last executing test programs: 3m8.83975755s ago: executing program 2 (id=397): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f00000004c0)={[{@acl}, {@barrier}, {@barrier_val}, {@sysvgroups}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@resuid}, {@nodelalloc}, {@acl}, {@noinit_itable}]}, 0xfc, 0x587, &(0x7f0000002100)="$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") socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xd, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x3, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) chdir(&(0x7f0000000100)='./file0\x00') link(&(0x7f0000000200)='./file1\x00', &(0x7f0000000300)='./bus\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) link(&(0x7f0000000440)='./file0\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') 3m8.447662007s ago: executing program 2 (id=404): bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0b00000007000000d7c900000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000005000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r3 = socket(0x10, 0x3, 0x0) connect$netlink(r3, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) sendmsg$nl_route_sched(r3, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x18, 0x30, 0x829, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) 3m8.168826101s ago: executing program 2 (id=408): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x3000046, &(0x7f0000000240)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@resgid}, {@debug}, {@jqfmt_vfsv0}, {@nobh}, {@errors_continue}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000001080)="$eJzs3d9rW1UcAPDvTdv91nUwhopIYQ9O5tK19ccEH+aj6HCg7zO0d2U0WUaTjrUO3B7ciy8yBBEH4ru++zj8B/wrBjoYMoo++BK56U2XrUmbddnSmc8Hbjkn9ybnfnPv9/TcnBsSwNCayP4UIl6OiG+SiIMRkeTrRiNfObG23er9q7PZkkSj8elfSXO7rN56rdbz9ueVlyLit68ijhc2tltbXlkolcvpYl6frFcuTdaWV05cqJTm0/n04vTMzKm3Z6bfe/edvsX6xtl/vv/k9oenvj66+t0vdw/dTOJ0HMjXtcfxBK61VyZiIn9PxuL0IxtO9aGxnSQZ9A6wLSN5no9F1gccjJE864H/vy8jogEMqUT+w5BqjQNa1/Z9ug5+btz7YO0CaGP8o2ufjcSe5rXRvtXkoSuj7Hp3vA/tZ238+uetm9kS/fscAmBL165HxMnR0Y39X5L3f9t3sodtHm1D/wfPzu1s/PNmp/FPYX38Ex3GP/s75O52bJ3/hbt9aKarbPz3fsfx7/qk1fhIXnuhOeYbS85fKKdZ3/ZiRByLsd1ZfbP5nFOrdxrd1rWP/7Ila781Fsz34+7o7oefM1eql54k5nb3rke80nH8m6wf/6TD8c/ej7M9tnEkvfVat3Vbx/90NX6KeL3j8X8wo5VsPj852TwfJltnxUZ/3zjye7f2Bx1/dvz3bR7/eNI+X1t7/DZ+3PNv2m3dQ/FH7+f/ruSzZnlX/tiVUr2+OBWxK/l44+PTD57bqre2z+I/dnTz/q/T+b83Ij7vMf4bh39+taf4B3T85x7r+D9+4c5HX/zQrf3e+r+3mqVj+SO99H+97uCTvHcAAAAAAACw0xQi4kAkheJ6uVAoFtfu7zgc+wrlaq1+/Hx16eJcNL8rOx5jhdZM98G2+yGm8vthW/XpR+ozEXEoIr4d2dusF2er5blBBw8AAAAAAAAAAAAAAAAAAAA7xP4u3//P/DEy6L0Dnjo/+Q3Da8v878cvPQE7kv//MLzkPwwv+Q/DS/7D8JL/MLzkPwwv+Q/DS/4DAAAAAAAAAAAAAAAAAAAAAAAAAABAX509cyZbGqv3r85m9bnLy0sL1csn5tLaQrGyNFucrS5eKs5Xq/PltDhbrWz1euVq9dLUdCxdmayntfpkbXnlXKW6dLF+7kKlNJ+eS8eeSVQAAAAAAAAAAAAAAAAAAADwfKktryyUyuV0UUFhW4XRnbEbCn0uDLpnAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAH/gsAAP//6AY3sQ==") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) fallocate(r0, 0x0, 0x0, 0x8000c62) write$binfmt_elf64(r0, 0x0, 0x478) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x0) pwritev2(r3, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0x1}], 0x1, 0x8, 0x0, 0x2) 3m7.903029066s ago: executing program 2 (id=415): unshare(0x20050880) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x408cd, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x8000, &(0x7f0000000480)=ANY=[@ANYBLOB="002918d910d46be7099c66b02010b1f0b7c3dc1dabe625969fb0adc922385af53d57a1d35dd71c90d9dd649b53142dd3d4108b4c7db82e8475d5bb6fa2fa626cd92c7326ce1ba2f33b0aef2b2164e01d910058b51684696959ea7f5a607a6572d2640cf9312a07000000260e3651a0cbfd2c080990fb4c76e9e613a759863734a70d0600ec77e8ba76aacbb21e4b903aa4873a9951f269a9c0f87805a1a0cbdf6b8644a1de05a8d9dd9687d67c8af7f68cb59e60d1fbefb49b93d6b72cce4162edc4468a13987d94d428df36915621aeff6dc1358a7331fa69e05c417c2e1e6b8dc29c496c76d02dfc2d7b48616fb3f01b221f4f8f484a00090964922de8909a1f9f7ef655a12a68a56cb341a8fba4cd81cedec9cb518d13d2a2564427b63b037494748a24daa21fe1256df68d000b2778bf0437cc642cd83c5a1b34eeffdf93ecbd85bb340eeef68dd60101769c74f94d217264c171feea0305bfc87c36247d90b129a9973f00000001d99b195d2f75653a0193672783c6dbca5d1445110621d8095064f0a034f492cf5aa4767a772d6f4967722546bfd83d3202f76c20a9d7f40f9e7818d77129df7fd072804e0227ecaa03dddd303a318d6f7763ce011543587e6a306780ca2f37db7e8a5b64a5059ac91ff2110e40ea13d70e1504653ba9eebcf61b427797fb3fd79d2bb9aaa13c9729fe323c4ac222991981381e004684fb200b17d2f6ede181067662ad8a31f45b613869ca8fc5b1dbe62407a1f6dcb86a4c430210e9bcfca9b83283b87316c4d17f388e0bab0500000092a82e12f8e5348f11e7739033e9081bfc598746cf032fa55d0300470000000019ac65f89ca7d96da3ca2db52f8ec80462fddf42dbbca24b720000000000000000000000000000005214e7febdbc0033d6402c34aa96940474"], 0x1, 0x1221, &(0x7f0000002300)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x201000, 0x0) r0 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x0) preadv2(r0, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x100000000000000d, 0x0, 0x0, 0x0) 3m7.66473341s ago: executing program 2 (id=418): syz_usb_connect$hid(0x5, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000000000106a"], 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r2, 0x25, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x80, 0x7}) fcntl$lock(r2, 0x25, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x80000000}) 3m7.284482176s ago: executing program 2 (id=423): ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7) r0 = syz_clone(0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x3e, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x43, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000380), 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r2}, 0x18) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000240)={&(0x7f0000000180)=""/120, 0xffffffffffffff28}) 3m7.284201166s ago: executing program 32 (id=423): ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7) r0 = syz_clone(0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x3e, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x43, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000380), 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r2}, 0x18) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000240)={&(0x7f0000000180)=""/120, 0xffffffffffffff28}) 1.305192448s ago: executing program 5 (id=5648): bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@newtfilter={0x5c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xa}, {}, {0xffff}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x2c, 0x2, [@TCA_CGROUP_EMATCHES={0x28, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x1c, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x2, 0x1, 0xfff}, {0x3, 0x1, 0x332e, 0x0, 0x8}}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8080}, 0x4800) 1.218721549s ago: executing program 5 (id=5649): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffdfc, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000280), &(0x7f00000002c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) r3 = gettid() timer_create(0x0, &(0x7f00000003c0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000000380)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) pipe2(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r6, 0x0, r5, 0x0, 0x3, 0x0) 1.21778953s ago: executing program 5 (id=5652): r0 = syz_io_uring_setup(0x4176, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x567, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x24008094) r1 = accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000193cda55fa0f0f53b9d4343c00000080"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000340)=@gcm_128={{0x303}, "ddbcbb82b4cee959", "d039a0e2b9ecdf681fb5ab4ed5f472d6", "ddc25cec", "ec5a83768eed1ca7"}, 0x28) sendmsg$inet6(r2, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[], 0x58}, 0x40) 620.18184ms ago: executing program 4 (id=5667): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0x2}, 0x18) r1 = socket$kcm(0x10, 0x2, 0x4) close(r1) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000000000)={0x0, 0xf00, &(0x7f0000000040)=[{&(0x7f00000000c0)="5c00000014006b02c84e21100af32c6e0a0675f8d34460400000000000005c1e6182949a36c23d3b48dfd8cdbf9367b498fa51f60a64c9f4d493803792684b71bdd70000b6c0504bb9183132be471b93c91b5d7870743719b4b53cf2", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="e03f030013006bcd9e3fe3dc6e48aa31086b8700350000007ea60264160af3653c002e000d000af08bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg(r2, &(0x7f0000000500)={0x0, 0x300, 0x0}, 0x10000) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000240)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r4, 0x0, 0x3}, 0x18) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x20, 0x2, 0x1, 0x301, 0x0, 0x0, {0x0, 0x0, 0x4}, [@CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0xee9ae771b5cff49c}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000080) 619.861149ms ago: executing program 4 (id=5668): socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) memfd_create(&(0x7f0000000bc0)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o84I\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HO\x00\x00\x00\x00R\xfc\xcb%u3\xec\xde%\x9d\xe4\x1d\rD\x82S\x17?\xd6\xb1\x9aF\xe2\xba[\xc7QR\x9f\x81\x8b\xdc\xc7\xdc\xdem\xbe\x7f2\x11\x17\xd8\xda@4\x9f\xc5*T\x1e^\xf7o\xff\xff\xff\xffwI\x02\xf3\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\xa5\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\xae\xb8\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad\x06\xdd\xaf\x84\xf4\"\x13\xcf\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\xf1\x1b\xe6\xb9\xe7\xff\xc5H\x04\x93\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xcf\x7f\b\x94\xfe2.{\xc1\xbe\x9bth~\xcb\xb9E\x10W\xed\xed51[z\xb6>\xd3\xe7Y*\xdb\xa7h\nt\xddP\n\xc5\xeb\xb1ux\x94@\x00\x00g\x02D9\x83\xa7\x97\xf4\xb25wL\x97\xfb\xb9\xccj\xb3\x96\xc1@\xee`{\x87\xa8]\x96\x9cjF^+\xcc1l\xcbmA,5\xc4J\xcab\xa6\x91\xa0\xeaU\x92\x01\x1f,\xfa\x10\"+\x01\x00\x91\xe9\x1cz\xd1f\x901\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00o\"\x85Np\xba\x0e<\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb8V\xe4\xa1C\x90\x17\xcc{\x9d\xf1\xbd\xb0\xca\x03\x96\x85h}\x8f\x1c)X\xc83rA\x90r\xb6\xba!;\x95\xaf\xe0\xcb\xec\xcd$\x02f\x8c4\x1aH\x8fC\xbfr\xd39\x92\x1fShu\x9e\b\xd4m\xa8\x16\xa6\xd5\xae\xcb\x03oFQ\"\xf7F\xb7\vp\xb6\xe5\x92\xe2O}.\x95A\x9bH\x8d\xa1\x80\x1b\x14u\xfdK\xce\xaf\x94i\xf1s\xf7\xb8Jq\xcb3=M\x84\x7f\x181/\x9bQ|4\xaf\xcf\r\xcfz Z\x19\xad_\x13\x99\xf7\xfdOD\xd3\x9d\x9d\xb8d5g\xf1\x84\xbd\xe5\xa2\xb3\xda\x82\x10n1\xed\xba\xe3\x96\x85\"\xb6\xa6n\xe7\xfd\xd4\a\x97\x85\x810/\xc4o\x11\xc8\x1b\xc0\f\xeec\xa4\x7f|P\x00\x00\x00\x000p\xaf\xfdk\xac\xcc\xac`\xc9\a<\xadIt\x9b\xeb\x8a\xfe\x9b\aO\xa5?h\xe1B\xa8C\x8e;/\xa8\x94\x1bs\xf0\xa9>\x9e\xff\xc9\xd2\x00h\xcb\xfb\xb6Y\xbfp\xd8\x90\x96\xec\x83N\x8bNnx\xb6\x16Y\xf8sU\xae\xa0\b\x8cLq\n\x1f\x99t\xb6\xffozu\xa0B(\xe9?\xcdA\xba\xa8\x13Qc\xda\x16?\xe8z\x8f\x862!\xbf\xa4\xb8\x9bC\xe9Od\xe8\xd32m\x06RX\x7f\xf7\xc2\n\x94\xe5P:l\xd9\xd5\xbd\rH6-\x8a\x12m\xff\xe9\xa0\r\tk\xda\xa4q(\xae\\\xb6\x14I\xf7\xe0z\xf10x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=@newqdisc={0x78, 0x24, 0x3fe3aa0262d8c783, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x3, 0x0, 0x7ff, 0x1}, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffc}}}}]}, 0x78}}, 0x0) 544.204821ms ago: executing program 4 (id=5671): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0xb, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r0}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)='%ps \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 543.807291ms ago: executing program 4 (id=5672): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x80, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r1}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) close(r3) 503.198261ms ago: executing program 0 (id=5675): r0 = mq_open(&(0x7f0000000080)='!selin\xdb\xa1\x02\xbf\xd9l\xd7\xcd\xc0uxse\xee\x0e\xcd\xce6\xbf\xfa;\xb9-a\xb8\xef\x8de\x14\xbc\x9ej\xa1q\xa2\xa5\t\x98\x8a\x8f>\xba', 0x6e93ebbbcc088cf2, 0x0, &(0x7f0000000300)={0x0, 0x1, 0xec}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x9, 0x0) 456.411542ms ago: executing program 0 (id=5676): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000500)={[0x5]}, 0x8) name_to_handle_at(r0, &(0x7f0000004740)='\x00', &(0x7f0000004780)=ANY=[], &(0x7f00000047c0), 0x1200) 456.094992ms ago: executing program 0 (id=5677): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}], 0x20}, 0x10020) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 417.433493ms ago: executing program 0 (id=5679): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3f8, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee4, 0xffe0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r2}, 0x10) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c00028005000100000000000800074000000001"], 0x64}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000009c0)=ANY=[@ANYBLOB="48000000000101040000ff0f0000000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000001000058009"], 0x48}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x54, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @loopback}}, {0x14, 0x2, @in={0x2, 0x0, @multicast2}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0x54}}, 0x0) sendto$inet6(r3, &(0x7f0000001240)="8f", 0x1, 0x0, &(0x7f0000001200)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 417.160933ms ago: executing program 3 (id=5680): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004081}, 0x10) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x2042, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) unshare(0x2a020400) rseq(&(0x7f0000000400), 0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) bpf$MAP_CREATE(0x0, 0x0, 0x48) fsmount(0xffffffffffffffff, 0x0, 0x80) socket$kcm(0x21, 0x2, 0x2) 416.776493ms ago: executing program 0 (id=5681): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0x12) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x2, 0x80, 0xc2, 0xc}}) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x11ea, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000740)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000600)='inode_foreign_history\x00', r1}, 0x18) unshare(0x44040200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x3f8, 0x0, 0x940c, 0x3002, 0x0, 0x2c0, 0x328, 0x3d8, 0x3d8, 0x328, 0x3d8, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @private1, [0xffffff00, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xffffffff, 0xff000000, 0xff], 'geneve0\x00', 'veth1_to_bridge\x00', {0xff}, {0xff}, 0x11, 0x81, 0x6, 0x1d}, 0x0, 0x1d0, 0x1f0, 0x0, {}, [@common=@srh={{0x30}, {0x2b, 0x2, 0x5, 0x4, 0x6, 0x401, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz0\x00', 0x4}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0xd0, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x1, 0x2, 0xfffffffc, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 416.497053ms ago: executing program 3 (id=5682): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0x40, &(0x7f0000000340), 0x1, 0x565, &(0x7f0000000ec0)="$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") open(&(0x7f0000000040)='./file1\x00', 0x64941, 0x20) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendfile(r2, r0, &(0x7f0000000980)=0x8, 0x5) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) getpid() socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x24, r4, 0x1, 0x0, 0x2000000, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000040}, 0x0) 416.039883ms ago: executing program 4 (id=5683): syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r1, &(0x7f0000004200)='t', 0x1) sendfile(r1, r0, 0x0, 0x3ffff) sendfile(r1, r0, 0x0, 0x7ffff000) socket(0x28, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./bus\x00', 0x280008a, &(0x7f0000000240)=ANY=[@ANYBLOB='shortname=lower,shortname=win95,rodir,iocharset=default,uni_xlate=0,nonumtail=1,utf8=0,flush,rodir,shortname=win95,shortname=winnt,shortname=win95,showexec,uni_xlate=0,utf8=0,utf8=0,uni_xlate=0,shortname=mixed,\x00'], 0x97, 0x2ad, &(0x7f00000007c0)="$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") r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x105042, 0x189) pwrite64(r4, &(0x7f00000003c0)='\x00\x00', 0xfffffe97, 0x1) creat(0x0, 0x2) 340.443824ms ago: executing program 3 (id=5684): bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = socket(0x11, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000240)=0xe9, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000170000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000feffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='kmem_cache_free\x00', r4}, 0x10) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r6 