last executing test programs: 1.685092834s ago: executing program 1 (id=989): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x800000000006}, 0x18) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000}]) 1.598897983s ago: executing program 1 (id=991): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd6060626000102c00fe8000000000000000000000000000bbfe8000000000000000000000000000aa11000001"], 0x0) syz_emit_ethernet(0x19a, &(0x7f00000002c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd60eaff0201642c00fe8000000000000000000000000000bbfe8000000000000000000000000000aa0000000e"], 0x0) 1.573332955s ago: executing program 1 (id=993): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x30046, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffff"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) 1.512382992s ago: executing program 1 (id=996): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x10007ffffffff}, 0x18) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x600) 1.461469586s ago: executing program 1 (id=1008): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x7, 0x0, 0x7fff0006}]}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r4], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000980)='./file0\x00', 0x30) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000200)='cpuset.mem_exclusive\x00', 0x2, 0x0) r7 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x70, 0x103301) ioctl$USBDEVFS_IOCTL(r7, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r7, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x3a}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6}, 0x70) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000001700)=0x4) close_range(r0, 0xffffffffffffffff, 0x0) 936.924238ms ago: executing program 3 (id=1024): r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e24, @empty}, 0x10) recvmmsg(r0, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001680)=""/228, 0xe4}], 0x1}}], 0x1, 0x10120, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg(r1, &(0x7f0000002c40)={&(0x7f0000000440)=@in={0x2, 0x4e24, @empty}, 0x80, 0x0}, 0x0) 932.618178ms ago: executing program 3 (id=1025): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), r1) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r2, @ANYBLOB="0100000000000000000001000000060006000300000024000300a0cb879a47f5bc644c0e693fa6d031c74a1553b6e901b9ff2f518c78042fb5426c010880f4000080060005000180000024000100dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff240002001bc715ee4868b12a49f4df11bc05475489f6a27c4d6483ad2fa5e45903b0ce851400040002000000ac1414aa00000000000000008c00098028000080060001000a00000014000200ff020000000000000000000000000001050003000000000028000080060001000a000000140002000000000000000000000000000000000105000300030000001c000080060001000200da0008000200e000000105000300000000001c000080060001000200000008000200ac141400050003000000000074000080200004000a004e2200000000fc0000000000000000000000000000000400000024000100dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff080003000100000024000200cde20bc0d9b90ac13642d7b66459dd9db5e20b4b16d3d23f2cb03a8aa417dce6080007000000000014000200776730"], 0x1c8}}, 0x24000000) 912.157911ms ago: executing program 3 (id=1026): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0xea, 0x7, 0x40, 0xe5, 0x0, 0x0, 0xd000, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={0x0, 0x2}, 0x9c7, 0xfc, 0x4, 0x0, 0x81, 0x9, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22160, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0x7, 0x0, 0x3}, 0x0, 0x1, r0, 0xb) 829.282608ms ago: executing program 4 (id=1028): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) dup2(r0, r1) 829.042958ms ago: executing program 3 (id=1029): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r1}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x4008032, 0xffffffffffffffff, 0xd06d000) 828.491769ms ago: executing program 3 (id=1031): r0 = socket$kcm(0xa, 0x2, 0x0) r1 = socket(0x2, 0x80805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x14}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x84, @rand_addr=0x640100ff, 0x4e20, 0x3, 'lblc\x00', 0x20, 0xa7e, 0x400070}, 0x2c) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000000)={{0x84, @private=0xa010102, 0x4e22, 0x3, 'lblcr\x00', 0x1, 0x8000, 0x100077}, {@remote, 0x4e20, 0x3, 0xcd}}, 0x44) sendmsg$sock(r0, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e22, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x8528c000) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95, 0x3}, 0x100002, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYRESOCT], &(0x7f0000000100)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000100)="88", 0xfdef}], 0x1) r6 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x2000) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x2, 0x41001, &(0x7f00000000c0)=""/81}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x300, 0x0, 0x0, 0x0}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3f, 0x0, 0x0, 0x0, 0xb}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r8}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x1b, &(0x7f00000000c0)={@remote={0xfe, 0x80, '\x00', 0xffffffffffffffff}}, 0x20) r11 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r11, 0xffffffffffffffff, 0x0) 788.895473ms ago: executing program 4 (id=1033): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014fa0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='kfree\x00', r1, 0x0, 0x6}, 0x18) socket$inet6(0xa, 0x1, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 756.117746ms ago: executing program 3 (id=1034): r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/17, 0x11}, 0x8000}], 0x1, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000140)=0x6, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x21) syz_emit_ethernet(0x32, &(0x7f0000001140)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty, {[@timestamp={0x44, 0x4, 0x5e}]}}, {0x1, 0x4e20, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) 701.252141ms ago: executing program 4 (id=1037): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000007c0)='kmem_cache_free\x00', r1}, 0x18) truncate(&(0x7f0000000100)='./file0/file0\x00', 0x5) 700.905891ms ago: executing program 4 (id=1039): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, r0}, 0x18) r1 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) connect$vsock_stream(r1, &(0x7f0000000400)={0x28, 0x0, 0x2710, @host}, 0x10) 678.846814ms ago: executing program 2 (id=1040): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback=0x3}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 661.959115ms ago: executing program 0 (id=1041): setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x7, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file1\x00', 0x16f07e, 0x88) fallocate(r0, 0x0, 0x8, 0x1101f0) copy_file_range(r0, 0x0, r0, &(0x7f00000000c0)=0xc615, 0x39ea, 0x0) 613.08151ms ago: executing program 4 (id=1042): bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x12c, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x1) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$RTC_ALM_READ(r0, 0x40187013, &(0x7f0000000180)) 612.93495ms ago: executing program 2 (id=1043): r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) rt_tgsigqueueinfo(r0, r0, 0x8, &(0x7f0000000140)={0x3d, 0x5, 0xfffffff9}) tkill(r0, 