last executing test programs: 50m31.940567098s ago: executing program 32 (id=189): socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fchdir(0xffffffffffffffff) sendmmsg$unix(r5, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=@newqdisc={0x78, 0x24, 0xf0b, 0xfffffffe, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}, {0xfff1}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x0, 0x0, 0x800000, 0x0, 0xffffffff}, 0x20, 0x0, 0x7, 0x8, 0x101, 0x14, 0x0, 0x0, 0x0, 0x0, {0x200}}}}]}, 0x78}}, 0x4080) bind$can_raw(0xffffffffffffffff, &(0x7f0000000340)={0x1d, r8}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x2) 47m46.701269766s ago: executing program 33 (id=276): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r3}, 0x18) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xf, 0x4, 0x8, 0x2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r6, &(0x7f0000000300), 0x0}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) unshare(0x64000600) 45m13.039573662s ago: executing program 34 (id=347): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r0 = socket$igmp(0x2, 0x3, 0x2) sendmsg$inet(r0, 0x0, 0x4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) syz_clone(0x0, 0x0, 0x9, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) ioprio_set$pid(0x2, 0x0, 0x4007) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r8}, 0x10) fsopen(&(0x7f0000000100)='configfs\x00', 0x0) 43m18.978121537s ago: executing program 35 (id=381): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13101}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x20ea7fc}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x44}}, 0x4000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@local, 0x800, 0x0, 0x2, 0x1, 0x3}, 0x20) 41m28.039384269s ago: executing program 36 (id=423): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) 39m37.739109526s ago: executing program 5 (id=626): r0 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000002, 0x11012, r0, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) 39m35.199125276s ago: executing program 5 (id=629): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004080)={{r0}, &(0x7f0000004000), &(0x7f0000004040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r1, 0x0, 0x8000000000004}, 0x18) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="d800000018008103e00312ba0d8105040a600300ff0f040b067c55a1bc000900b80006990700000015000500fef32702d3001500030001400200000901ac040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b66bce0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0x48002) 39m34.642114365s ago: executing program 5 (id=631): syz_emit_ethernet(0x52, &(0x7f00000003c0)={@local, @random="fe995905a6f4", @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x34, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0xc, 0x2, 0xfffe, 0x0, 0x400, {[@timestamp={0x8, 0xa, 0x801, 0x80de}, @generic={0x1, 0x10, "d60eba9716d7b646011b806410fe"}]}}}}}}}, 0x0) 39m34.232228936s ago: executing program 5 (id=632): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x10, 0x0, 0xa}, {0x0, 0x7}, {}, 0x0, 0x0, 0x1}, {{@in=@private=0xa010101, 0x0, 0x33}, 0x0, @in=@dev, 0x200, 0x0, 0x0, 0x7}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 39m31.338980365s ago: executing program 5 (id=636): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x808000, 0x40000004, 0x20300, 0xfa, 0x0, 0x4}, 0x1c) 39m31.060848489s ago: executing program 5 (id=637): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000740)=@newlink={0x38, 0x10, 0x439, 0x70bd2a, 0xffffffea, {0x0, 0x0, 0xe403, 0x0, 0x3, 0x610c3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @remote}]}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4008040) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = mq_open(&(0x7f00000000c0)='${ \x00', 0x840, 0x8, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x5, 0x4}]}) close_range(r2, 0xffffffffffffffff, 0x0) 38m45.712250875s ago: executing program 37 (id=637): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000740)=@newlink={0x38, 0x10, 0x439, 0x70bd2a, 0xffffffea, {0x0, 0x0, 0xe403, 0x0, 0x3, 0x610c3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @remote}]}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4008040) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = mq_open(&(0x7f00000000c0)='${ \x00', 0x840, 0x8, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x5, 0x4}]}) close_range(r2, 0xffffffffffffffff, 0x0) 36m58.597581421s ago: executing program 6 (id=998): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x28) 36m58.357656254s ago: executing program 6 (id=1000): munmap(&(0x7f0000002000/0x2000)=nil, 0x2000) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x78, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f0000002040)=[{0x4, 0x8, 0x8, 0x6}]}, 0x10) 36m58.090975717s ago: executing program 6 (id=1001): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = socket(0x10, 0x803, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0x9}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x4, 0xc00}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000006c0)=@newtfilter={0x58, 0x2c, 0xd27, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, r5, {0xfff2, 0x4}, {}, {0x5, 0x10}}, [@filter_kind_options=@f_flow={{0x9}, {0x28, 0x2, [@TCA_FLOW_EMATCHES={0x24, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xfffb}}, @TCA_EMATCH_TREE_LIST={0x18, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x7, 0x7, 0x2}, {{0x0, 0x1, 0x0, 0x1}, {0x0, 0x1, 0x1, 0x1}}}}]}]}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x400c021}, 0x20040054) 36m57.799828802s ago: executing program 6 (id=1003): mq_open(0x0, 0x42, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0xa004}, 0x4) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket(0x1d, 0x2, 0x6) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3, 0x2, {0x0, 0xf0, 0x3}}, 0x18) sendmmsg$inet6(r2, &(0x7f0000001d80)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="e6810f", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f0000000400)=[{0x0}], 0x1}}], 0x2, 0x40800) syz_usb_connect(0x0, 0x4a, 0x0, 0x0) 36m57.558992845s ago: executing program 6 (id=1004): r0 = socket(0x10, 0x2, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f00000014c0)='w\xde\xa1\x05\xff\a\x00\x00\x00\x00\x00\x00\x8f\xc0\x9b\x86\xef\\\xc0\x89\av\x9f\xd6\xd1\x98<\xc8\x18E/\x8c\x1a\xe3\xbd\xde\xad\xf5\x1eM\x11[\xb6\x98\xda\xd2y\xbd\xad\x87P\xd8\xb2\xe5\xd2\xe7\xf6\xa1\xc8\'\x1e\xbc\xf4\xa0\xe6\xcf*(\xfb_\x9fL\xa2\x86\f\xcd\x1b\xd1\xe7\x11\xe8\xe1-\x0f\x1b:\xff\x11~') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write(r0, &(0x7f0000000040)="1c0000001a009b8a140000003b9b301f00"/28, 0x1c) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 36m55.939177068s ago: executing program 6 (id=1005): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup(r0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socket$igmp(0x2, 0x3, 0x2) sched_setaffinity(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) close_range(r5, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) 36m10.825833421s ago: executing program 38 (id=1005): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup(r0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socket$igmp(0x2, 0x3, 0x2) sched_setaffinity(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) close_range(r5, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) 35m35.027671515s ago: executing program 8 (id=1069): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0xfffffffffffffdd0, 0x0, 0x41000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, @fallback=0x2c, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x200, 0xa) r4 = openat(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) sendfile(r4, r3, 0x0, 0x6) 35m34.781621218s ago: executing program 8 (id=1070): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) r0 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r0, 0x0, 0x0, 0x7c00, 0x0, 0x3) 35m34.377646929s ago: executing program 8 (id=1071): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x304}, "fb7faf0400", "0d35db0d4af1cbcce779bbc24b53fc4988c215118dd14cb837de56339a336a19", "a9a9f902", "8891ea13f18ef0be"}, 0x13) 35m34.287733963s ago: executing program 8 (id=1072): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'ip6_vti0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x2000008, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x8}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}]}, 0x40}}, 0x0) 35m34.039375486s ago: executing program 8 (id=1073): r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socket$inet6_udplite(0xa, 0x2, 0x88) 35m33.800546008s ago: executing program 8 (id=1074): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x2c, r2, 0x6a98047402e98331, 0x70bd2a, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x50}, 0x4886) 34m48.149435499s ago: executing program 39 (id=1074): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x2c, r2, 0x6a98047402e98331, 0x70bd2a, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x50}, 0x4886) 18m34.967459321s ago: executing program 9 (id=1822): r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0105500, &(0x7f0000000000)={0x80, 0x8, 0x303, 0x0, 0x0, 0x4000101, 0x0}) 18m34.569583502s ago: executing program 9 (id=1824): sendmsg$kcm(0xffffffffffffffff, &(0x7f00000020c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)=[{0x10, 0x112, 0x3}], 0x10}, 0x4001) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) socket$kcm(0xa, 0x2, 0x3a) ioctl$SIOCSIFHWADDR(r0, 0x890b, &(0x7f0000002280)={'team0\x00', @random="2b0100004ec6"}) 18m34.338943373s ago: executing program 9 (id=1826): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@struct={0x8, 0x0, 0x0, 0xf, 0x0, 0x10005}]}, {0x0, [0x30, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x0]}}, 0x0, 0x2d, 0x0, 0x6}, 0x28) 18m33.710031585s ago: executing program 9 (id=1827): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$fuse(0x0, 0x0, 0x0, 0x104000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1c8) mount$bind(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x1805406, 0x0) mount$bind(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2a05004, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x205) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000280)={@id={0x2, 0x0, @d}, 0x10, 0x0, '\x00', @d}) 18m33.41631206s ago: executing program 9 (id=1830): r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/105, 0x69}, {&(0x7f00000037c0)=""/4079, 0xfef}, {&(0x7f00000027c0)=""/4065, 0xfe1}, {&(0x7f0000000340)=""/198, 0xc6}, {&(0x7f0000000500)=""/42, 0x2a}, {&(0x7f0000000080)=""/187, 0xbb}, {&(0x7f0000000040)=""/42, 0x2a}], 0x7}, 0x40000100) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000900)="5c00000012006bab9a3fe3d86e17aa0a046b4877c4aaf68187bae53dca2ba35bda6a876c1d0048007ea608649e7524765f0ef82e3c0000a705259a3651f60a84c9f4d4938037e70e4509c5bb00000000e513aeac9bf2bee150d5fe86", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x20000000) recvmsg$kcm(r0, &(0x7f0000000e80)={0x0, 0x0, 0x0}, 0x40000002) 18m33.057866328s ago: executing program 9 (id=1831): r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/105, 0x69}, {&(0x7f0000000ec0)=""/4071, 0xfe7}, {&(0x7f00000027c0)=""/4065, 0xfe1}, {&(0x7f0000000700)=""/238, 0xee}, {&(0x7f0000000500)=""/42, 0x2a}, {&(0x7f0000000080)=""/187, 0xbb}, {&(0x7f00000001c0)=""/42, 0x2a}], 0x7}, 0x40000100) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000900)="5c00000012006bab9a3fe3d86e17aa0a046b4877c4aaf68187bae53dca2ba35bda6a876c1d0048007ea608649e7524765f0ef82e3c0000a705259a3651f60a84c9f4d4938037e70e4509c5bb00000000e513aeac9bf2bee150d5fe86", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x20000000) recvmsg$kcm(r0, &(0x7f0000000e80)={0x0, 0x0, 0x0}, 0x40000002) 18m33.057631428s ago: executing program 40 (id=1831): r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/105, 0x69}, {&(0x7f0000000ec0)=""/4071, 0xfe7}, {&(0x7f00000027c0)=""/4065, 0xfe1}, {&(0x7f0000000700)=""/238, 0xee}, {&(0x7f0000000500)=""/42, 0x2a}, {&(0x7f0000000080)=""/187, 0xbb}, {&(0x7f00000001c0)=""/42, 0x2a}], 0x7}, 0x40000100) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000900)="5c00000012006bab9a3fe3d86e17aa0a046b4877c4aaf68187bae53dca2ba35bda6a876c1d0048007ea608649e7524765f0ef82e3c0000a705259a3651f60a84c9f4d4938037e70e4509c5bb00000000e513aeac9bf2bee150d5fe86", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x20000000) recvmsg$kcm(r0, &(0x7f0000000e80)={0x0, 0x0, 0x0}, 0x40000002) 12m1.824961402s ago: executing program 7 (id=2073): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) keyctl$chown(0x4, 0x0, 0xee01, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = dup(r4) write$UHID_INPUT(r5, &(0x7f0000001980)={0x9, {"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", 0x1000}}, 0x1006) 11m56.678221373s ago: executing program 7 (id=2074): r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x77, 0x29, 0x4, 0x20, 0x424, 0x9901, 0xc257, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x43, 0x0, 0x2, 0x31, 0x7d, 0x55, 0x0, [], [{{0x9, 0x5, 0x2, 0x2, 0x200, 0x2}}, {{0x9, 0x5, 0x82, 0x2, 0x200}}]}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, &(0x7f0000000400)={0x44, &(0x7f0000000200)=ANY=[@ANYBLOB="401504"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000780)={0x44, &(0x7f0000000940)={0x0, 0x31, 0x4, "94c161ee"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, &(0x7f0000000680)={0x44, &(0x7f00000002c0)={0x20, 0x15, 0x7, "e635dc5ddba77e"}, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x20, 0x82, 0x1, "f9"}, 0x0, 0x0, 0x0}) 11m56.381464828s ago: executing program 7 (id=2075): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) 11m56.160844349s ago: executing program 7 (id=2076): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000ae000000b703000007000000850000000e000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 11m55.789771298s ago: executing program 7 (id=2077): r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4c21, 0x84, @mcast1, 0x5}, 0x1c) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0x28) 11m55.55874798s ago: executing program 7 (id=2078): sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r4}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000380), 0xffffffffffffffff) 11m10.345580678s ago: executing program 41 (id=2078): sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r4}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000380), 0xffffffffffffffff) 11m2.0168534s ago: executing program 1 (id=2087): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000540)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x8}, 0x94) 11m1.827932769s ago: executing program 1 (id=2088): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="05000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) eventfd2(0x0, 0x80000) 11m1.479421457s ago: executing program 1 (id=2089): r0 = creat(&(0x7f00000007c0)='./file0\x00', 0x84) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) 11m1.155734654s ago: executing program 1 (id=2091): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x23, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x25, 0x2, @val=@uprobe_multi={0x0, 0x0, 0x0, 0x6, 0x8c5f49850670a6da, 0x1}}, 0x40) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) r4 = eventfd(0xfffffff9) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000240)=r4) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f0000000040)={0x1, r4}) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000500)=""/67, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, &(0x7f0000000380)=""/246, &(0x7f00000000c0)=""/87, &(0x7f0000000480)=""/70, 0x100000}) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000680)={0x1, 0x0, [{0x0, 0x73, &(0x7f00000001c0)=""/115}]}) ioctl$VHOST_SET_VRING_ERR(r3, 0x4008af22, &(0x7f00000002c0)={0x1, r4}) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f0000000000)=0x1) 11m0.118068346s ago: executing program 2 (id=2093): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x2041, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x4, 0x0, 0x19, "0062ba7d820000a75e0000000000fcff00"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0xffffffffffffffde, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='sched_switch\x00', r3}, 0x18) 10m57.348768716s ago: executing program 2 (id=2094): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0200000004"], 0x50) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$UI_SET_EVBIT(r4, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000100)={{0x100}, 'syz1\x00'}) ioctl$UI_SET_LEDBIT(r4, 0x40045569, 0x1) ioctl$UI_SET_LEDBIT(r4, 0x40045569, 0x3) ioctl$UI_DEV_CREATE(r4, 0x5501) 10m54.90844167s ago: executing program 1 (id=2095): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r1, 0x0) accept4$unix(r1, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) 10m54.354750008s ago: executing program 2 (id=2096): r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x77, 0x29, 0x4, 0x20, 0x424, 0x9901, 0xc257, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x43, 0x0, 0x2, 0x31, 0x7d, 0x55, 0x0, [], [{{0x9, 0x5, 0x2, 0x2, 0x200, 0x2}}, {{0x9, 0x5, 0x82, 0x2, 0x200}}]}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000780)={0x44, &(0x7f0000000940)={0x0, 0x31, 0x4, "94c161ee"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, &(0x7f0000000680)={0x44, &(0x7f00000002c0)={0x20, 0x15, 0x7, "e635dc5ddba77e"}, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x20, 0x82, 0x1, "f9"}, 0x0, 0x0, 0x0}) 10m54.047555884s ago: executing program 2 (id=2097): pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000380)={0xa, 0x14e24}, 0x1c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="0c76d22d48e57f42d2f12a09585ba95962d9e7210822031d184c04123c4e78ed628eb7232d9d38c1dd229b269403d3ac796a4f", 0x33}], 0x1}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000640)="a5ae", 0x2}], 0x1}}], 0x2, 0xc8040) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) splice(r1, 0x0, r0, 0x0, 0x7ffff000, 0x6) 10m52.825201795s ago: executing program 2 (id=2098): mkdirat(0xffffffffffffff9c, 0x0, 0x0) setresuid(0x0, 0xee00, 0x0) capset(&(0x7f0000000500)={0x20080522}, &(0x7f0000000140)={0x200002, 0x200003, 0x801, 0x5, 0x7}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002100), 0x48) 10m52.566304788s ago: executing program 2 (id=2099): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) 10m52.081319163s ago: executing program 1 (id=2100): socket$inet6(0xa, 0x400000000001, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0xfffffffffffffffc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD_OLD(r4, 0x40045402, &(0x7f0000000140)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) 10m6.870902743s ago: executing program 42 (id=2100): socket$inet6(0xa, 0x400000000001, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0xfffffffffffffffc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD_OLD(r4, 0x40045402, &(0x7f0000000140)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) 10m6.771531108s ago: executing program 43 (id=2099): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) 6m56.98882244s ago: executing program 4 (id=2161): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000000008b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector}, 0x48) 6m52.509299496s ago: executing program 4 (id=2162): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbeef, 0x8031, 0xffffffffffffffff, 0x55779000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r4) socket$inet6_mptcp(0xa, 0x1, 0x106) madvise(&(0x7f0000304000/0x3000)=nil, 0x3000, 0x9) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r5, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r6 = accept(r4, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[], 0xfffffdef}, 0x1, 0x0, 0x0, 0xc000}, 0x10) 6m28.262585754s ago: executing program 4 (id=2168): r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, &(0x7f0000000400)={0x44, &(0x7f0000000200)=ANY=[@ANYBLOB="401504"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000780)={0x44, &(0x7f0000000940)={0x0, 0x31, 0x4, "94c161ee"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, &(0x7f0000000680)={0x44, &(0x7f00000002c0)={0x20, 0x15, 0x7, "e635dc5ddba77e"}, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x20, 0x82, 0x1, "f9"}, 0x0, 0x0, 0x0}) 6m27.866100955s ago: executing program 4 (id=2169): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ftruncate(r0, 0x81ff) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00', 0x40}) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) io_setup(0x8, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) ioctl$UI_DEV_CREATE(r1, 0x5501) write$input_event(r1, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfe4f) 6m16.357096524s ago: executing program 4 (id=2172): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbeef, 0x8031, 0xffffffffffffffff, 0x55779000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) madvise(&(0x7f0000304000/0x3000)=nil, 0x3000, 0x9) listen(r5, 0x0) r6 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r7 = accept(r4, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[], 0xfffffdef}, 0x1, 0x0, 0x0, 0xc000}, 0x10) 5m57.248064923s ago: executing program 4 (id=2183): syz_open_dev$tty20(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x1, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x2) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, 0x0}, 0x0) 5m11.914577077s ago: executing program 44 (id=2183): syz_open_dev$tty20(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x1, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x2) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, 0x0}, 0x0) 11.10712651s ago: executing program 0 (id=2591): sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)=ANY=[], 0x5c}], 0x1}, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r0, 0xc0105500, &(0x7f0000000000)=ANY=[@ANYBLOB="a1"]) 10.810495635s ago: executing program 0 (id=2592): r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x20) syz_emit_ethernet(0x46, &(0x7f0000000440)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60f91e2e00107300fc040000000000000000000000000000ff02000000000000000000000000000100000000ff"], 0x0) recvmmsg(r0, &(0x7f0000003000)=[{{&(0x7f0000000080)=@phonet, 0x80, 0x0}, 0x736}], 0x1, 0x60, &(0x7f0000003140)) 10.434138115s ago: executing program 0 (id=2593): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x1fc, 0x4) sendmmsg$inet6(r0, &(0x7f00000027c0)=[{{&(0x7f00000002c0)={0xa, 0x4e20, 0x0, @mcast2, 0x41}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000a40)="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", 0x1fd}], 0x1}}], 0x1, 0x80) 10.031282235s ago: executing program 0 (id=2594): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000040)='/dev/comedi2\x00', 0x2, 0x0) ioctl$COMEDI_INSN(r0, 0x8028640c, &(0x7f0000000000)={0xc000002, 0x0, 0x0, 0x0, 0x4000003}) 9.817296606s ago: executing program 0 (id=2596): r0 = socket(0x2b, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x8000000, 0x0, 0xff, 0x1}, 0x20) socket$inet6(0xa, 0x4, 0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@mcast1, 0x8000000, 0x0, 0xff, 0x0, 0x4}, 0x20) 8.696428654s ago: executing program 0 (id=2599): syz_open_dev$hidraw(&(0x7f0000000080), 0x0, 0x418000) r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000090000082502000000000000000109025c00020100f92a0904000001020900000524060001053408fa6e0d240f0100000000000d000a0006471a010000190581"], 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000300), 0x20880, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000083c0)={{0x0, 0x2, 0x80000001, 0x0, 0xfffefffc}}) close_range(r1, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000003000), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, 0x0, 0x20040084) syz_usb_disconnect(r0) syz_usb_connect(0x0, 0x24, 0x0, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5}]}) socket$nl_netfilter(0x10, 0x3, 0xc) close_range(r3, 0xffffffffffffffff, 0x0) 5.470331969s ago: executing program 3 (id=2601): r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000040), 0xa0201, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f00000000c0)=0x6) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000180)=0x6f) r1 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$dsp(r1, &(0x7f0000004e40)=""/4096, 0x1000) write$dsp(r0, &(0x7f00000012c0)="a52876830a602214f6b4e928d758f38a5a7cb4b31c4c09289e9ebb6286784ca3", 0x4000) 3.845768172s ago: executing program 3 (id=2602): r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0xf, 0x8041) ioctl$USBDEVFS_ALLOC_STREAMS(r0, 0x8008551c, &(0x7f00000001c0)=ANY=[@ANYBLOB="4a1800000100000081"]) 3.429736233s ago: executing program 3 (id=2603): r0 = syz_open_dev$sndctrl(&(0x7f0000000440), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000200), 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r1, 0xc0884113, &(0x7f0000000240)={0x1, 0x0, 0x200, 0xfffd, 0xffffffffffffffff, 0x200000000000008, 0xfffffffffffffffd, 0x200, 0x4, 0x2c, 0x2, 0x1}) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r1, 0xc0984124, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ad0b19196c79eb5}) 2.847855313s ago: executing program 3 (id=2604): r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@private=0x800000, @in6=@dev, 0x0, 0x41ce, 0x0, 0x0, 0x2}, {0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4={'\x00', '\xff\xff', @local}, 0x0, 0x6c}, 0x0, @in=@private=0xa010101, 0x0, 0x0, 0x0, 0x4}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 108.119144ms ago: executing program 3 (id=2605): r0 = syz_open_dev$sndpcmp(&(0x7f00000004c0), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0xc0844123, &(0x7f0000002180)) 0s ago: executing program 3 (id=2606): r0 = syz_open_dev$dri(&(0x7f0000000140), 0x1, 0x0) r1 = syz_open_dev$dri(&(0x7f00000008c0), 0x2, 0x22800) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f00000002c0)={0x0, 0x0, r2, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000440)={r3, 0x0, 0x0, 0x0, 0x3, [0x0, 0x0, 0x0], [0x0, 0xfffffffc], [0x0, 0x3c, 0x2], [0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffd]}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000100)={r4, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, r6}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000580)={0x0, 0x8bd, 0x80, 0x20203843, 0x3, [0x2, r7, 0x0, r5], [0x810003, 0x0, 0x0, 0x2], [0x5, 0xfffffffd, 0xffffffff, 0x46], [0x100000001, 0x0, 0x0, 0x2]}) kernel console output (not intermixed with test programs): comm="syz.3.2185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3122.549925][ T31] audit: type=1400 audit(2000000891.060:21578): avc: denied { bpf } for pid=17150 comm="syz.3.2185" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3122.552495][ T31] audit: type=1400 audit(2000000891.060:21579): avc: denied { perfmon } for pid=17150 comm="syz.3.2185" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3122.567294][ T31] audit: type=1400 audit(2000000891.080:21580): avc: denied { prog_run } for pid=17150 comm="syz.3.2185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3122.577618][ T31] audit: type=1400 audit(2000000891.090:21581): avc: denied { read write } for pid=17150 comm="syz.3.2185" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3122.580999][ T31] audit: type=1400 audit(2000000891.090:21582): avc: denied { open } for pid=17150 comm="syz.3.2185" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3122.586017][ T31] audit: type=1400 audit(2000000891.100:21583): avc: denied { ioctl } for pid=17150 comm="syz.3.2185" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3122.589105][T17151] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3122.592361][T17151] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3133.275577][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 3133.275795][ T31] audit: type=1400 audit(2000000901.790:21587): avc: denied { prog_load } for pid=17159 comm="syz.3.2187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3133.280814][ T31] audit: type=1400 audit(2000000901.790:21588): avc: denied { bpf } for pid=17159 comm="syz.3.2187" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3133.281052][ T31] audit: type=1400 audit(2000000901.790:21589): avc: denied { perfmon } for pid=17159 comm="syz.3.2187" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3133.281194][ T31] audit: type=1400 audit(2000000901.790:21590): avc: denied { prog_run } for pid=17159 comm="syz.3.2187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3133.310655][ T31] audit: type=1400 audit(2000000901.820:21591): avc: denied { execmem } for pid=17159 comm="syz.3.2187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3144.380493][ T31] audit: type=1400 audit(2000000912.890:21592): avc: denied { execute } for pid=17165 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3144.400971][ T31] audit: type=1400 audit(2000000912.910:21593): avc: denied { execute_no_trans } for pid=17165 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3144.411336][ T31] audit: type=1400 audit(2000000912.920:21594): avc: denied { execute } for pid=17165 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3144.489061][ T31] audit: type=1400 audit(2000000913.000:21595): avc: denied { execmem } for pid=17165 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3144.613865][ T31] audit: type=1400 audit(2000000913.130:21596): avc: denied { read } for pid=17166 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3144.615119][ T31] audit: type=1400 audit(2000000913.130:21597): avc: denied { open } for pid=17166 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3144.620000][ T31] audit: type=1400 audit(2000000913.130:21598): avc: denied { mounton } for pid=17166 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 3144.744788][ T31] audit: type=1400 audit(2000000913.260:21599): avc: denied { module_request } for pid=17166 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3145.002974][ T31] audit: type=1400 audit(2000000913.520:21600): avc: denied { sys_module } for pid=17166 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3145.004284][ T31] audit: type=1400 audit(2000000913.520:21601): avc: denied { module_request } for pid=17166 comm="syz-executor" kmod="nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3147.454515][T17166] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3147.463669][T17166] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3148.846688][T17166] hsr_slave_0: entered promiscuous mode [ 3148.848431][T17166] hsr_slave_1: entered promiscuous mode [ 3148.849106][T17166] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3148.849242][T17166] Cannot create hsr debugfs directory [ 3150.536237][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 3150.536602][ T31] audit: type=1400 audit(2000000919.050:21638): avc: denied { create } for pid=17166 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3150.538904][ T31] audit: type=1400 audit(2000000919.050:21639): avc: denied { write } for pid=17166 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3150.541232][ T31] audit: type=1400 audit(2000000919.050:21640): avc: denied { read } for pid=17166 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3150.544355][T17166] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 3150.552228][T17166] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 3150.559910][T17166] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 3150.566969][T17166] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 3150.628020][ T31] audit: type=1400 audit(2000000919.140:21641): avc: denied { module_request } for pid=17166 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3150.724301][ T31] audit: type=1400 audit(2000000919.240:21642): avc: denied { sys_module } for pid=17166 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3150.727128][ T31] audit: type=1400 audit(2000000919.240:21643): avc: denied { module_request } for pid=17166 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3150.923258][ T31] audit: type=1400 audit(2000000919.440:21644): avc: denied { module_request } for pid=17166 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3150.975114][ T31] audit: type=1400 audit(2000000919.490:21645): avc: denied { read write } for pid=17494 comm="syz.3.2189" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3150.982466][ T31] audit: type=1400 audit(2000000919.500:21646): avc: denied { read write open } for pid=17494 comm="syz.3.2189" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3150.984988][ T31] audit: type=1400 audit(2000000919.500:21647): avc: denied { ioctl } for pid=17494 comm="syz.3.2189" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3150.992950][T17496] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3151.001819][T17496] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3151.479837][T17507] SELinux: policydb string length 0 does not match expected length 8 [ 3151.480514][T17507] SELinux: failed to load policy [ 3151.567574][T17509] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3151.569481][T17509] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3151.675384][T17166] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3153.414653][T17529] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3153.420860][T17529] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3156.141404][ T31] kauditd_printk_skb: 64 callbacks suppressed [ 3156.142462][ T31] audit: type=1400 audit(2000000924.660:21712): avc: denied { sys_module } for pid=17166 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3156.144032][ T31] audit: type=1400 audit(2000000924.660:21713): avc: denied { module_request } for pid=17166 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3156.618829][ T31] audit: type=1400 audit(2000000925.130:21714): avc: denied { module_request } for pid=17166 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3156.920692][ T31] audit: type=1400 audit(2000000925.430:21715): avc: denied { sys_module } for pid=17166 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3156.921146][ T31] audit: type=1400 audit(2000000925.430:21716): avc: denied { module_request } for pid=17166 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3157.251079][ T31] audit: type=1400 audit(2000000925.750:21717): avc: denied { module_request } for pid=17166 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3157.504482][ T31] audit: type=1400 audit(2000000926.020:21718): avc: denied { sys_module } for pid=17166 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3157.504890][ T31] audit: type=1400 audit(2000000926.020:21719): avc: denied { module_request } for pid=17166 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3157.646057][ T31] audit: type=1400 audit(2000000926.160:21720): avc: denied { prog_load } for pid=17533 comm="syz.3.2198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3157.648294][ T31] audit: type=1400 audit(2000000926.160:21721): avc: denied { bpf } for pid=17533 comm="syz.3.2198" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3159.853653][T17166] veth0_vlan: entered promiscuous mode [ 3159.895333][T17166] veth1_vlan: entered promiscuous mode [ 3160.064587][T17166] veth0_macvtap: entered promiscuous mode [ 3160.074515][T17166] veth1_macvtap: entered promiscuous mode [ 3160.346181][T17166] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3160.371925][T17166] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3160.374040][T17166] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3160.375715][T17166] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3161.172245][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 3161.172600][ T31] audit: type=1400 audit(2000000929.630:21748): avc: denied { execmem } for pid=17555 comm="syz.0.2188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3163.439772][ T31] audit: type=1400 audit(2000000931.890:21749): avc: denied { prog_load } for pid=17555 comm="syz.0.2188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3163.441064][ T31] audit: type=1400 audit(2000000931.890:21750): avc: denied { bpf } for pid=17555 comm="syz.0.2188" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3163.442232][ T31] audit: type=1400 audit(2000000931.890:21751): avc: denied { perfmon } for pid=17555 comm="syz.0.2188" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3163.448229][ T31] audit: type=1400 audit(2000000931.900:21752): avc: denied { prog_run } for pid=17555 comm="syz.0.2188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3172.701329][ T31] audit: type=1400 audit(2000000941.210:21753): avc: denied { write } for pid=17561 comm="syz.0.2199" name="udplite6" dev="proc" ino=4026532828 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3172.970589][ T31] audit: type=1400 audit(2000000941.480:21754): avc: denied { map_create } for pid=17563 comm="syz.0.2200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3172.971047][ T31] audit: type=1400 audit(2000000941.480:21755): avc: denied { bpf } for pid=17563 comm="syz.0.2200" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3172.971299][ T31] audit: type=1400 audit(2000000941.480:21756): avc: denied { map_read map_write } for pid=17563 comm="syz.0.2200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3172.982471][ T31] audit: type=1400 audit(2000000941.500:21757): avc: denied { prog_load } for pid=17563 comm="syz.0.2200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3173.036709][ T31] audit: type=1400 audit(2000000941.510:21758): avc: denied { perfmon } for pid=17563 comm="syz.0.2200" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3173.141806][ T31] audit: type=1400 audit(2000000941.640:21759): avc: denied { prog_run } for pid=17563 comm="syz.0.2200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3173.143768][ T31] audit: type=1400 audit(2000000941.650:21760): avc: denied { read } for pid=17563 comm="syz.0.2200" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3173.145663][ T31] audit: type=1400 audit(2000000941.650:21761): avc: denied { open } for pid=17563 comm="syz.0.2200" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3173.162123][ T31] audit: type=1400 audit(2000000941.680:21762): avc: denied { ioctl } for pid=17563 comm="syz.0.2200" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3174.041246][ T8057] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 3174.201111][ T8057] usb 1-1: Using ep0 maxpacket: 32 [ 3174.216323][ T8057] usb 1-1: config 0 has an invalid interface number: 67 but max is 0 [ 3174.216711][ T8057] usb 1-1: config 0 has no interface number 0 [ 3174.244081][ T8057] usb 1-1: New USB device found, idVendor=0424, idProduct=9901, bcdDevice=c2.57 [ 3174.245264][ T8057] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3174.246222][ T8057] usb 1-1: Product: syz [ 3174.246924][ T8057] usb 1-1: Manufacturer: syz [ 3174.247620][ T8057] usb 1-1: SerialNumber: syz [ 3174.382625][ T8057] usb 1-1: config 0 descriptor?? [ 3174.403523][ T8057] smsc95xx v2.0.0 [ 3174.405158][ T8057] smsc95xx 1-1:0.67 (unnamed net_device) (uninitialized): usbnet_get_endpoints failed: -22 [ 3174.406457][ T8057] smsc95xx 1-1:0.67: probe with driver smsc95xx failed with error -22 [ 3178.164321][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 3178.164858][ T31] audit: type=1400 audit(2000000946.680:21767): avc: denied { ioctl } for pid=17569 comm="syz.0.2201" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3179.910995][ T31] audit: type=1400 audit(2000000948.420:21768): avc: denied { prog_load } for pid=17578 comm="syz.3.2202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3179.913179][ T31] audit: type=1400 audit(2000000948.430:21769): avc: denied { bpf } for pid=17578 comm="syz.3.2202" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3179.934991][ T31] audit: type=1400 audit(2000000948.430:21770): avc: denied { perfmon } for pid=17578 comm="syz.3.2202" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3179.935427][ T31] audit: type=1400 audit(2000000948.450:21771): avc: denied { prog_run } for pid=17578 comm="syz.3.2202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3180.218110][ T31] audit: type=1400 audit(2000000948.730:21772): avc: denied { read write } for pid=17580 comm="syz.3.2203" name="uinput" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3180.219312][ T31] audit: type=1400 audit(2000000948.730:21773): avc: denied { open } for pid=17580 comm="syz.3.2203" path="/dev/uinput" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3180.259975][ T31] audit: type=1400 audit(2000000948.770:21774): avc: denied { ioctl } for pid=17580 comm="syz.3.2203" path="/dev/uinput" dev="devtmpfs" ino=696 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3180.691217][ T31] audit: type=1400 audit(2000000949.200:21775): avc: denied { prog_load } for pid=17582 comm="syz.3.2204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3180.713041][ T31] audit: type=1400 audit(2000000949.200:21776): avc: denied { bpf } for pid=17582 comm="syz.3.2204" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3183.524812][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 3183.525509][ T31] audit: type=1400 audit(2000000952.040:21782): avc: denied { create } for pid=17587 comm="syz.3.2205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3183.528008][ T31] audit: type=1400 audit(2000000952.040:21783): avc: denied { write } for pid=17587 comm="syz.3.2205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3183.750745][ T31] audit: type=1400 audit(2000000952.260:21784): avc: denied { prog_load } for pid=17589 comm="syz.3.2206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3183.753166][ T31] audit: type=1400 audit(2000000952.270:21785): avc: denied { bpf } for pid=17589 comm="syz.3.2206" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3183.755032][ T31] audit: type=1400 audit(2000000952.270:21786): avc: denied { perfmon } for pid=17589 comm="syz.3.2206" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3183.765203][ T31] audit: type=1400 audit(2000000952.280:21787): avc: denied { prog_load } for pid=17589 comm="syz.3.2206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3183.790803][ T31] audit: type=1400 audit(2000000952.300:21788): avc: denied { write } for pid=17589 comm="syz.3.2206" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3183.791392][ T31] audit: type=1400 audit(2000000952.300:21789): avc: denied { open } for pid=17589 comm="syz.3.2206" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3183.796910][ T31] audit: type=1400 audit(2000000952.310:21790): avc: denied { ioctl } for pid=17589 comm="syz.3.2206" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3183.838595][ T31] audit: type=1400 audit(2000000952.350:21791): avc: denied { read write } for pid=17589 comm="syz.3.2206" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3183.845337][T17590] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3183.853949][T17590] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3184.645620][T17598] syzkaller0: entered promiscuous mode [ 3184.669801][T17598] syzkaller0: entered allmulticast mode [ 3185.154104][T15535] usb 1-1: USB disconnect, device number 13 [ 3191.291461][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 3191.291825][ T31] audit: type=1400 audit(2000000959.810:21812): avc: denied { map_create } for pid=17635 comm="syz.3.2210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3191.292138][ T31] audit: type=1400 audit(2000000959.810:21813): avc: denied { bpf } for pid=17635 comm="syz.3.2210" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3191.295291][ T31] audit: type=1400 audit(2000000959.810:21814): avc: denied { map_read map_write } for pid=17635 comm="syz.3.2210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3191.322601][ T31] audit: type=1400 audit(2000000959.840:21815): avc: denied { prog_load } for pid=17635 comm="syz.3.2210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3191.324496][ T31] audit: type=1400 audit(2000000959.840:21816): avc: denied { perfmon } for pid=17635 comm="syz.3.2210" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3191.326869][ T31] audit: type=1400 audit(2000000959.840:21817): avc: denied { prog_run } for pid=17635 comm="syz.3.2210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3191.401439][ T31] audit: type=1400 audit(2000000959.900:21818): avc: denied { ioctl } for pid=17635 comm="syz.3.2210" path="/dev/uinput" dev="devtmpfs" ino=696 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3192.901181][ T31] audit: type=1400 audit(2000000961.410:21819): avc: denied { read write } for pid=17642 comm="syz.0.2212" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3192.944729][ T31] audit: type=1400 audit(2000000961.410:21820): avc: denied { open } for pid=17642 comm="syz.0.2212" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3192.961269][ T31] audit: type=1400 audit(2000000961.430:21821): avc: denied { ioctl } for pid=17642 comm="syz.0.2212" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3193.161213][T15532] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 3193.337096][T15532] usb 1-1: Using ep0 maxpacket: 32 [ 3193.404402][T15532] usb 1-1: config 0 has an invalid interface number: 67 but max is 0 [ 3193.404732][T15532] usb 1-1: config 0 has no interface number 0 [ 3193.422372][T15532] usb 1-1: New USB device found, idVendor=0424, idProduct=9901, bcdDevice=c2.57 [ 3193.422689][T15532] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3193.422800][T15532] usb 1-1: Product: syz [ 3193.422865][T15532] usb 1-1: Manufacturer: syz [ 3193.422916][T15532] usb 1-1: SerialNumber: syz [ 3193.428845][T15532] usb 1-1: config 0 descriptor?? [ 3193.561436][T15532] smsc95xx v2.0.0 [ 3194.008006][T15532] smsc95xx 1-1:0.67 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000030: -32 [ 3194.008398][T15532] smsc95xx 1-1:0.67 (unnamed net_device) (uninitialized): Error reading E2P_CMD [ 3194.219262][T15532] smsc95xx 1-1:0.67 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000014: -32 [ 3194.220026][T15532] smsc95xx 1-1:0.67: probe with driver smsc95xx failed with error -32 [ 3204.276270][T13005] usb 1-1: USB disconnect, device number 14 [ 3206.584826][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 3206.586535][ T31] audit: type=1400 audit(2000000975.100:21824): avc: denied { create } for pid=17662 comm="syz.3.2214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3206.606993][ T31] audit: type=1400 audit(2000000975.130:21825): avc: denied { ioctl } for pid=17662 comm="syz.3.2214" path="socket:[31495]" dev="sockfs" ino=31495 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3206.644099][ T31] audit: type=1400 audit(2000000975.160:21826): avc: denied { bind } for pid=17662 comm="syz.3.2214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3206.857399][ T31] audit: type=1400 audit(2000000975.370:21827): avc: denied { map_create } for pid=17664 comm="syz.3.2215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3206.858825][ T31] audit: type=1400 audit(2000000975.370:21828): avc: denied { perfmon } for pid=17664 comm="syz.3.2215" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3206.861161][ T31] audit: type=1400 audit(2000000975.370:21829): avc: denied { map_read map_write } for pid=17664 comm="syz.3.2215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3206.872496][ T31] audit: type=1400 audit(2000000975.390:21830): avc: denied { prog_load } for pid=17664 comm="syz.3.2215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3206.874046][ T31] audit: type=1400 audit(2000000975.390:21831): avc: denied { bpf } for pid=17664 comm="syz.3.2215" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3206.879540][ T31] audit: type=1400 audit(2000000975.390:21832): avc: denied { prog_run } for pid=17664 comm="syz.3.2215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3209.537047][ T31] audit: type=1400 audit(2000000978.050:21833): avc: denied { map_create } for pid=17666 comm="syz.3.2216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3212.313346][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 3212.313658][ T31] audit: type=1400 audit(2000000980.830:21843): avc: denied { read write } for pid=17668 comm="syz.3.2217" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3212.314012][ T31] audit: type=1400 audit(2000000980.830:21844): avc: denied { open } for pid=17668 comm="syz.3.2217" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3212.317740][ T31] audit: type=1400 audit(2000000980.830:21845): avc: denied { ioctl } for pid=17668 comm="syz.3.2217" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3212.318947][T17669] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3212.343530][T17669] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3212.864162][ T31] audit: type=1400 audit(2000000981.380:21846): avc: denied { map_create } for pid=17672 comm="syz.3.2218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3212.866119][ T31] audit: type=1400 audit(2000000981.380:21847): avc: denied { bpf } for pid=17672 comm="syz.3.2218" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3212.868221][ T31] audit: type=1400 audit(2000000981.380:21848): avc: denied { map_read map_write } for pid=17672 comm="syz.3.2218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3212.869920][ T31] audit: type=1400 audit(2000000981.380:21849): avc: denied { prog_load } for pid=17672 comm="syz.3.2218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3212.881935][ T31] audit: type=1400 audit(2000000981.400:21850): avc: denied { perfmon } for pid=17672 comm="syz.3.2218" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3212.885575][ T31] audit: type=1400 audit(2000000981.400:21851): avc: denied { prog_run } for pid=17672 comm="syz.3.2218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3213.251705][ T31] audit: type=1400 audit(2000000981.760:21852): avc: denied { prog_load } for pid=17674 comm="syz.3.2219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3219.135970][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 3219.136419][ T31] audit: type=1400 audit(2000000987.650:21856): avc: denied { prog_run } for pid=17674 comm="syz.3.2219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3219.184263][ T31] audit: type=1400 audit(2000000987.700:21857): avc: denied { create } for pid=17674 comm="syz.3.2219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3219.612168][ T31] audit: type=1400 audit(2000000988.130:21858): avc: denied { prog_load } for pid=17678 comm="syz.0.2220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3219.615365][ T31] audit: type=1400 audit(2000000988.130:21859): avc: denied { bpf } for pid=17678 comm="syz.0.2220" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3219.617269][ T31] audit: type=1400 audit(2000000988.130:21860): avc: denied { perfmon } for pid=17678 comm="syz.0.2220" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3219.644118][ T31] audit: type=1400 audit(2000000988.160:21861): avc: denied { map_create } for pid=17678 comm="syz.0.2220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3219.647963][ T31] audit: type=1400 audit(2000000988.160:21862): avc: denied { prog_load } for pid=17678 comm="syz.0.2220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3219.703709][ T31] audit: type=1400 audit(2000000988.220:21863): avc: denied { prog_run } for pid=17678 comm="syz.0.2220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3220.008158][ T31] audit: type=1400 audit(2000000988.520:21864): avc: denied { create } for pid=17680 comm="syz.0.2221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3220.057086][ T31] audit: type=1400 audit(2000000988.570:21865): avc: denied { name_bind } for pid=17680 comm="syz.0.2221" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3220.114975][T17681] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3220.691203][T16908] usb 1-1: new high-speed USB device number 15 using dummy_hcd [ 3220.848943][T16908] usb 1-1: Using ep0 maxpacket: 32 [ 3220.893814][T16908] usb 1-1: config 0 has an invalid interface number: 67 but max is 0 [ 3220.894246][T16908] usb 1-1: config 0 has no interface number 0 [ 3220.947954][T16908] usb 1-1: New USB device found, idVendor=0424, idProduct=9901, bcdDevice=c2.57 [ 3220.948389][T16908] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3220.948681][T16908] usb 1-1: Product: syz [ 3220.948893][T16908] usb 1-1: Manufacturer: syz [ 3220.949121][T16908] usb 1-1: SerialNumber: syz [ 3221.018140][T16908] usb 1-1: config 0 descriptor?? [ 3221.043361][T16908] smsc95xx v2.0.0 [ 3221.668321][T16908] smsc95xx 1-1:0.67 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000030: -32 [ 3221.669612][T16908] smsc95xx 1-1:0.67 (unnamed net_device) (uninitialized): Error reading E2P_CMD [ 3221.907936][T16908] smsc95xx 1-1:0.67 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000014: -32 [ 3221.910979][T16908] smsc95xx 1-1:0.67: probe with driver smsc95xx failed with error -32 [ 3225.427524][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 3225.428681][ T31] audit: type=1400 audit(2000000993.940:21870): avc: denied { ioctl } for pid=17682 comm="syz.0.2222" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3228.486630][T17485] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3228.567904][T17485] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3228.667695][T17485] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3228.761651][T17485] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3228.950033][ T31] audit: type=1400 audit(2000000997.460:21871): avc: denied { ioctl } for pid=17682 comm="syz.0.2222" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3229.381106][T17485] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3229.387169][T17485] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3229.394339][T17485] bond0 (unregistering): Released all slaves [ 3229.456268][T17485] hsr_slave_0: left promiscuous mode [ 3229.458177][T17485] hsr_slave_1: left promiscuous mode [ 3229.475575][T17485] veth1_macvtap: left promiscuous mode [ 3229.476023][T17485] veth0_macvtap: left promiscuous mode [ 3229.476229][T17485] veth1_vlan: left promiscuous mode [ 3229.476394][T17485] veth0_vlan: left promiscuous mode [ 3231.956100][ T8075] usb 1-1: USB disconnect, device number 15 [ 3232.121941][ T31] audit: type=1400 audit(2000001000.630:21872): avc: denied { bpf } for pid=17712 comm="syz.0.2223" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3232.154889][ T31] audit: type=1400 audit(2000001000.650:21873): avc: denied { prog_load } for pid=17712 comm="syz.0.2223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3232.156405][ T31] audit: type=1400 audit(2000001000.650:21874): avc: denied { perfmon } for pid=17712 comm="syz.0.2223" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3232.191560][ T31] audit: type=1400 audit(2000001000.710:21875): avc: denied { read } for pid=17712 comm="syz.0.2223" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3232.193220][ T31] audit: type=1400 audit(2000001000.710:21876): avc: denied { open } for pid=17712 comm="syz.0.2223" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3234.718298][ T31] audit: type=1400 audit(2000001003.230:21877): avc: denied { map_create } for pid=17715 comm="syz.0.2224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3234.720732][ T31] audit: type=1400 audit(2000001003.230:21878): avc: denied { perfmon } for pid=17715 comm="syz.0.2224" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3234.723008][ T31] audit: type=1400 audit(2000001003.230:21879): avc: denied { map_read map_write } for pid=17715 comm="syz.0.2224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3234.729059][ T31] audit: type=1400 audit(2000001003.240:21880): avc: denied { prog_load } for pid=17715 comm="syz.0.2224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3234.734342][ T31] audit: type=1400 audit(2000001003.250:21881): avc: denied { bpf } for pid=17715 comm="syz.0.2224" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3237.386218][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 3237.386603][ T31] audit: type=1400 audit(2000001005.900:21902): avc: denied { unmount } for pid=17166 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3237.665564][ T31] audit: type=1400 audit(2000001006.180:21903): avc: denied { create } for pid=17725 comm="syz.0.2226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3237.769463][ T31] audit: type=1400 audit(2000001006.280:21904): avc: denied { execmem } for pid=17725 comm="syz.0.2226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3241.366984][ T31] audit: type=1400 audit(2000001009.880:21905): avc: denied { map_create } for pid=17725 comm="syz.0.2226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3241.391089][ T31] audit: type=1400 audit(2000001009.880:21906): avc: denied { map_read map_write } for pid=17725 comm="syz.0.2226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3241.391576][ T31] audit: type=1400 audit(2000001009.900:21907): avc: denied { prog_load } for pid=17725 comm="syz.0.2226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3241.391696][ T31] audit: type=1400 audit(2000001009.900:21908): avc: denied { bpf } for pid=17725 comm="syz.0.2226" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3241.391792][ T31] audit: type=1400 audit(2000001009.900:21909): avc: denied { perfmon } for pid=17725 comm="syz.0.2226" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3241.391881][ T31] audit: type=1400 audit(2000001009.900:21910): avc: denied { prog_run } for pid=17725 comm="syz.0.2226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3252.809655][ T31] audit: type=1400 audit(2000001021.320:21911): avc: denied { read write } for pid=17729 comm="syz.3.2227" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3252.842927][ T31] audit: type=1400 audit(2000001021.340:21912): avc: denied { open } for pid=17729 comm="syz.3.2227" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3252.853450][ T31] audit: type=1400 audit(2000001021.360:21913): avc: denied { ioctl } for pid=17729 comm="syz.3.2227" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3252.941255][T17730] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3252.943173][T17730] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3253.207947][ T31] audit: type=1400 audit(2000001021.720:21914): avc: denied { execmem } for pid=17733 comm="syz.3.2228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3255.695399][ T31] audit: type=1400 audit(2000001024.190:21915): avc: denied { prog_load } for pid=17733 comm="syz.3.2228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3255.722305][ T31] audit: type=1400 audit(2000001024.190:21916): avc: denied { bpf } for pid=17733 comm="syz.3.2228" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3255.724112][ T31] audit: type=1400 audit(2000001024.190:21917): avc: denied { perfmon } for pid=17733 comm="syz.3.2228" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3255.726507][ T31] audit: type=1400 audit(2000001024.190:21918): avc: denied { bpf } for pid=17733 comm="syz.3.2228" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3255.729742][ T31] audit: type=1400 audit(2000001024.210:21919): avc: denied { prog_run } for pid=17733 comm="syz.3.2228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3255.735638][T17736] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 3255.745867][ T31] audit: type=1400 audit(2000001024.260:21920): avc: denied { prog_load } for pid=17733 comm="syz.3.2228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3259.423843][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 3259.424939][ T31] audit: type=1400 audit(2000001027.940:21935): avc: denied { unmount } for pid=17166 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3259.764261][ T31] audit: type=1400 audit(2000001028.280:21936): avc: denied { execmem } for pid=17745 comm="syz.0.2231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3263.350939][ T31] audit: type=1400 audit(2000001031.860:21937): avc: denied { map_create } for pid=17745 comm="syz.0.2231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3263.362685][ T31] audit: type=1400 audit(2000001031.870:21938): avc: denied { map_read map_write } for pid=17745 comm="syz.0.2231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3263.374039][ T31] audit: type=1400 audit(2000001031.890:21939): avc: denied { prog_load } for pid=17745 comm="syz.0.2231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3263.374562][ T31] audit: type=1400 audit(2000001031.890:21940): avc: denied { bpf } for pid=17745 comm="syz.0.2231" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3263.374813][ T31] audit: type=1400 audit(2000001031.890:21941): avc: denied { perfmon } for pid=17745 comm="syz.0.2231" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3263.384844][ T31] audit: type=1400 audit(2000001031.900:21942): avc: denied { prog_run } for pid=17745 comm="syz.0.2231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3263.423536][ T31] audit: type=1400 audit(2000001031.940:21943): avc: denied { mount } for pid=17745 comm="syz.0.2231" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 3271.134895][ T31] audit: type=1400 audit(2000001039.650:21944): avc: denied { create } for pid=17749 comm="syz.3.2232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3271.135376][ T31] audit: type=1400 audit(2000001039.650:21945): avc: denied { write } for pid=17749 comm="syz.3.2232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3271.138167][ T31] audit: type=1400 audit(2000001039.650:21946): avc: denied { module_request } for pid=17749 comm="syz.3.2232" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3271.314781][ T31] audit: type=1400 audit(2000001039.830:21947): avc: denied { read } for pid=17749 comm="syz.3.2232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3271.325314][ T31] audit: type=1400 audit(2000001039.830:21948): avc: denied { read write } for pid=17749 comm="syz.3.2232" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3271.325696][ T31] audit: type=1400 audit(2000001039.840:21949): avc: denied { open } for pid=17749 comm="syz.3.2232" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3271.325793][ T31] audit: type=1400 audit(2000001039.840:21950): avc: denied { ioctl } for pid=17749 comm="syz.3.2232" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3271.331334][T17750] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3271.332018][T17750] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3272.318056][ T31] audit: type=1400 audit(2000001040.830:21951): avc: denied { create } for pid=17754 comm="syz.3.2233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3272.347491][ T31] audit: type=1400 audit(2000001040.860:21952): avc: denied { prog_load } for pid=17754 comm="syz.3.2233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3272.350009][ T31] audit: type=1400 audit(2000001040.860:21953): avc: denied { bpf } for pid=17754 comm="syz.3.2233" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3277.710574][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 3277.710899][ T31] audit: type=1400 audit(2000001046.220:21979): avc: denied { unmount } for pid=16044 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3278.030979][ T31] audit: type=1400 audit(2000001046.540:21980): avc: denied { prog_load } for pid=17790 comm="syz.3.2236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3278.061639][ T31] audit: type=1400 audit(2000001046.580:21981): avc: denied { bpf } for pid=17790 comm="syz.3.2236" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3278.063027][ T31] audit: type=1400 audit(2000001046.580:21982): avc: denied { perfmon } for pid=17790 comm="syz.3.2236" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3278.064325][ T31] audit: type=1400 audit(2000001046.580:21983): avc: denied { prog_run } for pid=17790 comm="syz.3.2236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3278.118436][ T31] audit: type=1400 audit(2000001046.630:21984): avc: denied { create } for pid=17790 comm="syz.3.2236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3278.141838][ T31] audit: type=1400 audit(2000001046.650:21985): avc: denied { module_request } for pid=17790 comm="syz.3.2236" kmod="net-pf-2-proto-0-type-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3278.611510][ T31] audit: type=1400 audit(2000001047.110:21986): avc: denied { module_request } for pid=17790 comm="syz.3.2236" kmod="net-pf-2-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3279.744931][T17797] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2237'. [ 3279.761746][T17796] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2237'. [ 3280.325258][ T31] audit: type=1400 audit(2000001048.840:21987): avc: denied { prog_load } for pid=17798 comm="syz.3.2238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3280.338548][ T31] audit: type=1400 audit(2000001048.850:21988): avc: denied { bpf } for pid=17798 comm="syz.3.2238" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3284.113928][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 3284.114456][ T31] audit: type=1400 audit(2000001052.610:22012): avc: denied { prog_load } for pid=17833 comm="syz.0.2242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3284.114827][ T31] audit: type=1400 audit(2000001052.630:22013): avc: denied { bpf } for pid=17833 comm="syz.0.2242" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3284.114931][ T31] audit: type=1400 audit(2000001052.630:22014): avc: denied { perfmon } for pid=17833 comm="syz.0.2242" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3284.124550][ T31] audit: type=1400 audit(2000001052.640:22015): avc: denied { prog_run } for pid=17833 comm="syz.0.2242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3284.689572][ T31] audit: type=1400 audit(2000001053.200:22016): avc: denied { prog_load } for pid=17835 comm="syz.0.2243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3284.691095][ T31] audit: type=1400 audit(2000001053.200:22017): avc: denied { bpf } for pid=17835 comm="syz.0.2243" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3284.691358][ T31] audit: type=1400 audit(2000001053.200:22018): avc: denied { perfmon } for pid=17835 comm="syz.0.2243" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3284.691442][ T31] audit: type=1400 audit(2000001053.200:22019): avc: denied { prog_run } for pid=17835 comm="syz.0.2243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3284.934342][ T31] audit: type=1400 audit(2000001053.450:22020): avc: denied { prog_load } for pid=17836 comm="syz.3.2244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3284.952249][ T31] audit: type=1400 audit(2000001053.450:22021): avc: denied { bpf } for pid=17836 comm="syz.3.2244" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3288.904022][T17873] pim6reg1: entered promiscuous mode [ 3288.905466][T17873] pim6reg1: entered allmulticast mode [ 3289.395948][ T31] kauditd_printk_skb: 68 callbacks suppressed [ 3289.396442][ T31] audit: type=1400 audit(2000001057.910:22090): avc: denied { map_create } for pid=17880 comm="syz.0.2255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3289.397970][ T31] audit: type=1400 audit(2000001057.910:22091): avc: denied { perfmon } for pid=17880 comm="syz.0.2255" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3289.399362][ T31] audit: type=1400 audit(2000001057.910:22092): avc: denied { map_read map_write } for pid=17880 comm="syz.0.2255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3289.412304][ T31] audit: type=1400 audit(2000001057.930:22093): avc: denied { prog_load } for pid=17880 comm="syz.0.2255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3289.415875][ T31] audit: type=1400 audit(2000001057.930:22094): avc: denied { bpf } for pid=17880 comm="syz.0.2255" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3289.453293][ T31] audit: type=1400 audit(2000001057.970:22095): avc: denied { prog_run } for pid=17880 comm="syz.0.2255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3289.474704][ T31] audit: type=1400 audit(2000001057.990:22096): avc: denied { read } for pid=17880 comm="syz.0.2255" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3289.476855][ T31] audit: type=1400 audit(2000001057.990:22097): avc: denied { open } for pid=17880 comm="syz.0.2255" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3289.484875][ T31] audit: type=1400 audit(2000001058.000:22098): avc: denied { ioctl } for pid=17880 comm="syz.0.2255" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3289.916650][ T31] audit: type=1400 audit(2000001058.430:22099): avc: denied { map_create } for pid=17886 comm="syz.0.2256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3294.624373][ T31] kauditd_printk_skb: 92 callbacks suppressed [ 3294.625013][ T31] audit: type=1400 audit(2000001063.130:22192): avc: denied { map_create } for pid=17984 comm="syz.0.2271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3294.625393][ T31] audit: type=1400 audit(2000001063.130:22193): avc: denied { map_read map_write } for pid=17984 comm="syz.0.2271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3294.625658][ T31] audit: type=1400 audit(2000001063.140:22194): avc: denied { prog_load } for pid=17984 comm="syz.0.2271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3294.625944][ T31] audit: type=1400 audit(2000001063.140:22195): avc: denied { bpf } for pid=17984 comm="syz.0.2271" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3294.638955][ T31] audit: type=1400 audit(2000001063.150:22196): avc: denied { perfmon } for pid=17984 comm="syz.0.2271" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3294.659980][ T31] audit: type=1400 audit(2000001063.170:22197): avc: denied { perfmon } for pid=17984 comm="syz.0.2271" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3294.682227][ T31] audit: type=1400 audit(2000001063.180:22198): avc: denied { bpf } for pid=17984 comm="syz.0.2271" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3294.736347][ T31] audit: type=1400 audit(2000001063.240:22199): avc: denied { create } for pid=17978 comm="syz.3.2270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 3294.780703][ T31] audit: type=1400 audit(2000001063.290:22200): avc: denied { module_request } for pid=17978 comm="syz.3.2270" kmod="net-pf-30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3294.879614][ T31] audit: type=1400 audit(2000001063.390:22201): avc: denied { bpf } for pid=17984 comm="syz.0.2271" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3297.322330][T18022] pim6reg1: entered allmulticast mode [ 3297.392121][T18022] pim6reg1: left allmulticast mode [ 3299.681880][ T31] kauditd_printk_skb: 96 callbacks suppressed [ 3299.682351][ T31] audit: type=1400 audit(2000001068.200:22298): avc: denied { map_create } for pid=18050 comm="syz.3.2285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3299.693401][ T31] audit: type=1400 audit(2000001068.200:22299): avc: denied { map_read map_write } for pid=18050 comm="syz.3.2285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3299.745561][ T31] audit: type=1400 audit(2000001068.260:22300): avc: denied { prog_load } for pid=18050 comm="syz.3.2285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3299.763958][ T31] audit: type=1400 audit(2000001068.280:22301): avc: denied { bpf } for pid=18050 comm="syz.3.2285" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3299.765950][ T31] audit: type=1400 audit(2000001068.280:22302): avc: denied { perfmon } for pid=18050 comm="syz.3.2285" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3299.774140][ T31] audit: type=1400 audit(2000001068.290:22303): avc: denied { prog_load } for pid=18050 comm="syz.3.2285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3299.924781][ T31] audit: type=1400 audit(2000001068.440:22304): avc: denied { prog_load } for pid=18054 comm="syz.0.2286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3299.926980][ T31] audit: type=1400 audit(2000001068.440:22305): avc: denied { bpf } for pid=18054 comm="syz.0.2286" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3299.929209][ T31] audit: type=1400 audit(2000001068.440:22306): avc: denied { perfmon } for pid=18054 comm="syz.0.2286" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3299.947215][ T31] audit: type=1400 audit(2000001068.460:22307): avc: denied { prog_load } for pid=18054 comm="syz.0.2286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3301.304727][T18074] wg2: entered promiscuous mode [ 3301.306025][T18074] wg2: entered allmulticast mode [ 3304.736796][ T31] kauditd_printk_skb: 89 callbacks suppressed [ 3304.741514][ T31] audit: type=1400 audit(2000001073.250:22397): avc: denied { map_create } for pid=18109 comm="syz.0.2298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3304.753511][ T31] audit: type=1400 audit(2000001073.270:22398): avc: denied { map_read map_write } for pid=18109 comm="syz.0.2298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3304.791776][ T31] audit: type=1400 audit(2000001073.300:22399): avc: denied { prog_load } for pid=18109 comm="syz.0.2298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3304.792246][ T31] audit: type=1400 audit(2000001073.300:22400): avc: denied { bpf } for pid=18109 comm="syz.0.2298" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3304.792524][ T31] audit: type=1400 audit(2000001073.300:22401): avc: denied { perfmon } for pid=18109 comm="syz.0.2298" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3304.803520][ T31] audit: type=1400 audit(2000001073.310:22402): avc: denied { prog_run } for pid=18109 comm="syz.0.2298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3304.823972][ T31] audit: type=1400 audit(2000001073.340:22403): avc: denied { map_create } for pid=18111 comm="syz.3.2299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3304.859801][ T31] audit: type=1400 audit(2000001073.370:22404): avc: denied { write } for pid=18111 comm="syz.3.2299" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3304.861111][ T31] audit: type=1400 audit(2000001073.370:22405): avc: denied { open } for pid=18111 comm="syz.3.2299" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3304.881539][ T31] audit: type=1400 audit(2000001073.390:22406): avc: denied { map_create } for pid=18111 comm="syz.3.2299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3309.151204][T18198] pim6reg1: entered promiscuous mode [ 3309.156999][T18198] pim6reg1: entered allmulticast mode [ 3310.203413][ T31] kauditd_printk_skb: 118 callbacks suppressed [ 3310.206101][ T31] audit: type=1400 audit(2000001078.720:22525): avc: denied { prog_load } for pid=18209 comm="syz.0.2314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3310.214416][ T31] audit: type=1400 audit(2000001078.730:22526): avc: denied { bpf } for pid=18209 comm="syz.0.2314" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3310.221370][ T31] audit: type=1400 audit(2000001078.730:22527): avc: denied { perfmon } for pid=18209 comm="syz.0.2314" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3310.247646][ T31] audit: type=1400 audit(2000001078.760:22528): avc: denied { prog_load } for pid=18209 comm="syz.0.2314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3310.258002][ T31] audit: type=1400 audit(2000001078.770:22529): avc: denied { map_create } for pid=18209 comm="syz.0.2314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3310.267959][ T31] audit: type=1400 audit(2000001078.770:22530): avc: denied { map_read map_write } for pid=18209 comm="syz.0.2314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3310.313126][ T31] audit: type=1400 audit(2000001078.830:22531): avc: denied { prog_run } for pid=18209 comm="syz.0.2314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3310.375577][T18210] wg2: entered promiscuous mode [ 3310.380578][T18210] wg2: entered allmulticast mode [ 3310.823920][ T31] audit: type=1400 audit(2000001079.340:22532): avc: denied { read } for pid=18213 comm="syz.0.2315" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3310.837110][ T31] audit: type=1400 audit(2000001079.350:22533): avc: denied { open } for pid=18213 comm="syz.0.2315" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3310.859200][ T31] audit: type=1400 audit(2000001079.370:22534): avc: denied { ioctl } for pid=18213 comm="syz.0.2315" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3315.271260][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 3315.274096][ T31] audit: type=1400 audit(2000001083.780:22583): avc: denied { unmount } for pid=17166 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3315.549964][ T31] audit: type=1400 audit(2000001084.050:22584): avc: denied { prog_load } for pid=18259 comm="syz.3.2325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3315.553244][ T31] audit: type=1400 audit(2000001084.060:22585): avc: denied { bpf } for pid=18259 comm="syz.3.2325" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3315.562638][ T31] audit: type=1400 audit(2000001084.080:22586): avc: denied { perfmon } for pid=18259 comm="syz.3.2325" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3315.564796][ T31] audit: type=1400 audit(2000001084.080:22587): avc: denied { perfmon } for pid=18259 comm="syz.3.2325" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3315.566945][ T31] audit: type=1400 audit(2000001084.080:22588): avc: denied { bpf } for pid=18259 comm="syz.3.2325" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3315.585650][ T31] audit: type=1400 audit(2000001084.100:22589): avc: denied { prog_run } for pid=18259 comm="syz.3.2325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3315.678915][ T31] audit: type=1400 audit(2000001084.190:22590): avc: denied { prog_load } for pid=18260 comm="syz.0.2326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3315.682418][ T31] audit: type=1400 audit(2000001084.190:22591): avc: denied { bpf } for pid=18260 comm="syz.0.2326" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3315.685840][ T31] audit: type=1400 audit(2000001084.200:22592): avc: denied { map_create } for pid=18259 comm="syz.3.2325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3320.328542][ T31] kauditd_printk_skb: 64 callbacks suppressed [ 3320.329025][ T31] audit: type=1400 audit(2000001088.850:22657): avc: denied { unmount } for pid=17166 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3320.532169][ T31] audit: type=1400 audit(2000001089.040:22658): avc: denied { prog_load } for pid=18297 comm="syz.3.2336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3320.532663][ T31] audit: type=1400 audit(2000001089.040:22659): avc: denied { bpf } for pid=18297 comm="syz.3.2336" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3320.532947][ T31] audit: type=1400 audit(2000001089.040:22660): avc: denied { perfmon } for pid=18297 comm="syz.3.2336" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3320.561474][ T31] audit: type=1400 audit(2000001089.070:22661): avc: denied { map_create } for pid=18297 comm="syz.3.2336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3320.575877][ T31] audit: type=1400 audit(2000001089.070:22662): avc: denied { map_read map_write } for pid=18297 comm="syz.3.2336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3320.608327][ T31] audit: type=1400 audit(2000001089.120:22663): avc: denied { prog_run } for pid=18297 comm="syz.3.2336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3320.789941][ T31] audit: type=1400 audit(2000001089.300:22664): avc: denied { prog_load } for pid=18300 comm="syz.0.2337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3320.796110][ T31] audit: type=1400 audit(2000001089.310:22665): avc: denied { bpf } for pid=18300 comm="syz.0.2337" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3320.814322][ T31] audit: type=1400 audit(2000001089.330:22666): avc: denied { map_create } for pid=18300 comm="syz.0.2337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3325.736349][ T31] kauditd_printk_skb: 65 callbacks suppressed [ 3325.736756][ T31] audit: type=1400 audit(2000001094.250:22732): avc: denied { map_create } for pid=18335 comm="syz.0.2347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3325.737162][ T31] audit: type=1400 audit(2000001094.250:22733): avc: denied { bpf } for pid=18335 comm="syz.0.2347" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3325.737264][ T31] audit: type=1400 audit(2000001094.250:22734): avc: denied { map_read map_write } for pid=18335 comm="syz.0.2347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3325.759303][ T31] audit: type=1400 audit(2000001094.270:22735): avc: denied { prog_load } for pid=18335 comm="syz.0.2347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3325.764435][ T31] audit: type=1400 audit(2000001094.280:22736): avc: denied { perfmon } for pid=18335 comm="syz.0.2347" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3325.766429][ T31] audit: type=1400 audit(2000001094.280:22737): avc: denied { prog_run } for pid=18335 comm="syz.0.2347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3326.502529][ T31] audit: type=1400 audit(2000001095.010:22738): avc: denied { prog_load } for pid=18340 comm="syz.0.2348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3326.514186][ T31] audit: type=1400 audit(2000001095.030:22739): avc: denied { bpf } for pid=18340 comm="syz.0.2348" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3326.533670][ T31] audit: type=1400 audit(2000001095.050:22740): avc: denied { perfmon } for pid=18340 comm="syz.0.2348" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3326.539016][ T31] audit: type=1400 audit(2000001095.050:22741): avc: denied { prog_run } for pid=18340 comm="syz.0.2348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3330.744720][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 3330.745129][ T31] audit: type=1400 audit(2000001099.260:22788): avc: denied { prog_load } for pid=18375 comm="syz.3.2355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3330.813356][ T31] audit: type=1400 audit(2000001099.330:22789): avc: denied { prog_run } for pid=18374 comm="syz.0.2356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3331.298399][ T31] audit: type=1400 audit(2000001099.810:22790): avc: denied { map_create } for pid=18380 comm="syz.3.2358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3331.301241][ T31] audit: type=1400 audit(2000001099.810:22791): avc: denied { perfmon } for pid=18380 comm="syz.3.2358" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3331.303503][ T31] audit: type=1400 audit(2000001099.810:22792): avc: denied { map_read map_write } for pid=18380 comm="syz.3.2358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3331.311753][ T31] audit: type=1400 audit(2000001099.820:22793): avc: denied { prog_load } for pid=18380 comm="syz.3.2358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3331.399910][ T31] audit: type=1400 audit(2000001099.860:22794): avc: denied { bpf } for pid=18380 comm="syz.3.2358" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3331.403233][ T31] audit: type=1400 audit(2000001099.920:22795): avc: denied { map_create } for pid=18382 comm="syz.0.2357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3331.491855][ T31] audit: type=1400 audit(2000001100.010:22796): avc: denied { perfmon } for pid=18382 comm="syz.0.2357" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3331.564142][ T31] audit: type=1400 audit(2000001100.080:22797): avc: denied { prog_run } for pid=18382 comm="syz.0.2357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3335.068860][T18412] pim6reg1: entered promiscuous mode [ 3335.069790][T18412] pim6reg1: entered allmulticast mode [ 3337.753142][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 3337.753571][ T31] audit: type=1400 audit(2000001106.270:22859): avc: denied { map_create } for pid=18450 comm="syz.3.2368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3337.754724][ T31] audit: type=1400 audit(2000001106.270:22860): avc: denied { perfmon } for pid=18450 comm="syz.3.2368" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3337.755368][ T31] audit: type=1400 audit(2000001106.270:22861): avc: denied { map_read map_write } for pid=18450 comm="syz.3.2368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3337.759933][ T31] audit: type=1400 audit(2000001106.270:22862): avc: denied { prog_load } for pid=18450 comm="syz.3.2368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3337.760939][ T31] audit: type=1400 audit(2000001106.280:22863): avc: denied { bpf } for pid=18450 comm="syz.3.2368" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3337.834518][ T31] audit: type=1400 audit(2000001106.350:22864): avc: denied { prog_run } for pid=18450 comm="syz.3.2368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3337.882130][ T31] audit: type=1400 audit(2000001106.400:22865): avc: denied { read write } for pid=18450 comm="syz.3.2368" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3337.884052][ T31] audit: type=1400 audit(2000001106.400:22866): avc: denied { open } for pid=18450 comm="syz.3.2368" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3337.894046][ T31] audit: type=1400 audit(2000001106.420:22867): avc: denied { create } for pid=18450 comm="syz.3.2368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3337.898462][ T31] audit: type=1400 audit(2000001106.420:22868): avc: denied { mounton } for pid=18450 comm="syz.3.2368" path="/147/file0" dev="tmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3351.979609][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 3351.979907][ T31] audit: type=1400 audit(2000001120.490:22881): avc: denied { map_create } for pid=18464 comm="syz.3.2372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3351.992278][ T31] audit: type=1400 audit(2000001120.510:22882): avc: denied { perfmon } for pid=18464 comm="syz.3.2372" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3351.992674][ T31] audit: type=1400 audit(2000001120.510:22883): avc: denied { map_read map_write } for pid=18464 comm="syz.3.2372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3352.025085][ T31] audit: type=1400 audit(2000001120.540:22884): avc: denied { prog_load } for pid=18464 comm="syz.3.2372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3352.025513][ T31] audit: type=1400 audit(2000001120.540:22885): avc: denied { bpf } for pid=18464 comm="syz.3.2372" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3352.090631][ T31] audit: type=1400 audit(2000001120.600:22886): avc: denied { prog_run } for pid=18464 comm="syz.3.2372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3354.892729][ T31] audit: type=1400 audit(2000001123.410:22887): avc: denied { map_create } for pid=18467 comm="syz.3.2373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3354.917837][ T31] audit: type=1400 audit(2000001123.410:22888): avc: denied { perfmon } for pid=18467 comm="syz.3.2373" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3354.921086][ T31] audit: type=1400 audit(2000001123.410:22889): avc: denied { map_read map_write } for pid=18467 comm="syz.3.2373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3354.932152][ T31] audit: type=1400 audit(2000001123.430:22890): avc: denied { prog_load } for pid=18467 comm="syz.3.2373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3358.073432][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 3358.073795][ T31] audit: type=1400 audit(2000001126.590:22898): avc: denied { unmount } for pid=16044 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3358.693306][ T31] audit: type=1400 audit(2000001127.210:22899): avc: denied { prog_load } for pid=18474 comm="syz.3.2374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3358.693976][ T31] audit: type=1400 audit(2000001127.210:22900): avc: denied { bpf } for pid=18474 comm="syz.3.2374" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3358.716604][ T31] audit: type=1400 audit(2000001127.230:22901): avc: denied { perfmon } for pid=18474 comm="syz.3.2374" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3358.751862][ T31] audit: type=1400 audit(2000001127.260:22902): avc: denied { prog_run } for pid=18474 comm="syz.3.2374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3359.471349][T18481] bond0: option fail_over_mac: unable to set because the bond device has slaves [ 3359.897753][ T31] audit: type=1400 audit(2000001128.410:22903): avc: denied { map_create } for pid=18482 comm="syz.0.2378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3359.899716][ T31] audit: type=1400 audit(2000001128.410:22904): avc: denied { perfmon } for pid=18482 comm="syz.0.2378" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3359.905144][ T31] audit: type=1400 audit(2000001128.410:22905): avc: denied { map_read map_write } for pid=18482 comm="syz.0.2378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3359.906613][ T31] audit: type=1400 audit(2000001128.420:22906): avc: denied { prog_load } for pid=18482 comm="syz.0.2378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3359.913991][ T31] audit: type=1400 audit(2000001128.420:22907): avc: denied { bpf } for pid=18482 comm="syz.0.2378" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3363.118473][T18491] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18491 comm=syz.3.2380 [ 3363.267969][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 3363.268439][ T31] audit: type=1400 audit(2000001131.780:22919): avc: denied { unmount } for pid=17166 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3363.609553][ T31] audit: type=1400 audit(2000001132.120:22920): avc: denied { bpf } for pid=18494 comm="syz.0.2381" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3363.610614][ T31] audit: type=1400 audit(2000001132.120:22921): avc: denied { create } for pid=18493 comm="syz.3.2382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3363.714864][ T31] audit: type=1400 audit(2000001132.230:22922): avc: denied { setopt } for pid=18493 comm="syz.3.2382" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3363.902952][ T31] audit: type=1400 audit(2000001132.420:22923): avc: denied { map_create } for pid=18497 comm="syz.0.2383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3363.905708][ T31] audit: type=1400 audit(2000001132.420:22924): avc: denied { bpf } for pid=18497 comm="syz.0.2383" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3363.907468][ T31] audit: type=1400 audit(2000001132.420:22925): avc: denied { map_read map_write } for pid=18497 comm="syz.0.2383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3363.918014][ T31] audit: type=1400 audit(2000001132.430:22926): avc: denied { prog_load } for pid=18497 comm="syz.0.2383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3363.948263][ T31] audit: type=1400 audit(2000001132.450:22927): avc: denied { bpf } for pid=18497 comm="syz.0.2383" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3363.981376][ T31] audit: type=1400 audit(2000001132.490:22928): avc: denied { prog_load } for pid=18497 comm="syz.0.2383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3368.313630][ T31] kauditd_printk_skb: 54 callbacks suppressed [ 3368.314011][ T31] audit: type=1400 audit(2000001136.830:22983): avc: denied { create } for pid=18551 comm="syz.0.2406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3368.319736][ T31] audit: type=1400 audit(2000001136.830:22984): avc: denied { write } for pid=18551 comm="syz.0.2406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3368.325761][ T31] audit: type=1400 audit(2000001136.840:22985): avc: denied { read } for pid=18551 comm="syz.0.2406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3368.328428][T18552] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2406'. [ 3368.660597][ T31] audit: type=1400 audit(2000001137.160:22986): avc: denied { prog_load } for pid=18553 comm="syz.3.2407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3368.661718][ T31] audit: type=1400 audit(2000001137.170:22987): avc: denied { bpf } for pid=18553 comm="syz.3.2407" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3368.681374][ T31] audit: type=1400 audit(2000001137.200:22988): avc: denied { read append } for pid=18553 comm="syz.3.2407" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3368.686401][ T31] audit: type=1400 audit(2000001137.200:22989): avc: denied { read append open } for pid=18553 comm="syz.3.2407" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3368.736438][ T31] audit: type=1400 audit(2000001137.250:22990): avc: denied { prog_load } for pid=18554 comm="syz.0.2408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3368.736715][ T31] audit: type=1400 audit(2000001137.250:22991): avc: denied { bpf } for pid=18554 comm="syz.0.2408" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3368.976798][ T31] audit: type=1400 audit(2000001137.480:22992): avc: denied { prog_load } for pid=18557 comm="syz.0.2409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3369.896403][T18567] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3369.899476][T18567] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3373.471668][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 3373.472086][ T31] audit: type=1400 audit(2000001141.980:23008): avc: denied { prog_load } for pid=18576 comm="syz.3.2417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3373.472432][ T31] audit: type=1400 audit(2000001141.990:23009): avc: denied { bpf } for pid=18576 comm="syz.3.2417" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3373.794571][ T31] audit: type=1400 audit(2000001142.310:23010): avc: denied { read write } for pid=18578 comm="syz.3.2418" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3373.795083][ T31] audit: type=1400 audit(2000001142.310:23011): avc: denied { open } for pid=18578 comm="syz.3.2418" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3373.831466][ T31] audit: type=1400 audit(2000001142.340:23012): avc: denied { ioctl } for pid=18578 comm="syz.3.2418" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3373.836559][T18579] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3373.838976][T18579] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3374.068996][ T31] audit: type=1400 audit(2000001142.580:23013): avc: denied { prog_load } for pid=18582 comm="syz.3.2419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3374.089951][ T31] audit: type=1400 audit(2000001142.600:23014): avc: denied { bpf } for pid=18582 comm="syz.3.2419" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3374.090973][ T31] audit: type=1400 audit(2000001142.600:23015): avc: denied { perfmon } for pid=18582 comm="syz.3.2419" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3374.091128][ T31] audit: type=1400 audit(2000001142.600:23016): avc: denied { write } for pid=18582 comm="syz.3.2419" name="rtc0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3374.091228][ T31] audit: type=1400 audit(2000001142.600:23017): avc: denied { open } for pid=18582 comm="syz.3.2419" path="/dev/rtc0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3375.304916][T18596] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3375.307592][T18596] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3376.700858][T18611] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2429'. [ 3378.654810][ T31] kauditd_printk_skb: 40 callbacks suppressed [ 3378.655135][ T31] audit: type=1400 audit(2000001147.170:23058): avc: denied { module_request } for pid=18624 comm="syz.3.2435" kmod="net-pf-10-proto-0-type-5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3378.846634][ T31] audit: type=1400 audit(2000001147.360:23059): avc: denied { module_request } for pid=18624 comm="syz.3.2435" kmod="net-pf-10-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3379.222085][ T31] audit: type=1400 audit(2000001147.740:23060): avc: denied { create } for pid=18624 comm="syz.3.2435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3379.249488][ T31] audit: type=1400 audit(2000001147.740:23061): avc: denied { setopt } for pid=18624 comm="syz.3.2435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3380.076133][ T31] audit: type=1400 audit(2000001148.580:23062): avc: denied { name_bind } for pid=18604 comm="syz.0.2426" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3380.092541][ T31] audit: type=1400 audit(2000001148.600:23063): avc: denied { node_bind } for pid=18604 comm="syz.0.2426" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 3381.899913][ T31] audit: type=1400 audit(2000001150.410:23064): avc: denied { create } for pid=18634 comm="syz.3.2438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3381.902474][ T31] audit: type=1400 audit(2000001150.420:23065): avc: denied { write } for pid=18634 comm="syz.3.2438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3381.910919][ T31] audit: type=1400 audit(2000001150.420:23066): avc: denied { read } for pid=18634 comm="syz.3.2438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3382.686632][ T31] audit: type=1400 audit(2000001151.200:23067): avc: denied { map_create } for pid=18642 comm="syz.3.2442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3383.669301][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 3383.672308][ T31] audit: type=1400 audit(2000001152.180:23076): avc: denied { prog_load } for pid=18652 comm="syz.3.2447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3383.673983][ T31] audit: type=1400 audit(2000001152.180:23077): avc: denied { bpf } for pid=18652 comm="syz.3.2447" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3383.690912][ T31] audit: type=1400 audit(2000001152.200:23078): avc: denied { perfmon } for pid=18652 comm="syz.3.2447" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3383.694755][ T31] audit: type=1400 audit(2000001152.200:23079): avc: denied { prog_run } for pid=18652 comm="syz.3.2447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3383.999308][ T31] audit: type=1400 audit(2000001152.510:23080): avc: denied { name_bind } for pid=18654 comm="syz.3.2448" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3384.008262][ T31] audit: type=1400 audit(2000001152.510:23081): avc: denied { node_bind } for pid=18654 comm="syz.3.2448" saddr=::ffff:172.20.20.19 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 3386.690624][ T31] audit: type=1400 audit(2000001155.200:23082): avc: denied { module_request } for pid=18657 comm="syz.3.2449" kmod="rtnl-link-bridge_slave" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3387.127158][ T31] audit: type=1400 audit(2000001155.640:23083): avc: denied { read write } for pid=18660 comm="syz.3.2450" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3387.151220][ T31] audit: type=1400 audit(2000001155.650:23084): avc: denied { open } for pid=18660 comm="syz.3.2450" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3387.164561][ T31] audit: type=1400 audit(2000001155.660:23085): avc: denied { mounton } for pid=18660 comm="syz.3.2450" path="/209/file0" dev="tmpfs" ino=1078 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3393.079761][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 3393.081477][ T31] audit: type=1400 audit(2000001161.590:23097): avc: denied { read write } for pid=18682 comm="syz.0.2456" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3393.083387][ T31] audit: type=1400 audit(2000001161.590:23098): avc: denied { open } for pid=18682 comm="syz.0.2456" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3393.087026][ T31] audit: type=1400 audit(2000001161.600:23099): avc: denied { ioctl } for pid=18682 comm="syz.0.2456" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3393.102855][ T31] audit: type=1400 audit(2000001161.620:23100): avc: denied { ioctl } for pid=18682 comm="syz.0.2456" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3393.320795][ T8093] usb 1-1: new high-speed USB device number 16 using dummy_hcd [ 3393.471720][ T8093] usb 1-1: Using ep0 maxpacket: 32 [ 3393.481358][ T8093] usb 1-1: config 0 has an invalid interface number: 67 but max is 0 [ 3393.482490][ T8093] usb 1-1: config 0 has no interface number 0 [ 3393.497833][ T8093] usb 1-1: New USB device found, idVendor=0424, idProduct=9901, bcdDevice=c2.57 [ 3393.499421][ T8093] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3393.501475][ T8093] usb 1-1: Product: syz [ 3393.502322][ T8093] usb 1-1: Manufacturer: syz [ 3393.503087][ T8093] usb 1-1: SerialNumber: syz [ 3393.512344][ T8093] usb 1-1: config 0 descriptor?? [ 3393.517897][ T31] audit: type=1400 audit(2000001162.030:23101): avc: denied { ioctl } for pid=18682 comm="syz.0.2456" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3393.528510][ T8093] smsc95xx v2.0.0 [ 3393.947105][ T8093] smsc95xx 1-1:0.67 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000030: -32 [ 3393.952279][ T8093] smsc95xx 1-1:0.67 (unnamed net_device) (uninitialized): Error reading E2P_CMD [ 3395.439262][ T8093] smsc95xx 1-1:0.67 (unnamed net_device) (uninitialized): Failed to write reg index 0x00000038: -71 [ 3395.443819][ T8093] smsc95xx 1-1:0.67: probe with driver smsc95xx failed with error -71 [ 3395.462398][ T8093] usb 1-1: USB disconnect, device number 16 [ 3395.604693][ T31] audit: type=1400 audit(2000001164.120:23102): avc: denied { read } for pid=18696 comm="syz.0.2457" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3395.609427][ T31] audit: type=1400 audit(2000001164.120:23103): avc: denied { open } for pid=18696 comm="syz.0.2457" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3395.613856][ T31] audit: type=1400 audit(2000001164.140:23104): avc: denied { ioctl } for pid=18696 comm="syz.0.2457" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3395.908845][ T31] audit: type=1400 audit(2000001164.420:23105): avc: denied { prog_load } for pid=18704 comm="syz.0.2459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3395.911227][ T31] audit: type=1400 audit(2000001164.420:23106): avc: denied { bpf } for pid=18704 comm="syz.0.2459" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3396.608102][T18717] veth1_macvtap: entered promiscuous mode [ 3398.342411][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 3398.342825][ T31] audit: type=1400 audit(2000001166.860:23135): avc: denied { name_bind } for pid=18704 comm="syz.0.2459" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3398.343134][ T31] audit: type=1400 audit(2000001166.860:23136): avc: denied { node_bind } for pid=18704 comm="syz.0.2459" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 3399.470991][ T31] audit: type=1400 audit(2000001167.980:23137): avc: denied { unmount } for pid=16044 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3400.368061][ T31] audit: type=1400 audit(2000001168.880:23138): avc: denied { read } for pid=18738 comm="syz.3.2470" name="rtc0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3400.380859][ T31] audit: type=1400 audit(2000001168.880:23139): avc: denied { open } for pid=18738 comm="syz.3.2470" path="/dev/rtc0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3400.388136][ T31] audit: type=1400 audit(2000001168.900:23140): avc: denied { ioctl } for pid=18738 comm="syz.3.2470" path="/dev/rtc0" dev="devtmpfs" ino=697 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3400.552738][ T31] audit: type=1400 audit(2000001169.050:23141): avc: denied { create } for pid=18740 comm="syz.3.2471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3400.892994][ T31] audit: type=1400 audit(2000001169.400:23142): avc: denied { prog_load } for pid=18742 comm="syz.3.2472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3400.922299][ T31] audit: type=1400 audit(2000001169.430:23143): avc: denied { bpf } for pid=18742 comm="syz.3.2472" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3401.434060][ T31] audit: type=1400 audit(2000001169.950:23144): avc: denied { prog_load } for pid=18747 comm="syz.3.2474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3404.921336][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 3404.921798][ T31] audit: type=1400 audit(2000001173.420:23157): avc: denied { write } for pid=18757 comm="syz.3.2478" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3404.924863][ T31] audit: type=1400 audit(2000001173.440:23158): avc: denied { open } for pid=18757 comm="syz.3.2478" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3404.931519][ T31] audit: type=1400 audit(2000001173.440:23159): avc: denied { ioctl } for pid=18757 comm="syz.3.2478" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3405.197763][ T31] audit: type=1400 audit(2000001173.710:23160): avc: denied { name_bind } for pid=18763 comm="syz.3.2479" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3405.201081][ T31] audit: type=1400 audit(2000001173.710:23161): avc: denied { node_bind } for pid=18763 comm="syz.3.2479" saddr=::1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 3407.967250][ T31] audit: type=1400 audit(2000001176.480:23162): avc: denied { write } for pid=18766 comm="syz.3.2480" name="event0" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3407.967878][ T31] audit: type=1400 audit(2000001176.480:23163): avc: denied { open } for pid=18766 comm="syz.3.2480" path="/dev/input/event0" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3408.155257][ T31] audit: type=1400 audit(2000001176.670:23164): avc: denied { read } for pid=18768 comm="syz.3.2481" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3408.155726][ T31] audit: type=1400 audit(2000001176.670:23165): avc: denied { open } for pid=18768 comm="syz.3.2481" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3408.177555][ T31] audit: type=1400 audit(2000001176.690:23166): avc: denied { setattr } for pid=18768 comm="syz.3.2481" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3409.673217][T18778] netlink: 'syz.3.2485': attribute type 1 has an invalid length. [ 3410.266390][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 3410.268445][ T31] audit: type=1400 audit(2000001178.780:23176): avc: denied { mount } for pid=18781 comm="syz.3.2487" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 3412.145538][ T31] audit: type=1400 audit(2000001180.660:23177): avc: denied { watch } for pid=18804 comm="syz.3.2498" path="/syzcgroup/unified/syz3" dev="cgroup2" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 3412.386475][ T31] audit: type=1400 audit(2000001180.910:23178): avc: denied { name_bind } for pid=18808 comm="syz.3.2500" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3412.394238][ T31] audit: type=1400 audit(2000001180.910:23179): avc: denied { node_bind } for pid=18808 comm="syz.3.2500" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 3412.782011][ T31] audit: type=1400 audit(2000001181.300:23180): avc: denied { read } for pid=18814 comm="syz.0.2503" dev="nsfs" ino=4026532769 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3412.783703][ T31] audit: type=1400 audit(2000001181.300:23181): avc: denied { read open } for pid=18814 comm="syz.0.2503" path="mnt:[4026532769]" dev="nsfs" ino=4026532769 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3413.217003][ T31] audit: type=1400 audit(2000001181.730:23182): avc: denied { map_create } for pid=18826 comm="syz.0.2508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3413.217471][ T31] audit: type=1400 audit(2000001181.730:23183): avc: denied { perfmon } for pid=18826 comm="syz.0.2508" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3413.221570][ T31] audit: type=1400 audit(2000001181.730:23184): avc: denied { map_read map_write } for pid=18826 comm="syz.0.2508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3413.225745][ T31] audit: type=1400 audit(2000001181.750:23185): avc: denied { prog_load } for pid=18826 comm="syz.0.2508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3415.475615][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 3415.478392][ T31] audit: type=1400 audit(2000001183.980:23205): avc: denied { map_create } for pid=18841 comm="syz.3.2513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3415.482569][ T31] audit: type=1400 audit(2000001184.000:23206): avc: denied { map_read map_write } for pid=18841 comm="syz.3.2513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3415.522149][ T31] audit: type=1400 audit(2000001184.010:23207): avc: denied { prog_load } for pid=18841 comm="syz.3.2513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3415.560711][ T31] audit: type=1400 audit(2000001184.060:23208): avc: denied { bpf } for pid=18841 comm="syz.3.2513" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3415.563888][ T31] audit: type=1400 audit(2000001184.080:23209): avc: denied { perfmon } for pid=18841 comm="syz.3.2513" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3415.599758][ T31] audit: type=1400 audit(2000001184.110:23210): avc: denied { prog_run } for pid=18841 comm="syz.3.2513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3415.716995][T18842] veth0_vlan: entered allmulticast mode [ 3415.844629][ T31] audit: type=1400 audit(2000001184.360:23211): avc: denied { unmount } for pid=17166 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3415.970952][ T31] audit: type=1400 audit(2000001184.480:23212): avc: denied { map_create } for pid=18844 comm="syz.3.2514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3415.974058][ T31] audit: type=1400 audit(2000001184.490:23213): avc: denied { map_read map_write } for pid=18844 comm="syz.3.2514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3415.980766][ T31] audit: type=1400 audit(2000001184.490:23214): avc: denied { prog_load } for pid=18844 comm="syz.3.2514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3420.265741][T18365] usb 1-1: new high-speed USB device number 17 using dummy_hcd [ 3420.423644][T18365] usb 1-1: Using ep0 maxpacket: 8 [ 3420.462742][T18365] usb 1-1: config 16 has an invalid descriptor of length 0, skipping remainder of the config [ 3420.470641][T18365] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 3420.480082][T18365] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3420.511987][ T31] kauditd_printk_skb: 107 callbacks suppressed [ 3420.512144][ T31] audit: type=1400 audit(2000001189.030:23322): avc: denied { create } for pid=18905 comm="syz.3.2540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3420.533738][ T31] audit: type=1400 audit(2000001189.050:23323): avc: denied { write } for pid=18905 comm="syz.3.2540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3420.535542][ T31] audit: type=1400 audit(2000001189.050:23324): avc: denied { module_request } for pid=18905 comm="syz.3.2540" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3420.539912][ T31] audit: type=1400 audit(2000001189.050:23325): avc: denied { ioctl } for pid=18900 comm="syz.0.2539" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3420.765637][ T31] audit: type=1400 audit(2000001189.280:23326): avc: denied { ioctl } for pid=18900 comm="syz.0.2539" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3420.981487][ T31] audit: type=1400 audit(2000001189.500:23327): avc: denied { read } for pid=18905 comm="syz.3.2540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3421.023058][ T31] audit: type=1400 audit(2000001189.540:23328): avc: denied { ioctl } for pid=18905 comm="syz.3.2540" path="socket:[34130]" dev="sockfs" ino=34130 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3421.044795][ T31] audit: type=1400 audit(2000001189.560:23329): avc: denied { module_request } for pid=18905 comm="syz.3.2540" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3421.534677][ T31] audit: type=1400 audit(2000001190.050:23330): avc: denied { write } for pid=18905 comm="syz.3.2540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3421.735409][ T31] audit: type=1400 audit(2000001190.250:23331): avc: denied { sys_module } for pid=18905 comm="syz.3.2540" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3423.698003][T18919] nbd3: detected capacity change from 0 to 4294967296 [ 3424.214568][T18922] block nbd3: shutting down sockets [ 3426.208494][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 3426.208889][ T31] audit: type=1400 audit(2000001194.720:23348): avc: denied { create } for pid=18935 comm="syz.3.2547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3426.218236][ T31] audit: type=1400 audit(2000001194.730:23349): avc: denied { write } for pid=18935 comm="syz.3.2547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3426.305362][ T31] audit: type=1400 audit(2000001194.820:23350): avc: denied { read write } for pid=18937 comm="syz.3.2548" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3426.305887][ T31] audit: type=1400 audit(2000001194.820:23351): avc: denied { open } for pid=18937 comm="syz.3.2548" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3426.313239][ T31] audit: type=1400 audit(2000001194.830:23352): avc: denied { ioctl } for pid=18937 comm="syz.3.2548" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3426.314996][T18938] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3426.319079][T18938] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3426.414082][ T31] audit: type=1400 audit(2000001194.930:23353): avc: denied { read } for pid=18941 comm="syz.3.2549" dev="nsfs" ino=4026532858 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3426.414585][ T31] audit: type=1400 audit(2000001194.930:23354): avc: denied { open } for pid=18941 comm="syz.3.2549" path="net:[4026532858]" dev="nsfs" ino=4026532858 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3426.422334][ T31] audit: type=1400 audit(2000001194.940:23355): avc: denied { create } for pid=18941 comm="syz.3.2549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3426.428833][ T31] audit: type=1400 audit(2000001194.940:23356): avc: denied { write } for pid=18941 comm="syz.3.2549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3426.432610][ T31] audit: type=1400 audit(2000001194.940:23357): avc: denied { module_request } for pid=18941 comm="syz.3.2549" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3426.874416][T18950] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3426.877366][T18950] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3433.541088][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 3433.541472][ T31] audit: type=1400 audit(2000001202.060:23391): avc: denied { write } for pid=18966 comm="syz.3.2559" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3433.542600][ T31] audit: type=1400 audit(2000001202.060:23392): avc: denied { open } for pid=18966 comm="syz.3.2559" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3433.591753][ T31] audit: type=1400 audit(2000001202.080:23393): avc: denied { ioctl } for pid=18966 comm="syz.3.2559" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3433.762972][ T31] audit: type=1400 audit(2000001202.280:23394): avc: denied { create } for pid=18966 comm="syz.3.2559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3433.771952][ T31] audit: type=1400 audit(2000001202.290:23395): avc: denied { ioctl } for pid=18966 comm="syz.3.2559" path="socket:[34268]" dev="sockfs" ino=34268 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3434.359589][T18399] usb 1-1: USB disconnect, device number 17 [ 3434.448007][ T31] audit: type=1400 audit(2000001202.960:23396): avc: denied { read } for pid=18972 comm="syz.3.2560" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3434.465319][ T31] audit: type=1400 audit(2000001202.980:23397): avc: denied { read open } for pid=18972 comm="syz.3.2560" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3434.481411][ T31] audit: type=1400 audit(2000001202.990:23398): avc: denied { ioctl } for pid=18972 comm="syz.3.2560" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3435.108477][ T31] audit: type=1400 audit(2000001203.620:23399): avc: denied { read } for pid=18982 comm="syz.3.2562" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3435.111758][ T31] audit: type=1400 audit(2000001203.620:23400): avc: denied { open } for pid=18982 comm="syz.3.2562" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3438.363236][T19002] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19002 comm=syz.0.2571 [ 3438.789990][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 3438.791574][ T31] audit: type=1400 audit(2000001207.300:23459): avc: denied { read write } for pid=19008 comm="syz.0.2572" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3438.794030][ T31] audit: type=1400 audit(2000001207.300:23460): avc: denied { open } for pid=19008 comm="syz.0.2572" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3438.796320][ T31] audit: type=1400 audit(2000001207.310:23461): avc: denied { ioctl } for pid=19008 comm="syz.0.2572" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3438.799359][ T31] audit: type=1400 audit(2000001207.310:23462): avc: denied { create } for pid=19007 comm="syz.3.2573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3438.808684][ T31] audit: type=1400 audit(2000001207.320:23463): avc: denied { ioctl } for pid=19008 comm="syz.0.2572" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3438.811912][ T31] audit: type=1400 audit(2000001207.320:23464): avc: denied { write } for pid=19007 comm="syz.3.2573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3438.903389][ T31] audit: type=1400 audit(2000001207.420:23465): avc: denied { ioctl } for pid=19008 comm="syz.0.2572" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3438.916768][ T31] audit: type=1400 audit(2000001207.430:23466): avc: denied { read } for pid=19014 comm="syz.3.2574" dev="nsfs" ino=4026532858 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3438.917823][ T31] audit: type=1400 audit(2000001207.430:23467): avc: denied { open } for pid=19014 comm="syz.3.2574" path="net:[4026532858]" dev="nsfs" ino=4026532858 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3438.919497][ T31] audit: type=1400 audit(2000001207.430:23468): avc: denied { create } for pid=19014 comm="syz.3.2574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3439.031204][T18385] usb 1-1: new high-speed USB device number 18 using dummy_hcd [ 3439.225902][T18385] usb 1-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 3439.226267][T18385] usb 1-1: config 27 interface 0 altsetting 0 endpoint 0xB has invalid maxpacket 24623, setting to 1024 [ 3439.226504][T18385] usb 1-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 1024 [ 3439.226730][T18385] usb 1-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 3439.226941][T18385] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3439.242299][T19009] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 3439.262409][T18385] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 3439.501610][T18385] usb 1-1: USB disconnect, device number 18 [ 3440.560633][T12258] usb 1-1: new high-speed USB device number 19 using dummy_hcd [ 3440.721571][T12258] usb 1-1: Using ep0 maxpacket: 32 [ 3440.971150][T12258] usb 1-1: unable to get BOS descriptor or descriptor too short [ 3440.973595][T12258] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 3440.973763][T12258] usb 1-1: can't read configurations, error -71 [ 3443.952644][ T31] kauditd_printk_skb: 92 callbacks suppressed [ 3443.953005][ T31] audit: type=1400 audit(2000001212.470:23561): avc: denied { create } for pid=19095 comm="syz.0.2588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3444.002711][ T31] audit: type=1400 audit(2000001212.510:23562): avc: denied { bind } for pid=19095 comm="syz.0.2588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3444.012845][ T31] audit: type=1400 audit(2000001212.530:23563): avc: denied { node_bind } for pid=19095 comm="syz.0.2588" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 3444.643625][ T31] audit: type=1400 audit(2000001213.160:23564): avc: denied { execute } for pid=19098 comm="syz.0.2589" name="file0" dev="tmpfs" ino=758 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3444.648776][ T31] audit: type=1400 audit(2000001213.160:23565): avc: denied { execute_no_trans } for pid=19098 comm="syz.0.2589" path="/146/file0" dev="tmpfs" ino=758 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3444.982922][ T31] audit: type=1400 audit(2000001213.500:23566): avc: denied { create } for pid=19101 comm="syz.0.2590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3445.019356][ T31] audit: type=1400 audit(2000001213.530:23567): avc: denied { write } for pid=19101 comm="syz.0.2590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3445.019904][ T31] audit: type=1400 audit(2000001213.530:23568): avc: denied { ioctl } for pid=19101 comm="syz.0.2590" path="socket:[34532]" dev="sockfs" ino=34532 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3445.661329][ T31] audit: type=1400 audit(2000001214.180:23569): avc: denied { create } for pid=19105 comm="syz.0.2592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3445.681033][ T31] audit: type=1400 audit(2000001214.190:23570): avc: denied { bind } for pid=19105 comm="syz.0.2592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3448.050867][T18399] usb 1-1: new high-speed USB device number 21 using dummy_hcd [ 3448.210813][T18399] usb 1-1: Using ep0 maxpacket: 8 [ 3448.227437][T18399] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 3448.228691][T18399] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 3448.230931][T18399] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 100, changing to 10 [ 3448.232226][T18399] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 24936, setting to 1024 [ 3448.233379][T18399] usb 1-1: New USB device found, idVendor=0225, idProduct=0000, bcdDevice= 0.00 [ 3448.234390][T18399] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3448.254327][T18399] hub 1-1:1.0: bad descriptor, ignoring hub [ 3448.260735][T18399] hub 1-1:1.0: probe with driver hub failed with error -5 [ 3448.261773][T18399] cdc_wdm 1-1:1.0: skipping garbage [ 3448.262025][T18399] cdc_wdm 1-1:1.0: skipping garbage [ 3448.302878][T18399] cdc_wdm 1-1:1.0: cdc-wdm0: USB WDM device [ 3449.215229][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 3449.215649][ T31] audit: type=1400 audit(2000001217.730:23603): avc: denied { read } for pid=19123 comm="syz.0.2599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3449.342139][T18399] usb 1-1: USB disconnect, device number 21 [ 3449.496934][ T31] audit: type=1326 audit(2000001218.010:23604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19123 comm="syz.0.2599" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x0 [ 3449.861007][ T31] audit: type=1400 audit(2000001218.370:23605): avc: denied { create } for pid=19146 comm="syz.3.2600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3449.873087][ T31] audit: type=1400 audit(2000001218.390:23606): avc: denied { bind } for pid=19146 comm="syz.3.2600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3449.876776][ T31] audit: type=1400 audit(2000001218.390:23607): avc: denied { module_request } for pid=19146 comm="syz.3.2600" kmod="crypto-cbc-camellia-asm" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3450.272180][ T31] audit: type=1400 audit(2000001218.780:23608): avc: denied { module_request } for pid=19146 comm="syz.3.2600" kmod="crypto-cbc-camellia-asm-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3450.425738][ T31] audit: type=1400 audit(2000001218.940:23609): avc: denied { setopt } for pid=19146 comm="syz.3.2600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3450.463868][ T31] audit: type=1400 audit(2000001218.980:23610): avc: denied { accept } for pid=19146 comm="syz.3.2600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3450.492587][ T31] audit: type=1400 audit(2000001219.010:23611): avc: denied { read } for pid=19146 comm="syz.3.2600" name="pcmC0D0p" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3450.500018][ T31] audit: type=1400 audit(2000001219.010:23612): avc: denied { read open } for pid=19146 comm="syz.3.2600" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3456.100892][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 3456.101233][ T31] audit: type=1400 audit(2000001224.610:23622): avc: denied { read } for pid=19161 comm="syz.3.2605" name="pcmC0D0p" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3456.101411][ T31] audit: type=1400 audit(2000001224.620:23623): avc: denied { open } for pid=19161 comm="syz.3.2605" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3456.107087][ T31] audit: type=1400 audit(2000001224.620:23624): avc: denied { ioctl } for pid=19161 comm="syz.3.2605" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=721 ioctlcmd=0x4123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3456.200585][ T31] audit: type=1400 audit(2000001224.710:23625): avc: denied { read } for pid=19163 comm="syz.3.2606" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3456.204920][ T31] audit: type=1400 audit(2000001224.720:23626): avc: denied { open } for pid=19163 comm="syz.3.2606" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3456.210584][ T31] audit: type=1400 audit(2000001224.720:23627): avc: denied { ioctl } for pid=19163 comm="syz.3.2606" path="/dev/dri/card2" dev="devtmpfs" ino=760 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3456.223049][T19164] ------------[ cut here ]------------ [ 3456.223708][T19164] WARNING: CPU: 0 PID: 19164 at kernel/dma/direct.h:87 dma_direct_map_sg+0x374/0x404 [ 3456.224524][T19164] Modules linked in: [ 3456.226812][T19164] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 3456.227866][T19164] CPU: 0 UID: 0 PID: 19164 Comm: syz.3.2606 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 3456.228251][T19164] Hardware name: ARM-Versatile Express [ 3456.228813][T19164] Call trace: [ 3456.229429][T19164] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 3456.230122][T19164] r7:00000000 r6:8282083c r5:00000000 r4:8225b4e0 [ 3456.230661][T19164] [<80201ae4>] (show_stack) from [<8021fdf4>] (dump_stack_lvl+0x54/0x7c) [ 3456.231154][T19164] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 3456.231532][T19164] r5:00000000 r4:82a6dd18 [ 3456.231725][T19164] [<8021fe1c>] (dump_stack) from [<80202614>] (panic+0x120/0x374) [ 3456.232192][T19164] [<802024f4>] (panic) from [<80258578>] (get_taint+0x0/0x1c) [ 3456.232517][T19164] r3:8280c684 r2:00000001 r1:82242028 r0:822499c0 [ 3456.232852][T19164] r7:80317874 [ 3456.233035][T19164] [<80258504>] (check_panic_on_warn) from [<802586dc>] (__warn+0x80/0x188) [ 3456.233359][T19164] [<8025865c>] (__warn) from [<8025895c>] (warn_slowpath_fmt+0x178/0x1f4) [ 3456.233956][T19164] r8:00000009 r7:822557b8 r6:dfaedc0c r5:86b3c800 r4:00000000 [ 3456.234296][T19164] [<802587e8>] (warn_slowpath_fmt) from [<80317874>] (dma_direct_map_sg+0x374/0x404) [ 3456.234784][T19164] r10:82ab9b30 r9:00000000 r8:00000000 r7:833f8810 r6:85abb400 r5:00018000 [ 3456.235204][T19164] r4:85abb6c0 [ 3456.235386][T19164] [<80317500>] (dma_direct_map_sg) from [<80315fd4>] (__dma_map_sg_attrs+0x4c/0x2fc) [ 3456.235829][T19164] r10:84bcbe00 r9:833f8f48 r8:00000001 r7:85abb400 r6:00000000 r5:833f8810 [ 3456.236146][T19164] r4:85abb6c0 [ 3456.236295][T19164] [<80315f88>] (__dma_map_sg_attrs) from [<803162d8>] (dma_map_sgtable+0x2c/0x40) [ 3456.236710][T19164] r10:84bcbe00 r9:833f8f48 r8:84bcbec0 r7:85abbf80 r6:85abbf80 r5:00000000 [ 3456.237365][T19164] r4:85abb6c0 [ 3456.237598][T19164] [<803162ac>] (dma_map_sgtable) from [<80acddcc>] (drm_gem_map_dma_buf+0x58/0xc4) [ 3456.238213][T19164] r4:85abb6c0 [ 3456.238399][T19164] [<80acdd74>] (drm_gem_map_dma_buf) from [<80b8f42c>] (dma_buf_map_attachment+0x50/0x164) [ 3456.239330][T19164] r7:85abbf80 r6:00000000 r5:00000000 r4:85abbf80 [ 3456.239588][T19164] [<80b8f3dc>] (dma_buf_map_attachment) from [<80b8f57c>] (dma_buf_map_attachment_unlocked+0x3c/0x78) [ 3456.240040][T19164] r7:85abbf80 r6:833f8c00 r5:00000000 r4:85abbf80 [ 3456.240583][T19164] [<80b8f540>] (dma_buf_map_attachment_unlocked) from [<80ace6ac>] (drm_gem_prime_import_dev+0x88/0x1a0) [ 3456.241397][T19164] r5:84690900 r4:85b14300 [ 3456.241712][T19164] [<80ace624>] (drm_gem_prime_import_dev) from [<80aced00>] (drm_gem_prime_fd_to_handle+0x184/0x230) [ 3456.242147][T19164] r9:833f8f48 r8:84bcbec0 r7:dfaede64 r6:833f8c00 r5:84bcbe00 r4:85b14300 [ 3456.242451][T19164] [<80aceb7c>] (drm_gem_prime_fd_to_handle) from [<80aceec0>] (drm_prime_fd_to_handle_ioctl+0x34/0x38) [ 3456.242899][T19164] r9:86b3c800 r8:833f8c00 r7:dfaede64 r6:80acee8c r5:84bcbe00 r4:00000000 [ 3456.243190][T19164] [<80acee8c>] (drm_prime_fd_to_handle_ioctl) from [<80ac0418>] (drm_ioctl_kernel+0xb8/0x120) [ 3456.243603][T19164] r5:84bcbe00 r4:00000020 [ 3456.243798][T19164] [<80ac0360>] (drm_ioctl_kernel) from [<80ac06e4>] (drm_ioctl+0x264/0x5b0) [ 3456.244136][T19164] r8:81d38b28 r7:833f8c00 r6:c00c642e r5:0000000c r4:0000000c [ 3456.244431][T19164] [<80ac0480>] (drm_ioctl) from [<805679c4>] (sys_ioctl+0x130/0xdc8) [ 3456.244788][T19164] r10:86b3c800 r9:854ac900 r8:00000003 r7:20000080 r6:854ac901 r5:00000000 [ 3456.245179][T19164] r4:c00c642e [ 3456.245329][T19164] [<80567894>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3456.245790][T19164] Exception stack(0xdfaedfa8 to 0xdfaedff0) [ 3456.246199][T19164] dfa0: 00000000 00000000 00000003 c00c642e 20000080 00000000 [ 3456.246577][T19164] dfc0: 00000000 00000000 002f6300 00000036 002e0000 00000000 00006364 76b400bc [ 3456.246927][T19164] dfe0: 76b3fec0 76b3feb0 000193a4 00131fc0 [ 3456.247219][T19164] r10:00000036 r9:86b3c800 r8:8020029c r7:00000036 r6:002f6300 r5:00000000 [ 3456.247559][T19164] r4:00000000 [ 3456.251965][T19164] Rebooting in 86400 seconds.. VM DIAGNOSIS: 08:28:51 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=8225b4e0 R02=00000000 R03=81a25380 R04=00000006 R05=828f8dc8 R06=00000000 R07=828f8dc0 R08=86b3c800 R09=00000028 R10=828f8dc8 R11=dfaed970 R12=dfaed974 R13=dfaed964 R14=80340894 R15=81a25390 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=8225b4e0 R02=003965a1 R03=80239c80 R04=83246000 R05=00000001 R06=83246000 R07=8280c6d0 R08=00000001 R09=00000000 R10=00000000 R11=df865f64 R12=df865f68 R13=df865f58 R14=80228714 R15=80239c88 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000