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r6, 0x0) write$selinux_load(r5, &(0x7f0000000000)=ANY=[], 0x6000) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000440)=ANY=[@ANYBLOB="02011400012918000e3580009f0001140000002f0600ac141414e0000003808a8972bd0b72e41082b1a3d206"], 0xdd12}], 0x1}, 0x44040) 340.128014ms ago: executing program 3 (id=5685): syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@local, @random="8d7b88b9492d", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0xff, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x4, 0x0, 0x4ef}}}}}}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x804810, &(0x7f0000000100), 0x26, 0x769, &(0x7f0000000b00)="$eJzs3M9rHGUfAPDvTLNNf+R9Ny+88L56EKGFFko3SXNpT00v3gqFgtcakkkImWRDdlO7sWDrWajNRUEQ9ezRq1DqH+BNCgp6FkRrPIiXldn80MRsum2SjqSfD0zmeZ758f1+N8OTHchMAC+sV4sfScRARFyLiOr6eBoRRzutYxF31vZbfXx7oliSaLev/5QUh8Vqu7p5rmR9fTI6h8T/I+JhJeLcO3+P22gtz47neba43h9qzi0MNVrL52fmxqez6Wx+ZPTS8MXR0YvDo0+s4X891nr69UvH73/12srK1583773Sdz6JsU7dsV5bj6d5KmufSSXGto3PH0SwEiVlJwAAQE+K7/lHIqKv8y21Gkc6LQAAAOAwafe3AQAAgEMvibIzAAAAAA7Wxv8BbDzbe1DPwXbz45WIGNwpfl/nGeKIY1GJiBOryZYnE5K1w2BP7tyNiAdj26+/T4sr7M4ezz28rb/1Gemjezw7++FBMf+M7TT/pJvzT+ww//RtvDthj/46/x3vEv9Il/nvWo8xvvjopUrX+HcjXu7bqf5kM37SJf4bPca/t/Lu/W7b2p9EnNnx70+yJdYu74cYm5rJd339wMPfzz7arf4T3eInu9e/0GP9b63+MtttLininz21+/W3U/zimnhvPY80Iu6vr4v+yrYYp+a++XK3+icj2s/y+/+4x/q/+6z/Vo+7AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQEcaEQORpLXNdprWahEnI+K/cSLN643muan60vxksS1iMCrp1EyeDUdEda2fFP2RTvvP/oVt/dGI+M+3x9eCzuRZbaKeT5ZdPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJtORsRAJGktItKI+LWaprVaRF8Px/Y/h/wAAACAfTJYdgIAAADAgXP/DwAAAIffs97/J/ucBwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHCoXbt6tVjaq49vTxT9yZutpdn6zfOTWWO2Nrc0UZuoLy7Upuv16TyrTdTnnnS+vF5fGLkUS7eGmlmjOdRoLd+Yqy/NN2/MzI1PZzeyynOpCgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgKc10FmStBYRaaedprVaxL8iYjAqydRMng1HxL8j4lG10l/0R8pOGgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgH3XaC3Pjud5tri10R/bRzSufB/xD0hDYx8aG5d/aWm8HRFlfwi7N8qdlwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKEejtTw7nufZYqPsTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAChX+kMSEcVypnp6YPvWo8lv1c46It788Pr7t8abzcWRYvznzfHmB+vjF8rIHwAAAF4Il59m54379I37eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgF41Wsuz43meLe6tcTlay+2kyz5l1wgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADybPwIAAP//1/rBhQ==") r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x6, 0x8, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2}, &(0x7f0000000400), &(0x7f0000000340)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) r3 = socket(0x1e, 0x4, 0x0) r4 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x3514}], 0x1}}], 0x400000000000181, 0x9200000000000000) dup3(r4, r3, 0x80000) recvmmsg$unix(r3, &(0x7f0000000ec0)=[{{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000740)=""/128, 0x80}], 0x1}}], 0x1, 0x2101, 0x0) 299.425255ms ago: executing program 0 (id=5686): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) socket$kcm(0x10, 0x7, 0x0) sysfs$1(0x1, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') clock_nanosleep(0xfffffff2, 0xca9a3b, &(0x7f0000000000)={0x77359400}, 0xfffffffffffffffe) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x14) fcntl$setsig(r1, 0xa, 0x13) fcntl$setlease(r1, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 294.897784ms ago: executing program 5 (id=5687): r0 = mq_open(&(0x7f0000000080)='!selin\xdb\xa1\x02\xbf\xd9l\xd7\xcd\xc0uxse\xee\x0e\xcd\xce6\xbf\xfa;\xb9-a\xb8\xef\x8de\x14\xbc\x9ej\xa1q\xa2\xa5\t\x98\x8a\x8f>\xba', 0x6e93ebbbcc088cf2, 0x0, &(0x7f0000000300)={0x0, 0x1, 0xec}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x9, 0x0) 294.304974ms ago: executing program 3 (id=5688): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) name_to_handle_at(0xffffffffffffffff, &(0x7f0000004740)='\x00', &(0x7f0000004780)=ANY=[], &(0x7f00000047c0), 0x1200) 259.232825ms ago: executing program 3 (id=5689): sched_setscheduler(0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x137b}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x40000, 0x100a8}}}}}}]}, 0x48}}, 0x40080) 212.463596ms ago: executing program 5 (id=5691): r0 = epoll_create(0x7) r1 = epoll_create1(0x0) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)) r3 = epoll_create1(0x0) r4 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000100)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = epoll_create1(0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r6, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f0000000200)) 212.139076ms ago: executing program 5 (id=5692): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000810"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000), 0xfffffecc) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f00000002c0)='./file0\x00', 0xc80, &(0x7f0000020100)=ANY=[@ANYBLOB="00631dda01aef2456795dd9b26209f1c0f624854ea3dd5a00bd6df44035f5c3ae796fec6d633a0ffad0569794acfef7da01767fd4175f2cd82df769aa2ee7bfe3640554507d2e660c9f9e222a72e1e3e71145c480657d2864e5e276f028d64701ae31cde0ceaf408fdb05c0f4142da00e900000100000149e6d308cbe315789f4baffe39bbced9b1d421d2e290e9fc563b62225f002ee310e1fa7321000000000000d6231001a4b2d467825f3abb0c167e129cf1fa0e7854103f4bf2d3a0194983bc86cbd3d75ccef3c8ac4516dac102"], 0x1, 0x266, &(0x7f000001fe80)="$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") r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) mknod(0x0, 0x0, 0x0) ftruncate(r3, 0x81fd) creat(&(0x7f0000000100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) rename(&(0x7f0000000b00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000f40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x2100, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x3e00, 0x116094000, 0x41000000}], 0x0) 211.841986ms ago: executing program 1 (id=5693): unshare(0x68040200) socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000086dd0000120000000000000060ec97000f982c00fb8000000000000000000000000000aaff02000000000000000000000000000189"], 0xfce) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000180)={0x800006dc, 0x0, 0xfffffff8, 0x101, 0x18, "12000400000000000001deffffffff041f00"}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000080008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3, 0x0, 0xfffffffffffffffe}, 0x18) creat(&(0x7f00000002c0)='./file0\x00', 0x6) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = getpid() bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r4, 0x0, 0x30, 0x1, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)=[0x7], 0x0, 0x0, 0x8e, 0x0, r5}}, 0x40) 143.689657ms ago: executing program 1 (id=5694): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) close(0x3) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8c}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3014850, &(0x7f00000006c0)={[{@noquota}, {@barrier_val={'barrier', 0x3d, 0x1000}}, {@grpjquota}, {@noauto_da_alloc}, {@dioread_lock}]}, 0x2, 0x4c5, &(0x7f0000001cc0)="$eJzs3U1rW1caAOD3ynbiJM7YmZlFJjCZMJPBCTOR7HiSmFlkPFDaVaBpunddWzbGsmUsOYlNKA79AYXSL9pVV90Uui6Fkp9QCoF2X0ppCW2SLrpoqyL5qkld+YtYVmI9Dxzfcz+k9z0W90hH56IbQNs6EREjEdEREacjojfdnklLrKyW6nH37t4Yr5YkKpUr3yaRpNvqz5Wky0Ppw7oj4rlnIl5Mfh+3tLQ8M1Yo5BfS9Vx5dj5XWlo+Mz07NpWfys+NDA2eH74wfG54YMfaevGpr9545b2nL37872tfjH5z6qVqWj3pvofbsRUrWzxuteldtf9FXWdELGwn2GOsI21PV6sTAQBgS6qf8f8YEX+PiPtvtzobAAAAoBkq/+uJH5OICgAAALBnZWrXwCaZbHotQE9kMtns6jW8f46DmUKxVP7XZHFxbmL1Wtm+6MpMThfyA+m1wn3RlVTXB2v1B+tn16wPRcSRiHit90BtPTteLEy0+ssPAAAAaBOH1oz/v+9dHf8DAAAAe0xfqxMAAAAAms74HwAAAPa+dcf/SefuJgIAAAA0w7OXLlVLpX7/64mrS4szxatnJvKlmezs4nh2vLgwn50qFqdqv9k3u9nzFYrF+f/E3OL1XDlfKudKS8ujs8XFufJo7b7eo3n3iQYAAIDdd+Rvtz5PImLlvwdqpWpfum8LY/WR5mYHNFNme4cnzcoD2H0drU4AaBkX+EL7Mh8PbDKwf33N+ja/NgAAAB4H/X95pPl/84HwBDOQh/Zl/h/al/l/aF/m/6HN7d/8kO71dnyyw7kAAABN01MrSSabzgX2RCaTzUYcrt0WoCuZnC7kByLiDxHxWW/X/ur6YKuTBgAAAAAAAAAAAAAAAAAAAAAAAIAnTKWSRAUAAADY0yIyXyfpjfz7e0/2rP1+YF/yQ29tGRHX3rny5vWxcnlhsLr9u1+3l99Kt5+tbwEAAABaqT5Or4/jAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAn3bt7Y7xedjPunf9HRF+j+J3RXVt2f9gbEQfvJ9H50OOSiOjYgfgrNyPiaKP4STWt6EuzWBs/ExEHWhz/0A7Eh3Z2q9r/jFTPv641518mTtSWjc+/zrQ8qjsn1uv/MvX+r9bPNer/Dm/81N31yrHbH+TWjX8z4lhn4/6nHj95xP73heeXl9fbV3k3on+T959qrFx5dj5XWlo+Mz07NpWfys8NDQ2eH74wfG54IDc5XcinfxvGePWvH/28UfsPNoy/2v9u1P6TW2z/T7ev3/3TBvFP/aPx6390g/jV//0/0/eB6v7+en1ltf6w4+9/enyj9k+s0/7NXv9TW2z/6csvf7nFQwGAXVBaWp4ZKxTyCyoqKnuvcjk90bf98BZ3TAAAwI578KG/1ZkAAAAAAAAAAAAAAAAAAABA+2r6j5Dt/+0vC3S3rqkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABv6JQAA///dfdKW") 92.129958ms ago: executing program 1 (id=5695): socket$nl_route(0x10, 0x3, 0x0) creat(0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0xffb3, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000d00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) nanosleep(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCGDEV(r3, 0x80045432, &(0x7f0000000400)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x18) sendmsg$netlink(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000010008100000000000080000000000000", @ANYRES32=0x0, @ANYBLOB="0a043cbf", @ANYRES32, @ANYBLOB="0a001b"], 0x2c}], 0x1}, 0x0) 68.167579ms ago: executing program 1 (id=5696): socket$kcm(0x10, 0x2, 0x4) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) memfd_secret(0x0) fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) r1 = syz_io_uring_setup(0x19f2, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000140)=0x0, &(0x7f0000000100)=0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'syztnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x14, 0x0, 0x0, 0x0, 0x2b, @empty, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='pids.events\x00', 0x275a, 0x0) write$UHID_CREATE2(r5, &(0x7f0000000180)=ANY=[@ANYRES64=r4], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r5, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x0, 0x0, r5, 0x0, r0}) io_uring_enter(r1, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 341.89µs ago: executing program 1 (id=5697): socket$inet6(0xa, 0x2, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x1c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) futimesat(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x5) setsockopt(r3, 0x800000000010d, 0x8000000011, &(0x7f00001c9fff), 0xc5) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @local}, 0x10) sendmmsg(r3, &(0x7f0000002980), 0x400000000000239, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 0s ago: executing program 1 (id=5698): rseq(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x7}, 0x20, 0x4, 0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x1, 0x5, 0x6, 0x28e5}}, 0x20, 0x1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x18, 0xb, &(0x7f0000000040)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='mm_page_alloc\x00', r0}, 0x10) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r3, 0x0, 0xfffffffffffffffc}, 0x18) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x8, &(0x7f0000000040), 0x9, 0x52e, &(0x7f0000000500)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r4, &(0x7f0000000080)="10", 0xffffff27, 0x8000c60) syz_emit_ethernet(0xfdef, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x0) sync() kernel console output (not intermixed with test programs): 1][ T6226] FAT-fs (loop3): error, invalid access to FAT (entry 0x0000e1b1) [ 70.811534][ T6233] bridge_slave_0: left allmulticast mode [ 70.817426][ T6233] bridge_slave_0: left promiscuous mode [ 70.823196][ T6233] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.834023][ T6233] bond0: (slave bridge_slave_1): Releasing backup interface [ 70.846561][ T6233] bond0: (slave bond_slave_0): Releasing backup interface [ 70.853841][ T6236] netlink: 60 bytes leftover after parsing attributes in process `syz.3.874'. [ 70.865864][ T6233] bond0: (slave bond_slave_1): Releasing backup interface [ 70.890397][ T6233] team0: Port device team_slave_0 removed [ 70.900895][ T6233] team0: Port device team_slave_1 removed [ 70.918275][ T6233] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 70.925880][ T6233] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 70.934321][ T6233] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 70.941882][ T6233] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 70.975790][ T6242] loop1: detected capacity change from 0 to 736 [ 70.985762][ T6242] iso9660: Unknown parameter '§ÐQþ{Uº²a×ÓNÉDÙÂ?»sæM00000000000000000000' [ 70.997940][ T29] kauditd_printk_skb: 290 callbacks suppressed [ 70.997956][ T29] audit: type=1326 audit(1744716805.900:1553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6241 comm="syz.1.876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 71.028193][ T29] audit: type=1326 audit(1744716805.900:1554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6241 comm="syz.1.876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 71.055290][ T29] audit: type=1326 audit(1744716805.900:1555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6241 comm="syz.1.876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 71.078749][ T29] audit: type=1326 audit(1744716805.900:1556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6241 comm="syz.1.876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 71.102114][ T29] audit: type=1326 audit(1744716805.900:1557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6241 comm="syz.1.876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 71.125449][ T29] audit: type=1326 audit(1744716805.900:1558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6241 comm="syz.1.876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 71.148798][ T29] audit: type=1326 audit(1744716805.919:1559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6241 comm="syz.1.876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 71.172121][ T29] audit: type=1326 audit(1744716805.938:1560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6241 comm="syz.1.876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 71.195766][ T29] audit: type=1326 audit(1744716805.984:1561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6241 comm="syz.1.876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=291 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 71.219313][ T29] audit: type=1326 audit(1744716805.984:1562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6241 comm="syz.1.876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 71.259330][ T6236] team0: Mode changed to "roundrobin" [ 71.267963][ T6245] pim6reg: entered allmulticast mode [ 71.273481][ T6246] pim6reg: left allmulticast mode [ 71.294929][ T6250] loop3: detected capacity change from 0 to 2048 [ 71.323005][ T6250] EXT4-fs mount: 24 callbacks suppressed [ 71.323041][ T6250] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 71.375749][ T6250] EXT4-fs error (device loop3): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 4128793 free clusters [ 71.402120][ T6250] EXT4-fs (loop3): re-mounted 00000000-0000-0000-0000-000000000000. [ 71.430088][ T3307] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 71.656022][ T6278] netlink: 12 bytes leftover after parsing attributes in process `syz.0.891'. [ 71.859081][ T6286] netlink: 8 bytes leftover after parsing attributes in process `syz.0.895'. [ 72.024319][ T6282] Set syz1 is full, maxelem 65536 reached [ 72.067373][ T6300] netlink: 332 bytes leftover after parsing attributes in process `syz.0.902'. [ 72.124506][ T6302] netlink: 36 bytes leftover after parsing attributes in process `syz.0.904'. [ 72.150163][ T6307] bond0: entered promiscuous mode [ 72.156201][ T6307] batadv0: entered promiscuous mode [ 72.161911][ T6307] hsr1: Slave A (bond0) is not up; please bring it up to get a fully working HSR network [ 72.172186][ T6307] 8021q: adding VLAN 0 to HW filter on device hsr1 [ 72.181499][ T6307] bond0: left promiscuous mode [ 72.190968][ T6307] batadv0: left promiscuous mode [ 72.305301][ T6317] loop4: detected capacity change from 0 to 128 [ 72.314438][ T6317] EXT4-fs (loop4): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 72.326763][ T6317] ext4 filesystem being mounted at /176/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 72.353769][ T3003] udevd[3003]: worker [3492] terminated by signal 33 (Unknown signal 33) [ 72.363046][ T3003] udevd[3003]: worker [3492] failed while handling '/devices/virtual/block/loop1' [ 72.404178][ T3303] EXT4-fs (loop4): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 72.437806][ T6330] loop4: detected capacity change from 0 to 128 [ 72.448696][ T6330] EXT4-fs (loop4): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 72.510290][ T6330] ext4 filesystem being mounted at /177/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 72.624459][ T6334] loop3: detected capacity change from 0 to 2048 [ 72.635859][ T6334] EXT4-fs: Ignoring removed bh option [ 72.725295][ T6334] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 72.842400][ T3303] EXT4-fs (loop4): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 73.399699][ T6353] __nla_validate_parse: 8 callbacks suppressed [ 73.399713][ T6353] netlink: 132 bytes leftover after parsing attributes in process `syz.5.920'. [ 73.417581][ T6337] EXT4-fs error (device loop3): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 73.434911][ T6337] EXT4-fs (loop3): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 32 with error 28 [ 73.447266][ T6337] EXT4-fs (loop3): This should not happen!! Data will be lost [ 73.447266][ T6337] [ 73.456929][ T6337] EXT4-fs (loop3): Total free blocks count 0 [ 73.463037][ T6337] EXT4-fs (loop3): Free/Dirty block details [ 73.469111][ T6337] EXT4-fs (loop3): free_blocks=2415919104 [ 73.474846][ T6337] EXT4-fs (loop3): dirty_blocks=8224 [ 73.480208][ T6337] EXT4-fs (loop3): Block reservation details [ 73.486261][ T6337] EXT4-fs (loop3): i_reserved_data_blocks=514 [ 73.547942][ T6358] loop4: detected capacity change from 0 to 256 [ 73.672675][ T3626] EXT4-fs (loop3): Delayed block allocation failed for inode 15 at logical offset 32 with max blocks 2048 with error 28 [ 73.888184][ T6350] Set syz1 is full, maxelem 65536 reached [ 73.980578][ T6366] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 74.003055][ T6362] syzkaller0: entered promiscuous mode [ 74.008665][ T6362] syzkaller0: entered allmulticast mode [ 74.014872][ T6366] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 74.160997][ T6368] tipc: Started in network mode [ 74.165957][ T6368] tipc: Node identity 8ed8cc6b4b22, cluster identity 4711 [ 74.173210][ T6368] tipc: Enabled bearer , priority 0 [ 74.181521][ T6367] tipc: Resetting bearer [ 74.199340][ T6367] tipc: Disabling bearer [ 74.361657][ T6387] netlink: 4 bytes leftover after parsing attributes in process `syz.0.933'. [ 74.457390][ T6395] netlink: 24 bytes leftover after parsing attributes in process `syz.5.936'. [ 74.519258][ T6395] netlink: 4 bytes leftover after parsing attributes in process `syz.5.936'. [ 74.600598][ T6392] loop4: detected capacity change from 0 to 1024 [ 74.659831][ T6403] syzkaller0: entered promiscuous mode [ 74.665370][ T6403] syzkaller0: entered allmulticast mode [ 74.705288][ T6392] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 74.799117][ T6410] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 74.888010][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 74.899989][ T6413] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 74.989449][ T6416] tipc: Enabled bearer , priority 0 [ 74.998004][ T6415] tipc: Resetting bearer [ 75.011454][ T6415] tipc: Disabling bearer [ 75.104395][ T6420] loop4: detected capacity change from 0 to 2048 [ 75.140941][ T6420] loop4: p1 < > p4 [ 75.151370][ T6420] loop4: p4 size 8388608 extends beyond EOD, truncated [ 75.171076][ T6422] netdevsim netdevsim1 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 75.185487][ T6422] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 75.229241][ T3003] loop4: p1 < > p4 [ 75.235700][ T3003] loop4: p4 size 8388608 extends beyond EOD, truncated [ 75.266991][ T6422] netdevsim netdevsim1 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 75.279328][ T6422] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 75.334455][ T3293] udevd[3293]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 75.345262][ T4630] udevd[4630]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 75.378814][ T6422] netdevsim netdevsim1 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 75.390254][ T6422] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 75.496961][ T6422] netdevsim netdevsim1 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 75.508016][ T6422] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 75.600043][ T6435] loop4: detected capacity change from 0 to 512 [ 75.635543][ T6435] EXT4-fs: Ignoring removed bh option [ 75.659439][ T6435] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 75.694791][ T6435] EXT4-fs (loop4): 1 truncate cleaned up [ 75.700983][ T6435] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 75.711436][ T6422] netdevsim netdevsim1 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 75.723089][ T6422] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.767272][ T6422] netdevsim netdevsim1 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 75.776625][ T6422] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.812942][ T6422] netdevsim netdevsim1 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 75.822894][ T6422] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.860182][ T6422] netdevsim netdevsim1 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 75.869494][ T6422] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.886197][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 75.959222][ T3626] ip6gretap1: left promiscuous mode [ 76.023140][ T6445] netlink: 24 bytes leftover after parsing attributes in process `syz.1.952'. [ 76.054982][ T6445] netlink: 4 bytes leftover after parsing attributes in process `syz.1.952'. [ 76.261488][ T6458] loop1: detected capacity change from 0 to 256 [ 76.285920][ T6460] netlink: 8 bytes leftover after parsing attributes in process `syz.3.962'. [ 76.308297][ T6460] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 76.371267][ T6460] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 76.452671][ T6460] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 76.462742][ T6465] loop1: detected capacity change from 0 to 2048 [ 76.471434][ T6465] EXT4-fs: Ignoring removed bh option [ 76.496276][ T29] kauditd_printk_skb: 378 callbacks suppressed [ 76.496293][ T29] audit: type=1326 audit(1744716811.045:1941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6466 comm="syz.0.965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5f8402e169 code=0x7ffc0000 [ 76.532104][ T6465] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 76.544741][ T29] audit: type=1326 audit(1744716811.045:1942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6466 comm="syz.0.965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5f8402e169 code=0x7ffc0000 [ 76.568210][ T29] audit: type=1326 audit(1744716811.045:1943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6466 comm="syz.0.965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=223 compat=0 ip=0x7f5f8402e169 code=0x7ffc0000 [ 76.592018][ T29] audit: type=1326 audit(1744716811.045:1944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6466 comm="syz.0.965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5f8402e169 code=0x7ffc0000 [ 76.615452][ T29] audit: type=1326 audit(1744716811.045:1945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6466 comm="syz.0.965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=22 compat=0 ip=0x7f5f8402e169 code=0x7ffc0000 [ 76.640203][ T29] audit: type=1326 audit(1744716811.045:1946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6466 comm="syz.0.965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5f8402e169 code=0x7ffc0000 [ 76.663545][ T29] audit: type=1326 audit(1744716811.045:1947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6466 comm="syz.0.965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7f5f8402e169 code=0x7ffc0000 [ 76.686934][ T29] audit: type=1326 audit(1744716811.045:1948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6466 comm="syz.0.965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5f84025127 code=0x7ffc0000 [ 76.710228][ T29] audit: type=1326 audit(1744716811.045:1949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6466 comm="syz.0.965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f5f83fca359 code=0x7ffc0000 [ 76.733560][ T29] audit: type=1326 audit(1744716811.045:1950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6466 comm="syz.0.965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7f5f8402e169 code=0x7ffc0000 [ 76.758223][ T6460] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 76.855045][ T6460] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.868972][ T6460] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.886982][ T6460] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.920528][ T6460] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.081646][ T6470] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 77.108021][ T6470] EXT4-fs (loop1): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 32 with error 28 [ 77.120414][ T6470] EXT4-fs (loop1): This should not happen!! Data will be lost [ 77.120414][ T6470] [ 77.130217][ T6470] EXT4-fs (loop1): Total free blocks count 0 [ 77.136234][ T6470] EXT4-fs (loop1): Free/Dirty block details [ 77.142148][ T6470] EXT4-fs (loop1): free_blocks=2415919104 [ 77.147946][ T6470] EXT4-fs (loop1): dirty_blocks=8224 [ 77.153257][ T6470] EXT4-fs (loop1): Block reservation details [ 77.159325][ T6470] EXT4-fs (loop1): i_reserved_data_blocks=514 [ 77.159317][ T6483] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 77.205627][ T3619] EXT4-fs (loop1): Delayed block allocation failed for inode 15 at logical offset 32 with max blocks 2048 with error 28 [ 77.242843][ T6483] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 77.290057][ T6490] loop3: detected capacity change from 0 to 256 [ 77.331533][ T6483] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 77.405482][ T6492] syzkaller0: entered promiscuous mode [ 77.411021][ T6492] syzkaller0: entered allmulticast mode [ 77.434436][ T6483] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 77.651925][ T6483] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.693797][ T6483] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.729769][ T6483] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.765705][ T6506] netlink: 8 bytes leftover after parsing attributes in process `syz.0.980'. [ 77.781327][ T6508] loop3: detected capacity change from 0 to 512 [ 77.790644][ T6483] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.803649][ T6506] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 77.804216][ T6508] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 77.826097][ T6508] ext4 filesystem being mounted at /195/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 77.906428][ T6508] EXT4-fs error (device loop3): ext4_do_update_inode:5211: inode #19: comm syz.3.990: corrupted inode contents [ 77.918401][ T6508] EXT4-fs error (device loop3): ext4_dirty_inode:6103: inode #19: comm syz.3.990: mark_inode_dirty error [ 77.919381][ T6506] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 77.931658][ T6508] EXT4-fs error (device loop3): ext4_do_update_inode:5211: inode #19: comm syz.3.990: corrupted inode contents [ 77.952747][ T6508] EXT4-fs error (device loop3): ext4_xattr_delete_inode:2991: inode #19: comm syz.3.990: mark_inode_dirty error [ 77.966200][ T6508] EXT4-fs error (device loop3): ext4_xattr_delete_inode:2994: inode #19: comm syz.3.990: mark inode dirty (error -117) [ 77.979438][ T6508] EXT4-fs warning (device loop3): ext4_evict_inode:279: xattr delete (err -117) [ 78.013327][ T6506] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 78.025904][ T3307] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 78.088990][ T6506] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 78.146515][ T6506] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.158150][ T6506] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.169851][ T6506] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.181268][ T6506] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.208394][ T6525] loop5: detected capacity change from 0 to 256 [ 78.232245][ T6525] syz.5.984: attempt to access beyond end of device [ 78.232245][ T6525] loop5: rw=0, sector=256, nr_sectors = 20 limit=256 [ 78.546259][ T6543] netlink: 4 bytes leftover after parsing attributes in process `syz.3.992'. [ 79.111665][ T6549] loop4: detected capacity change from 0 to 256 [ 79.134481][ T6549] FAT-fs (loop4): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 79.147440][ T6549] xt_hashlimit: max too large, truncated to 1048576 [ 79.216892][ T6551] loop3: detected capacity change from 0 to 512 [ 79.220966][ T6553] loop4: detected capacity change from 0 to 512 [ 79.223824][ T6551] EXT4-fs: Ignoring removed orlov option [ 79.237402][ T6551] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a81ee098, mo2=0002] [ 79.245633][ T6551] System zones: 1-12 [ 79.249881][ T6551] EXT4-fs error (device loop3): ext4_iget_extra_inode:4693: inode #15: comm syz.3.1008: corrupted in-inode xattr: invalid ea_ino [ 79.265000][ T6551] EXT4-fs error (device loop3): ext4_orphan_get:1395: comm syz.3.1008: couldn't read orphan inode 15 (err -117) [ 79.265468][ T6553] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 79.278264][ T6551] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 79.306071][ T6553] ext4 filesystem being mounted at /199/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 79.342345][ T3307] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 79.417479][ T6564] netlink: 8 bytes leftover after parsing attributes in process `syz.5.999'. [ 79.427679][ T6564] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 79.445986][ T6553] EXT4-fs error (device loop4): ext4_do_update_inode:5211: inode #19: comm syz.4.996: corrupted inode contents [ 79.474102][ T6553] EXT4-fs error (device loop4): ext4_dirty_inode:6103: inode #19: comm syz.4.996: mark_inode_dirty error [ 79.486691][ T6553] EXT4-fs error (device loop4): ext4_do_update_inode:5211: inode #19: comm syz.4.996: corrupted inode contents [ 79.501893][ T6553] EXT4-fs error (device loop4): ext4_xattr_delete_inode:2991: inode #19: comm syz.4.996: mark_inode_dirty error [ 79.516560][ T6564] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 79.527900][ T6553] EXT4-fs error (device loop4): ext4_xattr_delete_inode:2994: inode #19: comm syz.4.996: mark inode dirty (error -117) [ 79.540777][ T6553] EXT4-fs warning (device loop4): ext4_evict_inode:279: xattr delete (err -117) [ 79.596430][ T6564] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 79.619597][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 79.651084][ T6564] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 79.653454][ T6579] loop4: detected capacity change from 0 to 1024 [ 79.683520][ T6579] EXT4-fs: inline encryption not supported [ 79.700081][ T6579] EXT4-fs: Ignoring removed orlov option [ 79.719429][ T6579] EXT4-fs (loop4): stripe (4) is not aligned with cluster size (16), stripe is disabled [ 79.768448][ T6579] EXT4-fs (loop4): warning: checktime reached, running e2fsck is recommended [ 79.790001][ T6579] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 79.845099][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 79.868237][ T6572] cgroup: fork rejected by pids controller in /syz0 [ 79.946520][ T6628] IPv6: Can't replace route, no match found [ 80.297734][ T7206] loop4: detected capacity change from 0 to 1024 [ 80.326091][ T7227] loop1: detected capacity change from 0 to 256 [ 80.362174][ T7206] EXT4-fs: Ignoring removed bh option [ 80.375934][ T7227] FAT-fs (loop1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 80.383398][ T7206] EXT4-fs: inline encryption not supported [ 80.392270][ T7206] EXT4-fs: Ignoring removed i_version option [ 80.408476][ T7206] EXT4-fs (loop4): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 80.416460][ T7227] xt_hashlimit: max too large, truncated to 1048576 [ 80.450987][ T7206] EXT4-fs error (device loop4): ext4_map_blocks:675: inode #3: block 2: comm syz.4.1013: lblock 2 mapped to illegal pblock 2 (length 1) [ 80.486795][ T7206] EXT4-fs error (device loop4): ext4_map_blocks:675: inode #3: block 48: comm syz.4.1013: lblock 0 mapped to illegal pblock 48 (length 1) [ 80.521525][ T7281] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.523557][ T7206] EXT4-fs error (device loop4): ext4_acquire_dquot:6935: comm syz.4.1013: Failed to acquire dquot type 0 [ 80.547034][ T7206] EXT4-fs error (device loop4) in ext4_reserve_inode_write:5899: Corrupt filesystem [ 80.556744][ T7206] EXT4-fs error (device loop4): ext4_evict_inode:259: inode #11: comm syz.4.1013: mark_inode_dirty error [ 80.570599][ T7206] EXT4-fs warning (device loop4): ext4_evict_inode:262: couldn't mark inode dirty (err -117) [ 80.582509][ T7206] EXT4-fs (loop4): 1 orphan inode deleted [ 80.590090][ T7206] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 80.602835][ T31] EXT4-fs error (device loop4): ext4_map_blocks:675: inode #3: block 1: comm kworker/u8:1: lblock 1 mapped to illegal pblock 1 (length 1) [ 80.618311][ T7281] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.632573][ T31] EXT4-fs error (device loop4): ext4_release_dquot:6971: comm kworker/u8:1: Failed to release dquot type 0 [ 80.647770][ T7206] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 80.657161][ T7206] EXT4-fs error (device loop4): __ext4_get_inode_loc:4450: comm syz.4.1013: Invalid inode table block 1 in block_group 0 [ 80.670301][ T7206] EXT4-fs error (device loop4) in ext4_reserve_inode_write:5899: Corrupt filesystem [ 80.680157][ T7206] EXT4-fs error (device loop4): ext4_quota_off:7219: inode #3: comm syz.4.1013: mark_inode_dirty error [ 80.681101][ T7281] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.743001][ T7281] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.795494][ T7300] xt_hashlimit: max too large, truncated to 1048576 [ 80.925747][ T7304] syzkaller0: entered allmulticast mode [ 80.933493][ T7304] syzkaller0: entered promiscuous mode [ 80.941802][ T7304] syzkaller0 (unregistering): left promiscuous mode [ 80.948455][ T7304] syzkaller0 (unregistering): left allmulticast mode [ 81.125743][ T7312] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 81.183627][ T7312] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 81.226086][ T7312] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 81.269681][ T7312] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 81.312668][ T7281] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.324352][ T7281] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.337682][ T7281] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.351034][ T7281] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.396336][ T7312] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.421657][ T7312] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.462101][ T7314] syzkaller0: entered promiscuous mode [ 81.467682][ T7314] syzkaller0: entered allmulticast mode [ 81.488663][ T7312] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.517773][ T7312] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.695546][ T6564] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.706825][ T6564] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.718099][ T6564] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.729647][ T6564] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.765020][ T7325] loop5: detected capacity change from 0 to 1024 [ 81.771656][ T7325] EXT4-fs: Ignoring removed bh option [ 81.778404][ T7325] EXT4-fs: inline encryption not supported [ 81.784310][ T7325] EXT4-fs: Ignoring removed i_version option [ 81.791187][ T7325] EXT4-fs (loop5): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 81.804630][ T7325] EXT4-fs error (device loop5): ext4_map_blocks:675: inode #3: block 2: comm syz.5.1029: lblock 2 mapped to illegal pblock 2 (length 1) [ 81.820306][ T7325] EXT4-fs error (device loop5): ext4_map_blocks:675: inode #3: block 48: comm syz.5.1029: lblock 0 mapped to illegal pblock 48 (length 1) [ 81.834758][ T7325] EXT4-fs error (device loop5): ext4_acquire_dquot:6935: comm syz.5.1029: Failed to acquire dquot type 0 [ 81.846398][ T7325] EXT4-fs error (device loop5) in ext4_reserve_inode_write:5899: Corrupt filesystem [ 81.857174][ T7325] EXT4-fs error (device loop5): ext4_evict_inode:259: inode #11: comm syz.5.1029: mark_inode_dirty error [ 81.869028][ T7325] EXT4-fs warning (device loop5): ext4_evict_inode:262: couldn't mark inode dirty (err -117) [ 81.880536][ T7325] EXT4-fs (loop5): 1 orphan inode deleted [ 81.887189][ T7325] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 81.945733][ T3626] EXT4-fs error (device loop5): ext4_map_blocks:675: inode #3: block 1: comm kworker/u8:60: lblock 1 mapped to illegal pblock 1 (length 1) [ 81.968353][ T3626] __quota_error: 974 callbacks suppressed [ 81.968382][ T3626] Quota error (device loop5): remove_tree: Can't read quota data block 1 [ 81.982693][ T3626] EXT4-fs error (device loop5): ext4_release_dquot:6971: comm kworker/u8:60: Failed to release dquot type 0 [ 81.986698][ T29] audit: type=1326 audit(1744716816.180:2920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7331 comm="syz.4.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52cd55e169 code=0x7ffc0000 [ 82.017885][ T29] audit: type=1326 audit(1744716816.180:2921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7331 comm="syz.4.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52cd55e169 code=0x7ffc0000 [ 82.041355][ T29] audit: type=1326 audit(1744716816.180:2922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7331 comm="syz.4.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f52cd55e169 code=0x7ffc0000 [ 82.063825][ T7325] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 82.064794][ T29] audit: type=1326 audit(1744716816.180:2923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7331 comm="syz.4.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52cd55e169 code=0x7ffc0000 [ 82.075627][ T7325] EXT4-fs error (device loop5): __ext4_get_inode_loc:4450: comm syz.5.1029: Invalid inode table block 1 in block_group 0 [ 82.097024][ T29] audit: type=1326 audit(1744716816.180:2924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7331 comm="syz.4.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52cd55e169 code=0x7ffc0000 [ 82.097056][ T29] audit: type=1326 audit(1744716816.180:2925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7331 comm="syz.4.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f52cd55e169 code=0x7ffc0000 [ 82.159802][ T29] audit: type=1326 audit(1744716816.339:2926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7331 comm="syz.4.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52cd55e169 code=0x7ffc0000 [ 82.165100][ T7325] EXT4-fs error (device loop5) in ext4_reserve_inode_write:5899: Corrupt filesystem [ 82.183265][ T29] audit: type=1326 audit(1744716816.339:2927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7331 comm="syz.4.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f52cd555127 code=0x7ffc0000 [ 82.204189][ T7325] EXT4-fs error (device loop5): ext4_quota_off:7219: inode #3: comm syz.5.1029: mark_inode_dirty error [ 82.215895][ T29] audit: type=1326 audit(1744716816.339:2928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7331 comm="syz.4.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f52cd4fa359 code=0x7ffc0000 [ 82.308414][ T7332] ref_ctr increment failed for inode: 0x46c offset: 0x9 ref_ctr_offset: 0x82 of mm: 0xffff88811b30c780 [ 82.345383][ T7331] uprobe: syz.4.1031:7331 failed to unregister, leaking uprobe [ 82.485458][ T7338] loop5: detected capacity change from 0 to 512 [ 82.493356][ T7338] EXT4-fs (loop5): revision level too high, forcing read-only mode [ 82.501562][ T7338] EXT4-fs (loop5): orphan cleanup on readonly fs [ 82.531268][ T7338] EXT4-fs warning (device loop5): ext4_enable_quotas:7170: Failed to enable quota tracking (type=1, err=-22, ino=4). Please run e2fsck to fix. [ 82.582360][ T7343] netdevsim netdevsim1 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 82.592399][ T7343] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.626334][ T7338] EXT4-fs (loop5): Cannot turn on quotas: error -22 [ 82.634687][ T7338] EXT4-fs error (device loop5): ext4_orphan_get:1390: inode #16: comm syz.5.1034: iget: immutable or append flags not allowed on symlinks [ 82.684536][ T7338] EXT4-fs error (device loop5): ext4_orphan_get:1395: comm syz.5.1034: couldn't read orphan inode 16 (err -117) [ 82.707804][ T7338] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 82.738805][ T7343] netdevsim netdevsim1 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 82.748640][ T7343] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.793207][ T7354] loop4: detected capacity change from 0 to 512 [ 82.801218][ T7354] EXT4-fs error (device loop4): ext4_read_inode_bitmap:139: comm syz.4.1042: Invalid inode bitmap blk 4 in block_group 0 [ 82.822002][ T7343] netdevsim netdevsim1 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 82.822366][ T7354] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 82.831904][ T7343] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.902282][ T7356] A link change request failed with some changes committed already. Interface bond1 may have been left with an inconsistent configuration, please check. [ 82.921992][ T7354] @: renamed from vlan0 (while UP) [ 82.941070][ T7343] netdevsim netdevsim1 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 82.951124][ T7343] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.967329][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 83.011455][ T4918] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 83.062224][ T7359] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 83.080066][ T7363] : renamed from bond0 (while UP) [ 83.101766][ T7343] netdevsim netdevsim1 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 83.110000][ T7343] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.124321][ T7343] netdevsim netdevsim1 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 83.132715][ T7343] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.145633][ T7343] netdevsim netdevsim1 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 83.153931][ T7343] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.166136][ T7343] netdevsim netdevsim1 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 83.174452][ T7343] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.740598][ T7404] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1064'. [ 83.750147][ T7404] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1064'. [ 84.163255][ T7439] futex_wake_op: syz.5.1079 tries to shift op by 144; fix this program [ 85.339008][ T7541] netlink: 2256 bytes leftover after parsing attributes in process `syz.1.1127'. [ 85.718223][ T7572] pim6reg1: entered promiscuous mode [ 85.723893][ T7572] pim6reg1: entered allmulticast mode [ 87.146600][ T7617] bond_slave_1: mtu less than device minimum [ 87.324806][ T29] kauditd_printk_skb: 2052 callbacks suppressed [ 87.324824][ T29] audit: type=1326 audit(1744716821.175:4981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7625 comm="syz.1.1164" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f1a33265127 code=0x7ffc0000 [ 87.366035][ T29] audit: type=1326 audit(1744716821.175:4982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7625 comm="syz.1.1164" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f1a3320a359 code=0x7ffc0000 [ 87.389501][ T29] audit: type=1326 audit(1744716821.175:4983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7625 comm="syz.1.1164" exe="/root/syz-executor" sig=0 arch=c000003e syscall=243 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 87.412959][ T29] audit: type=1326 audit(1744716821.175:4984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7625 comm="syz.1.1164" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f1a33265127 code=0x7ffc0000 [ 87.436355][ T29] audit: type=1326 audit(1744716821.175:4985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7625 comm="syz.1.1164" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f1a3320a359 code=0x7ffc0000 [ 87.459695][ T29] audit: type=1326 audit(1744716821.175:4986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7625 comm="syz.1.1164" exe="/root/syz-executor" sig=0 arch=c000003e syscall=243 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 87.483144][ T29] audit: type=1326 audit(1744716821.175:4987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7625 comm="syz.1.1164" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f1a33265127 code=0x7ffc0000 [ 87.506512][ T29] audit: type=1326 audit(1744716821.175:4988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7625 comm="syz.1.1164" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f1a3320a359 code=0x7ffc0000 [ 87.529874][ T29] audit: type=1326 audit(1744716821.175:4989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7625 comm="syz.1.1164" exe="/root/syz-executor" sig=0 arch=c000003e syscall=243 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 87.553333][ T29] audit: type=1326 audit(1744716821.203:4990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7625 comm="syz.1.1164" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f1a33265127 code=0x7ffc0000 [ 89.129240][ T7711] pim6reg1: entered promiscuous mode [ 89.134743][ T7711] pim6reg1: entered allmulticast mode [ 89.716708][ T7800] pim6reg1: entered promiscuous mode [ 89.722228][ T7800] pim6reg1: entered allmulticast mode [ 90.604118][ T7866] bond_slave_1: mtu less than device minimum [ 92.788890][ T29] kauditd_printk_skb: 1025 callbacks suppressed [ 92.788916][ T29] audit: type=1400 audit(1744716826.283:6016): avc: denied { create } for pid=8031 comm="syz.1.1343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 92.835928][ T29] audit: type=1400 audit(1744716826.311:6017): avc: denied { prog_load } for pid=8031 comm="syz.1.1343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 92.855125][ T29] audit: type=1400 audit(1744716826.311:6018): avc: denied { map_create } for pid=8031 comm="syz.1.1343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 92.874263][ T29] audit: type=1400 audit(1744716826.311:6019): avc: denied { prog_load } for pid=8031 comm="syz.1.1343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 92.893508][ T29] audit: type=1400 audit(1744716826.311:6020): avc: denied { prog_load } for pid=8031 comm="syz.1.1343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 92.912732][ T29] audit: type=1400 audit(1744716826.311:6021): avc: denied { create } for pid=8031 comm="syz.1.1343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 92.957115][ T29] audit: type=1400 audit(1744716826.367:6022): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 92.981455][ T29] audit: type=1400 audit(1744716826.404:6023): avc: denied { prog_load } for pid=8033 comm="syz.4.1344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 93.000696][ T29] audit: type=1400 audit(1744716826.404:6024): avc: denied { create } for pid=8033 comm="syz.4.1344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 93.021381][ T29] audit: type=1400 audit(1744716826.404:6025): avc: denied { create } for pid=8033 comm="" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 93.251874][ T8063] ALSA: seq fatal error: cannot create timer (-22) [ 94.004672][ T8101] pim6reg1: entered promiscuous mode [ 94.010078][ T8101] pim6reg1: entered allmulticast mode [ 96.203483][ T8209] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 96.518224][ T8254] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8254 comm=syz.4.1438 [ 97.017266][ T8281] syzkaller0: entered promiscuous mode [ 97.022896][ T8281] syzkaller0: entered allmulticast mode [ 97.461053][ T8322] veth1_macvtap: left promiscuous mode [ 97.470703][ T8322] macsec0: entered promiscuous mode [ 97.806885][ T8360] pim6reg1: entered promiscuous mode [ 97.812426][ T8360] pim6reg1: entered allmulticast mode [ 98.107214][ T8386] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1496'. [ 98.117064][ T8385] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1496'. [ 98.142199][ T29] kauditd_printk_skb: 870 callbacks suppressed [ 98.142213][ T29] audit: type=1400 audit(1744716831.287:6896): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.172593][ T29] audit: type=1400 audit(1744716831.296:6897): avc: denied { map_create } for pid=8387 comm="syz.3.1497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.191765][ T29] audit: type=1400 audit(1744716831.296:6898): avc: denied { prog_load } for pid=8387 comm="syz.3.1497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.223937][ T29] audit: type=1400 audit(1744716831.362:6899): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.264459][ T29] audit: type=1400 audit(1744716831.390:6900): avc: denied { execmem } for pid=8391 comm="syz.3.1499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 98.283942][ T29] audit: type=1400 audit(1744716831.390:6901): avc: denied { prog_load } for pid=8390 comm="syz.1.1498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.303331][ T29] audit: type=1400 audit(1744716831.390:6902): avc: denied { map_create } for pid=8390 comm="syz.1.1498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.322699][ T29] audit: type=1400 audit(1744716831.390:6903): avc: denied { prog_load } for pid=8390 comm="syz.1.1498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.341788][ T29] audit: type=1400 audit(1744716831.390:6905): avc: denied { prog_load } for pid=8390 comm="syz.1.1498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.360890][ T29] audit: type=1400 audit(1744716831.390:6904): avc: denied { map_create } for pid=8391 comm="syz.3.1499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.758686][ T8432] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8432 