
[  314.710065][ T5401] netdevsim netdevsim4 netdevsim0: renamed from eth0
[  314.748806][ T5401] netdevsim netdevsim4 netdevsim1: renamed from eth1
[  314.777228][ T5401] netdevsim netdevsim4 netdevsim2: renamed from eth2
[  314.800576][ T5401] netdevsim netdevsim4 netdevsim3: renamed from eth3
[  315.174492][   T31] kauditd_printk_skb: 7 callbacks suppressed
[  315.174634][   T31] audit: type=1400 audit(315.080:1880): avc:  denied  { read } for  pid=5498 comm="syz.3.266" name="binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1
[  315.188065][   T31] audit: type=1400 audit(315.080:1881): avc:  denied  { open } for  pid=5498 comm="syz.3.266" path="/dev/binderfs/binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1
[  316.841647][ T5401] 8021q: adding VLAN 0 to HW filter on device bond0
[  329.057563][ T5401] veth0_vlan: entered promiscuous mode
[  329.415858][ T5401] veth1_vlan: entered promiscuous mode
[  329.614454][ T5401] veth0_macvtap: entered promiscuous mode
[  329.644877][ T5401] veth1_macvtap: entered promiscuous mode
[  329.790162][ T5401] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  329.793977][ T5401] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  329.794819][ T5401] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  329.796052][ T5401] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  330.302881][   T31] audit: type=1326 audit(330.200:1882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5785 comm="syz.3.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  330.341940][   T31] audit: type=1326 audit(330.220:1883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5785 comm="syz.3.269" exe="/syz-executor" sig=0 arch=40000028 syscall=314 compat=0 ip=0x133450 code=0x7ffc0000
[  330.355234][   T31] audit: type=1326 audit(330.260:1884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5785 comm="syz.3.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  330.356407][   T31] audit: type=1326 audit(330.260:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5785 comm="syz.3.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  330.940910][   T31] audit: type=1400 audit(330.820:1886): avc:  denied  { getopt } for  pid=5790 comm="syz.4.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  331.726051][   T31] audit: type=1326 audit(587.623:1887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5797 comm="syz.3.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  331.736701][   T31] audit: type=1326 audit(587.633:1888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5797 comm="syz.3.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  331.773173][   T31] audit: type=1326 audit(587.653:1889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5797 comm="syz.3.273" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  331.775162][   T31] audit: type=1326 audit(587.653:1890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5797 comm="syz.3.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  331.777811][   T31] audit: type=1326 audit(587.653:1891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5797 comm="syz.3.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  334.184516][ T5823] nicvf0: tun_chr_ioctl cmd 1074025692
[  339.892429][   T31] kauditd_printk_skb: 22 callbacks suppressed
[  339.892557][   T31] audit: type=1326 audit(595.763:1914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5917 comm="syz.3.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  340.032625][   T31] audit: type=1326 audit(595.863:1915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5917 comm="syz.3.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  340.033539][   T31] audit: type=1326 audit(595.923:1916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5917 comm="syz.3.288" exe="/syz-executor" sig=0 arch=40000028 syscall=442 compat=0 ip=0x133450 code=0x7ffc0000
[  340.034192][   T31] audit: type=1326 audit(595.923:1917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5917 comm="syz.3.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  340.300041][   T31] audit: type=1326 audit(596.073:1918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5917 comm="syz.3.288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  343.601519][ T5958] netlink: 12 bytes leftover after parsing attributes in process `syz.4.289'.
[  346.585487][   T31] audit: type=1400 audit(602.483:1919): avc:  denied  { create } for  pid=5972 comm="syz.4.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[  348.127082][   T31] audit: type=1326 audit(604.013:1920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  348.267124][   T31] audit: type=1326 audit(604.063:1921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  348.294486][   T31] audit: type=1326 audit(604.173:1922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133450 code=0x7ffc0000
[  348.380162][   T31] audit: type=1326 audit(604.243:1923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  348.390480][   T31] audit: type=1326 audit(604.273:1924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  348.443388][   T31] audit: type=1326 audit(604.343:1925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=282 compat=0 ip=0x133450 code=0x7ffc0000
[  348.450435][   T31] audit: type=1326 audit(604.343:1926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  348.465586][   T31] audit: type=1326 audit(604.363:1927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  348.572416][   T31] audit: type=1326 audit(604.463:1928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.4.294" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x133450 code=0x7ffc0000
[  351.926126][   T31] kauditd_printk_skb: 65 callbacks suppressed
[  351.926255][   T31] audit: type=1400 audit(607.823:1994): avc:  denied  { create } for  pid=6002 comm="syz.4.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1
[  351.951981][   T31] audit: type=1400 audit(607.843:1995): avc:  denied  { sys_admin } for  pid=6002 comm="syz.4.302" capability=21  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1
[  353.178435][ T6039] netlink: 'syz.4.308': attribute type 10 has an invalid length.
[  353.179636][ T6039] netlink: 40 bytes leftover after parsing attributes in process `syz.4.308'.
[  353.194563][ T6039] A link change request failed with some changes committed already. Interface vxcan0 may have been left with an inconsistent configuration, please check.
[  353.363030][   T31] audit: type=1326 audit(609.263:1996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6041 comm="syz.4.309" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  353.370430][   T31] audit: type=1326 audit(609.263:1997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6041 comm="syz.4.309" exe="/syz-executor" sig=0 arch=40000028 syscall=441 compat=0 ip=0x133450 code=0x7ffc0000
[  353.382052][   T31] audit: type=1326 audit(609.263:1998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6041 comm="syz.4.309" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  353.524472][ T6046] bridge_slave_0: default FDB implementation only supports local addresses
[  353.974353][ T6052] syz.4.312[6052] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  353.974987][ T6052] syz.4.312[6052] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  353.975862][ T6052] syz.4.312[6052] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  354.378337][   T31] audit: type=1400 audit(610.273:1999): avc:  denied  { sqpoll } for  pid=6056 comm="syz.4.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1
[  357.355153][   T31] audit: type=1400 audit(613.253:2000): avc:  denied  { ioctl } for  pid=6064 comm="syz.4.317" path="socket:[5038]" dev="sockfs" ino=5038 ioctlcmd=0x8943 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  357.565458][   T31] audit: type=1326 audit(613.453:2001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  357.578229][   T31] audit: type=1326 audit(613.473:2002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  357.593649][   T31] audit: type=1326 audit(613.473:2003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  357.609669][   T31] audit: type=1326 audit(613.483:2004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  357.616776][   T31] audit: type=1326 audit(613.503:2005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  357.636813][   T31] audit: type=1326 audit(613.523:2006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  357.649500][   T31] audit: type=1326 audit(613.543:2007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  357.655407][   T31] audit: type=1326 audit(613.543:2008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  357.658899][   T31] audit: type=1326 audit(613.553:2009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.4.318" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133450 code=0x7ffc0000
[  360.143562][ T6083] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy
[  360.145161][ T6083] misc raw-gadget: fail, usb_gadget_register_driver returned -16
[  363.996457][   T31] kauditd_printk_skb: 10 callbacks suppressed
[  363.996585][   T31] audit: type=1400 audit(619.893:2020): avc:  denied  { create } for  pid=6115 comm="syz.4.332" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=unix_dgram_socket permissive=1
[  364.035637][ T6116] netdevsim netdevsim4 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0
[  364.036613][ T6116] netdevsim netdevsim4 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0
[  364.036995][ T6116] netdevsim netdevsim4 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0
[  364.038804][ T6116] netdevsim netdevsim4 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0
[  364.046134][ T6116] vxlan0: entered promiscuous mode
[  364.047178][ T6116] vxlan0: entered allmulticast mode
[  364.068778][ T6116] netdevsim netdevsim4 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0
[  364.070766][ T6116] netdevsim netdevsim4 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0
[  364.072220][ T6116] netdevsim netdevsim4 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0
[  364.073231][ T6116] netdevsim netdevsim4 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0
[  364.158565][   T31] audit: type=1400 audit(620.053:2021): avc:  denied  { create } for  pid=6115 comm="syz.4.332" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=qipcrtr_socket permissive=1
[  364.526767][   T31] audit: type=1400 audit(620.423:2022): avc:  denied  { bind } for  pid=6122 comm="syz.4.333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  365.509597][ T6135] netlink: 36 bytes leftover after parsing attributes in process `syz.4.337'.