0x2e) ptrace$peeksig(0x4209, r0, &(0x7f0000000580)={0x1, 0x0, 0x1}, &(0x7f00000016c0)=[{}]) 612.70463ms ago: executing program 4 (id=1044): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) 612.39698ms ago: executing program 0 (id=1045): r0 = socket$kcm(0xa, 0x2, 0x0) r1 = socket(0x2, 0x80805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x14}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x84, @rand_addr=0x640100ff, 0x4e20, 0x3, 'lblc\x00', 0x20, 0xa7e, 0x400070}, 0x2c) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000000)={{0x84, @private=0xa010102, 0x4e22, 0x3, 'lblcr\x00', 0x1, 0x8000, 0x100077}, {@remote, 0x4e20, 0x3, 0xcd}}, 0x44) sendmsg$sock(r0, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e22, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x8528c000) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95, 0x3}, 0x100002, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYRESOCT], &(0x7f0000000100)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000100)="88", 0xfdef}], 0x1) r6 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x2000) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x2, 0x41001, &(0x7f00000000c0)=""/81}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x300, 0x0, 0x0, 0x0}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3f, 0x0, 0x0, 0x0, 0xb}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r8}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x1b, &(0x7f00000000c0)={@remote={0xfe, 0x80, '\x00', 0xffffffffffffffff}}, 0x20) r11 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r11, 0xffffffffffffffff, 0x0) 593.011932ms ago: executing program 1 (id=1046): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x7, 0x0, 0x7fff0006}]}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES32=r4], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000980)='./file0\x00', 0x30) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000200)='cpuset.mem_exclusive\x00', 0x2, 0x0) r7 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x70, 0x103301) ioctl$USBDEVFS_IOCTL(r7, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r7, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x3a}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6}, 0x70) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000001700)=0x4) close_range(r0, 0xffffffffffffffff, 0x0) 570.820654ms ago: executing program 0 (id=1047): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x20, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x2d, 0x0, @val=@netfilter={0x2, 0x1, 0x6, 0x1}}, 0x20) syz_emit_ethernet(0xbe, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "7b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af", "584cbf2649a50f2dbc43efa8698dfa871c51852e4451b57d037ad3c045942824251d7d17b5191584cdd4fbe40a27424d", "bcfd56f1373669caaa2f19935e6996c7096ffe4f3a4745a8f762b964", {"9a3bfbc1f39cb307b3472eb9cdb042d2", "643fcbb2c5a57df67d544af6e8dafe09"}}}}}}}, 0x0) 525.244368ms ago: executing program 2 (id=1048): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x66, &(0x7f0000000080)=ANY=[@ANYBLOB="69e1629b6174391e7dd7a2d786dd60b6000000302c03cb697a653e336f000000500000000000ff02000000000000000000000000000102000003"], 0x0) syz_emit_ethernet(0x66, &(0x7f0000000080)=ANY=[], 0x0) 525.011058ms ago: executing program 2 (id=1049): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000000000000000000000100000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000240)='netlink_extack\x00', r0}, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="05f3"], 0x18}}, 0x0) 524.750879ms ago: executing program 2 (id=1050): mkdir(0x0, 0x7192346c17744cfa) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xf, 0x5, &(0x7f00000015c0)=ANY=[@ANYBLOB="180200000100000000000000000000008500000087000000850000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r2, 0x0, 0x14, 0x0, &(0x7f0000000080)="f6f4e9a10000502468da5eb1c6b2feff8833c000", 0x0, 0x86, 0x0, 0x31, 0x0, &(0x7f0000000000)="daf9e846ab156efc71b59652333536dbfd26a6d0546366e36eb77dd0aaa2dbe567d168904cf0d5bce1771889c98ffc0abf", 0x0}, 0x50) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) preadv(r0, &(0x7f0000000840)=[{&(0x7f0000000040)=""/69, 0x45}, {&(0x7f0000000180)=""/102, 0x66}, {&(0x7f0000000200)}, {&(0x7f0000000300)=""/226, 0xe2}, {&(0x7f0000000400)=""/171, 0xab}, {&(0x7f0000000280)=""/12, 0xc}, {&(0x7f0000000580)=""/195, 0xc3}, {&(0x7f0000000680)=""/132, 0x84}, {&(0x7f00000004c0)=""/59, 0x3b}], 0x9, 0xb, 0x1ff) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$inet(r4, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff7a}], 0x1, &(0x7f0000007880)=ANY=[@ANYBLOB="1100000000000000004003000100000000000000000000001c00000000000000000f00fd08000000", @ANYRES32=0x0, @ANYBLOB="ac1414bbe0000001000000001c0000000000000000078f0208000000", @ANYRES32=0x0, @ANYBLOB="a00500000000000000000000240000000000000000000000070000009404000044108800000000000000000000000000000000001100000000000000000000c2d63c67000000000000000000"], 0x98}, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10) setsockopt$sock_int(r5, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r5, 0x0, 0x0, 0xc806, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) sendto$inet(r5, &(0x7f0000000100)='J', 0xfdbe, 0x4004084, 0x0, 0x11000a00) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, &(0x7f0000000400)={0x44, &(0x7f0000000640)=ANY=[@ANYBLOB="20150700000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getpid() r6 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) fchdir(r6) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) 512.03804ms ago: executing program 0 (id=1051): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 485.552212ms ago: executing program 0 (id=1052): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x70, 0x103301) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 465.144665ms ago: executing program 0 (id=1053): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x18, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000200000000000000fcffffff18110000", @ANYRES32, @ANYBLOB="0000000001000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000910000000000000085000000a000000018010000202069250895adbbe2c610ed7d43883db4f027fd00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000050000008500000006000000bf91000000000000b7020000000000090000000000000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) syz_open_dev$sg(&(0x7f0000001600), 0x0, 0x22c01) gettid() r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x60}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) io_setup(0xd6, &(0x7f0000000200)=0x0) r4 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f00000000c0)="01", 0x2020}]) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000060a0b040000000000000012020000002c000480280001800b0001006c6f6f6b75700000180002800900010073797a3003000000000000000000000f0900010073797a30000000000900020073797a32"], 0x80}, 0x1, 0x0, 0x0, 0x4}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) syz_io_uring_setup(0x80c, &(0x7f0000000440)={0x0, 0x6d83, 0x0, 0x40000000, 0x54}, &(0x7f0000000100)=0x0, &(0x7f0000000040)) syz_io_uring_submit(r7, 0x0, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(0xffffffffffffffff, 0x381b, 0x0, 0x0, 0x0, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="1500000065ffff0a0000000800395032303030938f"], 0x15) write(r8, &(0x7f0000004200)='t', 0x1) sendfile(r8, r6, 0x0, 0x3ffff) sendfile(r8, r8, 0x0, 0x7ffff000) r9 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r9, &(0x7f0000004200)='t', 0x1) sendfile(r9, r2, 0x0, 0x7ffff000) socket$nl_xfrm(0x10, 0x3, 0x6) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) 0s ago: executing program 2 (id=1054): timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040), 0x0) msgsnd(0x0, &(0x7f0000000080)={0x2}, 0x8, 0x800) kernel console output (not intermixed with test programs): syzkaller syzkaller login: [ 27.095985][ T29] kauditd_printk_skb: 45 callbacks suppressed [ 27.096003][ T29] audit: type=1400 audit(1760021639.713:57): avc: denied { transition } for pid=3291 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 27.124698][ T29] audit: type=1400 audit(1760021639.713:58): avc: denied { noatsecure } for pid=3291 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 27.144393][ T29] audit: type=1400 audit(1760021639.713:59): avc: denied { write } for pid=3291 comm="sh" path="pipe:[2406]" dev="pipefs" ino=2406 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 27.166600][ T29] audit: type=1400 audit(1760021639.713:60): avc: denied { rlimitinh } for pid=3291 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 27.185420][ T29] audit: type=1400 audit(1760021639.713:61): avc: denied { siginh } for pid=3291 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.115' (ED25519) to the list of known hosts. [ 35.622513][ T29] audit: type=1400 audit(1760021648.243:62): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 35.645566][ T29] audit: type=1400 audit(1760021648.263:63): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 35.646632][ T3302] cgroup: Unknown subsys name 'net' [ 35.673395][ T29] audit: type=1400 audit(1760021648.303:64): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 35.828602][ T3302] cgroup: Unknown subsys name 'cpuset' [ 35.834865][ T3302] cgroup: Unknown subsys name 'rlimit' [ 36.006280][ T29] audit: type=1400 audit(1760021648.623:65): avc: denied { setattr } for pid=3302 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 36.029562][ T29] audit: type=1400 audit(1760021648.623:66): avc: denied { create } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.050047][ T29] audit: type=1400 audit(1760021648.623:67): avc: denied { write } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.070486][ T29] audit: type=1400 audit(1760021648.633:68): avc: denied { read } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.079740][ T3305] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 36.090767][ T29] audit: type=1400 audit(1760021648.633:69): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 36.124216][ T29] audit: type=1400 audit(1760021648.633:70): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 36.147561][ T29] audit: type=1400 audit(1760021648.723:71): avc: denied { relabelto } for pid=3305 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 36.182848][ T3302] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 37.362138][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 37.390298][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 37.432959][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 37.487792][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.494950][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.502213][ T3316] bridge_slave_0: entered allmulticast mode [ 37.508689][ T3316] bridge_slave_0: entered promiscuous mode [ 37.535946][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.543067][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.550301][ T3316] bridge_slave_1: entered allmulticast mode [ 37.556662][ T3316] bridge_slave_1: entered promiscuous mode [ 37.573305][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.580478][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.587763][ T3313] bridge_slave_0: entered allmulticast mode [ 37.594174][ T3313] bridge_slave_0: entered promiscuous mode [ 37.610208][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.617384][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.624657][ T3313] bridge_slave_1: entered allmulticast mode [ 37.631057][ T3313] bridge_slave_1: entered promiscuous mode [ 37.650744][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.661991][ T3322] chnl_net:caif_netlink_parms(): no params data found [ 37.681625][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.690795][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 37.700626][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.726889][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.751458][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.758642][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.765765][ T3317] bridge_slave_0: entered allmulticast mode [ 37.772377][ T3317] bridge_slave_0: entered promiscuous mode [ 37.793242][ T3316] team0: Port device team_slave_0 added [ 37.801287][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.808467][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.815650][ T3317] bridge_slave_1: entered allmulticast mode [ 37.822145][ T3317] bridge_slave_1: entered promiscuous mode [ 37.834324][ T3313] team0: Port device team_slave_0 added [ 37.840794][ T3316] team0: Port device team_slave_1 added [ 37.847074][ T3313] team0: Port device team_slave_1 added [ 37.900496][ T3322] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.907640][ T3322] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.915088][ T3322] bridge_slave_0: entered allmulticast mode [ 37.921613][ T3322] bridge_slave_0: entered promiscuous mode [ 37.929107][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.940727][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.947772][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.973766][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.984720][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.991783][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 38.017795][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 38.028631][ T3322] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.035731][ T3322] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.042950][ T3322] bridge_slave_1: entered allmulticast mode [ 38.049470][ T3322] bridge_slave_1: entered promiscuous mode [ 38.056583][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.075781][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.082827][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 38.108745][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.122231][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.129210][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 38.155101][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.183638][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.190776][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.197986][ T3312] bridge_slave_0: entered allmulticast mode [ 38.204558][ T3312] bridge_slave_0: entered promiscuous mode [ 38.224368][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.233634][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.240909][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.248221][ T3312] bridge_slave_1: entered allmulticast mode [ 38.254683][ T3312] bridge_slave_1: entered promiscuous mode [ 38.270140][ T3317] team0: Port device team_slave_0 added [ 38.278155][ T3313] hsr_slave_0: entered promiscuous mode [ 38.284171][ T3313] hsr_slave_1: entered promiscuous mode [ 38.291309][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.315653][ T3317] team0: Port device team_slave_1 added [ 38.339138][ T3316] hsr_slave_0: entered promiscuous mode [ 38.345062][ T3316] hsr_slave_1: entered promiscuous mode [ 38.350923][ T3316] debugfs: 'hsr0' already exists in 'hsr' [ 38.356730][ T3316] Cannot create hsr debugfs directory [ 38.379168][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 38.386144][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 38.412193][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 38.423764][ T3322] team0: Port device team_slave_0 added [ 38.430853][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.440640][ T3322] team0: Port device team_slave_1 added [ 38.456936][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.463970][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 38.489924][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.501422][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.521460][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 38.528486][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 38.554386][ T3322] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 38.567925][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.574907][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 38.600916][ T3322] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.624434][ T3312] team0: Port device team_slave_0 added [ 38.633269][ T3312] team0: Port device team_slave_1 added [ 38.656451][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 38.663629][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 38.689787][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 38.701591][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.708577][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 38.734657][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.785161][ T3322] hsr_slave_0: entered promiscuous mode [ 38.791349][ T3322] hsr_slave_1: entered promiscuous mode [ 38.797238][ T3322] debugfs: 'hsr0' already exists in 'hsr' [ 38.803010][ T3322] Cannot create hsr debugfs directory [ 38.810977][ T3317] hsr_slave_0: entered promiscuous mode [ 38.817214][ T3317] hsr_slave_1: entered promiscuous mode [ 38.823358][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 38.829193][ T3317] Cannot create hsr debugfs directory [ 38.885329][ T3312] hsr_slave_0: entered promiscuous mode [ 38.891753][ T3312] hsr_slave_1: entered promiscuous mode [ 38.897729][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 38.903474][ T3312] Cannot create hsr debugfs directory [ 39.042469][ T3316] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 39.054649][ T3316] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 39.063491][ T3316] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 39.074919][ T3316] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 39.105048][ T3313] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 39.119522][ T3313] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 39.135209][ T3313] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 39.145607][ T3313] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 39.154306][ T3322] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 39.168680][ T3322] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 39.177478][ T3322] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 39.190830][ T3322] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 39.223974][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.248243][ T3317] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 39.259267][ T3317] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 39.269999][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.277329][ T3317] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 39.287419][ T3317] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 39.313446][ T2107] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.320640][ T2107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.339172][ T2107] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.346327][ T2107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.369254][ T3312] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 39.385541][ T3312] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 39.395154][ T3312] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 39.404216][ T3312] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 39.445291][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.467210][ T3322] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.493113][ T299] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.500276][ T299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.510667][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.523532][ T299] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.530636][ T299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.542648][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.558754][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.570155][ T299] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.577214][ T299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.589558][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.602542][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.609705][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.625765][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.639069][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.646134][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.664891][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.688892][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.696000][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.717580][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.748928][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.756108][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.775852][ T3317] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 39.786319][ T3317] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 39.811525][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.818631][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.842032][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.856889][ T3312] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 39.881826][ T3316] veth0_vlan: entered promiscuous mode [ 39.900263][ T3316] veth1_vlan: entered promiscuous mode [ 39.909697][ T3322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.970395][ T3316] veth0_macvtap: entered promiscuous mode [ 39.981043][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.997364][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.005720][ T3316] veth1_macvtap: entered promiscuous mode [ 40.025491][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.064367][ T3313] veth0_vlan: entered promiscuous mode [ 40.081025][ T3313] veth1_vlan: entered promiscuous mode [ 40.099078][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.140295][ T2107] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.161553][ T3313] veth0_macvtap: entered promiscuous mode [ 40.170553][ T2107] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.187685][ T3322] veth0_vlan: entered promiscuous mode [ 40.193628][ T2107] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.205764][ T2107] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.221576][ T3313] veth1_macvtap: entered promiscuous mode [ 40.231135][ T3317] veth0_vlan: entered promiscuous mode [ 40.253596][ T3322] veth1_vlan: entered promiscuous mode [ 40.267807][ T3317] veth1_vlan: entered promiscuous mode [ 40.275354][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.292219][ T3312] veth0_vlan: entered promiscuous mode [ 40.298388][ T3316] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 40.299862][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.326485][ T3312] veth1_vlan: entered promiscuous mode [ 40.334771][ T31] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.346094][ T31] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.377206][ T31] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.389208][ T3317] veth0_macvtap: entered promiscuous mode [ 40.397135][ T31] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.407597][ T3312] veth0_macvtap: entered promiscuous mode [ 40.422925][ T3317] veth1_macvtap: entered promiscuous mode [ 40.437254][ T3322] veth0_macvtap: entered promiscuous mode [ 40.444529][ T3312] veth1_macvtap: entered promiscuous mode [ 40.454530][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.471801][ T3322] veth1_macvtap: entered promiscuous mode [ 40.489633][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.501177][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.510372][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.529550][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.539788][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.552399][ T2107] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.570959][ T2107] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.591776][ T2107] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.604318][ T3488] loop1: detected capacity change from 0 to 512 [ 40.621481][ T2107] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.641834][ T2107] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.659220][ T3488] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 40.672538][ T3488] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 40.677396][ T2107] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.692404][ T12] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.702387][ T12] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.711234][ T12] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.720825][ T12] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.729804][ T12] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.739022][ T12] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.753303][ T3488] EXT4-fs (loop1): 1 truncate cleaned up [ 40.785486][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 40.785501][ T29] audit: type=1400 audit(1760021653.403:97): avc: denied { create } for pid=3499 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 40.818215][ T3488] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.868596][ T29] audit: type=1326 audit(1760021653.423:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3500 comm="syz.4.5" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f770d31eec9 code=0x7ffc0000 [ 40.891729][ T29] audit: type=1326 audit(1760021653.423:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3500 comm="syz.4.5" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f770d31eec9 code=0x7ffc0000 [ 40.914792][ T29] audit: type=1326 audit(1760021653.423:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3500 comm="syz.4.5" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7f770d31eec9 code=0x7ffc0000 [ 40.937798][ T29] audit: type=1326 audit(1760021653.423:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3500 comm="syz.4.5" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f770d31eec9 code=0x7ffc0000 [ 40.943343][ T3511] loop2: detected capacity change from 0 to 512 [ 40.960929][ T29] audit: type=1326 audit(1760021653.423:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3500 comm="syz.4.5" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f770d31eec9 code=0x7ffc0000 [ 40.960965][ T29] audit: type=1326 audit(1760021653.423:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3500 comm="syz.4.5" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f770d31eec9 code=0x7ffc0000 [ 40.992424][ T3488] EXT4-fs (loop1): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 41.013416][ T29] audit: type=1400 audit(1760021653.453:104): avc: denied { ioctl } for pid=3499 comm="syz.0.9" path="socket:[4626]" dev="sockfs" ino=4626 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 41.013467][ T29] audit: type=1400 audit(1760021653.453:105): avc: denied { write } for pid=3499 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 41.057462][ T3511] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 41.065425][ T29] audit: type=1400 audit(1760021653.473:106): avc: denied { mount } for pid=3487 comm="syz.1.8" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 41.153450][ T3511] EXT4-fs (loop2): 1 truncate cleaned up [ 41.160093][ T3511] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 41.173681][ T3518] netlink: 96 bytes leftover after parsing attributes in process `syz.0.14'. [ 41.208779][ T3511] EXT4-fs error (device loop2): ext4_find_dest_de:2052: inode #2: block 13: comm syz.2.11: bad entry in directory: rec_len is smaller than minimal - offset=24, inode=11, rec_len=8, size=1024 fake=0 [ 41.235733][ T3511] EXT4-fs (loop2): Remounting filesystem read-only [ 41.296488][ T3316] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.318963][ T3317] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.346137][ T3528] loop3: detected capacity change from 0 to 512 [ 41.384337][ T3536] loop4: detected capacity change from 0 to 1024 [ 41.391582][ T3528] EXT4-fs: test_dummy_encryption option not supported [ 41.409461][ T3541] capability: warning: `syz.1.19' uses 32-bit capabilities (legacy support in use) [ 41.428361][ T3536] ======================================================= [ 41.428361][ T3536] WARNING: The mand mount option has been deprecated and [ 41.428361][ T3536] and is ignored by this kernel. Remove the mand [ 41.428361][ T3536] option from the mount to silence this warning. [ 41.428361][ T3536] ======================================================= [ 41.440980][ T3528] loop3: detected capacity change from 0 to 512 [ 41.485626][ T3536] EXT4-fs: Ignoring removed nomblk_io_submit option [ 41.492317][ T3536] EXT4-fs: inline encryption not supported [ 41.498187][ T3536] EXT4-fs: Ignoring removed i_version option [ 41.550295][ T3536] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.592236][ T3536] EXT4-fs (loop4): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 41.601071][ T3528] ------------[ cut here ]------------ [ 41.606555][ T3528] EA inode 11 i_nlink=2 [ 41.606888][ T3528] WARNING: CPU: 1 PID: 3528 at fs/ext4/xattr.c:1058 ext4_xattr_inode_update_ref+0x36a/0x380 [ 41.621376][ T3528] Modules linked in: [ 41.621405][ T3528] CPU: 1 UID: 0 PID: 3528 Comm: syz.3.20 Not tainted syzkaller #0 PREEMPT(voluntary) [ 41.621429][ T3528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 41.621442][ T3528] RIP: 0010:ext4_xattr_inode_update_ref+0x36a/0x380 [ 41.621492][ T3528] Code: 90 49 8d 7e 40 e8 26 03 b9 ff 4d 8b 6e 40 4c 89 e7 e8 3a fe b8 ff 41 8b 56 48 48 c7 c7 97 4c 55 86 4c 89 ee e8 a7 15 68 ff 90 <0f> 0b 90 90 e9 ff fe ff ff e8 e8 73 b0 03 0f 1f 84 00 00 00 00 00 [ 41.621587][ T3528] RSP: 0000:ffffc90001d575a0 EFLAGS: 00010246 [ 41.621602][ T3528] RAX: 53474841951ab300 RBX: ffff88811a428600 RCX: 0000000000080000 [ 41.621618][ T3528] RDX: ffffc90005345000 RSI: 0000000000003bd2 RDI: 0000000000003bd3 [ 41.621649][ T3528] RBP: 0000000000000002 R08: 0001c90001d57427 R09: 0000000000000000 [ 41.621661][ T3528] R10: 00000000ffffffff R11: 0000000000000002 R12: ffff88811a4285b0 [ 41.621674][ T3528] R13: 000000000000000b R14: ffff88811a428568 R15: 0000000000000001 [ 41.621686][ T3528] FS: 00007f42ffa2f6c0(0000) GS:ffff8882aef3a000(0000) knlGS:0000000000000000 [ 41.621702][ T3528] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.621774][ T3528] CR2: 00005564738b8040 CR3: 000000011ade0000 CR4: 00000000003506f0 [ 41.621795][ T3528] Call Trace: [ 41.621803][ T3528] [ 41.621817][ T3528] ext4_xattr_set_entry+0x77f/0x1020 [ 41.621865][ T3528] ext4_xattr_ibody_set+0x184/0x3c0 [ 41.621979][ T3528] ext4_expand_extra_isize_ea+0xcbb/0x11f0 [ 41.622043][ T3528] __ext4_expand_extra_isize+0x246/0x280 [ 41.622074][ T3528] __ext4_mark_inode_dirty+0x29d/0x3f0 [ 41.622117][ T3528] ext4_evict_inode+0x80e/0xd90 [ 41.622150][ T3528] ? __pfx_ext4_evict_inode+0x10/0x10 [ 41.622206][ T3528] evict+0x2e0/0x550 [ 41.622244][ T3528] ? __dquot_initialize+0x146/0x7c0 [ 41.622308][ T3528] iput+0x4ed/0x650 [ 41.622338][ T3528] ext4_process_orphan+0x1a9/0x1c0 [ 41.622369][ T3528] ext4_orphan_cleanup+0x6a8/0xa00 [ 41.622401][ T3528] ext4_fill_super+0x3483/0x3810 [ 41.622425][ T3528] ? snprintf+0x86/0xb0 [ 41.622453][ T3528] ? set_blocksize+0x1a8/0x310 [ 41.622476][ T3528] ? sb_set_blocksize+0xe3/0x100 [ 41.622500][ T3528] ? setup_bdev_super+0x30e/0x370 [ 41.622529][ T3528] ? __pfx_ext4_fill_super+0x10/0x10 [ 41.622591][ T3528] get_tree_bdev_flags+0x28e/0x300 [ 41.622614][ T3528] ? __pfx_ext4_fill_super+0x10/0x10 [ 41.622647][ T3528] get_tree_bdev+0x1f/0x30 [ 41.622675][ T3528] ext4_get_tree+0x1c/0x30 [ 41.622732][ T3528] vfs_get_tree+0x57/0x1d0 [ 41.622761][ T3528] do_new_mount+0x24d/0x660 [ 41.622789][ T3528] path_mount+0x4a5/0xb70 [ 41.622851][ T3528] ? user_path_at+0x109/0x130 [ 41.622894][ T3528] __se_sys_mount+0x28c/0x2e0 [ 41.622920][ T3528] ? do_mkdirat+0x3ac/0x3f0 [ 41.622991][ T3528] __x64_sys_mount+0x67/0x80 [ 41.623020][ T3528] x64_sys_call+0x2b51/0x3000 [ 41.623048][ T3528] do_syscall_64+0xd2/0x200 [ 41.623077][ T3528] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 41.623128][ T3528] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 41.623155][ T3528] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.623219][ T3528] RIP: 0033:0x7f4300fd066a [ 41.623240][ T3528] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.623256][ T3528] RSP: 002b:00007f42ffa2ee68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 41.623350][ T3528] RAX: ffffffffffffffda RBX: 00007f42ffa2eef0 RCX: 00007f4300fd066a [ 41.623433][ T3528] RDX: 0000200000000180 RSI: 00002000000001c0 RDI: 00007f42ffa2eeb0 [ 41.623451][ T3528] RBP: 0000200000000180 R08: 00007f42ffa2eef0 R09: 0000000001800700 [ 41.623468][ T3528] R10: 0000000001800700 R11: 0000000000000246 R12: 00002000000001c0 [ 41.623485][ T3528] R13: 00007f42ffa2eeb0 R14: 000000000000047c R15: 00002000000004c0 [ 41.623508][ T3528] [ 41.623516][ T3528] ---[ end trace 0000000000000000 ]--- [ 41.629290][ T3528] EXT4-fs (loop3): 1 orphan inode deleted [ 42.010251][ T3312] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.010726][ T3528] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 42.068623][ T3528] syz.3.20 (3528) used greatest stack depth: 10680 bytes left [ 42.081153][ T3322] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.182171][ T3575] loop4: detected capacity change from 0 to 512 [ 42.198643][ T3575] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 42.198764][ T3575] ext4 filesystem being mounted at /8/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 42.249067][ T3312] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.797301][ T3645] loop1: detected capacity change from 0 to 512 [ 42.809633][ T3645] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 42.822643][ T3645] ext4 filesystem being mounted at /15/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 42.845801][ T3316] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.238569][ T3651] loop1: detected capacity change from 0 to 1024 [ 43.245492][ T3651] EXT4-fs: Ignoring removed orlov option [ 43.254022][ T3651] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 43.267354][ T3651] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.295919][ T3409] IPVS: starting estimator thread 0... [ 43.330785][ T3662] netlink: 16 bytes leftover after parsing attributes in process `syz.4.71'. [ 43.341999][ T3662] syz.4.71 uses obsolete (PF_INET,SOCK_PACKET) [ 43.350059][ T3662] capability: warning: `syz.4.71' uses deprecated v2 capabilities in a way that may be insecure [ 43.387924][ T3660] IPVS: using max 2256 ests per chain, 112800 per kthread [ 44.033214][ T3733] netlink: 16 bytes leftover after parsing attributes in process `syz.3.104'. [ 44.217101][ T3753] netlink: 16 bytes leftover after parsing attributes in process `syz.3.115'. [ 44.392292][ T3779] netlink: 16 bytes leftover after parsing attributes in process `syz.1.127'. [ 45.806260][ T29] kauditd_printk_skb: 414 callbacks suppressed [ 45.806277][ T29] audit: type=1400 audit(1760021658.423:521): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.054478][ T3931] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 46.089014][ T3931] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 46.104019][ T29] audit: type=1400 audit(1760021658.473:522): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 46.128375][ T29] audit: type=1400 audit(1760021658.623:523): avc: denied { prog_load } for pid=3929 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 46.147383][ T29] audit: type=1400 audit(1760021658.623:524): avc: denied { map_create } for pid=3929 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 46.166415][ T29] audit: type=1400 audit(1760021658.623:525): avc: denied { prog_load } for pid=3929 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 46.185392][ T29] audit: type=1400 audit(1760021658.623:526): avc: denied { prog_load } for pid=3929 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 46.204303][ T29] audit: type=1400 audit(1760021658.623:527): avc: denied { prog_load } for pid=3929 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 46.223321][ T29] audit: type=1400 audit(1760021658.623:528): avc: denied { prog_load } for pid=3929 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 46.242274][ T29] audit: type=1400 audit(1760021658.623:529): avc: denied { open } for pid=3929 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 46.261399][ T29] audit: type=1400 audit(1760021658.623:530): avc: denied { open } for pid=3929 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 46.714859][ T3967] netlink: 16 bytes leftover after parsing attributes in process `syz.1.215'. [ 47.347520][ T4003] netlink: 'syz.3.232': attribute type 1 has an invalid length. [ 47.355238][ T4003] netlink: 16126 bytes leftover after parsing attributes in process `syz.3.232'. [ 49.553628][ T4148] Zero length message leads to an empty skb [ 50.485954][ T4176] netlink: 16 bytes leftover after parsing attributes in process `syz.4.308'. [ 50.819123][ T29] kauditd_printk_skb: 463 callbacks suppressed [ 50.819141][ T29] audit: type=1400 audit(1760021663.443:994): avc: denied { read write } for pid=3322 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 50.860997][ T4197] sock: sock_timestamping_bind_phc: sock not bind to device [ 50.881628][ T4199] netlink: 16 bytes leftover after parsing attributes in process `syz.4.319'. [ 50.921380][ T29] audit: type=1400 audit(1760021663.473:995): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 50.945680][ T29] audit: type=1400 audit(1760021663.483:996): avc: denied { name_bind } for pid=4195 comm="syz.3.318" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 50.967301][ T29] audit: type=1400 audit(1760021663.493:997): avc: denied { open } for pid=4198 comm="syz.4.