comm=syz.5.1511 [ 99.021050][ T8451] €Â: renamed from syzkaller0 [ 99.770678][ T8530] SELinux: syz.0.1558 (8530) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 100.723604][ T8588] ALSA: seq fatal error: cannot create timer (-22) [ 100.775892][ T8595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8595 comm=syz.3.1589 [ 101.817421][ T8636] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8636 comm=syz.5.1607 [ 101.851964][ T8632] Falling back ldisc for ttyS3. [ 103.540748][ T29] kauditd_printk_skb: 770 callbacks suppressed [ 103.540765][ T29] audit: type=1400 audit(1744716836.329:7676): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.578579][ T29] audit: type=1400 audit(1744716836.376:7677): avc: denied { open } for pid=8752 comm="syz.3.1656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 103.605210][ T29] audit: type=1400 audit(1744716836.376:7678): avc: denied { open } for pid=8752 comm="syz.3.1656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 103.624520][ T29] audit: type=1400 audit(1744716836.376:7679): avc: denied { map_create } for pid=8752 comm="syz.3.1656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.643700][ T29] audit: type=1400 audit(1744716836.376:7680): avc: denied { prog_load } for pid=8752 comm="syz.3.1656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.662906][ T29] audit: type=1400 audit(1744716836.376:7681): avc: denied { prog_load } for pid=8752 comm="syz.3.1656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.682153][ T29] audit: type=1400 audit(1744716836.376:7682): avc: denied { prog_load } for pid=8752 comm="syz.3.1656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.701352][ T29] audit: type=1400 audit(1744716836.376:7683): avc: denied { prog_load } for pid=8752 comm="syz.3.1656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.720507][ T29] audit: type=1400 audit(1744716836.394:7684): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.754789][ T29] audit: type=1400 audit(1744716836.404:7685): avc: denied { prog_load } for pid=8754 comm="syz.3.1657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 104.464078][ T8832] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 104.661003][ T8844] syzkaller0: entered promiscuous mode [ 104.666604][ T8844] syzkaller0: entered allmulticast mode [ 105.061863][ T8888] bridge0: entered allmulticast mode [ 105.353615][ T8905] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 0, id = 0 [ 106.329621][ T9000] syzkaller0: entered promiscuous mode [ 106.335188][ T9000] syzkaller0: entered allmulticast mode [ 107.007669][ T9032] bond_slave_1: mtu less than device minimum [ 107.664222][ T9069] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9069 comm=syz.5.1798 [ 107.898156][ T9091] ªªªªªª: renamed from vlan0 (while UP) [ 108.670613][ T9159] debugfs: Directory 'ptm0' with parent 'caif_serial' already present! [ 108.902803][ T29] kauditd_printk_skb: 980 callbacks suppressed [ 108.902820][ T29] audit: type=1400 audit(1744716841.352:8666): avc: denied { prog_load } for pid=9173 comm="syz.3.1847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 108.966102][ T29] audit: type=1400 audit(1744716841.380:8667): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 108.990598][ T29] audit: type=1400 audit(1744716841.389:8668): avc: denied { prog_load } for pid=9175 comm="syz.4.1848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 109.010482][ T29] audit: type=1400 audit(1744716841.408:8669): avc: denied { map_create } for pid=9175 comm="syz.4.1848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 109.029888][ T29] audit: type=1400 audit(1744716841.408:8670): avc: denied { prog_load } for pid=9175 comm="syz.4.1848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 109.049022][ T29] audit: type=1400 audit(1744716841.408:8671): avc: denied { create } for pid=9175 comm="syz.4.1848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 109.049065][ T29] audit: type=1400 audit(1744716841.408:8672): avc: denied { prog_load } for pid=9175 comm="syz.4.1848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 109.049091][ T29] audit: type=1400 audit(1744716841.408:8673): avc: denied { prog_load } for pid=9175 comm="syz.4.1848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 109.049136][ T29] audit: type=1400 audit(1744716841.408:8674): avc: denied { mounton } for pid=9176 comm="syz.0.1849" path="/404/file0" dev="tmpfs" ino=2125 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 109.049233][ T29] audit: type=1400 audit(1744716841.408:8675): avc: denied { prog_load } for pid=9176 comm="syz.0.1849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 109.355123][ T9197] IPVS: nq: UDP 224.0.0.2:0 - no destination available [ 109.370758][ T9199] syzkaller0: entered allmulticast mode [ 109.376603][ T10] IPVS: starting estimator thread 0... [ 109.484979][ T9203] IPVS: using max 2016 ests per chain, 100800 per kthread [ 109.525332][ T9211] syzkaller0: entered promiscuous mode [ 109.530870][ T9211] syzkaller0: entered allmulticast mode [ 109.614496][ T9219] syzkaller0: entered promiscuous mode [ 109.620004][ T9219] syzkaller0: entered allmulticast mode [ 109.927172][ T9242] syzkaller0: entered promiscuous mode [ 109.932688][ T9242] syzkaller0: entered allmulticast mode [ 111.198578][ T9337] pim6reg1: entered promiscuous mode [ 111.203928][ T9337] pim6reg1: entered allmulticast mode [ 112.073281][ T9407] xt_recent: Unsupported userspace flags (000000c7) [ 112.272971][ T9417] syzkaller0: entered promiscuous mode [ 112.278639][ T9417] syzkaller0: entered allmulticast mode [ 112.469409][ T9427] wg2: entered promiscuous mode [ 112.474316][ T9427] wg2: entered allmulticast mode [ 112.806679][ T9456] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 112.813223][ T9456] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 112.820691][ T9456] vhci_hcd vhci_hcd.0: Device attached [ 112.827353][ T9456] vhci_hcd vhci_hcd.0: pdev(0) rhport(1) sockfd(5) [ 112.833900][ T9456] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 112.841385][ T9456] vhci_hcd vhci_hcd.0: Device attached [ 112.851024][ T9457] vhci_hcd: connection closed [ 112.851967][ T9459] vhci_hcd: connection closed [ 112.857145][ T31] vhci_hcd: stop threads [ 112.866215][ T31] vhci_hcd: release socket [ 112.870672][ T31] vhci_hcd: disconnect device [ 112.876322][ T31] vhci_hcd: stop threads [ 112.880578][ T31] vhci_hcd: release socket [ 112.885033][ T31] vhci_hcd: disconnect device [ 114.046513][ T9568] syzkaller0: entered promiscuous mode [ 114.052098][ T9568] syzkaller0: entered allmulticast mode [ 114.059023][ T3618] syzkaller0: tun_net_xmit 48 [ 114.256151][ T29] kauditd_printk_skb: 1514 callbacks suppressed [ 114.256167][ T29] audit: type=1400 audit(1744716846.366:10190): avc: denied { prog_load } for pid=9585 comm="syz.1.2035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 114.288345][ T29] audit: type=1400 audit(1744716846.366:10191): avc: denied { open } for pid=9585 comm="syz.1.2035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 114.307799][ T29] audit: type=1400 audit(1744716846.366:10192): avc: denied { map_create } for pid=9585 comm="syz.1.2035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 114.327079][ T29] audit: type=1400 audit(1744716846.366:10193): avc: denied { prog_load } for pid=9585 comm="syz.1.2035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 114.346813][ T29] audit: type=1400 audit(1744716846.366:10194): avc: denied { prog_load } for pid=9585 comm="syz.1.2035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 114.366063][ T29] audit: type=1400 audit(1744716846.366:10195): avc: denied { mounton } for pid=9585 comm="syz.1.2035" path="/414/file0" dev="tmpfs" ino=2168 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 114.388837][ T29] audit: type=1326 audit(1744716846.384:10196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9515 comm="syz.0.2002" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5f84025127 code=0x7ffc0000 [ 114.412314][ T29] audit: type=1326 audit(1744716846.384:10197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9515 comm="syz.0.2002" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f5f83fca359 code=0x7ffc0000 [ 114.435889][ T29] audit: type=1326 audit(1744716846.384:10198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9515 comm="syz.0.2002" exe="/root/syz-executor" sig=0 arch=c000003e syscall=73 compat=0 ip=0x7f5f8402e169 code=0x7ffc0000 [ 114.463774][ T29] audit: type=1400 audit(1744716846.394:10199): avc: denied { read write } for pid=4918 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 114.775627][ T9620] pim6reg1: entered promiscuous mode [ 114.781200][ T9620] pim6reg1: entered allmulticast mode [ 116.062729][ T9772] xt_hashlimit: max too large, truncated to 1048576 [ 116.151574][ T9791] ip6gretap0: entered promiscuous mode [ 116.157203][ T9791] ip6gretap0: entered allmulticast mode [ 116.183107][ T9796] pim6reg1: entered promiscuous mode [ 116.188663][ T9796] pim6reg1: entered allmulticast mode [ 116.521204][ T9844] syzkaller0: entered promiscuous mode [ 116.526718][ T9844] syzkaller0: entered allmulticast mode [ 116.653913][ T9855] dns_resolver: Unsupported server list version (0) [ 117.140827][ T9866] syzkaller0: entered promiscuous mode [ 117.146331][ T9866] syzkaller0: entered allmulticast mode [ 119.025927][T10013] syzkaller0: entered promiscuous mode [ 119.031476][T10013] syzkaller0: entered allmulticast mode [ 119.163309][T10022] syzkaller0: entered promiscuous mode [ 119.168913][T10022] syzkaller0: entered allmulticast mode [ 119.240355][T10028] syzkaller0: entered promiscuous mode [ 119.245982][T10028] syzkaller0: entered allmulticast mode [ 119.619669][ T29] kauditd_printk_skb: 1467 callbacks suppressed [ 119.619685][ T29] audit: type=1400 audit(1744716851.379:11667): avc: denied { prog_load } for pid=10065 comm="syz.4.2252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 119.678499][ T29] audit: type=1400 audit(1744716851.408:11668): avc: denied { map_create } for pid=10065 comm="syz.4.2252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 119.697906][ T29] audit: type=1400 audit(1744716851.408:11669): avc: denied { prog_load } for pid=10065 comm="syz.4.2252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 119.717193][ T29] audit: type=1400 audit(1744716851.408:11670): avc: denied { open } for pid=10065 comm="syz.4.2252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 119.736734][ T29] audit: type=1400 audit(1744716851.408:11671): avc: denied { read } for pid=10065 comm="syz.4.2252" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 119.759676][ T29] audit: type=1400 audit(1744716851.417:11672): avc: denied { read write } for pid=4918 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 119.784214][ T29] audit: type=1400 audit(1744716851.417:11673): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 119.808522][ T29] audit: type=1400 audit(1744716851.426:11674): avc: denied { open } for pid=10069 comm="syz.4.2254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 119.828056][ T29] audit: type=1400 audit(1744716851.426:11675): avc: denied { map_create } for pid=10069 comm="syz.4.2254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 119.847526][ T29] audit: type=1400 audit(1744716851.426:11676): avc: denied { prog_load } for pid=10069 comm="syz.4.2254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 120.681916][T10102] ªªªªªª: renamed from vlan0 (while UP) [ 121.468864][T10208] syzkaller0: entered promiscuous mode [ 121.474529][T10208] syzkaller0: entered allmulticast mode [ 121.918433][T10230] syzkaller0: entered promiscuous mode [ 121.923978][T10230] syzkaller0: entered allmulticast mode [ 122.437459][T10271] xt_CT: You must specify a L4 protocol and not use inversions on it [ 122.844672][T10317] binfmt_misc: register: failed to install interpreter file ./file2 [ 123.829372][T10396] pim6reg1: entered promiscuous mode [ 123.834737][T10396] pim6reg1: entered allmulticast mode [ 124.682139][T10464] binfmt_misc: register: failed to install interpreter file ./file2 [ 124.986287][ T29] kauditd_printk_skb: 1060 callbacks suppressed [ 124.986305][ T29] audit: type=1400 audit(1744716856.403:12737): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 125.024155][ T29] audit: type=1400 audit(1744716856.431:12738): avc: denied { allowed } for pid=10484 comm="syz.1.2443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 125.043873][ T29] audit: type=1400 audit(1744716856.431:12739): avc: denied { prog_load } for pid=10484 comm="syz.1.2443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 125.063317][ T29] audit: type=1400 audit(1744716856.440:12740): avc: denied { prog_load } for pid=10488 comm="syz.4.2453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 125.082884][ T29] audit: type=1400 audit(1744716856.440:12741): avc: denied { create } for pid=10488 comm="syz.4.2453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 125.102723][ T29] audit: type=1400 audit(1744716856.440:12742): avc: denied { read write } for pid=10488 comm="syz.4.2453" name="rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 125.153262][ T29] audit: type=1400 audit(1744716856.487:12743): avc: denied { create } for pid=10484 comm="syz.1.2443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 125.173983][ T29] audit: type=1400 audit(1744716856.487:12744): avc: denied { prog_load } for pid=10484 comm="syz.1.2443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 125.193614][ T29] audit: type=1400 audit(1744716856.487:12745): avc: denied { create } for pid=10484 comm="syz.1.2443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 125.214268][ T29] audit: type=1400 audit(1744716856.515:12746): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 125.666453][T10542] block device autoloading is deprecated and will be removed. [ 125.674108][T10542] syz.5.2470: attempt to access beyond end of device [ 125.674108][T10542] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 126.024683][T10581] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 0, id = 0 [ 129.578440][T10774] IPVS: nq: UDP 224.0.0.2:0 - no destination available [ 130.348139][ T29] kauditd_printk_skb: 1229 callbacks suppressed [ 130.348158][ T29] audit: type=1326 audit(1744716861.416:13976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10776 comm="" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f1a3320a359 code=0x7ffc0000 [ 130.377072][ T29] audit: type=1326 audit(1744716861.416:13977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10776 comm="" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 130.399843][ T29] audit: type=1326 audit(1744716861.426:13978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10776 comm="" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f1a3320a359 code=0x7ffc0000 [ 130.422514][ T29] audit: type=1326 audit(1744716861.426:13979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10776 comm="" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 130.445240][ T29] audit: type=1326 audit(1744716861.435:13980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10776 comm="" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f1a3320a359 code=0x7ffc0000 [ 130.467878][ T29] audit: type=1326 audit(1744716861.435:13981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10776 comm="" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 130.490596][ T29] audit: type=1326 audit(1744716861.444:13982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10776 comm="" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f1a3320a359 code=0x7ffc0000 [ 130.513231][ T29] audit: type=1326 audit(1744716861.444:13983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10776 comm="" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 130.536015][ T29] audit: type=1326 audit(1744716861.454:13984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10776 comm="" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f1a3320a359 code=0x7ffc0000 [ 130.558645][ T29] audit: type=1326 audit(1744716861.454:13985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10776 comm="" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 130.714642][T10842] syzkaller0: entered allmulticast mode [ 132.304755][T10969] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 133.052971][T11006] syzkaller0: entered promiscuous mode [ 133.058504][T11006] syzkaller0: entered allmulticast mode [ 133.574026][T11077] xt_hashlimit: max too large, truncated to 1048576 [ 133.580714][T11077] xt_hashlimit: overflow, rate too high: 0 [ 134.691328][T11155] pim6reg1: entered promiscuous mode [ 134.696712][T11155] pim6reg1: entered allmulticast mode [ 134.834380][T11173] veth0_vlan: entered allmulticast mode [ 