[  367.220397][   T31] audit: type=1400 audit(623.113:2023): avc:  denied  { setopt } for  pid=6179 comm="syz.4.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  367.249630][   T31] audit: type=1326 audit(623.143:2024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6179 comm="syz.4.345" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  367.255536][   T31] audit: type=1326 audit(623.153:2025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6179 comm="syz.4.345" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  367.258798][   T31] audit: type=1326 audit(623.153:2026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6179 comm="syz.4.345" exe="/syz-executor" sig=0 arch=40000028 syscall=290 compat=0 ip=0x133450 code=0x7ffc0000
[  367.272552][   T31] audit: type=1326 audit(623.173:2027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6179 comm="syz.4.345" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  367.273696][   T31] audit: type=1326 audit(623.173:2028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6179 comm="syz.4.345" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  367.277145][   T31] audit: type=1326 audit(623.173:2029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6179 comm="syz.4.345" exe="/syz-executor" sig=0 arch=40000028 syscall=293 compat=0 ip=0x133450 code=0x7ffc0000
[  373.266789][   T31] kauditd_printk_skb: 6 callbacks suppressed
[  373.266929][   T31] audit: type=1326 audit(629.163:2036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  373.281621][   T31] audit: type=1326 audit(629.173:2037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  373.288790][   T31] audit: type=1326 audit(629.183:2038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  373.299698][   T31] audit: type=1326 audit(629.183:2039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  373.306689][   T31] audit: type=1326 audit(629.193:2040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  373.309196][   T31] audit: type=1326 audit(629.193:2041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  373.339445][   T31] audit: type=1326 audit(629.193:2042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  373.356067][   T31] audit: type=1326 audit(629.213:2043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  373.357747][   T31] audit: type=1326 audit(629.233:2044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  373.359808][   T31] audit: type=1326 audit(629.243:2045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6198 comm="syz.4.351" exe="/syz-executor" sig=0 arch=40000028 syscall=233 compat=0 ip=0x133450 code=0x7ffc0000
[  390.196038][ T6230] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  390.249570][ T6230] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  390.567699][   T31] kauditd_printk_skb: 1 callbacks suppressed
[  390.592938][   T31] audit: type=1326 audit(646.443:2047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  390.624579][   T31] audit: type=1326 audit(646.463:2048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  390.626664][   T31] audit: type=1326 audit(646.463:2049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  390.628510][   T31] audit: type=1326 audit(646.463:2050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  390.630942][   T31] audit: type=1326 audit(646.473:2051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  390.694601][   T31] audit: type=1326 audit(646.473:2052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  390.733389][   T31] audit: type=1326 audit(646.483:2053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  390.735068][   T31] audit: type=1326 audit(646.483:2054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  390.736795][   T31] audit: type=1326 audit(646.503:2055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  390.738953][   T31] audit: type=1326 audit(646.503:2056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.4.355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  392.928216][ T6474] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  392.957991][ T6230] hsr_slave_0: entered promiscuous mode
[  392.966335][ T6230] hsr_slave_1: entered promiscuous mode
[  392.975579][ T6230] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  392.976435][ T6230] Cannot create hsr debugfs directory
[  393.005771][ T6474] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  393.080495][ T6474] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  393.184246][ T6474] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  393.314129][ T6474] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0
[  393.377393][ T6474] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0
[  393.414280][ T6474] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0
[  393.457670][ T6474] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0
[  393.647237][ T6230] netdevsim netdevsim5 netdevsim0: renamed from eth0
[  393.657656][ T6230] netdevsim netdevsim5 netdevsim1: renamed from eth1
[  393.668072][ T6230] netdevsim netdevsim5 netdevsim2: renamed from eth2
[  393.678209][ T6230] netdevsim netdevsim5 netdevsim3: renamed from eth3
[  393.703938][ T6474] syz.4.359[6474] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  393.704705][ T6474] syz.4.359[6474] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  393.724454][ T6474] syz.4.359[6474] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  395.938895][ T6230] 8021q: adding VLAN 0 to HW filter on device bond0
[  405.879146][ T6230] veth0_vlan: entered promiscuous mode
[  405.916220][ T6230] veth1_vlan: entered promiscuous mode
[  406.056505][ T6230] veth0_macvtap: entered promiscuous mode
[  406.074200][ T6230] veth1_macvtap: entered promiscuous mode
[  406.123250][ T6230] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  406.123983][ T6230] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  406.124408][ T6230] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  406.125138][ T6230] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  406.625541][   T31] kauditd_printk_skb: 6 callbacks suppressed
[  406.625632][   T31] audit: type=1326 audit(662.523:2063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6635 comm="syz.5.366" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  406.651715][   T31] audit: type=1326 audit(662.543:2064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6635 comm="syz.5.366" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x131248 code=0x7ffc0000
[  406.653737][   T31] audit: type=1326 audit(662.543:2065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6635 comm="syz.5.366" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  406.669317][   T31] audit: type=1326 audit(662.563:2066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6635 comm="syz.5.366" exe="/syz-executor" sig=0 arch=40000028 syscall=146 compat=0 ip=0x133450 code=0x7ffc0000
[  406.673696][ T6636] SELinux:  Context � is not valid (left unmapped).
[  406.679170][   T31] audit: type=1400 audit(662.573:2067): avc:  denied  { mac_admin } for  pid=6635 comm="syz.5.366" capability=33  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[  406.688070][   T31] audit: type=1326 audit(662.573:2068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6635 comm="syz.5.366" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  408.176772][   T31] audit: type=1400 audit(664.073:2069): avc:  denied  { relabelfrom } for  pid=6651 comm="syz.5.370" name="" dev="pipefs" ino=7702 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1
[  408.370320][   T31] audit: type=1326 audit(664.263:2070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6653 comm="syz.5.371" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  408.374224][   T31] audit: type=1326 audit(664.273:2071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6653 comm="syz.5.371" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  408.378092][   T31] audit: type=1326 audit(664.273:2072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6653 comm="syz.5.371" exe="/syz-executor" sig=0 arch=40000028 syscall=186 compat=0 ip=0x133450 code=0x7ffc0000
[  408.688573][ T6660] netlink: 140 bytes leftover after parsing attributes in process `syz.5.373'.
[  415.500870][   T31] kauditd_printk_skb: 2 callbacks suppressed
[  415.500975][   T31] audit: type=1326 audit(671.393:2075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.5.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  415.511440][   T31] audit: type=1326 audit(671.403:2076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.5.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  415.512274][   T31] audit: type=1326 audit(671.403:2077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.5.385" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  415.515324][   T31] audit: type=1326 audit(671.403:2078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.5.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  415.534194][   T31] audit: type=1326 audit(671.413:2079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.5.385" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  415.554166][   T31] audit: type=1326 audit(671.423:2080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.5.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  415.557025][   T31] audit: type=1326 audit(671.433:2081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.5.385" exe="/syz-executor" sig=0 arch=40000028 syscall=305 compat=0 ip=0x133450 code=0x7ffc0000
[  415.557768][   T31] audit: type=1326 audit(671.453:2082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6691 comm="syz.5.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  416.028503][   T31] audit: type=1326 audit(671.923:2083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6698 comm="syz.5.387" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  416.038993][   T31] audit: type=1326 audit(671.933:2084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6698 comm="syz.5.387" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  416.477747][ T6707] wireguard0: entered promiscuous mode
[  416.478417][ T6707] wireguard0: entered allmulticast mode
[  417.118354][ T6718] =======================================================
[  417.118354][ T6718] WARNING: The mand mount option has been deprecated and
[  417.118354][ T6718]          and is ignored by this kernel. Remove the mand
[  417.118354][ T6718]          option from the mount to silence this warning.
[  417.118354][ T6718] =======================================================
[  417.753529][ T6727] random: crng reseeded on system resumption
[  418.015454][ T6732] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6732 comm=syz.5.395
[  418.029179][ T6732] netlink: 12 bytes leftover after parsing attributes in process `syz.5.395'.
[  418.040255][ T6732] netlink: 8 bytes leftover after parsing attributes in process `syz.5.395'.
[  419.724137][ T6775] netlink: 132 bytes leftover after parsing attributes in process `syz.5.402'.
[  421.425765][   T31] kauditd_printk_skb: 16 callbacks suppressed
[  421.426230][   T31] audit: type=1400 audit(677.303:2101): avc:  denied  { read } for  pid=6800 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  421.473007][   T31] audit: type=1400 audit(677.353:2102): avc:  denied  { map_create } for  pid=6800 comm="syz.5.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[  421.485416][   T31] audit: type=1400 audit(677.353:2103): avc:  denied  { bpf } for  pid=6800 comm="syz.5.411" capability=39  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[  421.516142][   T31] audit: type=1400 audit(677.353:2104): avc:  denied  { map_read map_write } for  pid=6800 comm="syz.5.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[  421.519160][   T31] audit: type=1400 audit(677.353:2105): avc:  denied  { prog_load } for  pid=6800 comm="syz.5.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[  421.568783][   T31] audit: type=1400 audit(677.353:2106): avc:  denied  { perfmon } for  pid=6800 comm="syz.5.411" capability=38  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[  421.575994][   T31] audit: type=1400 audit(677.373:2107): avc:  denied  { prog_run } for  pid=6800 comm="syz.5.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[  421.578532][   T31] audit: type=1400 audit(677.423:2108): avc:  denied  { read } for  pid=2906 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[  421.605299][   T31] audit: type=1400 audit(677.423:2109): avc:  denied  { search } for  pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[  421.606857][   T31] audit: type=1400 audit(677.423:2110): avc:  denied  { append } for  pid=2906 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[  425.232414][ T6823] vlan2: entered allmulticast mode
[  425.233340][ T6823] bridge_slave_0: entered allmulticast mode
[  425.248295][ T6823] bridge_slave_0: left allmulticast mode
[  426.713111][   T31] kauditd_printk_skb: 93 callbacks suppressed
[  426.713754][   T31] audit: type=1400 audit(682.613:2204): avc:  denied  { create } for  pid=6851 comm="syz.5.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[  427.515486][   T31] audit: type=1326 audit(683.393:2205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6854 comm="syz.5.427" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  427.520287][   T31] audit: type=1326 audit(683.393:2206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6854 comm="syz.5.427" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x133450 code=0x7ffc0000
[  427.531642][   T31] audit: type=1400 audit(683.393:2207): avc:  denied  { create } for  pid=6854 comm="syz.5.427" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  427.535392][   T31] audit: type=1326 audit(683.413:2208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6854 comm="syz.5.427" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x133488 code=0x7ffc0000
[  427.560951][   T31] audit: type=1400 audit(683.413:2209): avc:  denied  { map } for  pid=6854 comm="syz.5.427" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6394 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  427.578084][   T31] audit: type=1400 audit(683.413:2210): avc:  denied  { read write } for  pid=6854 comm="syz.5.427" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6394 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  427.578463][   T31] audit: type=1326 audit(683.413:2211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6854 comm="syz.5.427" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x133488 code=0x7ffc0000
[  427.579883][   T31] audit: type=1326 audit(683.413:2212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6854 comm="syz.5.427" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  427.602194][   T31] audit: type=1326 audit(683.413:2213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6854 comm="syz.5.427" exe="/syz-executor" sig=0 arch=40000028 syscall=426 compat=0 ip=0x133450 code=0x7ffc0000
[  431.399660][ T6868] netlink: 24 bytes leftover after parsing attributes in process `syz.5.430'.