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 50.986413][ T29] audit: type=1400 audit(1760021663.493:998): avc: denied { prog_load } for pid=4198 comm="syz.4.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 51.005505][ T29] audit: type=1400 audit(1760021663.503:999): avc: denied { create } for pid=4198 comm="syz.4.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 51.025921][ T29] audit: type=1400 audit(1760021663.513:1000): avc: denied { read write } for pid=3322 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.050303][ T29] audit: type=1400 audit(1760021663.513:1001): avc: denied { prog_load } for pid=4198 comm="syz.4.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 51.069337][ T29] audit: type=1400 audit(1760021663.513:1002): avc: denied { prog_load } for pid=4198 comm="syz.4.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 51.088474][ T29] audit: type=1400 audit(1760021663.513:1003): avc: denied { create } for pid=4198 comm="syz.4.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 51.977786][ T4257] IPv6: NLM_F_CREATE should be specified when creating new route [ 52.333104][ T4286] netlink: 176 bytes leftover after parsing attributes in process `syz.0.356'. [ 52.386784][ T4289] netlink: 16 bytes leftover after parsing attributes in process `syz.2.360'. [ 52.947714][ T4318] netlink: 16 bytes leftover after parsing attributes in process `syz.2.372'. [ 53.938004][ T4387] $Hÿ: renamed from bond0 (while UP) [ 53.945453][ T4387] $Hÿ: entered promiscuous mode [ 53.950581][ T4387] bond_slave_0: entered promiscuous mode [ 53.956323][ T4387] bond_slave_1: entered promiscuous mode [ 54.928032][ T4438] netlink: 8 bytes leftover after parsing attributes in process `syz.2.424'. [ 54.936865][ T4438] netlink: 'syz.2.424': attribute type 21 has an invalid length. [ 55.085651][ T4455] netlink: 'syz.0.432': attribute type 21 has an invalid length. [ 55.093868][ T4455] netlink: 'syz.0.432': attribute type 1 has an invalid length. [ 55.101549][ T4455] netlink: 144 bytes leftover after parsing attributes in process `syz.0.432'. [ 55.651894][ T4478] netlink: 16 bytes leftover after parsing attributes in process `syz.2.443'. [ 55.824926][ T4493] sch_tbf: burst 6 is lower than device ip6gre0 mtu (1448) ! [ 55.852079][ T29] kauditd_printk_skb: 588 callbacks suppressed [ 55.852116][ T29] audit: type=1400 audit(1760021668.473:1592): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 56.010353][ T29] audit: type=1400 audit(1760021668.503:1593): avc: denied { append } for pid=4490 comm="syz.1.448" name="sg0" dev="devtmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 56.034083][ T29] audit: type=1400 audit(1760021668.503:1594): avc: denied { create } for pid=4490 comm="syz.1.448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 56.054637][ T29] audit: type=1400 audit(1760021668.503:1595): avc: denied { read write } for pid=4490 comm="syz.1.448" name="qrtr-tun" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 56.077927][ T29] audit: type=1400 audit(1760021668.503:1596): avc: denied { read write } for pid=4490 comm="syz.1.448" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 56.101874][ T29] audit: type=1400 audit(1760021668.503:1597): avc: denied { create } for pid=4490 comm="syz.1.448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 56.123306][ T29] audit: type=1400 audit(1760021668.503:1598): avc: denied { allowed } for pid=4490 comm="syz.1.448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 56.142656][ T29] audit: type=1400 audit(1760021668.533:1599): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 56.166900][ T29] audit: type=1400 audit(1760021668.593:1600): avc: denied { create } for pid=4495 comm="syz.4.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 56.186350][ T29] audit: type=1400 audit(1760021668.593:1601): avc: denied { create } for pid=4495 comm="syz.4.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 59.295858][ T4696] IPv6: NLM_F_CREATE should be specified when creating new route [ 59.740294][ T4737] netlink: 16 bytes leftover after parsing attributes in process `syz.1.557'. [ 60.063193][ T4759] netlink: 8 bytes leftover after parsing attributes in process `syz.2.567'. [ 60.121233][ T4763] netlink: 16 bytes leftover after parsing attributes in process `syz.2.569'. [ 60.329206][ T4776] IPv6: Can't replace route, no match found [ 60.898597][ T29] kauditd_printk_skb: 532 callbacks suppressed [ 60.898614][ T29] audit: type=1400 audit(1760021673.523:2134): avc: denied { name_bind } for pid=4803 comm="syz.0.587" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 60.995762][ T29] audit: type=1400 audit(1760021673.583:2135): avc: denied { read write } for pid=3322 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 61.020042][ T29] audit: type=1400 audit(1760021673.583:2136): avc: denied { prog_load } for pid=4805 comm="syz.3.588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 61.039094][ T29] audit: type=1326 audit(1760021673.583:2137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4805 comm="syz.3.588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4300fceec9 code=0x7ffc0000 [ 61.062487][ T29] audit: type=1326 audit(1760021673.583:2138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4805 comm="syz.3.588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4300fceec9 code=0x7ffc0000 [ 61.085862][ T29] audit: type=1326 audit(1760021673.583:2139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4805 comm="syz.3.588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=12 compat=0 ip=0x7f4300fceec9 code=0x7ffc0000 [ 61.109189][ T29] audit: type=1326 audit(1760021673.583:2140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4805 comm="syz.3.588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4300fceec9 code=0x7ffc0000 [ 61.132520][ T29] audit: type=1326 audit(1760021673.583:2141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4805 comm="syz.3.588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4300fceec9 code=0x7ffc0000 [ 61.155845][ T29] audit: type=1400 audit(1760021673.593:2142): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 61.180148][ T29] audit: type=1400 audit(1760021673.603:2143): avc: denied { read write } for pid=3322 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 61.181024][ T4812] netlink: 176 bytes leftover after parsing attributes in process `syz.1.591'. [ 61.836090][ T4852] netlink: 8 bytes leftover after parsing attributes in process `syz.2.608'. [ 61.897120][ T4856] netlink: 3 bytes leftover after parsing attributes in process `syz.1.610'. [ 61.990052][ T4856] batadv1: entered promiscuous mode [ 61.995305][ T4856] batadv1: entered allmulticast mode [ 62.375567][ T4884] IPv6: Can't replace route, no match found [ 63.182694][ T4956] netlink: 'syz.4.658': attribute type 21 has an invalid length. [ 63.198200][ T4956] netlink: 132 bytes leftover after parsing attributes in process `syz.4.658'. [ 63.815435][ T4981] bond0: entered promiscuous mode [ 63.820631][ T4981] bond0: entered allmulticast mode [ 63.826110][ T4981] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.865779][ T4981] bond0 (unregistering): Released all slaves [ 64.791905][ T5050] netlink: 68 bytes leftover after parsing attributes in process `syz.0.698'. [ 65.349930][ T5077] veth0_to_team: entered promiscuous mode [ 65.899994][ T5114] pim6reg0: tun_chr_ioctl cmd 1074812118 [ 65.912091][ T29] kauditd_printk_skb: 632 callbacks suppressed [ 65.912108][ T29] audit: type=1400 audit(1760021678.533:2776): avc: denied { read write } for pid=3322 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.961711][ T29] audit: type=1400 audit(1760021678.583:2777): avc: denied { map_create } for pid=5107 comm="syz.4.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 65.984986][ T29] audit: type=1400 audit(1760021678.603:2778): avc: denied { prog_load } for pid=5107 comm="syz.4.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 66.004100][ T29] audit: type=1400 audit(1760021678.603:2779): avc: denied { mounton } for pid=5107 comm="syz.4.726" path="/130/file0" dev="tmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 66.026764][ T29] audit: type=1400 audit(1760021678.603:2780): avc: denied { write } for pid=5107 comm="syz.4.726" name="001" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 66.049531][ T29] audit: type=1400 audit(1760021678.603:2781): avc: denied { read } for pid=5107 comm="syz.4.726" name="event2" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 66.072745][ T29] audit: type=1400 audit(1760021678.603:2782): avc: denied { prog_load } for pid=5107 comm="syz.4.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 66.142382][ T29] audit: type=1400 audit(1760021678.763:2783): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 66.169529][ T29] audit: type=1400 audit(1760021678.793:2784): avc: denied { read } for pid=5116 comm="syz.3.731" dev="nsfs" ino=4026532672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 66.191723][ T29] audit: type=1400 audit(1760021678.813:2785): avc: denied { open } for pid=5118 comm="syz.0.730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 66.381627][ T5134] erspan0: entered promiscuous mode [ 66.499072][ T5153] netlink: 28 bytes leftover after parsing attributes in process `syz.1.745'. [ 67.010128][ T5223] netlink: 'syz.3.781': attribute type 3 has an invalid length. [ 67.017879][ T5223] netlink: 8 bytes leftover after parsing attributes in process `syz.3.781'. [ 69.002224][ T5345] netlink: 16 bytes leftover after parsing attributes in process `syz.0.835'. [ 69.011145][ T5345] netlink: 116 bytes leftover after parsing attributes in process `syz.0.835'. [ 69.135687][ T5357] netlink: 27 bytes leftover after parsing attributes in process `syz.0.841'. [ 70.503536][ T5502] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 70.923487][ T29] kauditd_printk_skb: 738 callbacks suppressed [ 70.923505][ T29] audit: type=1400 audit(1760021683.543:3524): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.025352][ T29] audit: type=1400 audit(1760021683.543:3525): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.049707][ T29] audit: type=1400 audit(1760021683.563:3526): avc: denied { create } for pid=5558 comm="syz.1.935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 71.069265][ T29] audit: type=1400 audit(1760021683.563:3527): avc: denied { create } for pid=5558 comm="syz.1.935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 71.089842][ T29] audit: type=1400 audit(1760021683.563:3528): avc: denied { open } for pid=5558 comm="syz.1.935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 71.109014][ T29] audit: type=1400 audit(1760021683.563:3529): avc: denied { prog_load } for pid=5558 comm="syz.1.935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 71.128079][ T29] audit: type=1400 audit(1760021683.563:3530): avc: denied { prog_load } for pid=5558 comm="syz.1.935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 71.147251][ T29] audit: type=1400 audit(1760021683.563:3531): avc: denied { read } for pid=5558 comm="syz.1.935" name="sg0" dev="devtmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 71.170707][ T29] audit: type=1400 audit(1760021683.563:3532): avc: denied { map_create } for pid=5558 comm="syz.1.935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 71.190100][ T29] audit: type=1400 audit(1760021683.563:3533): avc: denied { prog_load } for pid=5558 comm="syz.1.935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 71.394550][ T5582] netlink: 16 bytes leftover after parsing attributes in process `syz.3.944'. [ 71.572091][ T5599] syz.4.952 (5599) used greatest stack depth: 9384 bytes left [ 71.875929][ T5625] IPv6: Can't replace route, no match found [ 72.394691][ T5672] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 72.645304][ T5693] netdevsim netdevsim3: loading /lib/firmware/. failed with error -22 [ 72.653658][ T5693] netdevsim netdevsim3: Direct firmware load for . failed with error -22 [ 74.178013][ T5811] ================================================================== [ 74.186160][ T5811] BUG: KCSAN: data-race in touch_atime / touch_atime [ 74.192880][ T5811] [ 74.195212][ T5811] write to 0xffff88811aa49260 of 4 bytes by task 5810 on cpu 0: [ 74.202887][ T5811] touch_atime+0x1e8/0x340 [ 74.207336][ T5811] shmem_file_read_iter+0x477/0x540 [ 74.212551][ T5811] copy_splice_read+0x43f/0x660 [ 74.217425][ T5811] splice_direct_to_actor+0x290/0x680 [ 74.222807][ T5811] do_splice_direct+0xda/0x150 [ 74.227579][ T5811] do_sendfile+0x380/0x650 [ 74.232033][ T5811] __x64_sys_sendfile64+0x105/0x150 [ 74.237272][ T5811] x64_sys_call+0x2bb4/0x3000 [ 74.241995][ T5811] do_syscall_64+0xd2/0x200 [ 74.246539][ T5811] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 74.252441][ T5811] [ 74.254770][ T5811] read to 0xffff88811aa49260 of 4 bytes by task 5811 on cpu 1: [ 74.262314][ T5811] touch_atime+0x194/0x340 [ 74.266749][ T5811] shmem_file_read_iter+0x477/0x540 [ 74.272063][ T5811] copy_splice_read+0x43f/0x660 [ 74.276939][ T5811] splice_direct_to_actor+0x290/0x680 [ 74.282331][ T5811] do_splice_direct+0xda/0x150 [ 74.287193][ T5811] do_sendfile+0x380/0x650 [ 74.291641][ T5811] __x64_sys_sendfile64+0x105/0x150 [ 74.296858][ T5811] x64_sys_call+0x2bb4/0x3000 [ 74.301558][ T5811] do_syscall_64+0xd2/0x200 [ 74.306076][ T5811] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 74.311978][ T5811] [ 74.314305][ T5811] value changed: 0x2f4f86e8 -> 0x2fe81d68 [ 74.320018][ T5811] [ 74.322336][ T5811] Reported by Kernel Concurrency Sanitizer on: [ 74.328490][ T5811] CPU: 1 UID: 0 PID: 5811 Comm: syz.0.1053 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 74.339788][ T5811] Tainted: [W]=WARN [ 74.343592][ T5811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 74.353647][ T5811] ==================================================================