134.855854][T11173] veth0_vlan: left promiscuous mode [ 134.861120][T11173] veth0_vlan: entered promiscuous mode [ 134.910245][T11183] xt_hashlimit: max too large, truncated to 1048576 [ 134.916871][T11183] xt_hashlimit: overflow, rate too high: 0 [ 134.942565][T11188] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 135.723711][ T29] kauditd_printk_skb: 1462 callbacks suppressed [ 135.723731][ T29] audit: type=1400 audit(1744716866.439:15448): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 135.755377][ T29] audit: type=1400 audit(1744716866.439:15449): avc: denied { map_create } for pid=11192 comm="syz.3.2757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 135.774805][ T29] audit: type=1400 audit(1744716866.439:15450): avc: denied { map_create } for pid=11192 comm="syz.3.2757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 135.794429][ T29] audit: type=1400 audit(1744716866.439:15451): avc: denied { map_create } for pid=11192 comm="syz.3.2757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 135.813796][ T29] audit: type=1400 audit(1744716866.439:15452): avc: denied { prog_load } for pid=11192 comm="syz.3.2757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 135.833564][ T29] audit: type=1400 audit(1744716866.439:15453): avc: denied { map_create } for pid=11192 comm="syz.3.2757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 135.852996][ T29] audit: type=1400 audit(1744716866.439:15454): avc: denied { prog_load } for pid=11192 comm="syz.3.2757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 135.872500][ T29] audit: type=1400 audit(1744716866.439:15455): avc: denied { prog_load } for pid=11192 comm="syz.3.2757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 135.891827][ T29] audit: type=1400 audit(1744716866.439:15456): avc: denied { prog_load } for pid=11192 comm="syz.3.2757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 135.911152][ T29] audit: type=1400 audit(1744716866.439:15457): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 136.140355][T11246] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 136.149820][T11248] serio: Serial port ptm0 [ 136.309317][T11274] serio: Serial port ptm0 [ 138.215254][T11407] pim6reg1: entered promiscuous mode [ 138.220611][T11407] pim6reg1: entered allmulticast mode [ 139.774121][T11547] xt_hashlimit: max too large, truncated to 1048576 [ 140.668937][T11616] wg2: left promiscuous mode [ 140.673610][T11616] wg2: left allmulticast mode [ 140.697968][T11616] wg2: entered promiscuous mode [ 140.702980][T11616] wg2: entered allmulticast mode [ 141.084414][ T29] kauditd_printk_skb: 1655 callbacks suppressed [ 141.084431][ T29] audit: type=1400 audit(1744716871.453:17113): avc: denied { read write } for pid=4918 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 141.128161][ T29] audit: type=1400 audit(1744716871.491:17114): avc: denied { map_create } for pid=11671 comm="syz.5.2973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 141.147630][ T29] audit: type=1400 audit(1744716871.491:17115): avc: denied { prog_load } for pid=11671 comm="syz.5.2973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 141.166966][ T29] audit: type=1400 audit(1744716871.491:17116): avc: denied { prog_load } for pid=11671 comm="syz.5.2973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 141.186286][ T29] audit: type=1400 audit(1744716871.491:17117): avc: denied { create } for pid=11671 comm="syz.5.2973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 141.215283][ T29] audit: type=1400 audit(1744716871.575:17118): avc: denied { read write } for pid=4918 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 141.240946][ T29] audit: type=1400 audit(1744716871.593:17119): avc: denied { prog_load } for pid=11673 comm="syz.5.2974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 141.260248][ T29] audit: type=1400 audit(1744716871.593:17120): avc: denied { prog_load } for pid=11673 comm="syz.5.2974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 141.279536][ T29] audit: type=1400 audit(1744716871.593:17121): avc: denied { map_create } for pid=11673 comm="syz.5.2974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 141.298904][ T29] audit: type=1400 audit(1744716871.593:17122): avc: denied { prog_load } for pid=11673 comm="syz.5.2974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 141.832342][T11710] xt_hashlimit: max too large, truncated to 1048576 [ 141.931657][T11721] wg2: entered promiscuous mode [ 141.936577][T11721] wg2: entered allmulticast mode [ 143.592804][T11825] syzkaller0: entered promiscuous mode [ 143.598634][T11825] syzkaller0: entered allmulticast mode [ 145.151453][T11983] syzkaller0: entered promiscuous mode [ 145.157050][T11983] syzkaller0: entered allmulticast mode [ 145.393022][T12006] syzkaller0: entered promiscuous mode [ 145.398645][T12006] syzkaller0: entered allmulticast mode [ 145.684185][T12032] syzkaller0: entered promiscuous mode [ 145.689702][T12032] syzkaller0: entered allmulticast mode [ 146.429803][T12082] bond_slave_1: mtu less than device minimum [ 146.431640][ T29] kauditd_printk_skb: 1375 callbacks suppressed [ 146.431656][ T29] audit: type=1400 audit(1744716876.458:18498): avc: denied { prog_load } for pid=12081 comm="syz.5.3162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 146.461441][ T29] audit: type=1400 audit(1744716876.458:18499): avc: denied { prog_load } for pid=12081 comm="syz.5.3162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 146.497349][ T29] audit: type=1400 audit(1744716876.514:18500): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 146.521022][ T29] audit: type=1400 audit(1744716876.514:18501): avc: denied { read write } for pid=4918 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 146.656179][ T29] audit: type=1400 audit(1744716876.570:18502): avc: denied { open } for pid=12084 comm="syz.0.3163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 146.675659][ T29] audit: type=1400 audit(1744716876.570:18503): avc: denied { map_create } for pid=12084 comm="syz.0.3163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 146.695033][ T29] audit: type=1400 audit(1744716876.570:18504): avc: denied { prog_load } for pid=12084 comm="syz.0.3163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 146.714391][ T29] audit: type=1400 audit(1744716876.570:18505): avc: denied { prog_load } for pid=12083 comm="syz.5.3164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 146.733740][ T29] audit: type=1400 audit(1744716876.570:18506): avc: denied { prog_load } for pid=12084 comm="syz.0.3163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 146.753101][ T29] audit: type=1400 audit(1744716876.579:18507): avc: denied { prog_load } for pid=12084 comm="syz.0.3163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 147.548533][T12167] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12167 comm=syz.1.3198 [ 147.950235][T12186] bond_slave_1: mtu less than device minimum [ 148.146319][T12200] syzkaller0: entered promiscuous mode [ 148.151894][T12200] syzkaller0: entered allmulticast mode [ 148.353611][T12218] bond_slave_1: mtu less than device minimum [ 148.974291][T12259] syzkaller0: entered promiscuous mode [ 148.979994][T12259] syzkaller0: entered allmulticast mode [ 149.216765][T12287] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 149.283525][T12290] syz.3.3253: attempt to access beyond end of device [ 149.283525][T12290] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 149.524594][T12313] pim6reg1: entered promiscuous mode [ 149.529926][T12313] pim6reg1: entered allmulticast mode [ 150.963130][T12401] syzkaller0: entered promiscuous mode [ 150.968997][T12401] syzkaller0: entered allmulticast mode [ 151.625285][T12473] Falling back ldisc for ttyS3. [ 151.861054][ T29] kauditd_printk_skb: 971 callbacks suppressed [ 151.861120][ T29] audit: type=1400 audit(1744716881.537:19479): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 151.915626][ T29] audit: type=1400 audit(1744716881.584:19480): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 151.945471][ T29] audit: type=1400 audit(1744716881.612:19481): avc: denied { prog_load } for pid=12475 comm="syz.1.3337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.964924][ T29] audit: type=1400 audit(1744716881.612:19482): avc: denied { create } for pid=12477 comm="syz.3.3338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 151.984890][ T29] audit: type=1400 audit(1744716881.612:19483): avc: denied { create } for pid=12478 comm="syz.0.3336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 152.005319][ T29] audit: type=1400 audit(1744716881.612:19484): avc: denied { prog_load } for pid=12475 comm="syz.1.3337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 152.024643][ T29] audit: type=1400 audit(1744716881.612:19485): avc: denied { map_create } for pid=12475 comm="syz.1.3337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 152.044028][ T29] audit: type=1400 audit(1744716881.612:19486): avc: denied { prog_load } for pid=12475 comm="syz.1.3337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 152.063358][ T29] audit: type=1400 audit(1744716881.612:19487): avc: denied { open } for pid=12475 comm="syz.1.3337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 152.082790][ T29] audit: type=1400 audit(1744716881.612:19488): avc: denied { prog_load } for pid=12475 comm="syz.1.3337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 154.395099][T12646] syzkaller0: entered promiscuous mode [ 154.400800][T12646] syzkaller0: entered allmulticast mode [ 155.837373][T12759] pim6reg1: entered promiscuous mode [ 155.842807][T12759] pim6reg1: entered allmulticast mode [ 156.252102][T12770] syzkaller0: entered promiscuous mode [ 156.257724][T12770] syzkaller0: entered allmulticast mode [ 157.361733][ T29] kauditd_printk_skb: 907 callbacks suppressed [ 157.361747][ T29] audit: type=1400 audit(1744716886.681:20396): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 157.429387][ T29] audit: type=1400 audit(1744716886.719:20397): avc: denied { name_bind } for pid=12830 comm="syz.3.3493" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 157.451826][ T29] audit: type=1400 audit(1744716886.719:20398): avc: denied { prog_load } for pid=12830 comm="syz.3.3493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 157.471208][ T29] audit: type=1400 audit(1744716886.719:20399): avc: denied { create } for pid=12830 comm="syz.3.3493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 157.491622][ T29] audit: type=1400 audit(1744716886.738:20400): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 157.516155][ T29] audit: type=1400 audit(1744716886.747:20401): avc: denied { bpf } for pid=12832 comm="syz.3.3494" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 157.536899][ T29] audit: type=1400 audit(1744716886.747:20402): avc: denied { prog_load } for pid=12832 comm="syz.3.3494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 157.556143][ T29] audit: type=1400 audit(1744716886.747:20403): avc: denied { map_create } for pid=12832 comm="syz.3.3494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 157.586848][ T29] audit: type=1400 audit(1744716886.747:20404): avc: denied { read write } for pid=12832 comm="syz.3.3494" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 157.611200][ T29] audit: type=1400 audit(1744716886.756:20405): avc: denied { mounton } for pid=12832 comm="syz.3.3494" path="/705" dev="tmpfs" ino=3699 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 157.877233][T12870] xt_hashlimit: max too large, truncated to 1048576 [ 159.747995][T13024] futex_wake_op: syz.1.3580 tries to shift op by 144; fix this program [ 159.797378][ T3382] IPVS: starting estimator thread 0... [ 159.891142][T13031] IPVS: using max 2352 ests per chain, 117600 per kthread [ 160.424375][T13095] €Â: renamed from syzkaller0 [ 160.440920][T13098] Process accounting resumed [ 160.469459][ T1105] IPVS: starting estimator thread 0... [ 160.564753][T13106] IPVS: using max 2592 ests per chain, 129600 per kthread [ 160.650521][ T36] IPVS: starting estimator thread 0... [ 160.746484][T13131] IPVS: using max 2448 ests per chain, 122400 per kthread [ 160.922322][T13165] syz.5.3645: attempt to access beyond end of device [ 160.922322][T13165] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 161.461351][T13227] IPVS: nq: UDP 224.0.0.2:0 - no destination available [ 162.752249][ T29] kauditd_printk_skb: 1533 callbacks suppressed [ 162.752266][ T29] audit: type=1400 audit(1744716891.723:21939): avc: denied { execute } for pid=13321 comm="syz.3.3718" path=2F6D656D66643A0B656D31C1F8A68D4EC0A377E2CBA2BAE5F497AC232AFF202864656C6574656429 dev="tmpfs" ino=262 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 163.224270][ T29] audit: type=1400 audit(1744716892.163:21940): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 163.257304][ T29] audit: type=1400 audit(1744716892.191:21941): avc: denied { prog_load } for pid=13336 comm="syz.1.3722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.286684][ T29] audit: type=1400 audit(1744716892.191:21942): avc: denied { prog_load } for pid=13338 comm="syz.0.3732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.306039][ T29] audit: type=1400 audit(1744716892.191:21943): avc: denied { map_create } for pid=13338 comm="syz.0.3732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.306063][ T29] audit: type=1400 audit(1744716892.191:21944): avc: denied { prog_load } for pid=13338 comm="syz.0.3732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.306085][ T29] audit: type=1400 audit(1744716892.191:21945): avc: denied { prog_load } for pid=13338 comm="syz.0.3732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.306111][ T29] audit: type=1400 audit(1744716892.191:21946): avc: denied { prog_load } for pid=13338 comm="syz.0.3732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.306180][ T29] audit: type=1400 audit(1744716892.191:21947): avc: denied { prog_load } for pid=13336 comm="syz.1.3722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.306206][ T29] audit: type=1400 audit(1744716892.191:21948): avc: denied { create } for pid=13338 comm="syz.0.3732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 163.629072][T13377] €Â: renamed from syzkaller0 [ 164.127576][T13482] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13482 comm=syz.5.3793 [ 166.631963][T13680] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pid=13680 comm=syz.4.3881 [ 167.588916][T13732] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pid=13732 comm=syz.5.3905 [ 167.770140][T13766] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pid=13766 comm=syz.0.3921 [ 167.834006][T13776] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pid=13776 comm=syz.3.3935 [ 168.139163][ T29] kauditd_printk_skb: 1300 callbacks suppressed [ 168.139181][ T29] audit: type=1400 audit(1744716896.765:23249): avc: denied { prog_load } for pid=13794 comm="syz.1.3934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 168.164798][ T29] audit: type=1400 audit(1744716896.765:23250): avc: denied { read } for pid=13794 comm="syz.1.3934" dev="nsfs" ino=4026532859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 168.186139][ T29] audit: type=1400 audit(1744716896.765:23251): avc: denied { allowed } for pid=13794 comm="syz.1.3934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 168.216981][ T29] audit: type=1400 audit(1744716896.831:23252): avc: denied { create } for pid=13794 comm="syz.1.3934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 168.239183][ T29] audit: type=1400 audit(1744716896.831:23253): avc: denied { prog_load } for pid=13794 comm="syz.1.3934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 168.258722][ T29] audit: type=1400 audit(1744716896.849:23254): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 168.284970][ T29] audit: type=1400 audit(1744716896.905:23255): avc: denied { prog_load } for pid=13797 comm="syz.3.3936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 168.304305][ T29] audit: type=1400 audit(1744716896.905:23256): avc: denied { map_create } for pid=13797 comm="syz.3.3936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 168.323831][ T29] audit: type=1400 audit(1744716896.905:23257): avc: denied { prog_load } for pid=13797 comm="syz.3.3936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 168.343069][ T29] audit: type=1400 audit(1744716896.905:23258): avc: denied { prog_load } for pid=13797 comm="syz.3.3936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 169.587051][T13864] pim6reg1: entered promiscuous mode [ 169.592475][T13864] pim6reg1: entered allmulticast mode [ 171.381478][T13988] netlink: 'syz.1.4024': attribute type 29 has an invalid length. [ 171.777423][T14028] pim6reg1: entered