[  443.549412][   T31] kauditd_printk_skb: 6 callbacks suppressed
[  443.549498][   T31] audit: type=1400 audit(699.443:2220): avc:  denied  { execute } for  pid=6885 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[  443.562043][   T31] audit: type=1400 audit(699.453:2221): avc:  denied  { execute_no_trans } for  pid=6885 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[  443.592864][   T31] audit: type=1400 audit(699.483:2222): avc:  denied  { execmem } for  pid=6885 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[  443.636174][   T31] audit: type=1400 audit(699.523:2223): avc:  denied  { mounton } for  pid=6886 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[  445.418629][   T31] audit: type=1400 audit(701.293:2224): avc:  denied  { open } for  pid=6886 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  445.432060][   T31] audit: type=1400 audit(701.293:2225): avc:  denied  { ioctl } for  pid=6886 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  447.720437][ T6886] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  447.729489][ T6886] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  448.807559][ T6886] hsr_slave_0: entered promiscuous mode
[  448.829025][ T6886] hsr_slave_1: entered promiscuous mode
[  448.883980][ T6886] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  448.884813][ T6886] Cannot create hsr debugfs directory
[  449.220785][ T6886] netdevsim netdevsim6 netdevsim0: renamed from eth0
[  449.248234][ T6886] netdevsim netdevsim6 netdevsim1: renamed from eth1
[  449.267100][ T6886] netdevsim netdevsim6 netdevsim2: renamed from eth2
[  449.280678][ T6886] netdevsim netdevsim6 netdevsim3: renamed from eth3
[  450.334669][ T6886] 8021q: adding VLAN 0 to HW filter on device bond0
[  456.326165][ T6886] veth0_vlan: entered promiscuous mode
[  456.360895][ T6886] veth1_vlan: entered promiscuous mode
[  456.446485][ T6886] veth0_macvtap: entered promiscuous mode
[  456.472685][ T6886] veth1_macvtap: entered promiscuous mode
[  456.559099][ T6886] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  456.560087][ T6886] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  456.563889][ T6886] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  456.564986][ T6886] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  456.707511][   T31] audit: type=1400 audit(712.603:2226): avc:  denied  { mounton } for  pid=6886 comm="syz-executor" path="/syzkaller.Y8GDKy/syz-tmp" dev="vda" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[  456.713594][   T31] audit: type=1400 audit(712.603:2227): avc:  denied  { mount } for  pid=6886 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[  456.753724][   T31] audit: type=1400 audit(712.603:2228): avc:  denied  { mounton } for  pid=6886 comm="syz-executor" path="/syzkaller.Y8GDKy/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1
[  456.794151][   T31] audit: type=1400 audit(712.603:2229): avc:  denied  { mount } for  pid=6886 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1
[  456.796428][   T31] audit: type=1400 audit(712.613:2230): avc:  denied  { mounton } for  pid=6886 comm="syz-executor" path="/syzkaller.Y8GDKy/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1
[  456.799151][   T31] audit: type=1400 audit(712.613:2231): avc:  denied  { mounton } for  pid=6886 comm="syz-executor" path="/syzkaller.Y8GDKy/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=6820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1
[  456.817271][   T31] audit: type=1400 audit(712.633:2232): avc:  denied  { unmount } for  pid=6886 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[  456.818986][   T31] audit: type=1400 audit(712.633:2233): avc:  denied  { mounton } for  pid=6886 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[  456.820589][   T31] audit: type=1400 audit(712.643:2234): avc:  denied  { mount } for  pid=6886 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1
[  456.837976][   T31] audit: type=1400 audit(712.643:2235): avc:  denied  { mounton } for  pid=6886 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1
[  457.017646][ T7232] process 'syz.6.435' launched './file1' with NULL argv: empty string added
[  459.067502][ T7259] netlink: 5 bytes leftover after parsing attributes in process `syz.6.445'.
[  459.069106][ T7259] 0�X��D: renamed from gretap0 (while UP)
[  459.077669][ T7259] 0�X��D: entered allmulticast mode
[  459.079151][ T7259] A link change request failed with some changes committed already. Interface 30�X��D may have been left with an inconsistent configuration, please check.
[  459.870461][ T7277] netlink: 8 bytes leftover after parsing attributes in process `syz.6.450'.
[  463.848622][   T31] kauditd_printk_skb: 39 callbacks suppressed
[  463.849052][   T31] audit: type=1326 audit(719.743:2275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  463.874220][   T31] audit: type=1326 audit(719.743:2276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  463.896658][   T31] audit: type=1326 audit(719.793:2277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  463.917519][   T31] audit: type=1326 audit(719.803:2278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  463.919353][   T31] audit: type=1326 audit(719.813:2279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  463.940864][   T31] audit: type=1326 audit(719.823:2280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  463.943576][   T31] audit: type=1326 audit(719.833:2281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  463.963994][   T31] audit: type=1326 audit(719.843:2282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x133450 code=0x7ffc0000
[  463.990201][   T31] audit: type=1326 audit(719.883:2283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  463.995713][   T31] audit: type=1326 audit(719.883:2284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7294 comm="syz.6.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  465.547841][ T7306] SELinux:  Context system_u:object_r:hald_log_t:s0 is not valid (left unmapped).
[  468.868158][   T31] kauditd_printk_skb: 67 callbacks suppressed
[  468.868229][   T31] audit: type=1326 audit(724.763:2352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7315 comm="syz.6.463" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  468.900348][   T31] audit: type=1326 audit(724.793:2353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7315 comm="syz.6.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  468.985363][   T31] audit: type=1326 audit(724.883:2354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7315 comm="syz.6.463" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000
[  468.993047][   T31] audit: type=1326 audit(724.883:2355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7315 comm="syz.6.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  469.013643][   T31] audit: type=1326 audit(724.893:2356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7315 comm="syz.6.463" exe="/syz-executor" sig=0 arch=40000028 syscall=24 compat=0 ip=0x133450 code=0x7ffc0000
[  469.015587][   T31] audit: type=1326 audit(724.893:2357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7315 comm="syz.6.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  469.017617][   T31] audit: type=1326 audit(724.903:2358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7315 comm="syz.6.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  481.216217][   T31] audit: type=1326 audit(737.113:2359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7345 comm="syz.6.469" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  481.219564][   T31] audit: type=1326 audit(737.113:2360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7345 comm="syz.6.469" exe="/syz-executor" sig=0 arch=40000028 syscall=308 compat=0 ip=0x133450 code=0x7ffc0000
[  481.220826][   T31] audit: type=1326 audit(737.113:2361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7345 comm="syz.6.469" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  483.528250][ T7324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  483.558762][ T7324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  485.160304][   T31] audit: type=1400 audit(741.043:2362): avc:  denied  { create } for  pid=7553 comm="syz.6.472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  485.199499][   T31] audit: type=1400 audit(741.093:2363): avc:  denied  { write } for  pid=7553 comm="syz.6.472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  485.204751][   T31] audit: type=1400 audit(741.103:2364): avc:  denied  { nlmsg_write } for  pid=7553 comm="syz.6.472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  486.157546][ T7324] hsr_slave_0: entered promiscuous mode
[  486.178105][ T7324] hsr_slave_1: entered promiscuous mode
[  486.207077][ T7324] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  486.208175][ T7324] Cannot create hsr debugfs directory
[  488.049794][ T7324] netdevsim netdevsim7 netdevsim0: renamed from eth0
[  488.087813][ T7324] netdevsim netdevsim7 netdevsim1: renamed from eth1
[  488.105889][ T7324] netdevsim netdevsim7 netdevsim2: renamed from eth2
[  488.126956][ T7324] netdevsim netdevsim7 netdevsim3: renamed from eth3
[  488.584968][ T7661] netlink: 4 bytes leftover after parsing attributes in process `syz.6.475'.
[  489.107803][ T7666] netlink: 'syz.6.476': attribute type 1 has an invalid length.
[  489.651519][   T31] audit: type=1400 audit(745.543:2365): avc:  denied  { create } for  pid=7667 comm="syz.6.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[  490.198386][   T31] audit: type=1400 audit(746.063:2366): avc:  denied  { create } for  pid=7667 comm="syz.6.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[  490.200521][   T31] audit: type=1400 audit(746.073:2367): avc:  denied  { write } for  pid=7667 comm="syz.6.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[  490.202484][   T31] audit: type=1400 audit(746.073:2368): avc:  denied  { nlmsg_read } for  pid=7667 comm="syz.6.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[  491.125432][ T7324] 8021q: adding VLAN 0 to HW filter on device bond0
[  492.703194][   T31] audit: type=1400 audit(748.603:2369): avc:  denied  { create } for  pid=7721 comm="syz.6.488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  492.718306][   T31] audit: type=1400 audit(748.613:2370): avc:  denied  { setopt } for  pid=7721 comm="syz.6.488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  500.901422][   T31] audit: type=1326 audit(756.783:2371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.497" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  500.907919][   T31] audit: type=1326 audit(756.783:2372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.497" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  500.963864][   T31] audit: type=1326 audit(756.833:2373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.497" exe="/syz-executor" sig=0 arch=40000028 syscall=245 compat=0 ip=0x133450 code=0x7ffc0000
[  501.012737][   T31] audit: type=1326 audit(756.833:2374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.497" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  501.058118][   T31] audit: type=1326 audit(756.833:2375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.6.497" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  501.759135][ T7324] veth0_vlan: entered promiscuous mode
[  501.808864][ T7324] veth1_vlan: entered promiscuous mode
[  501.970898][ T7324] veth0_macvtap: entered promiscuous mode
[  501.996390][ T7324] veth1_macvtap: entered promiscuous mode
[  502.110979][ T7324] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  502.115964][ T7324] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  502.116490][ T7324] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  502.116890][ T7324] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  502.408558][   T31] audit: type=1326 audit(758.303:2376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7790 comm="syz.7.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  502.432415][   T31] audit: type=1326 audit(758.323:2377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7790 comm="syz.7.465" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000
[  502.433588][   T31] audit: type=1326 audit(758.323:2378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7790 comm="syz.7.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  502.441887][   T31] audit: type=1326 audit(758.333:2379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7790 comm="syz.7.465" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x133450 code=0x7ffc0000
[  502.453338][   T31] audit: type=1326 audit(758.333:2380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7790 comm="syz.7.465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  503.832632][ T7805] wireguard0: entered promiscuous mode
[  503.835116][ T7805] wireguard0: entered allmulticast mode
[  504.306367][ T7805] netlink: 76 bytes leftover after parsing attributes in process `syz.7.507'.
[  508.164176][   T31] kauditd_printk_skb: 16 callbacks suppressed
[  508.164375][   T31] audit: type=1326 audit(764.063:2397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7854 comm="syz.6.525" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  508.181659][   T31] audit: type=1326 audit(764.073:2398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7854 comm="syz.6.525" exe="/syz-executor" sig=0 arch=40000028 syscall=306 compat=0 ip=0x133450 code=0x7ffc0000
[  508.188847][   T31] audit: type=1326 audit(764.073:2399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7854 comm="syz.6.525" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  508.198405][   T31] audit: type=1326 audit(764.083:2400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7854 comm="syz.6.525" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  510.414230][   T31] audit: type=1326 audit(766.313:2401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7877 comm="syz.6.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  510.418794][   T31] audit: type=1326 audit(766.313:2402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7877 comm="syz.6.533" exe="/syz-executor" sig=0 arch=40000028 syscall=46 compat=0 ip=0x133450 code=0x7ffc0000
[  510.420875][   T31] audit: type=1326 audit(766.313:2403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7877 comm="syz.6.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  513.131891][   T31] audit: type=1326 audit(769.023:2404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  513.140425][   T31] audit: type=1326 audit(769.033:2405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  513.163864][   T31] audit: type=1326 audit(769.063:2406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000
[  513.177008][   T31] kauditd_printk_skb: 1 callbacks suppressed
[  513.177228][   T31] audit: type=1326 audit(769.063:2408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x133450 code=0x7ffc0000
[  513.195496][   T31] audit: type=1326 audit(769.063:2409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  513.197992][   T31] audit: type=1326 audit(769.083:2410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000
[  513.219946][   T31] audit: type=1326 audit(769.083:2411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  513.230037][   T31] audit: type=1326 audit(769.103:2412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000
[  513.237476][   T31] audit: type=1326 audit(769.113:2413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7890 comm="syz.6.537" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  513.621933][   T31] audit: type=1326 audit(769.513:2414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7885 comm="syz.7.535" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  513.629348][   T31] audit: type=1326 audit(769.523:2415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7885 comm="syz.7.535" exe="/syz-executor" sig=0 arch=40000028 syscall=306 compat=0 ip=0x133450 code=0x7ffc0000
[  513.642110][   T31] audit: type=1326 audit(769.523:2416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7885 comm="syz.7.535" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  513.643879][   T31] audit: type=1326 audit(769.533:2417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7885 comm="syz.7.535" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  516.617358][ T7912] netlink: 12 bytes leftover after parsing attributes in process `syz.6.543'.
[  516.647703][ T7912] 8021q: adding VLAN 0 to HW filter on device bond1
[  516.857045][ T7912] 8021q: adding VLAN 0 to HW filter on device bond1
[  516.858292][ T7912] bond1: (slave vcan1): The slave device specified does not support setting the MAC address
[  516.860790][ T7912] bond1: (slave vcan1): Error -95 calling set_mac_address
[  520.280814][   T31] kauditd_printk_skb: 12 callbacks suppressed
[  520.280920][   T31] audit: type=1326 audit(776.173:2430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  520.293943][   T31] audit: type=1326 audit(776.193:2431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  520.300490][   T31] audit: type=1326 audit(776.193:2432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000
[  520.336351][   T31] audit: type=1326 audit(776.193:2433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  520.432996][   T31] audit: type=1326 audit(776.273:2434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  520.435092][   T31] audit: type=1326 audit(776.323:2435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x133450 code=0x7ffc0000
[  520.436727][   T31] audit: type=1326 audit(776.323:2436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  520.463869][   T31] audit: type=1326 audit(776.323:2437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000
[  520.467129][   T31] audit: type=1326 audit(776.343:2438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  520.484619][   T31] audit: type=1326 audit(776.343:2439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7961 comm="syz.7.548" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  526.641585][   T31] kauditd_printk_skb: 2 callbacks suppressed
[  526.641891][   T31] audit: type=1326 audit(782.523:2442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  526.647611][   T31] audit: type=1326 audit(782.523:2443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  526.663786][   T31] audit: type=1326 audit(782.543:2444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000
[  526.665514][   T31] audit: type=1326 audit(782.543:2445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  526.667063][   T31] audit: type=1326 audit(782.543:2446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x133450 code=0x7ffc0000
[  526.668994][   T31] audit: type=1326 audit(782.543:2447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  526.670447][   T31] audit: type=1326 audit(782.543:2448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000
[  526.681761][   T31] audit: type=1326 audit(782.543:2449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  526.703889][   T31] audit: type=1326 audit(782.603:2450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=0 ip=0x133450 code=0x7ffc0000
[  526.705806][   T31] audit: type=1326 audit(782.603:2451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7975 comm="syz.7.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  532.567926][   T31] kauditd_printk_skb: 12 callbacks suppressed
[  532.568760][   T31] audit: type=1326 audit(788.463:2464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.7.563" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  532.575198][   T31] audit: type=1326 audit(788.473:2465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.7.563" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  532.581667][   T31] audit: type=1326 audit(788.473:2466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.7.563" exe="/syz-executor" sig=0 arch=40000028 syscall=316 compat=0 ip=0x133450 code=0x7ffc0000
[  532.590553][   T31] audit: type=1326 audit(788.473:2467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.7.563" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  532.606968][   T31] audit: type=1326 audit(788.473:2468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.7.563" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  532.781589][   T31] audit: type=1326 audit(788.673:2469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.7.564" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  532.788584][   T31] audit: type=1326 audit(788.683:2470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.7.564" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000
[  532.802250][   T31] audit: type=1326 audit(788.693:2471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.7.564" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  532.804437][   T31] audit: type=1326 audit(788.693:2472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.7.564" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  532.806169][   T31] audit: type=1326 audit(788.693:2473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7996 comm="syz.7.564" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x133450 code=0x7ffc0000
[  533.006185][ T7999] netlink: 24 bytes leftover after parsing attributes in process `syz.7.565'.
[  537.050597][ T8026] syz.7.570[8026] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  537.052407][ T8026] syz.7.570[8026] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  537.053902][ T8026] syz.7.570[8026] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  540.280999][   T31] kauditd_printk_skb: 22 callbacks suppressed
[  540.289847][   T31] audit: type=1326 audit(796.173:2496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  540.297201][   T31] audit: type=1326 audit(796.183:2497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000
[  540.299574][   T31] audit: type=1326 audit(796.183:2498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  540.317559][   T31] audit: type=1326 audit(796.193:2499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x133450 code=0x7ffc0000
[  540.319505][   T31] audit: type=1326 audit(796.193:2500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  540.334512][   T31] audit: type=1326 audit(796.203:2501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000
[  540.336846][   T31] audit: type=1326 audit(796.203:2502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  540.359366][   T31] audit: type=1326 audit(796.223:2503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=0 ip=0x133450 code=0x7ffc0000
[  540.367803][   T31] audit: type=1326 audit(796.223:2504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  540.370724][   T31] audit: type=1326 audit(796.223:2505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8035 comm="syz.7.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000
[  542.016269][   T32] INFO: task kworker/0:3:1776 blocked for more than 430 seconds.
[  542.016891][   T32]       Not tainted 6.12.0-syzkaller #0
[  542.017353][   T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  542.018058][   T32] task:kworker/0:3     state:D stack:0     pid:1776  tgid:1776  ppid:2      flags:0x00000000
[  542.018680][   T32] Workqueue: events bpf_prog_free_deferred
[  542.020263][   T32] Call trace: 
[  542.033018][   T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc)
[  542.034392][   T32]  r10:60000013 r9:00000000 r8:82717e48 r7:00000002 r6:eafe9da4 r5:83dfbc00
[  542.035514][   T32]  r4:83dfbc00
[  542.036114][   T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24)
[  542.036765][   T32]  r5:83dfbc00 r4:82717e44
[  542.037499][   T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38)
[  542.038801][   T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18)
[  542.039986][   T32]  r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe9e20
[  542.069706][   T32]  r4:00000000
[  542.070016][   T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40)
[  542.070439][   T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240)
SYZFAIL: failed to recv rpc
[  542.080698][   T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4)
[  542.081448][   T32]  r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84329dc0
[  542.081724][   T32]  r4:00000000
[  542.081889][   T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64)
[  542.082225][   T32]  r9:83dfbc00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f035000
[  542.082701][   T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14)
[  542.083480][   T32]  r5:00001000 r4:dfa1b000
[  542.083759][   T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4)
[  542.084293][   T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164)
[  542.084851][   T32]  r5:84f33754 r4:84f33400
[  542.085060][   T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4)
[  542.085818][   T32]  r7:dddd0000 r6:82c18000 r5:84f33754 r4:83c66580
[  542.086584][   T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc)
[  542.087161][   T32]  r10:83dfbc00 r9:83c665ac r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000
[  542.087786][   T32]  r4:83c66580
[  542.088086][   T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134)
[  542.088808][   T32]  r10:00000000 r9:df841e78 r8:83d8bd00 r7:83c66580 r6:8026771c r5:83dfbc00
[  542.089289][   T32]  r4:83d77a80
[  542.089575][   T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20)
[  542.090096][   T32] Exception stack(0xeafe9fb0 to 0xeafe9ff8)
fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor)
[  542.147435][   T32] 9fa0:                                     00000000 00000000 00000000 00000000
[  542.148118][   T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  542.148848][   T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  542.149752][   T32]  r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:83d77a80
[  542.171894][   T32] INFO: task kworker/1:9:3833 blocked for more than 430 seconds.
[  542.172630][   T32]       Not tainted 6.12.0-syzkaller #0
[  542.173117][   T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  542.173436][   T32] task:kworker/1:9     state:D stack:0     pid:3833  tgid:3833  ppid:2      flags:0x00000000
[  542.174377][   T32] Workqueue: events bpf_prog_free_deferred
[  542.174879][   T32] Call trace: 
[  542.175072][   T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc)
[  542.175648][   T32]  r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:dfda5da4 r5:83468000
[  542.176136][   T32]  r4:83468000
[  542.176313][   T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24)
[  542.176572][   T32]  r5:83468000 r4:82717e44
[  542.176828][   T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38)
[  542.177408][   T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18)
[  542.177969][   T32]  r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda5e20
[  542.178511][   T32]  r4:00000000
[  542.178740][   T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40)
[  542.221510][   T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240)
[  542.221960][   T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4)
[  542.222197][   T32]  r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85044c40
[  542.222389][   T32]  r4:00000000
[  542.222459][   T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64)
[  542.222668][   T32]  r9:83468000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f03b000
[  542.222896][   T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14)
[  542.223112][   T32]  r5:00001000 r4:dfa35000
[  542.223280][   T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4)
[  542.223559][   T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164)
[  542.223929][   T32]  r5:84f43b54 r4:84f43800
[  542.224085][   T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4)
[  542.224502][   T32]  r7:ddde4000 r6:82c18200 r5:84f43b54 r4:85206800
[  542.224677][   T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc)
[  542.224943][   T32]  r10:83468000 r9:8520682c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000
[  542.225127][   T32]  r4:85206800
[  542.225288][   T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134)
[  542.225538][   T32]  r10:00000000 r9:dfeede78 r8:84d63680 r7:85206800 r6:8026771c r5:83468000
[  542.225755][   T32]  r4:842f5740
[  542.225917][   T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20)
[  542.226164][   T32] Exception stack(0xdfda5fb0 to 0xdfda5ff8)
[  542.226358][   T32] 5fa0:                                     00000000 00000000 00000000 00000000
[  542.226640][   T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  542.226934][   T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  542.227128][   T32]  r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:842f5740
[  542.227695][   T32] INFO: task kworker/0:14:3855 blocked for more than 430 seconds.
[  542.228183][   T32]       Not tainted 6.12.0-syzkaller #0
[  542.228594][   T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  542.229104][   T32] task:kworker/0:14    state:D stack:0     pid:3855  tgid:3855  ppid:2      flags:0x00000000
[  542.229725][   T32] Workqueue: events bpf_prog_free_deferred
[  542.230080][   T32] Call trace: 
[  542.230325][   T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc)
[  542.230721][   T32]  r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:dfaa1da4 r5:84b29800
[  542.276185][   T32]  r4:84b29800
[  542.276626][   T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24)
[  542.277432][   T32]  r5:84b29800 r4:82717e44
[  542.277634][   T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38)
[  542.278126][   T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18)
[  542.278788][   T32]  r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e20
[  542.279335][   T32]  r4:00000000
[  542.279579][   T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40)
[  542.280273][   T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240)
[  542.296184][   T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4)
[  542.296849][   T32]  r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eea600
[  542.297301][   T32]  r4:00000000
[  542.297524][   T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64)
[  542.298014][   T32]  r9:84b29800 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f045000
[  542.298475][   T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14)
[  542.299160][   T32]  r5:00001000 r4:dfd2d000
[  542.299630][   T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4)
[  542.300634][   T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164)
[  542.315544][   T32]  r5:85089f54 r4:85089c00
[  542.315916][   T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4)
[  542.316617][   T32]  r7:dddd0000 r6:82c18000 r5:85089f54 r4:850ebd00
[  542.317107][   T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc)
[  542.317768][   T32]  r10:84b29800 r9:850ebd2c r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000
[  542.318624][   T32]  r4:850ebd00
[  542.319069][   T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134)
[  542.319655][   T32]  r10:00000000 r9:dfa31e78 r8:85079280 r7:850ebd00 r6:8026771c r5:84b29800
[  542.320073][   T32]  r4:8512a700
[  542.320215][   T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20)
[  542.320595][   T32] Exception stack(0xdfaa1fb0 to 0xdfaa1ff8)
[  542.340182][   T32] 1fa0:                                     00000000 00000000 00000000 00000000
[  542.340670][   T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  542.341659][   T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  542.341858][   T32]  r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:8512a700
[  542.351694][   T32] INFO: task kworker/1:11:3867 blocked for more than 430 seconds.
[  542.352067][   T32]       Not tainted 6.12.0-syzkaller #0
[  542.352245][   T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  542.352727][   T32] task:kworker/1:11    state:D stack:0     pid:3867  tgid:3867  ppid:2      flags:0x00000000
[  542.353220][   T32] Workqueue: events bpf_prog_free_deferred
[  542.353613][   T32] Call trace: 
[  542.353854][   T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc)
[  542.354323][   T32]  r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:df95dda4 r5:84b28000
[  542.354756][   T32]  r4:84b28000
[  542.354870][   T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24)
[  542.355447][   T32]  r5:84b28000 r4:82717e44
[  542.355628][   T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38)
[  542.356228][   T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18)
[  542.356798][   T32]  r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df95de20
[  542.357254][   T32]  r4:00000000
[  542.357479][   T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40)
[  542.357997][   T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240)
[  542.358626][   T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4)
[  542.359238][   T32]  r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520ec00
[  542.359789][   T32]  r4:00000000
[  542.359957][   T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64)
[  542.360435][   T32]  r9:84b28000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f037000
[  542.360960][   T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14)
[  542.392195][   T32]  r5:00001000 r4:dfa23000
[  542.392579][   T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4)
[  542.393209][   T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164)
[  542.393847][   T32]  r5:84f43f54 r4:84f43c00
[  542.394196][   T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4)
[  542.394918][   T32]  r7:ddde4000 r6:82c18200 r5:84f43f54 r4:85206400
[  542.395398][   T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc)
[  542.396138][   T32]  r10:84b28000 r9:8520642c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000
[  542.396925][   T32]  r4:85206400
[  542.397285][   T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134)
[  542.397899][   T32]  r10:00000000 r9:dfda5e78 r8:8423c2c0 r7:85206400 r6:8026771c r5:84b28000
[  542.398431][   T32]  r4:8520ebc0
[  542.398768][   T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20)
[  542.399421][   T32] Exception stack(0xdf95dfb0 to 0xdf95dff8)
[  542.399770][   T32] dfa0:                                     00000000 00000000 00000000 00000000
[  542.400226][   T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  542.400665][   T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  542.430880][   T32]  r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:8520ebc0
[  542.441626][   T32] INFO: task kworker/1:12:3872 blocked for more than 430 seconds.
[  542.442164][   T32]       Not tainted 6.12.0-syzkaller #0
[  542.442470][   T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  542.443103][   T32] task:kworker/1:12    state:D stack:0     pid:3872  tgid:3872  ppid:2      flags:0x00000000
[  542.443723][   T32] Workqueue: events bpf_prog_free_deferred
[  542.444221][   T32] Call trace: 
[  542.444500][   T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc)
[  542.444920][   T32]  r10:60000013 r9:00000000 r8:82717e48 r7:00000002 r6:df9f1da4 r5:83618000
[  542.445543][   T32]  r4:83618000
[  542.445745][   T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24)
[  542.446008][   T32]  r5:83618000 r4:82717e44
[  542.446147][   T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38)
[  542.446433][   T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18)
[  542.446765][   T32]  r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f1e20
[  542.446972][   T32]  r4:00000000
[  542.447117][   T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40)
[  542.447737][   T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240)
[  542.448337][   T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4)
[  542.448964][   T32]  r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ec500
[  542.449635][   T32]  r4:00000000
[  542.449886][   T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64)
[  542.450548][   T32]  r9:83618000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f043000
[  542.472947][   T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14)
[  542.473662][   T32]  r5:00001000 r4:dfce3000
[  542.473948][   T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4)
[  542.474549][   T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164)
[  542.475180][   T32]  r5:85095f54 r4:85095c00
[  542.475632][   T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4)
[  542.476407][   T32]  r7:ddde4000 r6:82c18200 r5:85095f54 r4:85206480
[  542.476751][   T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc)
[  542.477281][   T32]  r10:83618000 r9:852064ac r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000
[  542.477902][   T32]  r4:85206480
[  542.478156][   T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134)
[  542.478808][   T32]  r10:00000000 r9:df95de78 r8:850d86c0 r7:85206480 r6:8026771c r5:83618000
[  542.479500][   T32]  r4:83f65340
[  542.479829][   T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20)
[  542.480447][   T32] Exception stack(0xdf9f1fb0 to 0xdf9f1ff8)
[  542.480730][   T32] 1fa0:                                     00000000 00000000 00000000 00000000
[  542.504825][   T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  542.505620][   T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  542.506098][   T32]  r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:83f65340
[  542.511664][   T32] INFO: task kworker/1:13:3873 blocked for more than 430 seconds.
[  542.512148][   T32]       Not tainted 6.12.0-syzkaller #0
[  542.512527][   T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  542.512796][   T32] task:kworker/1:13    state:D stack:0     pid:3873  tgid:3873  ppid:2      flags:0x00000000
[  542.513337][   T32] Workqueue: events bpf_prog_free_deferred
[  542.513705][   T32] Call trace: 
[  542.513896][   T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc)
[  542.514288][   T32]  r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:df9a5da4 r5:8361e000
[  542.514798][   T32]  r4:8361e000
[  542.515069][   T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24)
[  542.515774][   T32]  r5:8361e000 r4:82717e44
[  542.516085][   T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38)
[  542.516817][   T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18)
[  542.517471][   T32]  r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a5e20
[  542.518060][   T32]  r4:00000000
[  542.518349][   T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40)
[  542.518852][   T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240)
[  542.519340][   T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4)
[  542.519776][   T32]  r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212040
[  542.520140][   T32]  r4:00000000
[  542.520371][   T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64)
[  542.545416][   T32]  r9:8361e000 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f03d000
[  542.546132][   T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14)
[  542.547329][   T32]  r5:00001000 r4:dfa7f000
[  542.547643][   T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4)
[  542.548343][   T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164)
[  542.549161][   T32]  r5:84f42f54 r4:84f42c00
[  542.549609][   T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4)
[  542.550534][   T32]  r7:ddde4000 r6:82c18200 r5:84f42f54 r4:85206500
[  542.550935][   T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc)
[  542.568533][   T32]  r10:8361e000 r9:8520652c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000
[  542.569165][   T32]  r4:85206500
[  542.569422][   T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134)
[  542.570164][   T32]  r10:00000000 r9:df9f1e78 r8:850d88c0 r7:85206500 r6:8026771c r5:8361e000
[  542.570444][   T32]  r4:84ed1a40
[  542.575874][   T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20)
[  542.576520][   T32] Exception stack(0xdf9a5fb0 to 0xdf9a5ff8)
[  542.576902][   T32] 5fa0:                                     00000000 00000000 00000000 00000000
[  542.577540][   T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  542.578175][   T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  542.578622][   T32]  r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:84ed1a40
[  542.579177][   T32] INFO: task kworker/0:17:3874 blocked for more than 430 seconds.
[  542.579738][   T32]       Not tainted 6.12.0-syzkaller #0
[  542.580153][   T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  542.580683][   T32] task:kworker/0:17    state:D stack:0     pid:3874  tgid:3874  ppid:2      flags:0x00000000
[  542.600325][   T32] Workqueue: events bpf_prog_free_deferred
[  542.600834][   T32] Call trace: 
[  542.604698][   T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc)
[  542.605498][   T32]  r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:dfa05da4 r5:8361c800
[  542.605944][   T32]  r4:8361c800
[  542.606039][   T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24)
[  542.606951][   T32]  r5:8361c800 r4:82717e44
[  542.607396][   T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38)
[  542.608340][   T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18)
[  542.609140][   T32]  r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e20
[  542.609911][   T32]  r4:00000000
[  542.610285][   T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40)
[  542.610936][   T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240)
[  542.633429][   T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4)
[  542.634161][   T32]  r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212300
[  542.634719][   T32]  r4:00000000
[  542.634955][   T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64)
[  542.635986][   T32]  r9:8361c800 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f041000
[  542.637070][   T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14)
[  542.637714][   T32]  r5:00001000 r4:dfc09000
[  542.638265][   T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4)
[  542.638954][   T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164)
[  542.639556][   T32]  r5:84f43754 r4:84f43400
[  542.639780][   T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4)
[  542.640455][   T32]  r7:dddd0000 r6:82c18000 r5:84f43754 r4:850eb180
[  542.640773][   T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc)
[  542.660717][   T32]  r10:8361c800 r9:850eb1ac r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000
[  542.661842][   T32]  r4:850eb180
[  542.662039][   T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134)
[  542.662592][   T32]  r10:00000000 r9:dfaa1e78 r8:84ffd940 r7:850eb180 r6:8026771c r5:8361c800
[  542.663118][   T32]  r4:84fcee00
[  542.663412][   T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20)
[  542.663910][   T32] Exception stack(0xdfa05fb0 to 0xdfa05ff8)
[  542.664212][   T32] 5fa0:                                     00000000 00000000 00000000 00000000
[  542.664733][   T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  542.665242][   T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  542.665754][   T32]  r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:84fcee00
[  542.671379][   T32] INFO: task kworker/1:14:3879 blocked for more than 430 seconds.
[  542.672030][   T32]       Not tainted 6.12.0-syzkaller #0
[  542.672172][   T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  542.672370][   T32] task:kworker/1:14    state:D stack:0     pid:3879  tgid:3879  ppid:2      flags:0x00000000
[  542.681676][   T32] Workqueue: events bpf_prog_free_deferred
[  542.682051][   T32] Call trace: 
[  542.682301][   T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc)
[  542.682856][   T32]  r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:dfbf5da4 r5:8361ec00
[  542.683385][   T32]  r4:8361ec00
[  542.683544][   T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24)
[  542.684037][   T32]  r5:8361ec00 r4:82717e44
[  542.684291][   T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38)
[  542.684913][   T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18)
[  542.685487][   T32]  r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e20
[  542.685921][   T32]  r4:00000000
[  542.686089][   T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40)
[  542.686606][   T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240)
[  542.687116][   T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4)
[  542.687647][   T32]  r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e900
[  542.688192][   T32]  r4:00000000
[  542.688384][   T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64)
[  542.688916][   T32]  r9:8361ec00 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f03f000
[  542.689350][   T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14)
[  542.689849][   T32]  r5:00001000 r4:dfbd5000
[  542.690093][   T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4)
[  542.690610][   T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164)
[  542.701607][   T32]  r5:85094754 r4:85094400
[  542.701946][   T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4)
[  542.702229][   T32]  r7:ddde4000 r6:82c18200 r5:85094754 r4:85206200
[  542.702370][   T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc)
[  542.702618][   T32]  r10:8361ec00 r9:8520622c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000
[  542.702906][   T32]  r4:85206200
[  542.703013][   T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134)
[  542.703689][   T32]  r10:00000000 r9:df9f1e78 r8:8510a200 r7:85206200 r6:8026771c r5:8361ec00
[  542.704161][   T32]  r4:85212140
[  542.704381][   T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20)
[  542.704868][   T32] Exception stack(0xdfbf5fb0 to 0xdfbf5ff8)
[  542.705226][   T32] 5fa0:                                     00000000 00000000 00000000 00000000
[  542.705694][   T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  542.706098][   T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  542.706602][   T32]  r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:85212140
[  542.707189][   T32] INFO: task kworker/1:16:3892 blocked for more than 430 seconds.
[  542.707776][   T32]       Not tainted 6.12.0-syzkaller #0
[  542.708138][   T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  542.708675][   T32] task:kworker/1:16    state:D stack:0     pid:3892  tgid:3892  ppid:2      flags:0x00000000
[  542.709421][   T32] Workqueue: events bpf_prog_free_deferred
[  542.709843][   T32] Call trace: 
[  542.710088][   T32] [<819c9cf8>] (__schedule) from [<819ca954>] (schedule+0x2c/0xfc)
[  542.710582][   T32]  r10:60000113 r9:00000000 r8:82717e48 r7:00000002 r6:dfccdda4 r5:83e04800
[  542.723502][   T32]  r4:83e04800
[  542.723803][   T32] [<819ca928>] (schedule) from [<819cad08>] (schedule_preempt_disabled+0x18/0x24)
[  542.724333][   T32]  r5:83e04800 r4:82717e44
[  542.724643][   T32] [<819cacf0>] (schedule_preempt_disabled) from [<819cd99c>] (__mutex_lock.constprop.0+0x32c/0xb38)
[  542.725279][   T32] [<819cd670>] (__mutex_lock.constprop.0) from [<819ce27c>] (__mutex_lock_slowpath+0x14/0x18)
[  542.725913][   T32]  r10:8260cabc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfccde20
[  542.726466][   T32]  r4:00000000
[  542.726702][   T32] [<819ce268>] (__mutex_lock_slowpath) from [<819ce2bc>] (mutex_lock+0x3c/0x40)
[  542.727401][   T32] [<819ce280>] (mutex_lock) from [<804b0598>] (_vm_unmap_aliases+0x68/0x240)
[  542.727935][   T32] [<804b0530>] (_vm_unmap_aliases) from [<804b42f4>] (vfree+0x170/0x1e4)
[  542.728375][   T32]  r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d637c0
[  542.728891][   T32]  r4:00000000
[  542.729204][   T32] [<804b4184>] (vfree) from [<80512d2c>] (execmem_free+0x30/0x64)
[  542.729695][   T32]  r9:83e04800 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f047000
[  542.730270][   T32] [<80512cfc>] (execmem_free) from [<8039dd20>] (bpf_jit_free_exec+0x10/0x14)
[  542.730802][   T32]  r5:00001000 r4:dfd73000
[  542.752385][   T32] [<8039dd10>] (bpf_jit_free_exec) from [<8039e100>] (bpf_jit_free+0x68/0xe4)
[  542.752946][   T32] [<8039e098>] (bpf_jit_free) from [<8039f254>] (bpf_prog_free_deferred+0x14c/0x164)
[  542.753476][   T32]  r5:8508ab54 r4:8508a800
[  542.753713][   T32] [<8039f108>] (bpf_prog_free_deferred) from [<80266d24>] (process_one_work+0x1b4/0x4f4)
[  542.754327][   T32]  r7:ddde4000 r6:82c18200 r5:8508ab54 r4:85206a00
[  542.754830][   T32] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc)
[  542.755354][   T32]  r10:83e04800 r9:85206a2c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000
[  542.755885][   T32]  r4:85206a00
[  542.756083][   T32] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134)
[  542.756486][   T32]  r10:00000000 r9:dfbe1e78 r8:850c6780 r7:85206a00 r6:8026771c r5:83e04800
[  542.756975][   T32]  r4:850c8700
[  542.757269][   T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20)
[  542.757840][   T32] Exception stack(0xdfccdfb0 to 0xdfccdff8)
[  542.758160][   T32] dfa0:                                     00000000 00000000 00000000 00000000
[  542.758837][   T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  542.759155][   T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  542.759622][   T32]  r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:850c8700
[  542.772221][   T32] NMI backtrace for cpu 1
[  542.772800][   T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-syzkaller #0
[  542.773383][   T32] Hardware name: ARM-Versatile Express
[  542.773675][   T32] Call trace: 
[  542.773903][   T32] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c)
[  542.774454][   T32]  r7:00000000 r6:00000113 r5:60000193 r4:8203f890
[  542.774848][   T32] [<819a7d5c>] (show_stack) from [<819c5ddc>] (dump_stack_lvl+0x70/0x7c)
[  542.775136][   T32] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c)
[  542.775433][   T32]  r5:00000001 r4:00000001
[  542.775575][   T32] [<819c5de8>] (dump_stack) from [<81994f30>] (nmi_cpu_backtrace+0x160/0x17c)
[  542.775867][   T32] [<81994dd0>] (nmi_cpu_backtrace) from [<8199507c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8)
[  542.776451][   T32]  r7:00000001 r6:8260c610 r5:8261af4c r4:ffffffff
[  542.776722][   T32] [<81994f4c>] (nmi_trigger_cpumask_backtrace) from [<80210408>] (arch_trigger_cpumask_backtrace+0x18/0x1c)
[  542.777522][   T32]  r9:00005ec2 r8:828b7ca4 r7:8260c770 r6:00007d5f r5:8261b508 r4:86478b1c
[  542.777911][   T32] [<802103f0>] (arch_trigger_cpumask_backtrace) from [<803599e4>] (watchdog+0x498/0x5b8)
[  542.778649][   T32] [<8035954c>] (watchdog) from [<80270974>] (kthread+0x104/0x134)
[  542.779220][   T32]  r10:00000000 r9:df819e58 r8:82e9f400 r7:00000000 r6:8035954c r5:82ee8c00
[  542.779848][   T32]  r4:82f45a00
[  542.780098][   T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20)
[  542.780692][   T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8)
[  542.781043][   T32] 1fa0:                                     00000000 00000000 00000000 00000000
[  542.781402][   T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  542.781995][   T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  542.782457][   T32]  r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:82f45a00
[  542.783836][   T32] Sending NMI from CPU 1 to CPUs 0:
[  542.784613][    C0] NMI backtrace for cpu 0
[  542.784791][    C0] CPU: 0 UID: 0 PID: 2446 Comm: kworker/u9:6 Not tainted 6.12.0-syzkaller #0
[  542.784855][    C0] Hardware name: ARM-Versatile Express
[  542.784885][    C0] Workqueue: events_unbound nsim_dev_trap_report_work
[  542.785008][    C0] PC is at _raw_spin_unlock_irqrestore+0x28/0x54
[  542.785067][    C0] LR is at hrtimer_start_range_ns+0x170/0x4c0
[  542.785122][    C0] pc : [<819d3390>]    lr : [<80305df8>]    psr: 60000113
[  542.785156][    C0] sp : df801dd0  ip : df801de0  fp : df801ddc
[  542.785189][    C0] r10: dddc7140  r9 : dddc7140  r8 : 00000000
[  542.785226][    C0] r7 : dddc7180  r6 : dddc7180  r5 : dddc7140  r4 : 849fd968
[  542.785264][    C0] r3 : 0000df0d  r2 : 0000003e  r1 : 20000113  r0 : dddc7140
[  542.785384][    C0] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  542.785461][    C0] Control: 30c5387d  Table: 84171840  DAC: fffffffd
[  542.785521][    C0] Call trace: frame pointer underflow
[  542.785601][    C0] [<819d3368>] (_raw_spin_unlock_irqrestore) from [<80305df8>] (hrtimer_start_range_ns+0x170/0x4c0)
[  542.785658][    C0] [<80305c88>] (hrtimer_start_range_ns) from [<815431b8>] (qdisc_watchdog_schedule_range_ns+0x8c/0x94)
[  542.785736][    C0]  r10:f03b2c27 r9:00000000 r8:00000000 r7:00000000 r6:0000007e r5:5b0b91fe
[  542.785771][    C0]  r4:849fd968
[  542.785786][    C0] [<8154312c>] (qdisc_watchdog_schedule_range_ns) from [<815769cc>] (tbf_dequeue+0x350/0x3e0)
[  542.785853][    C0]  r9:00000002 r8:00000088 r7:00000000 r6:849fd900 r5:00008d32 r4:849fd800
[  542.785867][    C0] [<8157667c>] (tbf_dequeue) from [<8153fb88>] (__qdisc_run+0x90/0x7e8)
[  542.785928][    C0]  r10:00000004 r9:8361bc00 r8:849fd898 r7:82e27c00 r6:00000000 r5:dddd1040
[  542.785958][    C0]  r4:849fd800
[  542.785972][    C0] [<8153faf8>] (__qdisc_run) from [<814beb54>] (net_tx_action+0x22c/0x398)
[  542.786044][    C0]  r10:00000004 r9:8361bc00 r8:849fd898 r7:849fd85c r6:00000000 r5:dddd1040
[  542.786077][    C0]  r4:849fd800
[  542.786091][    C0] [<814be928>] (net_tx_action) from [<8024b928>] (handle_softirqs+0x158/0x464)
[  542.786162][    C0]  r10:00000004 r9:8361bc00 r8:00000101 r7:04208060 r6:00000002 r5:00000003
[  542.786190][    C0]  r4:82604088
[  542.786202][    C0] [<8024b7d0>] (handle_softirqs) from [<8024bd90>] (__irq_exit_rcu+0x110/0x1d0)
[  542.786269][    C0]  r10:00000000 r9:8361bc00 r8:00000000 r7:eb7d5d58 r6:821e1a94 r5:822222a0
[  542.786288][    C0]  r4:8361bc00
[  542.786300][    C0] [<8024bc80>] (__irq_exit_rcu) from [<8024c108>] (irq_exit+0x10/0x18)
[  542.786367][    C0]  r5:822222a0 r4:824bbc1c
[  542.786382][    C0] [<8024c0f8>] (irq_exit) from [<819c679c>] (generic_handle_arch_irq+0x7c/0x80)
[  542.786450][    C0] [<819c6720>] (generic_handle_arch_irq) from [<819770fc>] (call_with_stack+0x1c/0x20)
[  542.786530][    C0]  r9:8361bc00 r8:80000113 r7:eb7d5d8c r6:ffffffff r5:20000113 r4:809fa5ec
[  542.786544][    C0] [<819770e0>] (call_with_stack) from [<80200bcc>] (__irq_svc+0x8c/0xbc)
[  542.786592][    C0] Exception stack(0xeb7d5d58 to 0xeb7d5da0)
[  542.786621][    C0] 5d40:                                                       00000000 8203f890
[  542.786654][    C0] 5d60: 00000000 00000001 dddce57c 00000006 eb7d5dd4 86980000 80000113 8290dfe0
[  542.786687][    C0] 5d80: 00000000 eb7d5dcc eb7d5d98 eb7d5da8 819c73d8 809fa5ec 20000113 ffffffff
[  542.786706][    C0] [<809fa57c>] (crng_make_state) from [<809fa740>] (_get_random_bytes+0x94/0x124)
[  542.786776][    C0]  r9:86980000 r8:00000006 r7:eb7d5e14 r6:eb7d5dd4 r5:86980000 r4:00000006
[  542.786791][    C0] [<809fa6ac>] (_get_random_bytes) from [<809fa7e0>] (get_random_bytes+0x10/0x14)
[  542.786850][    C0]  r8:00000030 r7:84f06b80 r6:81b90958 r5:84f06c30 r4:851fdb40
[  542.786864][    C0] [<809fa7d0>] (get_random_bytes) from [<80da9cec>] (nsim_dev_trap_report_work+0x10c/0x33c)
[  542.786912][    C0] [<80da9be0>] (nsim_dev_trap_report_work) from [<80266d24>] (process_one_work+0x1b4/0x4f4)
[  542.786980][    C0]  r10:82c1bc05 r9:8361bc00 r8:02400000 r7:82c0f600 r6:82c1bc00 r5:84f06b80
[  542.787014][    C0]  r4:83fe5280
[  542.787031][    C0] [<80266b70>] (process_one_work) from [<80267908>] (worker_thread+0x1ec/0x3bc)
[  542.787097][    C0]  r10:8361bc00 r9:83fe52ac r8:61c88647 r7:82c0f620 r6:82604d40 r5:82c0f600
[  542.787116][    C0]  r4:83fe5280
[  542.787146][    C0] [<8026771c>] (worker_thread) from [<80270974>] (kthread+0x104/0x134)
[  542.787209][    C0]  r10:00000000 r9:eb79de78 r8:84010d40 r7:83fe5280 r6:8026771c r5:8361bc00
[  542.787236][    C0]  r4:84010cc0
[  542.787251][    C0] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20)
[  542.787340][    C0] Exception stack(0xeb7d5fb0 to 0xeb7d5ff8)
[  542.787370][    C0] 5fa0:                                     00000000 00000000 00000000 00000000
[  542.787402][    C0] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  542.787429][    C0] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  542.787511][    C0]  r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:84010cc0
[  542.802118][   T32] Kernel panic - not syncing: hung_task: blocked tasks
[  542.841927][   T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-syzkaller #0
[  542.843528][   T32] Hardware name: ARM-Versatile Express
[  542.844918][   T32] Call trace: 
[  542.846115][   T32] [<819a7c78>] (dump_backtrace) from [<819a7d74>] (show_stack+0x18/0x1c)
[  542.847249][   T32]  r7:00000000 r6:82623184 r5:00000000 r4:8203f890
[  542.848933][   T32] [<819a7d5c>] (show_stack) from [<819c5dc0>] (dump_stack_lvl+0x54/0x7c)
[  542.850697][   T32] [<819c5d6c>] (dump_stack_lvl) from [<819c5e00>] (dump_stack+0x18/0x1c)
[  542.851360][   T32]  r5:00000000 r4:82871d18
[  542.851794][   T32] [<819c5de8>] (dump_stack) from [<819a88a0>] (panic+0x120/0x374)
[  542.852483][   T32] [<819a8780>] (panic) from [<80359864>] (watchdog+0x318/0x5b8)
[  542.852984][   T32]  r3:00000000 r2:00000000 r1:00000001 r0:820403bc
[  542.854180][   T32]  r7:8260c770
[  542.854941][   T32] [<8035954c>] (watchdog) from [<80270974>] (kthread+0x104/0x134)
[  542.856695][   T32]  r10:00000000 r9:df819e58 r8:82e9f400 r7:00000000 r6:8035954c r5:82ee8c00
[  542.858007][   T32]  r4:82f45a00
[  542.858710][   T32] [<80270870>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20)
[  542.860394][   T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8)
[  542.861148][   T32] 1fa0:                                     00000000 00000000 00000000 00000000
[  542.862835][   T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  542.863978][   T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  542.865550][   T32]  r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80270870 r4:82f45a00
[  542.869266][   T32] Rebooting in 86400 seconds..

VM DIAGNOSIS:
22:30:04  Registers:
info registers vcpu 0

CPU#0
R00=00000000 R01=8203f890 R02=00000001 R03=819c7c30
R04=00000006 R05=826f8c88 R06=00000000 R07=826f8c80
R08=82e3b000 R09=00000028 R10=826f8c88 R11=df801eac
R12=df801eb0 R13=df801ea0 R14=8031ada8 R15=819c7c40
PSR=20000193 --C- A S svc32
s00=10000000 s01=00000000 d00=0000000010000000
s02=e0000000 s03=0004290e d01=0004290ee0000000
s04=fc000000 s05=ffffffff d02=fffffffffc000000
s06=fc000000 s07=ffffffff d03=fffffffffc000000
s08=01c3c78e s09=00db51fc d04=00db51fc01c3c78e
s10=00000000 s11=00000000 d05=0000000000000000
s12=01c57567 s13=ffa3905d d06=ffa3905d01c57567
s14=00000000 s15=ffffffff d07=ffffffff00000000
s16=00000000 s17=07a2f9f4 d08=07a2f9f400000000
s18=54000000 s19=00020fbd d09=00020fbd54000000
s20=01c1b82e s21=ffa39061 d10=ffa3906101c1b82e
s22=00000000 s23=ffffffff d11=ffffffff00000000
s24=13c3c78e s25=00000000 d12=0000000013c3c78e
s26=e0000000 s27=0004290e d13=0004290ee0000000
s28=02000000 s29=00000000 d14=0000000002000000
s30=02000000 s31=00000000 d15=0000000002000000
s32=ffa1a718 s33=ff028334 d16=ff028334ffa1a718
s34=ffffffff s35=ffffffff d17=ffffffffffffffff
s36=ffefa6ae s37=002cb2c3 d18=002cb2c3ffefa6ae
s38=ffffffff s39=00000000 d19=00000000ffffffff
s40=01000000 s41=00000000 d20=0000000001000000
s42=03179bfe s43=00000000 d21=0000000003179bfe
s44=00000004 s45=00000000 d22=0000000000000004
s46=0107deaa s47=00000000 d23=000000000107deaa
s48=00894fa6 s49=07a2f9f4 d24=07a2f9f400894fa6
s50=1395869e s51=00000000 d25=000000001395869e
s52=0043f0f3 s53=ff22134c d26=ff22134c0043f0f3
s54=00531de3 s55=018dfd00 d27=018dfd0000531de3
s56=feb07006 s57=ffa41a5e d28=ffa41a5efeb07006
s58=ffd20d2f s59=00531de3 d29=00531de3ffd20d2f
s60=d48d3cac s61=0004290e d30=0004290ed48d3cac
s62=be2e40f0 s63=fffb8917 d31=fffb8917be2e40f0
FPSCR: 00000000
info registers vcpu 1

CPU#1
R00=00000008 R01=00000008 R02=df807000 R03=00010003
R04=00000001 R05=8260ce10 R06=81a01a2c R07=82c97b18
R08=20000193 R09=83e0cd94 R10=20000193 R11=df805c6c
R12=00000001 R13=df805c48 R14=808f8fc0 R15=808f8fe0
PSR=20000193 --C- A S svc32
s00=00000000 s01=00000000 d00=0000000000000000
s02=18000000 s03=0008e24b d01=0008e24b18000000
s04=fc000000 s05=ffffffff d02=fffffffffc000000
s06=fc000000 s07=ffffffff d03=fffffffffc000000
s08=fee93a28 s09=ffa82199 d04=ffa82199fee93a28
s10=ffffffff s11=ffffffff d05=ffffffffffffffff
s12=fed16eaf s13=ffd1f77d d06=ffd1f77dfed16eaf
s14=ffffffff s15=ffffffff d07=ffffffffffffffff
s16=00000000 s17=03df782d d08=03df782d00000000
s18=2a000000 s19=ffffad7f d09=ffffad7f2a000000
s20=fe350398 s21=ffd1f77e d10=ffd1f77efe350398
s22=ffffffff s23=ffffffff d11=ffffffffffffffff
s24=00e93a28 s25=00000000 d12=0000000000e93a28
s26=18000000 s27=0008e24b d13=0008e24b18000000
s28=02000000 s29=00000000 d14=0000000002000000
s30=02000000 s31=00000000 d15=0000000002000000
s32=01c9415c s33=0043a5c7 d16=0043a5c701c9415c
s34=00000000 s35=00000000 d17=0000000000000000
s36=ff12da24 s37=0081f7f8 d18=0081f7f8ff12da24
s38=ffffffff s39=00000000 d19=00000000ffffffff
s40=01000000 s41=00000000 d20=0000000001000000
s42=ff843ebf s43=ffffffff d21=ffffffffff843ebf
s44=00000000 s45=00000000 d22=0000000000000000
s46=ffd6bf95 s47=ffffffff d23=ffffffffffd6bf95
s48=00c6a694 s49=03df782d d24=03df782d00c6a694
s50=fcf0380f s51=ffffffff d25=fffffffffcf0380f
s52=feaaec17 s53=fec46342 d26=fec46342feaaec17
s54=fef0f869 s55=008a889e d27=008a889efef0f869
s56=ff68dc4a s57=00fa77e4 d28=00fa77e4ff68dc4a
s58=007d3bf2 s59=fef0f869 d29=fef0f869007d3bf2
s60=1ddca255 s61=0008e24b d30=0008e24b1ddca255
s62=4df90219 s63=ffff2a24 d31=ffff2a244df90219
FPSCR: 00000000