promiscuous mode [ 171.782801][T14028] pim6reg1: entered allmulticast mode [ 171.863691][T14032] IPVS: nq: UDP 224.0.0.2:0 - no destination available [ 172.681584][T14075] Process accounting resumed [ 172.865800][T14115] SELinux: syz.5.4083 (14115) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 173.188243][T14151] €Â: renamed from syzkaller0 [ 173.691083][ T29] kauditd_printk_skb: 926 callbacks suppressed [ 173.691100][ T29] audit: type=1400 audit(1744716901.957:24185): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 173.820966][ T29] audit: type=1400 audit(1744716902.069:24186): avc: denied { read write } for pid=4918 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 173.872929][ T29] audit: type=1400 audit(1744716902.106:24187): avc: denied { prog_load } for pid=14166 comm="syz.3.4105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 173.892262][ T29] audit: type=1400 audit(1744716902.116:24188): avc: denied { prog_load } for pid=14166 comm="syz.3.4105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 173.911797][ T29] audit: type=1400 audit(1744716902.116:24189): avc: denied { create } for pid=14166 comm="syz.3.4105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 173.931721][ T29] audit: type=1400 audit(1744716902.116:24190): avc: denied { create } for pid=14166 comm="syz.3.4105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 173.951465][ T29] audit: type=1400 audit(1744716902.116:24191): avc: denied { prog_load } for pid=14166 comm="syz.3.4105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 173.970881][ T29] audit: type=1400 audit(1744716902.116:24192): avc: denied { map_create } for pid=14168 comm="syz.5.4104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 173.990274][ T29] audit: type=1400 audit(1744716902.116:24193): avc: denied { prog_load } for pid=14168 comm="syz.5.4104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 174.010195][ T29] audit: type=1400 audit(1744716902.116:24194): avc: denied { prog_load } for pid=14168 comm="syz.5.4104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 174.444266][T14210] xt_hashlimit: invalid interval [ 175.046160][T14250] Process accounting resumed [ 175.107918][T14252] Process accounting resumed [ 177.420388][T14371] pim6reg1: entered promiscuous mode [ 177.425987][T14371] pim6reg1: entered allmulticast mode [ 177.664135][T14381] futex_wake_op: syz.1.4199 tries to shift op by -1; fix this program [ 177.829205][T14397] pim6reg1: entered promiscuous mode [ 177.834610][T14397] pim6reg1: entered allmulticast mode [ 177.915243][T14399] syzkaller0: entered promiscuous mode [ 177.920843][T14399] syzkaller0: entered allmulticast mode [ 178.177838][T14414] pim6reg1: entered promiscuous mode [ 178.183418][T14414] pim6reg1: entered allmulticast mode [ 178.346614][T14425] syzkaller0: entered promiscuous mode [ 178.352229][T14425] syzkaller0: entered allmulticast mode [ 178.618048][T14457] futex_wake_op: syz.0.4234 tries to shift op by -1; fix this program [ 178.651281][T14465] xt_hashlimit: invalid interval [ 179.046559][ T29] kauditd_printk_skb: 855 callbacks suppressed [ 179.046575][ T29] audit: type=1400 audit(1744716906.961:25050): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 179.071864][T14508] futex_wake_op: syz.5.4265 tries to shift op by -1; fix this program [ 179.077242][ T29] audit: type=1400 audit(1744716906.970:25051): avc: denied { read write } for pid=14506 comm="syz.5.4265" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 179.109764][ T29] audit: type=1400 audit(1744716907.008:25052): avc: denied { prog_load } for pid=14506 comm="syz.5.4265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 179.129146][ T29] audit: type=1400 audit(1744716907.008:25053): avc: denied { prog_load } for pid=14506 comm="syz.5.4265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 179.148533][ T29] audit: type=1400 audit(1744716907.026:25054): avc: denied { read write } for pid=4918 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 179.554373][ T29] audit: type=1400 audit(1744716907.438:25055): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 179.580247][ T29] audit: type=1400 audit(1744716907.466:25056): avc: denied { prog_load } for pid=14510 comm="syz.3.4258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 179.599564][ T29] audit: type=1400 audit(1744716907.466:25057): avc: denied { map_create } for pid=14511 comm="syz.5.4257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 179.620554][ T29] audit: type=1400 audit(1744716907.466:25058): avc: denied { prog_load } for pid=14511 comm="syz.5.4257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 179.621206][T14513] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14513 comm=syz.3.4258 [ 179.639895][ T29] audit: type=1400 audit(1744716907.466:25059): avc: denied { prog_load } for pid=14511 comm="syz.5.4257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 180.661181][T14601] pim6reg1: entered promiscuous mode [ 180.666633][T14601] pim6reg1: entered allmulticast mode [ 180.977379][T14627] pim6reg1: entered promiscuous mode [ 180.982719][T14627] pim6reg1: entered allmulticast mode [ 181.145454][T14631] syzkaller0: entered promiscuous mode [ 181.151053][T14631] syzkaller0: entered allmulticast mode [ 184.396401][ T29] kauditd_printk_skb: 1206 callbacks suppressed [ 184.396417][ T29] audit: type=1326 audit(1744716911.975:26266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14918 comm="syz.3.4439" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd68d0be169 code=0x7ffc0000 [ 184.437984][ T29] audit: type=1326 audit(1744716911.975:26267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14918 comm="syz.3.4439" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd68d0be169 code=0x7ffc0000 [ 184.461678][ T29] audit: type=1326 audit(1744716911.975:26268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14918 comm="syz.3.4439" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fd68d0be169 code=0x7ffc0000 [ 184.485346][ T29] audit: type=1400 audit(1744716911.975:26269): avc: denied { open } for pid=14918 comm="syz.3.4439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 184.504944][ T29] audit: type=1326 audit(1744716911.975:26270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14918 comm="syz.3.4439" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd68d0be169 code=0x7ffc0000 [ 184.528622][ T29] audit: type=1326 audit(1744716911.975:26271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14918 comm="syz.3.4439" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd68d0be169 code=0x7ffc0000 [ 184.552460][ T29] audit: type=1400 audit(1744716911.975:26272): avc: denied { map_create } for pid=14918 comm="syz.3.4439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 184.571862][ T29] audit: type=1326 audit(1744716911.975:26273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14918 comm="syz.3.4439" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd68d0be169 code=0x7ffc0000 [ 184.595616][ T29] audit: type=1326 audit(1744716911.975:26274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14918 comm="syz.3.4439" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd68d0be169 code=0x7ffc0000 [ 184.619572][ T29] audit: type=1326 audit(1744716911.975:26275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14918 comm="syz.3.4439" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd68d0be169 code=0x7ffc0000 [ 186.664701][T15034] wg2: left promiscuous mode [ 186.669350][T15034] wg2: left allmulticast mode [ 186.861095][T15051] €Â: renamed from syzkaller0 [ 187.731641][T15095] wg2: left promiscuous mode [ 187.731661][T15095] wg2: left allmulticast mode [ 187.953012][T15119] veth0_vlan: entered allmulticast mode [ 189.362242][T15189] syzkaller0: entered promiscuous mode [ 189.367818][T15189] syzkaller0: entered allmulticast mode [ 190.216123][ T29] kauditd_printk_skb: 907 callbacks suppressed [ 190.216138][ T29] audit: type=1400 audit(1744716917.409:27183): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 190.263160][ T29] audit: type=1400 audit(1744716917.428:27184): avc: denied { open } for pid=15211 comm="syz.0.4569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 190.282629][ T29] audit: type=1400 audit(1744716917.428:27185): avc: denied { prog_load } for pid=15211 comm="syz.0.4569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 190.302035][ T29] audit: type=1400 audit(1744716917.428:27186): avc: denied { map_create } for pid=15211 comm="syz.0.4569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 190.321564][ T29] audit: type=1400 audit(1744716917.428:27187): avc: denied { prog_load } for pid=15211 comm="syz.0.4569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 190.340837][ T29] audit: type=1400 audit(1744716917.428:27188): avc: denied { prog_load } for pid=15211 comm="syz.0.4569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 190.360105][ T29] audit: type=1400 audit(1744716917.428:27189): avc: denied { map_create } for pid=15211 comm="syz.0.4569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 190.379475][ T29] audit: type=1400 audit(1744716917.428:27190): avc: denied { prog_load } for pid=15211 comm="syz.0.4569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 190.398800][ T29] audit: type=1400 audit(1744716917.428:27191): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 190.422148][ T29] audit: type=1400 audit(1744716917.428:27192): avc: denied { create } for pid=15213 comm="syz.0.4570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 191.894229][T15325] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15325 comm=syz.3.4617 [ 192.092117][T15341] syzkaller0: entered promiscuous mode [ 192.097650][T15341] syzkaller0: entered allmulticast mode [ 192.287087][T15357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15357 comm=syz.1.4630 [ 192.781365][T15374] ip6gretap0: entered promiscuous mode [ 192.786930][T15374] ip6gretap0: entered allmulticast mode [ 192.965867][T15389] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15389 comm=syz.5.4644 [ 193.166551][T15401] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43100 sclass=netlink_route_socket pid=15401 comm=syz.4.4650 [ 194.186149][T15512] syzkaller0: entered promiscuous mode [ 194.191720][T15512] syzkaller0: entered allmulticast mode [ 194.333264][T15516] syzkaller0: entered promiscuous mode [ 194.338976][T15516] syzkaller0: entered allmulticast mode [ 195.402955][T15595] syzkaller0: entered promiscuous mode [ 195.408521][T15595] syzkaller0: entered allmulticast mode [ 195.434832][T15599] pim6reg1: entered promiscuous mode [ 195.440230][T15599] pim6reg1: entered allmulticast mode [ 195.570277][T15609] syzkaller0: entered allmulticast mode [ 195.596961][ T29] kauditd_printk_skb: 1019 callbacks suppressed [ 195.596978][ T29] audit: type=1400 audit(1744716922.442:28212): avc: denied { prog_load } for pid=15604 comm="syz.1.4740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 195.597189][T15610] xt_CT: You must specify a L4 protocol and not use inversions on it [ 195.794164][ T29] audit: type=1400 audit(1744716922.620:28213): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 195.841372][ T29] audit: type=1400 audit(1744716922.666:28214): avc: denied { execmem } for pid=15611 comm="syz.0.4743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 195.860938][ T29] audit: type=1400 audit(1744716922.666:28215): avc: denied { prog_load } for pid=15611 comm="syz.0.4743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 195.880230][ T29] audit: type=1400 audit(1744716922.676:28216): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 195.920253][ T29] audit: type=1400 audit(1744716922.704:28217): avc: denied { read write } for pid=4918 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 195.944637][ T29] audit: type=1400 audit(1744716922.741:28218): avc: denied { map_create } for pid=15613 comm="syz.5.4745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 195.964087][ T29] audit: type=1400 audit(1744716922.741:28219): avc: denied { prog_load } for pid=15613 comm="syz.5.4745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 195.983339][ T29] audit: type=1400 audit(1744716922.741:28220): avc: denied { prog_load } for pid=15613 comm="syz.5.4745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 196.002645][ T29] audit: type=1400 audit(1744716922.741:28221): avc: denied { map_create } for pid=15613 comm="syz.5.4745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 196.198719][T15622] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(5) [ 196.205289][T15622] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 196.212804][T15622] vhci_hcd vhci_hcd.0: Device attached [ 196.223391][T15623] vhci_hcd: connection closed [ 196.223580][ T3626] vhci_hcd: stop threads [ 196.232618][ T3626] vhci_hcd: release socket [ 196.237082][ T3626] vhci_hcd: disconnect device [ 196.852298][T15677] xt_CT: No such helper "netbios-ns" [ 196.899880][T15683] Process accounting resumed [ 197.661705][T15765] Process accounting resumed [ 197.790109][T15776] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.4814'. [ 198.779469][T15843] syzkaller0: entered promiscuous mode [ 198.785097][T15843] syzkaller0: entered allmulticast mode [ 199.373007][T15871] xt_CT: You must specify a L4 protocol and not use inversions on it [ 199.640423][T15883] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 199.820514][ T3334] unregister_netdevice: waiting for batadv0 to become free. Usage count = 3 [ 200.963158][ T29] kauditd_printk_skb: 975 callbacks suppressed [ 200.963174][ T29] audit: type=1400 audit(1744716927.465:29197): avc: denied { read write } for pid=4918 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 201.007076][ T29] audit: type=1400 audit(1744716927.474:29198): avc: denied { create } for pid=15949 comm="syz.5.4887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 201.026997][ T29] audit: type=1400 audit(1744716927.474:29199): avc: denied { name_bind } for pid=15949 comm="syz.5.4887" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 201.081903][T15955] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 201.098827][ T29] audit: type=1400 audit(1744716927.549:29200): avc: denied { map_create } for pid=15951 comm="syz.1.4888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 201.118290][ T29] audit: type=1400 audit(1744716927.549:29201): avc: denied { prog_load } for pid=15951 comm="syz.1.4888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 201.137619][ T29] audit: type=1400 audit(1744716927.549:29202): avc: denied { open } for pid=15951 comm="syz.1.4888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 201.157133][ T29] audit: type=1400 audit(1744716927.549:29203): avc: denied { open } for pid=15951 comm="syz.1.4888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 201.176559][ T29] audit: type=1400 audit(1744716927.577:29204): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 201.200887][ T29] audit: type=1400 audit(1744716927.596:29205): avc: denied { map_create } for pid=15954 comm="syz.4.4890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 201.220254][ T29] audit: type=1400 audit(1744716927.596:29206): avc: denied { prog_load } for pid=15954 comm="syz.4.4890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 201.343305][T15974] €Â: renamed from syzkaller0 [ 201.526928][T15999] block device autoloading is deprecated and will be removed. [ 201.535922][T15999] syz.0.4909: attempt to access beyond end of device [ 201.535922][T15999] md34: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 201.596532][ T3382] Process accounting resumed [ 202.919528][T16086] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 202.985480][T16089] Process accounting resumed [ 203.800811][T16202] xt_TCPMSS: Only works on TCP SYN packets [ 203.826110][T16204] xt_hashlimit: max too large, truncated to 1048576 [ 204.872721][T16263] SELinux: syz.4.5029 (16263) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 205.604370][T16282] wg2: entered promiscuous mode [ 205.609298][T16282] wg2: entered allmulticast mode [ 205.617089][T16282] wg2: left promiscuous mode [ 205.621719][T16282] wg2: left allmulticast mode [ 205.898648][ T3382] IPVS: starting estimator thread 0... [ 206.001278][T16309] IPVS: using max 2496 ests per chain, 124800 per kthread [ 206.680091][ T29] kauditd_printk_skb: 1189 callbacks suppressed [ 206.680108][ T29] audit: type=1400 audit(1744716932.815:30396): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 206.745817][ T29] audit: type=1400 audit(1744716932.853:30397): avc: denied { map_create } for pid=16324 comm="syz.3.5056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.765271][ T29] audit: type=1400 audit(1744716932.853:30398): avc: denied { prog_load } for pid=16324 comm="syz.3.5056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.784557][ T29] audit: type=1400 audit(1744716932.853:30399): avc: denied { prog_load } for pid=16324 comm="syz.3.5056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.803782][ T29] audit: type=1400 audit(1744716932.853:30400): avc: denied { prog_load } for pid=16324 comm="syz.3.5056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.823061][ T29] audit: type=1400 audit(1744716932.853:30401): avc: denied { prog_load } for pid=16324 comm="syz.3.5056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.842291][ T29] audit: type=1400 audit(1744716932.862:30402): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 206.867401][ T29] audit: type=1400 audit(1744716932.871:30403): avc: denied { create } for pid=16326 comm="syz.3.5057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 206.887234][ T29] audit: type=1400 audit(1744716932.965:30404): avc: denied { prog_load } for pid=16326 comm="syz.3.5057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.906560][ T29] audit: type=1400 audit(1744716932.965:30405): avc: denied { map_create } for pid=16326 comm="syz.3.5057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 207.741558][T16386] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5083'. [ 207.841081][T16393] syz.0.5094: attempt to access beyond end of device [ 207.841081][T16393] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 208.183298][T16406] TCP: out of memory -- consider tuning tcp_mem [ 208.559583][T16437] syzkaller0: entered promiscuous mode [ 208.559600][T16437] syzkaller0: entered allmulticast mode [ 209.051271][T16446] syzkaller0: entered promiscuous mode [ 209.051363][T16446] syzkaller0: entered allmulticast mode [ 209.194201][T16454] syz.1.5109: attempt to access beyond end of device [ 209.194201][T16454] md34: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 209.469647][T16480] xt_hashlimit: max too large, truncated to 1048576 [ 209.504324][T16485] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16485 comm=syz.1.5124 [ 209.891920][T16503] syzkaller0: entered allmulticast mode [ 210.901220][T16540] Process accounting resumed [ 212.178219][ T29] kauditd_printk_skb: 766 callbacks suppressed [ 212.178236][ T29] audit: type=1400 audit(1744716937.951:31172): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 212.284931][ T29] audit: type=1400 audit(1744716938.054:31173): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 212.315651][ T29] audit: type=1400 audit(1744716938.082:31174): avc: denied { map_create } for pid=16604 comm="syz.0.5183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 212.339315][ T29] audit: type=1400 audit(1744716938.082:31175): avc: denied { prog_load } for pid=16604 comm="syz.0.5183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 212.358769][ T29] audit: type=1400 audit(1744716938.082:31176): avc: denied { create } for pid=16604 comm="syz.0.5183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 212.378758][ T29] audit: type=1400 audit(1744716938.100:31177): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 212.407638][ T29] audit: type=1400 audit(1744716938.128:31178): avc: denied { read write } for pid=16602 comm="syz.3.5173" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 212.431948][ T29] audit: type=1400 audit(1744716938.128:31179): avc: denied { mounton } for pid=16602 comm="syz.3.5173" path="/proc/2692/task" dev="proc" ino=47310 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=0 [ 212.454915][ T29] audit: type=1400 audit(1744716938.147:31180): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 212.531654][ T29] audit: type=1400 audit(1744716938.175:31181): avc: denied { map_create } for pid=16607 comm="syz.3.5175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 212.538788][T16609] syzkaller0: entered promiscuous mode [ 212.556751][T16609] syzkaller0: entered allmulticast mode [ 212.599702][T16621] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 212.657372][T16626] Process accounting resumed [ 212.940359][T16646] syzkaller0: entered promiscuous mode [ 212.945900][T16646] syzkaller0: entered allmulticast mode [ 212.954330][T16652] wg2: entered promiscuous mode [ 212.959536][T16652] wg2: entered allmulticast mode [ 213.160531][T16670] Process accounting resumed [ 215.188508][T16784] syzkaller0: entered promiscuous mode [ 215.194155][T16784] syzkaller0: entered allmulticast mode [ 215.254151][T16790] syzkaller0: entered promiscuous mode [ 215.259856][T16790] syzkaller0: entered allmulticast mode [ 216.177666][T16838] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 216.286114][T16847] syzkaller0: entered promiscuous mode [ 216.291631][T16847] syzkaller0: entered allmulticast mode [ 216.424103][ T31] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 217.875720][ T29] kauditd_printk_skb: 820 callbacks suppressed [ 217.875738][ T29] audit: type=1400 audit(1744716943.282:32002): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 217.912247][ T29] audit: type=1400 audit(1744716943.320:32003): avc: denied { open } for pid=16900 comm="syz.4.5300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 217.917470][T16901] lo: entered promiscuous mode [ 217.948391][ T29] audit: type=1400 audit(1744716943.320:32004): avc: denied { bpf } for pid=16900 comm="syz.4.5300" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 217.969583][ T29] audit: type=1400 audit(1744716943.357:32005): avc: denied { bpf } for pid=16900 comm="syz.4.5300" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 218.022098][ T29] audit: type=1400 audit(1744716943.413:32006): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 218.046587][ T29] audit: type=1400 audit(1744716943.423:32007): avc: denied { prog_load } for pid=16902 comm="syz.4.5301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 218.074714][ T29] audit: type=1400 audit(1744716943.470:32008): avc: denied { open } for pid=16902 comm="syz.4.5301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 218.094177][ T29] audit: type=1400 audit(1744716943.470:32009): avc: denied { map_create } for pid=16902 comm="syz.4.5301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 218.113625][ T29] audit: type=1400 audit(1744716943.470:32010): avc: denied { prog_load } for pid=16902 comm="syz.4.5301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 218.132914][ T29] audit: type=1400 audit(1744716943.470:32011): avc: denied { prog_load } for pid=16902 comm="syz.4.5301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 218.234213][T16907] syzkaller0: entered promiscuous mode [ 218.239755][T16907] syzkaller0: entered allmulticast mode [ 218.676905][T16943] Process accounting resumed [ 219.008866][T16955] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16955 comm=syz.1.5325 [ 219.982291][T17001] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 220.456678][T17030] ÿÿÿÿÿÿ: renamed from vlan1 [ 220.935298][T17070] Process accounting resumed [ 221.339897][T17080] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 221.346511][T17080] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 221.354260][T17080] vhci_hcd vhci_hcd.0: Device attached [ 221.360328][T17081] vhci_hcd: connection closed [ 221.360507][ T380] vhci_hcd: stop threads [ 221.369555][ T380] vhci_hcd: release socket [ 221.373996][ T380] vhci_hcd: disconnect device [ 222.191663][T17114] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 222.426569][T17124] syzkaller0: refused to change device tx_queue_len [ 222.502198][T17128] lo: entered promiscuous mode [ 222.586725][ T3619] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 223.242317][ T29] kauditd_printk_skb: 796 callbacks suppressed [ 223.242333][ T29] audit: type=1400 audit(1744716948.306:32808): avc: denied { read write } for pid=17157 comm="syz.5.5407" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 223.315569][ T29] audit: type=1400 audit(1744716948.362:32809): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 223.355199][ T29] audit: type=1400 audit(1744716948.418:32810): avc: denied { map_create } for pid=17157 comm="syz.5.5407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 223.383861][ T29] audit: type=1400 audit(1744716948.437:32811): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 223.411814][ T29] audit: type=1400 audit(1744716948.446:32812): avc: denied { read write } for pid=4918 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 223.436278][ T29] audit: type=1400 audit(1744716948.446:32813): avc: denied { create } for pid=17160 comm="syz.4.5409" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=0 [ 223.457171][ T29] audit: type=1400 audit(1744716948.446:32814): avc: denied { map_create } for pid=17162 comm="syz.0.5408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 223.476648][ T29] audit: type=1400 audit(1744716948.446:32815): avc: denied { prog_load } for pid=17162 comm="syz.0.5408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 223.495977][ T29] audit: type=1400 audit(1744716948.455:32816): avc: denied { create } for pid=17162 comm="syz.0.5408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 223.515965][ T29] audit: type=1400 audit(1744716948.455:32817): avc: denied { read } for pid=17162 comm="syz.0.5408" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 225.999714][T17357] debugfs: Directory 'ttyS3' with parent 'caif_serial' already present! [ 226.249534][T17370] syzkaller0: entered promiscuous mode [ 226.255082][T17370] syzkaller0: entered allmulticast mode [ 227.115585][T17406] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 227.237663][T17421] syzkaller0: refused to change device tx_queue_len [ 227.283068][T17419] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.5521'. [ 227.292865][T17414] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.5521'. [ 227.325288][T17429] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=28142 sclass=netlink_route_socket pid=17429 comm=syz.1.5528 [ 228.372892][T17478] syzkaller0: entered promiscuous mode [ 228.378479][T17478] syzkaller0: entered allmulticast mode [ 228.418411][T17485] xt_recent: hitcount (4294967295) is larger than allowed maximum (65535) [ 228.589840][ T29] kauditd_printk_skb: 1217 callbacks suppressed [ 228.589856][ T29] audit: type=1326 audit(1744716953.310:34035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17479 comm="syz.1.5546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f1a33265127 code=0x7ffc0000 [ 228.621575][ T29] audit: type=1400 audit(1744716953.338:34036): avc: denied { map_create } for pid=17486 comm="syz.4.5549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 228.640968][ T29] audit: type=1326 audit(1744716953.338:34037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17479 comm="syz.1.5546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f1a3320a359 code=0x7ffc0000 [ 228.664637][ T29] audit: type=1326 audit(1744716953.338:34038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17479 comm="syz.1.5546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f1a33265127 code=0x7ffc0000 [ 228.688241][ T29] audit: type=1326 audit(1744716953.338:34039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17479 comm="syz.1.5546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f1a3320a359 code=0x7ffc0000 [ 228.711729][ T29] audit: type=1326 audit(1744716953.338:34040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17479 comm="syz.1.5546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f1a3326e169 code=0x7ffc0000 [ 228.735427][ T29] audit: type=1400 audit(1744716953.338:34041): avc: denied { prog_load } for pid=17486 comm="syz.4.5549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 228.754737][ T29] audit: type=1400 audit(1744716953.347:34042): avc: denied { map_create } for pid=17486 comm="syz.4.5549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 228.774064][ T29] audit: type=1400 audit(1744716953.347:34043): avc: denied { prog_load } for pid=17486 comm="syz.4.5549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 228.781805][ T3619] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 228.811921][ T29] audit: type=1326 audit(1744716953.516:34044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17479 comm="syz.1.5546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f1a33265127 code=0x7ffc0000 [ 229.862423][T17533] Process accounting resumed [ 229.886981][T17542] futex_wake_op: syz.0.5568 tries to shift op by -1; fix this program [ 229.975595][T17545] Process accounting resumed [ 232.193179][T17618] xt_CT: You must specify a L4 protocol and not use inversions on it [ 232.611354][T17642] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.5609'. [ 232.635982][T17641] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.5609'. [ 232.724546][T17648] IPVS: nq: UDP 224.0.0.2:0 - no destination available [ 232.760323][T17652] Process accounting resumed [ 232.869944][T17660] Process accounting resumed [ 233.885677][T17709] Process accounting resumed [ 233.951706][ T29] kauditd_printk_skb: 755 callbacks suppressed [ 233.951724][ T29] audit: type=1400 audit(1744716958.324:34800): avc: denied { prog_load } for pid=17710 comm="syz.4.5641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 233.979007][ T29] audit: type=1400 audit(1744716958.333:34801): avc: denied { prog_load } for pid=17712 comm="syz.1.5642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 233.999929][ T29] audit: type=1400 audit(1744716958.352:34802): avc: denied { prog_load } for pid=17710 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 234.018737][ T29] audit: type=1400 audit(1744716958.352:34803): avc: denied { create } for pid=17710 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 234.037859][ T29] audit: type=1400 audit(1744716958.352:34804): avc: denied { bpf } for pid=17710 comm="+}[@" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 234.058768][ T29] audit: type=1400 audit(1744716958.370:34805): avc: denied { execmem } for pid=17715 comm="syz.1.5643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 234.078292][ T29] audit: type=1400 audit(1744716958.370:34806): avc: denied { map_create } for pid=17715 comm="syz.1.5643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 234.097850][ T29] audit: type=1400 audit(1744716958.370:34807): avc: denied { prog_load } for pid=17715 comm="syz.1.5643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 234.117117][ T29] audit: type=1400 audit(1744716958.370:34808): avc: denied { create } for pid=17715 comm="syz.1.5643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 234.136805][ T29] audit: type=1400 audit(1744716958.408:34809): avc: denied { bpf } for pid=17717 comm="syz.1.5644" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 234.896878][ T380] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 235.655546][T17806] ================================================================== [ 235.663672][T17806] BUG: KCSAN: data-race in atime_needs_update / touch_atime [ 235.670996][T17806] [ 235.673331][T17806] write to 0xffff88811a9a0f78 of 4 bytes by task 17812 on cpu 1: [ 235.681062][T17806] touch_atime+0x1f3/0x350 [ 235.685493][T17806] shmem_file_splice_read+0x584/0x5d0 [ 235.690874][T17806] splice_direct_to_actor+0x26c/0x680 [ 235.696281][T17806] do_splice_direct+0xd9/0x150 [ 235.701089][T17806] do_sendfile+0x40a/0x690 [ 235.705522][T17806] __x64_sys_sendfile64+0x113/0x160 [ 235.710741][T17806] x64_sys_call+0xfc3/0x2e10 [ 235.715350][T17806] do_syscall_64+0xc9/0x1c0 [ 235.719881][T17806] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 235.725788][T17806] [ 235.728124][T17806] read to 0xffff88811a9a0f78 of 4 bytes by task 17806 on cpu 0: [ 235.735766][T17806] atime_needs_update+0x261/0x3e0 [ 235.740825][T17806] touch_atime+0x4a/0x350 [ 235.745171][T17806] shmem_file_splice_read+0x584/0x5d0 [ 235.750553][T17806] splice_direct_to_actor+0x26c/0x680 [ 235.755945][T17806] do_splice_direct+0xd9/0x150 [ 235.760730][T17806] do_sendfile+0x40a/0x690 [ 235.765172][T17806] __x64_sys_sendfile64+0x113/0x160 [ 235.770400][T17806] x64_sys_call+0xfc3/0x2e10 [ 235.775018][T17806] do_syscall_64+0xc9/0x1c0 [ 235.779553][T17806] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 235.785455][T17806] [ 235.787816][T17806] value changed: 0x3680aecd -> 0x370f69df [ 235.793539][T17806] [ 235.795863][T17806] Reported by Kernel Concurrency Sanitizer on: [ 235.802032][T17806] CPU: 0 UID: 0 PID: 17806 Comm: syz.4.5683 Not tainted 6.15.0-rc2-syzkaller-00037-g834a4a689699 #0 PREEMPT(voluntary) [ 235.814552][T17806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 235.824623][T17806] ================================================================== [ 241.065185][ T3626] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration