last executing test programs: 5.15002021s ago: executing program 4 (id=1033): r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) recvmmsg(0xffffffffffffffff, &(0x7f0000006940)=[{{0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x85}], 0x1, 0x40, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$sock(r1, &(0x7f00000044c0), 0x4000000000001c0, 0x0) recvfrom(r2, &(0x7f0000000040)=""/60, 0xdb, 0x40, 0x0, 0x0) 5.045068648s ago: executing program 4 (id=1036): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 4.952065473s ago: executing program 4 (id=1038): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, 0x0, 0x0) listen(r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r3 = accept(r1, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xfffffdef}, 0x1, 0x0, 0x0, 0x800}, 0x10) recvfrom(r2, &(0x7f0000000080)=""/60, 0xfffffffffffffeeb, 0x101, 0x0, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) 4.07528829s ago: executing program 4 (id=1043): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f00000002c0)={[{@test_dummy_encryption_v1}, {@usrjquota}, {@auto_da_alloc}, {@init_itable}, {@nodioread_nolock}, {@journal_checksum}, {@max_batch_time={'max_batch_time', 0x3d, 0x5}}]}, 0x1, 0x587, &(0x7f0000000940)="$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") prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) syz_io_uring_setup(0x63eb, &(0x7f0000000680)={0x0, 0x1200, 0x8, 0x2, 0x16b}, &(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'lo\x00'}) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000080}, 0x10) r6 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb801b, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0xb093, 0x800000, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) r8 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4e0, 0x0, 0x18c, 0x203, 0x320, 0x19030000, 0x410, 0x2e0, 0x2e0, 0x410, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x2d8, 0x320, 0x300, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{0x1d, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, 0xe}, {0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x3}, {0x2, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x8}, {}, {0x16}, {0x0, 0xff}, {}, {0x7}, {0x0, 0x0, 0x0, 0x4}, {0x0, 0x4, 0x0, 0x101}, {}, {0x0, 0x0, 0x5}, {}, {0x0, 0x0, 0x0, 0x9}, {0xfffc, 0x0, 0x0, 0x6}, {}, {0xfffe}, {}, {}, {}, {0xfffe, 0xfb}, {}, {0x7a04}, {}, {}, {0x20, 0x6}, {}, {}, {}, {0x0, 0x0, 0x0, 0x800}, {}, {0xb8c, 0x0, 0x0, 0xf00}, {0x0, 0x1, 0x0, 0x3}, {0x3}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {0x0, 0xfd}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffd}, {}, {0x0, 0xb}, {0x4, 0x2}]}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x2, 'syz0\x00', {0x8001}}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xb, 'syz0\x00', {0x6c8}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x8402, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x6}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r9 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_SETSEL(r9, 0x541c, &(0x7f0000000000)={0x2, {0xc, 0xa00, 0x6, 0x101, 0x13f}}) 4.07496911s ago: executing program 1 (id=1044): mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0x42795000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x4) sendmmsg$inet6(r1, &(0x7f0000000980)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x1, @loopback, 0x1}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000001680)="89", 0x1}], 0x1}}], 0x1, 0x20000000) close_range(r0, 0xffffffffffffffff, 0x0) 3.919778416s ago: executing program 3 (id=1048): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0xc0802, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000180)=0x4) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000080)=0x6100204) pwritev(r0, 0x0, 0x0, 0xf39, 0xc) preadv(r0, &(0x7f0000000900)=[{&(0x7f0000000200)=""/20, 0x14}], 0x1, 0x6, 0x1) 3.861821365s ago: executing program 3 (id=1049): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x121c91e, &(0x7f00000000c0), 0x1, 0x4f4, &(0x7f0000000c40)="$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") close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="f537000000000000b032b70000850e002516f5ffff17104bab55762d64a5b4ebbd854b7ada964120b7858c42583c2b61b269ab59a3743d8fac9e8e7022e69c6c732c9c34e54f841cb932af38a238180c92fd5a9b87cb40962e502afc80de62aa5dad027814b369ee332791b84aa924ed3b67b209e24a92091be86b33d624512a14fc8fee87433a83f1087ef682de939b7937cc8fb7e7e1c0a05fde227c0980ff6ec3075679559504865d67bab215dcb91b4c872624c065f57e63ec45b14865d132e24bacece97a0645fc705ca74b0b21dd27960bbc87f9906bcd72b5f89b019a67a4df8c66c4c7b3ccd77148854c6d4fb99dee0443f3fb4d5ab70ee4bb0983ac369039af5ff011f97f93a8bb751dd1b5970d8fca955704784e6ef4612056b07a3ac8665a1a821f2c73e3cfdf967d46ceaf045818e3711f03cc5998a29044c46f5e06c128226aab79080f042e2353e15c4c44fa9622646297c836bd6cdb7a938250a33b53afc83e2ab57a30e651494b669d211531656e28f7ad434b99c33d1643c4953176eba6c8fa000ecf0c24439fa68a271eff3e5a40151ad312e2701d35aabd", @ANYRES32, @ANYRESDEC=r0], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) dup2(r2, r3) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @empty, 0x4}], 0x1c) sendto$inet6(r3, &(0x7f0000000040)='l', 0x1, 0x7ddfdbdfafa51cdd, &(0x7f0000000100)={0xa, 0x4e23, 0x2, @loopback, 0xffffffff}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, 0x0, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000040)={0x0, 0x3}, 0xffffffffffffff37) r4 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000200)=[@in6={0xa, 0x4e22, 0x8001, @mcast1, 0xf43}], 0x1c) set_mempolicy_home_node(&(0x7f0000146000/0x1000)=nil, 0x1000, 0x0, 0x0) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00304, 0x17) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x40008d0}, 0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/40, 0x28) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x3, 0x10616, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x5}, 0x200, 0x1fb, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_emit_ethernet(0x46, &(0x7f0000000180)={@multicast, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x30, 0x0, 0x9, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x12, 0x1, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x68, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback=0xac1414aa}, '\x00\x00\x00\x00\x00\x00\x00\x00'}}}}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x801, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, "d65b"}]}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x68}, 0x1, 0x0, 0x0, 0x24000840}, 0x40) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x147042, 0x0) read(r5, &(0x7f0000001400)=""/4096, 0x1000) sendmsg$L2TP_CMD_TUNNEL_CREATE(r5, &(0x7f0000000540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f00000001c0)={0x24, 0x0, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040814}, 0x8000) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014a08b"], 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 2.820593619s ago: executing program 1 (id=1053): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c) listen(r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r2, 0x0, 0x0) r3 = accept(r1, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xfffffdef}, 0x1, 0x0, 0x0, 0x800}, 0x10) recvfrom(r2, &(0x7f0000000080)=""/60, 0xfffffffffffffeeb, 0x101, 0x0, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) 2.080647453s ago: executing program 0 (id=1054): socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x4, 0x4) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@null, 0x0, 'ip_vti0\x00'}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socket$xdp(0x2c, 0x3, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bond0\x00'}) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="2e00000011008b88040f80ee59acbc04130800480f0000005e2900421803001825800000000000000280000c0012", 0x2e}], 0x1}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000300)=@nat={'nat\x00', 0x1b, 0x5, 0x440, 0xd8, 0x0, 0xffffffff, 0xd8, 0x2b0, 0x3a8, 0x3a8, 0xffffffff, 0x3a8, 0x3a8, 0x5, &(0x7f0000000180), {[{{@ip={@multicast1, @multicast2, 0xff, 0xffffff00, 'veth0\x00', 'rose0\x00', {}, {}, 0x4, 0x2, 0x2b}, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x9, @ipv6=@mcast2, @ipv4=@loopback, @gre_key=0xfffd, @port=0x4e22}}}, {{@ip={@broadcast, @remote, 0x0, 0xffffff00, 'rose0\x00', 'caif0\x00', {0xff}, {}, 0x73, 0x0, 0x4b}, 0x0, 0xd0, 0x130, 0x0, {}, [@common=@addrtype={{0x30}, {0x208, 0x200, 0x1}}, @common=@addrtype={{0x30}, {0x20, 0x400}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x6, 0x10, [0x2a, 0x24, 0x19, 0x7, 0x31, 0x28, 0x1a, 0x12, 0x1a, 0x36, 0x15, 0x7, 0x40, 0x10, 0x2c, 0x8], 0x1, 0x8f3c, 0x5}}}, {{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x11, @broadcast, @private=0xa010101, @gre_key=0x5, @port=0x4e21}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@addrtype={{0x30}, {0x4, 0x100, 0x1}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x8, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4a0) r4 = socket$kcm(0x10, 0x2, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040), 0x4) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x7005}, 0x4) setsockopt$packet_fanout(r6, 0x107, 0x12, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d80000001a0081044e81f782db4cb904021d08007b490d4f1e81f8d815000100e000000103600e12080005007a010401a800160020e0034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6", 0xcb}], 0x1}, 0x4000000) socket$can_raw(0x1d, 0x3, 0x1) r8 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) r9 = open_tree(r8, &(0x7f0000000200)='./file0\x00', 0x80101) r10 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r10, &(0x7f0000000500)={0xa, 0x4e20, 0xffffffff, @empty, 0x4}, 0x1c) connect$inet6(r10, &(0x7f0000000300)={0xa, 0x4e1d, 0x9, @local, 0x2}, 0x1c) sendfile(r9, r10, &(0x7f0000000240)=0x3, 0x7) 1.471766875s ago: executing program 1 (id=1055): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="05"], 0x10) close(r0) socket(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r1}, &(0x7f0000000500), &(0x7f0000000540)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) 1.459586167s ago: executing program 1 (id=1056): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000400), 0x8080, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x3) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x101402, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000040)=0x1) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000480)="9586a26e2862", 0x6}, {0x0}], 0x2) 1.330656998s ago: executing program 0 (id=1058): unshare(0x22020400) socket(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x80000001, 0x8}, 0x204, 0x1, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="44000000100001042dbd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="4b02060000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x44}, 0x1, 0x0, 0x0, 0x4081}, 0x0) 1.314929951s ago: executing program 3 (id=1059): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x62181) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0xfffffffc, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r0, &(0x7f0000000540)=[{0x6, 0x1d, 0x0, 0x0, @time={0x0, 0x7ff}, {0x1}, {}, @raw32={[0x2600, 0x4]}}], 0x1c) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x62181) write$sndseq(r1, &(0x7f0000000280), 0x0) 1.271908188s ago: executing program 1 (id=1060): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$kcm(0x11, 0x3, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r3) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r5 = socket(0x400000000010, 0x3, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) r7 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff5653f, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x0, 0x9}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x81}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newtfilter={0x34, 0x2c, 0xd3f, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, r8, {0x2, 0x4}, {0x0, 0x9}, {0xb, 0x9}}, [@filter_kind_options=@f_flower={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x20040054) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x20000010}, 0x4) setsockopt$sock_attach_bpf(r2, 0x107, 0xf, &(0x7f0000000600), 0x56) sendmsg$kcm(r2, &(0x7f0000000280)={&(0x7f0000000440)=@xdp={0x2c, 0x0, r4, 0x3e}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)="27030200000214000e00002fb96dffff1144ee163cddcb000000800000827600000000000000", 0x26}, {&(0x7f00000004c0)="f058050000007f8f", 0x8}], 0x2}, 0x5) 1.271342948s ago: executing program 2 (id=1061): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00"/13], 0x48) socket$packet(0x11, 0x2, 0x300) socket(0x200000100000011, 0x803, 0x0) socket$kcm(0x2d, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6_sctp(0xa, 0x1, 0x84) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xe, 0x4, 0x4, 0x1, 0x0, 0x1, 0xfffffffc}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000100000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bca2000000000000a6020000f8ffffffb703000018000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r0}, &(0x7f0000000300), &(0x7f0000000280)=r1}, 0x20) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000002c0)={r1, r3, 0x25, 0x2, @void}, 0x10) syz_emit_ethernet(0x11, &(0x7f0000000400)={@remote, @random="001a00e100", @void, {@mpls_uc={0x8847, {[], @llc={@llc={0x42, 0x0, "d0"}}}}}}, 0x0) 1.205781589s ago: executing program 3 (id=1062): r0 = socket$inet(0x2, 0x2, 0x1) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000000)=0xfffffffc, 0x4) bind$inet(r0, 0x0, 0x0) 1.126059172s ago: executing program 3 (id=1063): mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0x42795000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x4) sendmmsg$inet6(r1, &(0x7f0000000980)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x1, @loopback, 0x1}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000001680)="89", 0x1}], 0x1}}], 0x1, 0x20000000) close_range(r0, 0xffffffffffffffff, 0x0) 1.048352915s ago: executing program 2 (id=1064): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0xe}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() prctl$PR_SET_IO_FLUSHER(0x34, 0x2) sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r3, 0x101, 0x1) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000002c0)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001480)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c383032313100f58965f1"], 0x20}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001b40), 0x0, 0x0, 0x0) r4 = openat$binfmt_format(0xffffff9c, &(0x7f0000000040)='/proc/sys/fs/binfmt_misc/syz0\x00', 0x2, 0x0) write$binfmt_format(r4, &(0x7f0000000100)='-1\x00', 0x2) close(r4) r5 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000040)={0x2, 'wg2\x00', 0x1}, 0x18) connect$inet(r5, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000005c0)=@mangle={'mangle\x00', 0x2, 0x6, 0x540, 0x280, 0x1b0, 0x370, 0x370, 0x370, 0x470, 0x470, 0x470, 0x470, 0x470, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0, 0x0, {0x7a00000010000000}}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x84}}}, {{@ipv6={@mcast2, @dev={0xfe, 0x80, '\x00', 0xb}, [0x0, 0x0, 0x0, 0xffffff00], [0x0, 0x0, 0xffffffff, 0xff], 'macvlan0\x00', 'veth1_vlan\x00', {}, {}, 0x6, 0x7f, 0x4}, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {0x1}, {0x87}, 0xfffffffd}}}, {{@uncond, 0x0, 0xa8, 0xd0, 0x48000000}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x370}}, {{@ipv6={@empty, @private0, [0xff, 0x0, 0xffffff00, 0xffffffff], [0xffffff00, 0xffffff, 0x0, 0xffffffff], 'geneve0\x00', 'xfrm0\x00', {0xff}, {}, 0x3a, 0x5, 0x0, 0x8}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@rand_addr=0x64010100, @ipv4=@loopback, 0x0, 0x4}}}, {{@ipv6={@private1, @local, [0xffffff00, 0xff, 0xff000000, 0xff], [0xff, 0xff, 0xffffffff, 0xff], 'veth0_to_bridge\x00', 'dummy0\x00', {0xff}, {}, 0x0, 0x3, 0x2, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@srh={{0x30}, {0x62, 0x8, 0x7, 0xb, 0x30ba, 0x222}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5a0) 1.031376748s ago: executing program 4 (id=1065): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c) listen(r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r2, 0x0, 0x0) r3 = accept(r1, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xfffffdef}, 0x1, 0x0, 0x0, 0x800}, 0x10) recvfrom(r2, &(0x7f0000000080)=""/60, 0xfffffffffffffeeb, 0x101, 0x0, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) 994.954594ms ago: executing program 0 (id=1066): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="05"], 0x10) close(r0) socket(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r1}, &(0x7f0000000500), &(0x7f0000000540)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) 956.833141ms ago: executing program 0 (id=1067): r0 = perf_event_open$cgroup(&(0x7f0000000400)={0x2f26dc29e83cb238, 0x80, 0x4, 0xb, 0x3, 0x3, 0x0, 0x10000, 0x100, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x8}, 0x2, 0x8, 0xe2da, 0x6, 0x7, 0x8, 0xba, 0x0, 0x9, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x6) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x89480, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x9, 0x3}, 0x0, 0xa88, 0x8406, 0x9, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, r0, 0x9) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x8, 0x2, 0x2, 0x3f, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./bus\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1, 0x2c9, &(0x7f00000005c0)="$eJzs3b9rJFUcAPDvbGYne6TYFFYiOMUVNobkWgtzSAQxlbKFP0APLwdHdjlIYOFUXK66v8DCwv/Dzl6x8T8QLCztPCTwZGb2dveyexs35+YkfD7V4/u+33nv7bxkA8O8fP7a4Pjug9N7j77+LTqdLFr7sR9PstiOVjyVxgIAuBaepBR/Xur7PW+ta04AwHrNfP+3n5OyOR96e93TAgDW6MOPPn7/9uHhwQdl2Yn4+fGwl0XE4PGw1/Tfvhf3ox9HsRvd2Jg+C0ipab/73uFB5GVlO24ORsNeVTn47JdJahF1/V50Y3tx/V7ZmKkfDfP6L48si7i/X03kVnTjlbn6qv/g1oL66BXxRme8yGr8nejGr1/Eg+jH3fqZRl2/WY3/TRHlO+nbv776pEqu6rPRsLdZ502ljau+NwAAAAAAAAAAAAAAAAAAAAAAXF875cR23BxUoeb8nd7GWd2/80x/fb5Oq+5v6rOIom7sRjfOpufzjFJ835zvE/luWZYpa/In5/vcyOPVPPKXtnAAAAAAAAAAAAAAAAAAAAD4Hzl9+OXxnX7/6OQ/aYxf8p+81n/Z6+zPRF6P5cmbK40VG+P0aq7nc/Z++nQwiVSLuMzkh+0yYtmc23ORG9V8Lr7y3ymllGURL3ab2tE/yufWvlpja3lO9QH/+N3Wm8d3sos+w87TG/fDbFcRJ6cPz93TyJYPevZMJK20/YolOcV4x/yr62y94A/RW783g40j2QWraM9E2uNGPG/7dVbaz1f3OwgAAAAAAAAAAAAAAAAAAGhMX/pd0PloaWlrbZMCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgCs2/f//00bMRc41RvFHXbw4J6U0mkSKODl92WsEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg+vsnAAD//7NtasQ=") ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {r1}}, './bus\x00'}) r4 = socket$inet6(0xa, 0x3, 0x6) sendto$inet6(r4, 0x0, 0x0, 0x8000, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) unshare(0x6020400) r5 = socket(0x22, 0x2, 0x3) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, 0x0) getsockopt$packet_buf(r5, 0x107, 0x16, 0x0, &(0x7f0000002180)) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x10, 0x4, 0x0, 0x0, 0x8, 0xc6, &(0x7f0000000400)=""/198, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x5) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000980)='./file0\x00', 0x3000010, &(0x7f0000000100)={[{@resuid}, {@nobh}]}, 0x1, 0x519, &(0x7f00000009c0)="$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") socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$inet(0x2, 0xa, 0x6) ioctl$sock_inet_SIOCSARP(r6, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x1, @local}, 0x4a, {0x2, 0x4e23, @private=0xa010100}}) socket$inet_udplite(0x2, 0x2, 0x88) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/arp\x00') preadv(r7, &(0x7f0000000080)=[{&(0x7f0000000b40)=""/119, 0x77}], 0x1, 0x4000ffe, 0x0) 956.253491ms ago: executing program 1 (id=1068): ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000000)=@ccm_128={{0x304}, "55685f9fb55aea48", "0241444ca3cc1d1432b0ee0100", "4eba004e", "c120c4ecdfc08a47"}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setregs(0xf, r2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r5) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r8, @ANYBLOB='ya\x00\x00\x00\x00\x00\x00\x00'], 0x1c}}, 0x4000054) openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) 589.862912ms ago: executing program 0 (id=1069): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r1) close(0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc080003400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0x3c, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, "d103"}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x64}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000010000100005de599697944623400000a400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c000180060001"], 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 488.348609ms ago: executing program 0 (id=1070): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x121c91e, &(0x7f00000000c0), 0x1, 0x4f4, &(0x7f0000000c40)="$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") close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRESDEC=r0], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) dup2(r2, r3) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @empty, 0x4}], 0x1c) sendto$inet6(r3, &(0x7f0000000040)='l', 0x1, 0x7ddfdbdfafa51cdd, &(0x7f0000000100)={0xa, 0x4e23, 0x2, @loopback, 0xffffffff}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, 0x0, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000040)={0x0, 0x3}, 0xffffffffffffff37) r4 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000200)=[@in6={0xa, 0x4e22, 0x8001, @mcast1, 0xf43}], 0x1c) set_mempolicy_home_node(&(0x7f0000146000/0x1000)=nil, 0x1000, 0x0, 0x0) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00304, 0x17) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x40008d0}, 0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/40, 0x28) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x3, 0x10616, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x5}, 0x200, 0x1fb, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_emit_ethernet(0x46, &(0x7f0000000180)={@multicast, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x30, 0x0, 0x9, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x12, 0x1, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x68, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback=0xac1414aa}, '\x00\x00\x00\x00\x00\x00\x00\x00'}}}}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x801, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, "d65b"}]}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x68}, 0x1, 0x0, 0x0, 0x24000840}, 0x40) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x147042, 0x0) read(r5, &(0x7f0000001400)=""/4096, 0x1000) sendmsg$L2TP_CMD_TUNNEL_CREATE(r5, &(0x7f0000000540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f00000001c0)={0x24, 0x0, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040814}, 0x8000) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014a08b"], 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 248.788909ms ago: executing program 3 (id=1071): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x121c91e, &(0x7f00000000c0), 0x1, 0x4f4, &(0x7f0000000c40)="$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") close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRESDEC=r0], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) dup2(r2, r3) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @empty, 0x4}], 0x1c) sendto$inet6(r3, &(0x7f0000000040)='l', 0x1, 0x7ddfdbdfafa51cdd, &(0x7f0000000100)={0xa, 0x4e23, 0x2, @loopback, 0xffffffff}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, 0x0, 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000040)={0x0, 0x3}, 0xffffffffffffff37) r4 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000200)=[@in6={0xa, 0x4e22, 0x8001, @mcast1, 0xf43}], 0x1c) set_mempolicy_home_node(&(0x7f0000146000/0x1000)=nil, 0x1000, 0x0, 0x0) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00304, 0x17) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x84}, 0x1, 0x0, 0x0, 0x40008d0}, 0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000080)=""/40, 0x28) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0x30, 0xc, 0xa, 0x801, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x58}, 0x1, 0x0, 0x0, 0x24000840}, 0x40) 139.728767ms ago: executing program 2 (id=1072): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x62181) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0xfffffffc, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r0, &(0x7f0000000540)=[{0x6, 0x1d, 0x0, 0x0, @time={0x0, 0x7ff}, {0x1}, {}, @raw32={[0x2600, 0x4]}}], 0x1c) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x62181) write$sndseq(r1, &(0x7f0000000280), 0x0) 139.373077ms ago: executing program 2 (id=1073): r0 = socket$inet(0x2, 0x2, 0x1) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000000)=0xfffffffc, 0x4) bind$inet(r0, 0x0, 0x0) 139.112397ms ago: executing program 4 (id=1074): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00"/13], 0x48) socket$packet(0x11, 0x2, 0x300) socket(0x200000100000011, 0x803, 0x0) socket$kcm(0x2d, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6_sctp(0xa, 0x1, 0x84) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xe, 0x4, 0x4, 0x1, 0x0, 0x1, 0xfffffffc}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000100000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bca2000000000000a6020000f8ffffffb703000018000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r0}, &(0x7f0000000300), &(0x7f0000000280)=r1}, 0x20) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000002c0)={r1, r3, 0x25, 0x2, @void}, 0x10) syz_emit_ethernet(0x11, &(0x7f0000000400)={@remote, @random="001a00e100", @void, {@mpls_uc={0x8847, {[], @llc={@llc={0x42, 0x0, "d0"}}}}}}, 0x0) 97.576974ms ago: executing program 2 (id=1075): r0 = socket$inet(0x2, 0x2, 0x800c) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x77, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfd, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200047fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[], 0x134}}, 0x40088) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000008c0)=ANY=[@ANYBLOB="d0000000020605000000000000000000000000000900020073797a300000000005000400000000000900020073797a3000000000800007801800028014000240000000000000000000000000000000000c0001800800aed0c4a98bcc014000001c020500070016000000050014000200000008001240000000010800064000000001060004404e2000001800028014000240000000000000000000000000000000010800124000000002080006400000000b0800064000000007050005000200000014000300686173683a69702c706f72742c697000"], 0xd0}, 0x1, 0x0, 0x0, 0x44114}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr', 0x37) sendmsg$TCPDIAG_GETSOCK(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000b00)=ANY=[], 0x208}, 0x1, 0x0, 0x0, 0x8}, 0x400008c4) r3 = socket$inet6(0xa, 0x80001, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="f00000001000130428bd700000000000ac1414aa000000000000000000000000ac1e0101000000000000000000000000000000004e2400020200202000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1e00010000000000000000000000000000000032000000ac1414aa0000000000000000000000000400000000000000070000000000000000000000000000000400000000004000fffffffffffffffffeffffffffffffff7f00000000000000000000040000000000000000000000000800009cc2ed1df459f4db00000000000000000000000000f600000000000000000000000000000000000000020001fe5c00000000000000"], 0xf0}}, 0x804) prlimit64(0xffffffffffffffff, 0xb, &(0x7f0000000140)={0x8, 0xf}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r5 = syz_clone(0x600, 0x0, 0x33, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r5, 0x0, 0x0) sched_setaffinity(0x0, 0xc67e7be33bfcd098, &(0x7f0000000180)=0x400000bce) sendmsg$nl_xfrm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="4001000010000100feffffff00010000fe8000000000080000008f735118d81cc0399493af4b480000000000000000aafc010000000000000000000000000001", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff020000000000000000000000000001000004d46c00000000000000000000000000000000000000000000000000000092010000000000000600000000000000ffff0000000000001c250800000000000200000000000000f8ffffffffffffff0000000000000000ffffffffffffffff03000000000000001f00000000000000feffffffffffffff02000000fcffffff000000002abd700005b50000020001000000000000000000480003006465666c61746500"/227], 0x140}, 0x1, 0x0, 0x0, 0x8801}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3801000018000100feffffff0001000000000000000000000000ffffe0000002fc0100000000000000000000000000010001071c4e230005000000003a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff020000000000000000000000000001000004d46c000000ac14142500000000000000000000000000000000000000009201000000000000a39b000000000000ffff0000000000001c250800000000000500000000000000fcffffffffffffff0000000000000000ffffffffffffffff00000000000000001f00000000000000fefffffffffffffffafffffffcffffff00000000800000000035000002"], 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x4e20, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000e0ff00000000000000bd0000000000000000001300e4ec010000000040000000000000000000000000000000000000013da51fd47aa2e2f70000000000000000000000000000000000000000000000000000000000000067ff0000000000000005"], 0x310) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x7, @ipv4={'\x00', '\xff\xff', @local}, 0x321}}}, 0x108) r6 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/mcfilter6\x00') preadv(r6, &(0x7f0000000000)=[{&(0x7f0000001bc0)=""/126, 0x7e}], 0x1, 0x7ff, 0x0) 0s ago: executing program 2 (id=1076): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f00000002c0)={[{@test_dummy_encryption_v1}, {@usrjquota}, {@auto_da_alloc}, {@init_itable}, {@nodioread_nolock}, {@journal_checksum}, {@max_batch_time={'max_batch_time', 0x3d, 0x5}}]}, 0x1, 0x587, &(0x7f0000000940)="$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") prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) syz_io_uring_setup(0x63eb, &(0x7f0000000680)={0x0, 0x1200, 0x8, 0x2, 0x16b}, &(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'lo\x00'}) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000080}, 0x10) r6 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb801b, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0xb093, 0x800000, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) r8 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4e0, 0x0, 0x18c, 0x203, 0x320, 0x19030000, 0x410, 0x2e0, 0x2e0, 0x410, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x2d8, 0x320, 0x300, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{0x1d, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, 0xe}, {0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x3}, {0x2, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x8}, {}, {0x16}, {0x0, 0xff}, {}, {0x7}, {0x0, 0x0, 0x0, 0x4}, {0x0, 0x4, 0x0, 0x101}, {}, {0x0, 0x0, 0x5}, {}, {0x0, 0x0, 0x0, 0x9}, {0xfffc, 0x0, 0x0, 0x6}, {}, {0xfffe}, {}, {}, {}, {0xfffe, 0xfb}, {}, {0x7a04}, {}, {}, {0x20, 0x6}, {}, {}, {}, {0x0, 0x0, 0x0, 0x800}, {}, {0xb8c, 0x0, 0x0, 0xf00}, {0x0, 0x1, 0x0, 0x3}, {0x3}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {0x0, 0xfd}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffd}, {}, {0x0, 0xb}, {0x4, 0x2}]}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x2, 'syz0\x00', {0x8001}}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xb, 'syz0\x00', {0x6c8}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x8402, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x6}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r9 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_SETSEL(r9, 0x541c, &(0x7f0000000000)={0x2, {0xc, 0xa00, 0x6, 0x101, 0x13f}}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.143' (ED25519) to the list of known hosts. [ 33.425157][ T28] audit: type=1400 audit(1776115963.879:62): avc: denied { mounton } for pid=3300 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.458460][ T28] audit: type=1400 audit(1776115963.919:63): avc: denied { mount } for pid=3300 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.459196][ T3300] cgroup: Unknown subsys name 'net' [ 33.502753][ T28] audit: type=1400 audit(1776115963.959:64): avc: denied { unmount } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.658714][ T3300] cgroup: Unknown subsys name 'cpuset' [ 33.667533][ T3300] cgroup: Unknown subsys name 'rlimit' [ 33.795784][ T28] audit: type=1400 audit(1776115964.249:65): avc: denied { setattr } for pid=3300 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 33.844126][ T28] audit: type=1400 audit(1776115964.249:66): avc: denied { create } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.847645][ T3302] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 33.873633][ T28] audit: type=1400 audit(1776115964.249:67): avc: denied { write } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.911472][ T28] audit: type=1400 audit(1776115964.249:68): avc: denied { read } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.931752][ T3300] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 33.939501][ T28] audit: type=1400 audit(1776115964.259:69): avc: denied { mounton } for pid=3300 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 33.980624][ T28] audit: type=1400 audit(1776115964.259:70): avc: denied { mount } for pid=3300 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 34.008151][ T28] audit: type=1400 audit(1776115964.299:71): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 35.234996][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 35.252631][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 35.267312][ T3318] chnl_net:caif_netlink_parms(): no params data found [ 35.299198][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 35.336970][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 35.404078][ T3318] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.412383][ T3318] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.420741][ T3318] bridge_slave_0: entered allmulticast mode [ 35.427703][ T3318] bridge_slave_0: entered promiscuous mode [ 35.435071][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.442762][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.450752][ T3311] bridge_slave_0: entered allmulticast mode [ 35.458323][ T3311] bridge_slave_0: entered promiscuous mode [ 35.477242][ T3318] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.486484][ T3318] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.494945][ T3318] bridge_slave_1: entered allmulticast mode [ 35.502330][ T3318] bridge_slave_1: entered promiscuous mode [ 35.509445][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.517563][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.527086][ T3311] bridge_slave_1: entered allmulticast mode [ 35.534266][ T3311] bridge_slave_1: entered promiscuous mode [ 35.551455][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.560434][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.571393][ T3314] bridge_slave_0: entered allmulticast mode [ 35.582239][ T3314] bridge_slave_0: entered promiscuous mode [ 35.617648][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.633519][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.644243][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.654732][ T3314] bridge_slave_1: entered allmulticast mode [ 35.664242][ T3314] bridge_slave_1: entered promiscuous mode [ 35.681748][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.690693][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.700870][ T3312] bridge_slave_0: entered allmulticast mode [ 35.708539][ T3312] bridge_slave_0: entered promiscuous mode [ 35.718071][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.749287][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.759729][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.768135][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.776736][ T3313] bridge_slave_0: entered allmulticast mode [ 35.784411][ T3313] bridge_slave_0: entered promiscuous mode [ 35.791635][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.800117][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.808856][ T3312] bridge_slave_1: entered allmulticast mode [ 35.816350][ T3312] bridge_slave_1: entered promiscuous mode [ 35.840229][ T3311] team0: Port device team_slave_0 added [ 35.847985][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.861089][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.871704][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.880973][ T3313] bridge_slave_1: entered allmulticast mode [ 35.889125][ T3313] bridge_slave_1: entered promiscuous mode [ 35.897194][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.909641][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.921126][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.931530][ T3311] team0: Port device team_slave_1 added [ 35.957177][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.986331][ T3314] team0: Port device team_slave_0 added [ 35.992622][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.000182][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.030541][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.053390][ T3318] team0: Port device team_slave_0 added [ 36.060889][ T3314] team0: Port device team_slave_1 added [ 36.068348][ T3318] team0: Port device team_slave_1 added [ 36.076014][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.085209][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.118235][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.138109][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.152668][ T3312] team0: Port device team_slave_0 added [ 36.184803][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.204011][ T3312] team0: Port device team_slave_1 added [ 36.221889][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.231723][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.270894][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.292357][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.306391][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.350775][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.367993][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.379340][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.411220][ T3318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.450460][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.459000][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.490531][ T3318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.506952][ T3313] team0: Port device team_slave_0 added [ 36.521305][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.532798][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.573015][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.602934][ T3313] team0: Port device team_slave_1 added [ 36.624189][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.636541][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.677848][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.716438][ T3311] hsr_slave_0: entered promiscuous mode [ 36.728174][ T3311] hsr_slave_1: entered promiscuous mode [ 36.748117][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.758396][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.796412][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.813069][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.822849][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.865318][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.891143][ T3314] hsr_slave_0: entered promiscuous mode [ 36.900733][ T3314] hsr_slave_1: entered promiscuous mode [ 36.909761][ T3314] debugfs: 'hsr0' already exists in 'hsr' [ 36.917723][ T3314] Cannot create hsr debugfs directory [ 36.926658][ T3318] hsr_slave_0: entered promiscuous mode [ 36.933384][ T3318] hsr_slave_1: entered promiscuous mode [ 36.941744][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 36.950993][ T3318] Cannot create hsr debugfs directory [ 37.001944][ T3312] hsr_slave_0: entered promiscuous mode [ 37.009225][ T3312] hsr_slave_1: entered promiscuous mode [ 37.016048][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 37.025291][ T3312] Cannot create hsr debugfs directory [ 37.069016][ T3313] hsr_slave_0: entered promiscuous mode [ 37.076980][ T3313] hsr_slave_1: entered promiscuous mode [ 37.085535][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 37.093414][ T3313] Cannot create hsr debugfs directory [ 37.355243][ T3318] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 37.369540][ T3318] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.388336][ T3318] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 37.406427][ T3318] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 37.432244][ T3311] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 37.443759][ T3311] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 37.454745][ T3311] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 37.466525][ T3311] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 37.512828][ T3314] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 37.522289][ T3314] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 37.543669][ T3314] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 37.553679][ T3314] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 37.587396][ T3313] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 37.603765][ T3313] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 37.622977][ T3313] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 37.640796][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.657596][ T3313] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 37.701793][ T3312] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 37.722672][ T3312] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 37.736544][ T3312] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 37.748972][ T3312] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 37.766932][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.792736][ T3318] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.821459][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.850074][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.860066][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.872025][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.881505][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.915150][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.923409][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.935344][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.943969][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.960941][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.990281][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.009628][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.028789][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.038542][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.048823][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.057508][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.090876][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.103688][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.126609][ T3314] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.147802][ T3314] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.176083][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.197946][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.210572][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.233376][ T3318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.252016][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.262783][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.283199][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.297243][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.315319][ T3313] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.332889][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.365360][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.373365][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.386950][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.445720][ T3312] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.460058][ T3312] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.485250][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.509594][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.582831][ T3318] veth0_vlan: entered promiscuous mode [ 38.610304][ T3311] veth0_vlan: entered promiscuous mode [ 38.621075][ T3318] veth1_vlan: entered promiscuous mode [ 38.645983][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.663242][ T3311] veth1_vlan: entered promiscuous mode [ 38.716140][ T3313] veth0_vlan: entered promiscuous mode [ 38.730767][ T3318] veth0_macvtap: entered promiscuous mode [ 38.759131][ T3318] veth1_macvtap: entered promiscuous mode [ 38.776811][ T3311] veth0_macvtap: entered promiscuous mode [ 38.795994][ T3313] veth1_vlan: entered promiscuous mode [ 38.811270][ T3311] veth1_macvtap: entered promiscuous mode [ 38.826369][ T3312] veth0_vlan: entered promiscuous mode [ 38.841082][ T3312] veth1_vlan: entered promiscuous mode [ 38.850554][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.865681][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.883138][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.896656][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.913873][ T36] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.925267][ T36] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.940440][ T3313] veth0_macvtap: entered promiscuous mode [ 38.951828][ T36] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.962675][ T36] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.985348][ T3312] veth0_macvtap: entered promiscuous mode [ 38.994589][ T3312] veth1_macvtap: entered promiscuous mode [ 39.003561][ T36] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.015972][ T3313] veth1_macvtap: entered promiscuous mode [ 39.024170][ T3314] veth0_vlan: entered promiscuous mode [ 39.031932][ T36] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.043714][ T36] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.061606][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 39.061623][ T28] audit: type=1400 audit(1776115969.519:85): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/root/syzkaller.dFSyuf/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 39.067437][ T3314] veth1_vlan: entered promiscuous mode [ 39.071303][ T28] audit: type=1400 audit(1776115969.519:86): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 39.103090][ T36] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.113217][ T28] audit: type=1400 audit(1776115969.519:87): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/root/syzkaller.dFSyuf/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 39.181839][ T28] audit: type=1400 audit(1776115969.519:88): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 39.187397][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.211559][ T28] audit: type=1400 audit(1776115969.519:89): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/root/syzkaller.dFSyuf/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 39.259575][ T3318] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 39.261924][ T28] audit: type=1400 audit(1776115969.519:90): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/root/syzkaller.dFSyuf/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=5047 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 39.322005][ T28] audit: type=1400 audit(1776115969.519:91): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 39.337535][ T3314] veth0_macvtap: entered promiscuous mode [ 39.356174][ T28] audit: type=1400 audit(1776115969.559:92): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 39.393171][ T28] audit: type=1400 audit(1776115969.559:93): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="gadgetfs" ino=5051 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 39.434742][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.445445][ T50] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.461604][ T28] audit: type=1400 audit(1776115969.919:94): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 39.496209][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.516298][ T50] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.531707][ T3482] loop2: detected capacity change from 0 to 512 [ 39.538231][ T50] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.552236][ T3482] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 39.555684][ T3314] veth1_macvtap: entered promiscuous mode [ 39.567164][ T3482] EXT4-fs (loop2): filesystem is read-only [ 39.586314][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.600775][ T50] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.618233][ T3482] EXT4-fs (loop2): failed to initialize system zone (-117) [ 39.629581][ T3482] EXT4-fs (loop2): mount failed [ 39.666060][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.680967][ T30] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.696105][ T30] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.707718][ T3485] @0Ù: renamed from bond_slave_1 (while UP) [ 39.726067][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.746348][ T3485] IPv4: Oversized IP packet from 127.202.26.0 [ 39.757595][ T30] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.772898][ T30] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.804746][ T30] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.040326][ T30] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.075165][ T30] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.087175][ T30] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.149381][ C0] hrtimer: interrupt took 1366582 ns [ 41.380261][ T3505] loop1: detected capacity change from 0 to 1024 [ 41.937724][ T3505] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 42.286041][ T3517] loop0: detected capacity change from 0 to 1024 [ 42.376436][ T3517] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 42.399888][ T3530] loop2: detected capacity change from 0 to 128 [ 42.432801][ T3511] mmap: syz.4.5 (3511) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 42.479355][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.505732][ T3313] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.749477][ T3542] loop4: detected capacity change from 0 to 1024 [ 42.776833][ T3542] ======================================================= [ 42.776833][ T3542] WARNING: The mand mount option has been deprecated and [ 42.776833][ T3542] and is ignored by this kernel. Remove the mand [ 42.776833][ T3542] option from the mount to silence this warning. [ 42.776833][ T3542] ======================================================= [ 42.891343][ T3542] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 43.437665][ T3627] loop1: detected capacity change from 0 to 512 [ 43.482016][ T3627] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 43.550487][ T3627] EXT4-fs (loop1): filesystem is read-only [ 43.561301][ T3627] EXT4-fs (loop1): failed to initialize system zone (-117) [ 43.594622][ T3627] EXT4-fs (loop1): mount failed [ 43.903747][ T3654] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 43.970200][ T3654] loop0: detected capacity change from 0 to 764 [ 44.030249][ T3654] isofs_fill_super: get root inode failed [ 46.615892][ T28] kauditd_printk_skb: 59 callbacks suppressed [ 46.615908][ T28] audit: type=1400 audit(1776115977.069:154): avc: denied { create } for pid=3670 comm="syz.2.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 47.635754][ T3679] loop2: detected capacity change from 0 to 512 [ 47.927461][ T3677] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.936321][ T3677] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.248864][ T3679] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 48.286769][ T3683] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pid=3683 comm=syz.3.26 [ 48.314667][ T3679] ext4 filesystem being mounted at /5/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 48.451647][ T3685] audit: audit_backlog=65 > audit_backlog_limit=64 [ 48.464552][ T3677] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 48.474762][ T3685] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 48.487446][ T3677] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 48.497337][ T3685] audit: backlog limit exceeded [ 48.546070][ T3685] audit: audit_backlog=65 > audit_backlog_limit=64 [ 48.570642][ T3611] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 48.584205][ T3611] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 48.606094][ T3685] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 48.606441][ T28] audit: type=1400 audit(1776115978.069:155): avc: denied { create } for pid=3672 comm="syz.3.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 48.710689][ T3611] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 48.724848][ T3611] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 48.748280][ T28] audit: type=1400 audit(1776115978.069:156): avc: denied { setopt } for pid=3672 comm="syz.3.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 48.804594][ T3685] audit: backlog limit exceeded [ 48.814093][ T28] audit: type=1326 audit(1776115978.739:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3672 comm="syz.3.26" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbbfb9bc819 code=0x7ffc0000 [ 48.876658][ T3685] EXT4-fs error (device loop2): ext4_empty_dir:3078: inode #12: comm syz.2.27: Directory hole found for htree leaf block 0 [ 49.048727][ T3356] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 49.094980][ T3356] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 49.165126][ T3701] xt_hashlimit: size too large, truncated to 1048576 [ 49.185406][ T3696] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 49.203691][ T3702] fido_id[3702]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 49.318197][ T3704] Zero length message leads to an empty skb [ 49.401863][ T3714] loop1: detected capacity change from 0 to 512 [ 49.425780][ T3714] EXT4-fs (loop1): mounting ext3 file system using the ext4 subsystem [ 49.441146][ T3714] EXT4-fs (loop1): 1 truncate cleaned up [ 49.450425][ T3714] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 49.496289][ T3717] loop3: detected capacity change from 0 to 256 [ 49.544708][ T3720] loop4: detected capacity change from 0 to 1024 [ 49.561208][ T3717] FAT-fs (loop3): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 49.600050][ T3318] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 49.620928][ T3720] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 49.668638][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 49.733865][ T3730] netlink: 8 bytes leftover after parsing attributes in process `syz.2.37'. [ 49.756620][ T3728] FAULT_INJECTION: forcing a failure. [ 49.756620][ T3728] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 49.783049][ T3728] CPU: 0 UID: 0 PID: 3728 Comm: syz.0.40 Not tainted syzkaller #0 PREEMPT(full) [ 49.783077][ T3728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 49.783150][ T3728] Call Trace: [ 49.783159][ T3728] [ 49.783167][ T3728] __dump_stack+0x1d/0x30 [ 49.783266][ T3728] dump_stack_lvl+0x95/0xd0 [ 49.783287][ T3728] dump_stack+0x15/0x1b [ 49.783307][ T3728] should_fail_ex+0x263/0x280 [ 49.783384][ T3728] should_fail+0xb/0x20 [ 49.783496][ T3728] should_fail_usercopy+0x1a/0x20 [ 49.783530][ T3728] _copy_from_user+0x1c/0xb0 [ 49.783762][ T3728] __copy_msghdr+0x244/0x300 [ 49.783843][ T3728] ___sys_sendmsg+0x10c/0x1e0 [ 49.783869][ T3728] __x64_sys_sendmsg+0xd4/0x160 [ 49.783887][ T3728] x64_sys_call+0x194c/0x3020 [ 49.784598][ T3728] do_syscall_64+0x12c/0x370 [ 49.784714][ T3728] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 49.784734][ T3728] RIP: 0033:0x7fef9b0ac819 [ 49.784790][ T3728] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 49.784866][ T3728] RSP: 002b:00007fef99b07028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 49.784888][ T3728] RAX: ffffffffffffffda RBX: 00007fef9b325fa0 RCX: 00007fef9b0ac819 [ 49.784900][ T3728] RDX: 00000000040440c0 RSI: 0000200000000000 RDI: 0000000000000003 [ 49.784912][ T3728] RBP: 00007fef99b07090 R08: 0000000000000000 R09: 0000000000000000 [ 49.784924][ T3728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 49.784935][ T3728] R13: 00007fef9b326038 R14: 00007fef9b325fa0 R15: 00007ffdad71bdb8 [ 49.784951][ T3728] [ 50.439906][ T3715] FAT-fs (loop3): error, corrupted file size (i_pos 196, 16779008) [ 50.473361][ T3715] FAT-fs (loop3): Filesystem has been set read-only [ 50.473701][ T3715] FAT-fs (loop3): error, corrupted file size (i_pos 196, 16779008) [ 50.473779][ T3715] FAT-fs (loop3): error, corrupted file size (i_pos 196, 16779008) [ 50.474080][ T3715] FAT-fs (loop3): error, corrupted file size (i_pos 196, 16779008) [ 50.684281][ T3750] loop0: detected capacity change from 0 to 128 [ 51.175900][ T3720] syz.4.36 (3720) used greatest stack depth: 10424 bytes left [ 51.239974][ T3314] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.915954][ T3768] loop2: detected capacity change from 0 to 512 [ 51.932616][ T3768] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 51.944175][ T3768] EXT4-fs (loop2): filesystem is read-only [ 51.953595][ T3768] EXT4-fs (loop2): failed to initialize system zone (-117) [ 51.968840][ T3768] EXT4-fs (loop2): mount failed [ 52.035945][ T3772] loop1: detected capacity change from 0 to 1024 [ 52.054592][ T3772] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 52.090939][ T3772] EXT4-fs error (device loop1): ext4_empty_dir:3107: inode #11: block 623: comm syz.1.51: Attempting to read directory block (623) that is past i_size (638464) [ 52.159484][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 52.210398][ T28] kauditd_printk_skb: 156 callbacks suppressed [ 52.210413][ T28] audit: type=1400 audit(1776115982.669:314): avc: denied { ioctl } for pid=3776 comm="syz.1.52" path="socket:[3898]" dev="sockfs" ino=3898 ioctlcmd=0x6f06 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 52.294205][ T3777] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.305664][ T3777] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.403514][ T3777] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 52.407958][ T3784] loop2: detected capacity change from 0 to 1024 [ 52.426660][ T3777] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 52.434632][ T3784] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 52.449118][ T3784] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 52.467969][ T3784] EXT4-fs error (device loop2): ext4_ext_check_inode:521: inode #2: comm syz.2.54: pblk 0 bad header/extent: too large eh_max - magic f30a, entries 2, max 32(4), depth 0(0) [ 52.498164][ T3784] loop2: lost file I/O error report for ino 2 type 5 pos 0x0 len 0x0 error -117 [ 52.503364][ T3784] EXT4-fs (loop2): no journal found [ 52.514098][ C0] EXT4-fs (loop2): error count since last fsck: 1 [ 52.514119][ C0] EXT4-fs (loop2): initial error at time 1776115982: ext4_ext_check_inode:521: inode 2 [ 52.514161][ C0] EXT4-fs (loop2): last error at time 1776115982: ext4_ext_check_inode:521: inode 2 [ 52.566833][ T70] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 52.582220][ T28] audit: type=1400 audit(1776115983.019:315): avc: denied { create } for pid=3785 comm="syz.4.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 52.585335][ T70] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 52.656717][ T28] audit: type=1400 audit(1776115983.079:317): avc: denied { setopt } for pid=3785 comm="syz.4.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 52.669722][ T70] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 52.712320][ T3793] loop2: detected capacity change from 0 to 736 [ 52.737347][ T28] audit: type=1400 audit(1776115983.039:316): avc: denied { mount } for pid=3783 comm="syz.2.54" name="/" dev="ramfs" ino=3918 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 52.780425][ T3788] netlink: 8 bytes leftover after parsing attributes in process `syz.4.56'. [ 52.792016][ T28] audit: type=1400 audit(1776115983.099:318): avc: denied { append } for pid=3787 comm="syz.4.56" name="001" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 52.820700][ T70] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 52.858101][ T3793] rock: directory entry would overflow storage [ 52.882308][ T3793] rock: sig=0x3b10, size=4, remaining=3 [ 52.894019][ T3793] FAULT_INJECTION: forcing a failure. [ 52.894019][ T3793] name failslab, interval 1, probability 0, space 0, times 1 [ 52.908089][ T28] audit: type=1400 audit(1776115983.099:319): avc: denied { read } for pid=3787 comm="syz.4.56" name="usbmon7" dev="devtmpfs" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 52.936467][ T3793] CPU: 0 UID: 0 PID: 3793 Comm: syz.2.58 Not tainted syzkaller #0 PREEMPT(full) [ 52.936608][ T3793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 52.936743][ T3793] Call Trace: [ 52.936750][ T3793] [ 52.936758][ T3793] __dump_stack+0x1d/0x30 [ 52.936785][ T3793] dump_stack_lvl+0x95/0xd0 [ 52.936879][ T3793] dump_stack+0x15/0x1b [ 52.936906][ T3793] should_fail_ex+0x263/0x280 [ 52.936934][ T3793] should_failslab+0x8c/0xb0 [ 52.936954][ T3793] kmem_cache_alloc_lru_noprof+0x6c/0x410 [ 52.937041][ T3793] ? __d_alloc+0x37/0x340 [ 52.937071][ T3793] __d_alloc+0x37/0x340 [ 52.937150][ T3793] d_alloc_parallel+0x54/0xce0 [ 52.937307][ T3793] ? lockref_get_not_dead+0x120/0x1c0 [ 52.937339][ T3793] ? __rcu_read_unlock+0x4e/0x70 [ 52.937362][ T3793] ? try_to_unlazy+0x39d/0x580 [ 52.937389][ T3793] __lookup_slow+0x96/0x260 [ 52.937560][ T3793] lookup_slow+0x3c/0x60 [ 52.937613][ T3793] path_lookupat+0x2f7/0x500 [ 52.937664][ T3793] filename_lookup+0x190/0x390 [ 52.937694][ T3793] filename_setxattr+0x56/0x410 [ 52.937729][ T3793] ? do_getname+0x102/0x1c0 [ 52.937774][ T3793] path_setxattrat+0x2be/0x310 [ 52.937863][ T3793] __x64_sys_lsetxattr+0x71/0x90 [ 52.937948][ T3793] x64_sys_call+0x1300/0x3020 [ 52.938081][ T3793] do_syscall_64+0x12c/0x370 [ 52.938109][ T3793] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 52.938130][ T3793] RIP: 0033:0x7fe2c9c3c819 [ 52.938147][ T3793] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 52.938173][ T3793] RSP: 002b:00007fe2c8697028 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 52.938193][ T3793] RAX: ffffffffffffffda RBX: 00007fe2c9eb5fa0 RCX: 00007fe2c9c3c819 [ 52.938206][ T3793] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000200000000040 [ 52.938256][ T3793] RBP: 00007fe2c8697090 R08: 0000000000000000 R09: 0000000000000000 [ 52.938267][ T3793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 52.938277][ T3793] R13: 00007fe2c9eb6038 R14: 00007fe2c9eb5fa0 R15: 00007fff48bbf848 [ 52.938295][ T3793] [ 53.225061][ T28] audit: type=1400 audit(1776115983.099:320): avc: denied { open } for pid=3787 comm="syz.4.56" path="/dev/usbmon7" dev="devtmpfs" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 53.263361][ T28] audit: type=1400 audit(1776115983.159:321): avc: denied { getopt } for pid=3787 comm="syz.4.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 53.296516][ T28] audit: type=1400 audit(1776115983.159:322): avc: denied { name_connect } for pid=3787 comm="syz.4.56" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 53.329270][ T28] audit: type=1400 audit(1776115983.309:323): avc: denied { read } for pid=3797 comm="syz.3.60" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 53.500819][ T3813] loop1: detected capacity change from 0 to 512 [ 53.510265][ T3813] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 53.529352][ T3815] netlink: 12 bytes leftover after parsing attributes in process `syz.4.65'. [ 53.540725][ T3813] EXT4-fs (loop1): filesystem is read-only [ 54.499726][ T3813] EXT4-fs (loop1): failed to initialize system zone (-117) [ 54.529937][ T3813] EXT4-fs (loop1): mount failed [ 54.539825][ T3824] netlink: 4 bytes leftover after parsing attributes in process `syz.4.68'. [ 54.635117][ T3822] syzkaller0: entered promiscuous mode [ 54.657085][ T3828] loop4: detected capacity change from 0 to 1024 [ 54.658442][ T3822] syzkaller0: entered allmulticast mode [ 54.666734][ T3828] EXT4-fs: test_dummy_encryption option not supported [ 55.129425][ T3837] loop2: detected capacity change from 0 to 512 [ 55.151053][ T3837] EXT4-fs: inline encryption not supported [ 55.258125][ T3837] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 55.318348][ T3844] loop1: detected capacity change from 0 to 512 [ 55.320601][ T3837] ext4 filesystem being mounted at /17/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 55.358306][ T3837] Driver unsupported XDP return value 0 on prog (id 21) dev N/A, expect packet loss! [ 55.376302][ T3844] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 55.413097][ T3844] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 55.446897][ T3844] EXT4-fs warning (device loop1): ext4_expand_extra_isize_ea:2858: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 55.447042][ T3844] EXT4-fs (loop1): 1 truncate cleaned up [ 55.447491][ T3844] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 55.992062][ T3318] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 56.847569][ T3866] syzkaller0: entered promiscuous mode [ 56.934728][ T3866] syzkaller0: entered allmulticast mode [ 56.949181][ T3878] netlink: 14 bytes leftover after parsing attributes in process `syz.0.81'. [ 57.001360][ T3880] x_tables: duplicate underflow at hook 1 [ 57.024782][ T3878] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 57.065389][ T3878] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 57.219734][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 57.370569][ T3878] bond0 (unregistering): Released all slaves [ 57.881596][ T3892] loop0: detected capacity change from 0 to 1024 [ 57.960508][ T3892] EXT4-fs: test_dummy_encryption option not supported [ 58.016472][ T3895] macvlan2: entered allmulticast mode [ 58.049311][ T3895] bridge0: entered allmulticast mode [ 58.057282][ T3895] bridge0: port 3(macvlan2) entered blocking state [ 58.066877][ T3895] bridge0: port 3(macvlan2) entered disabled state [ 58.869330][ T3895] bridge0: left allmulticast mode [ 59.137923][ T28] kauditd_printk_skb: 22 callbacks suppressed [ 59.137937][ T28] audit: type=1400 audit(1776124181.590:346): avc: denied { create } for pid=3903 comm="syz.2.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 59.229835][ T3907] FAULT_INJECTION: forcing a failure. [ 59.229835][ T3907] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 59.251794][ T3907] CPU: 1 UID: 0 PID: 3907 Comm: syz.2.89 Not tainted syzkaller #0 PREEMPT(full) [ 59.251897][ T3907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 59.251924][ T3907] Call Trace: [ 59.251932][ T3907] [ 59.251941][ T3907] __dump_stack+0x1d/0x30 [ 59.251967][ T3907] dump_stack_lvl+0x95/0xd0 [ 59.252025][ T3907] dump_stack+0x15/0x1b [ 59.252049][ T3907] should_fail_ex+0x263/0x280 [ 59.252080][ T3907] should_fail+0xb/0x20 [ 59.252179][ T3907] should_fail_usercopy+0x1a/0x20 [ 59.252213][ T3907] _copy_to_user+0x20/0xa0 [ 59.252241][ T3907] simple_read_from_buffer+0xb5/0x130 [ 59.252289][ T3907] proc_fail_nth_read+0x10e/0x150 [ 59.252332][ T3907] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 59.252564][ T3907] vfs_read+0x1ab/0x7f0 [ 59.252580][ T3907] ? __rcu_read_unlock+0x4e/0x70 [ 59.252601][ T3907] ? __fget_files+0x184/0x1c0 [ 59.252623][ T3907] ? mutex_lock+0x57/0x90 [ 59.252686][ T3907] ksys_read+0xdc/0x1a0 [ 59.252706][ T3907] __x64_sys_read+0x40/0x50 [ 59.252727][ T3907] x64_sys_call+0x2886/0x3020 [ 59.252798][ T3907] do_syscall_64+0x12c/0x370 [ 59.252829][ T3907] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.252850][ T3907] RIP: 0033:0x7fe2c9bfd04e [ 59.252864][ T3907] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 59.252891][ T3907] RSP: 002b:00007fe2c8675fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 59.252984][ T3907] RAX: ffffffffffffffda RBX: 00007fe2c86766c0 RCX: 00007fe2c9bfd04e [ 59.252996][ T3907] RDX: 000000000000000f RSI: 00007fe2c86760a0 RDI: 0000000000000006 [ 59.253075][ T3907] RBP: 00007fe2c8676090 R08: 0000000000000000 R09: 0000000000000000 [ 59.253097][ T3907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 59.253107][ T3907] R13: 00007fe2c9eb6128 R14: 00007fe2c9eb6090 R15: 00007fff48bbf848 [ 59.253122][ T3907] [ 59.944157][ T3921] netlink: 14 bytes leftover after parsing attributes in process `syz.2.96'. [ 59.970880][ T3921] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 59.987447][ T3921] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 60.005582][ T3922] x_tables: duplicate underflow at hook 1 [ 60.022867][ T3921] bond0 (unregistering): Released all slaves [ 60.072493][ T3924] loop3: detected capacity change from 0 to 512 [ 60.104811][ T3926] 9p: Bad value for 'rfdno' [ 60.130830][ T3924] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 60.178291][ T3387] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 60.198384][ T3387] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 60.239904][ T3924] EXT4-fs error (device loop3): ext4_mb_generate_buddy:1317: group 0, block bitmap and bg descriptor inconsistent: 48 vs 41 free clusters [ 60.268024][ C1] EXT4-fs (loop3): error count since last fsck: 1 [ 60.274785][ C1] EXT4-fs (loop3): initial error at time 1776124182: ext4_mb_generate_buddy:1317 [ 60.286741][ C1] EXT4-fs (loop3): last error at time 1776124182: ext4_mb_generate_buddy:1317 [ 60.382272][ T3924] Quota error (device loop3): write_blk: dquota write failed [ 60.408127][ T3924] Quota error (device loop3): find_free_dqentry: Can't write quota data block 5 [ 60.418295][ T28] audit: type=1400 audit(1776124182.860:347): avc: denied { write } for pid=3927 comm="syz.2.99" name="hidraw0" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 60.445140][ T3924] Quota error (device loop3): write_blk: dquota write failed [ 60.453680][ T3924] Quota error (device loop3): qtree_write_dquot: Error -28 occurred while creating quota [ 60.464946][ T3924] EXT4-fs error (device loop3): ext4_acquire_dquot:7026: comm syz.3.97: Failed to acquire dquot type 1 [ 60.477895][ T3924] loop3: lost filesystem error report for type 5 error -28 [ 60.487594][ T3924] EXT4-fs (loop3): 1 truncate cleaned up [ 60.565821][ T3924] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 60.600952][ T3941] loop1: detected capacity change from 0 to 512 [ 60.612561][ T3924] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.664353][ T3941] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 60.734401][ T3941] EXT4-fs warning (device loop1): ext4_update_dynamic_rev:1142: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 60.811303][ T3941] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz.1.103: bg 0: block 248: padding at end of block bitmap is not set [ 60.838097][ T3941] loop1: lost filesystem error report for type 5 error -117 [ 60.838715][ T3941] Quota error (device loop1): write_blk: dquota write failed [ 60.855615][ C1] EXT4-fs (loop1): error count since last fsck: 1 [ 60.855647][ C1] EXT4-fs (loop1): last error at time 1776124183: ext4_validate_block_bitmap:441 [ 60.887610][ T3953] loop2: detected capacity change from 0 to 1024 [ 60.905914][ T3953] EXT4-fs: test_dummy_encryption option not supported [ 60.949675][ T3941] Quota error (device loop1): qtree_write_dquot: Error -28 occurred while creating quota [ 60.993019][ T3958] xt_hashlimit: size too large, truncated to 1048576 [ 61.000939][ T3941] EXT4-fs error (device loop1): ext4_acquire_dquot:7026: comm syz.1.103: Failed to acquire dquot type 1 [ 61.014198][ T3941] loop1: lost filesystem error report for type 5 error -28 [ 61.014660][ T3941] EXT4-fs (loop1): 1 truncate cleaned up [ 61.040054][ T3941] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0008-000000000000 r/w without journal. Quota mode: writeback. [ 61.063032][ T3941] FAULT_INJECTION: forcing a failure. [ 61.063032][ T3941] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 61.065242][ T3960] bridge0: entered promiscuous mode [ 61.084690][ T3941] CPU: 1 UID: 0 PID: 3941 Comm: syz.1.103 Not tainted syzkaller #0 PREEMPT(full) [ 61.084743][ T3941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 61.084756][ T3941] Call Trace: [ 61.084763][ T3941] [ 61.084771][ T3941] __dump_stack+0x1d/0x30 [ 61.084808][ T3941] dump_stack_lvl+0x95/0xd0 [ 61.084831][ T3941] dump_stack+0x15/0x1b [ 61.084853][ T3941] should_fail_ex+0x263/0x280 [ 61.084975][ T3941] should_fail+0xb/0x20 [ 61.084999][ T3941] should_fail_usercopy+0x1a/0x20 [ 61.085027][ T3941] strncpy_from_user+0x27/0x250 [ 61.085049][ T3941] ? kmem_cache_alloc_noprof+0x18c/0x400 [ 61.085111][ T3941] do_getname+0x59/0x1c0 [ 61.085135][ T3941] getname_flags+0x1d/0x30 [ 61.085158][ T3941] __se_sys_quotactl+0x157/0x660 [ 61.085184][ T3941] __x64_sys_quotactl+0x55/0x70 [ 61.085210][ T3941] x64_sys_call+0x1a2a/0x3020 [ 61.085237][ T3941] do_syscall_64+0x12c/0x370 [ 61.085265][ T3941] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 61.085308][ T3941] RIP: 0033:0x7f408aaac819 [ 61.085324][ T3941] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 61.085341][ T3941] RSP: 002b:00007f40894ff028 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 61.085360][ T3941] RAX: ffffffffffffffda RBX: 00007f408ad25fa0 RCX: 00007f408aaac819 [ 61.085375][ T3941] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: ffffffff80000901 [ 61.085418][ T3941] RBP: 00007f40894ff090 R08: 0000000000000000 R09: 0000000000000000 [ 61.085431][ T3941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 61.085444][ T3941] R13: 00007f408ad26038 R14: 00007f408ad25fa0 R15: 00007ffe00633698 [ 61.085507][ T3941] [ 61.108254][ T3941] syz.1.103 (3941) used greatest stack depth: 9160 bytes left [ 61.136153][ T3960] macvlan2: entered allmulticast mode [ 61.189291][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0008-000000000000. [ 61.195174][ T3960] bridge0: entered allmulticast mode [ 61.383142][ T3960] bridge0: port 3(macvlan2) entered blocking state [ 61.391506][ T3960] bridge0: port 3(macvlan2) entered disabled state [ 61.401014][ T3960] bridge0: left allmulticast mode [ 61.406846][ T3960] bridge0: left promiscuous mode [ 61.419285][ T3964] loop1: detected capacity change from 0 to 512 [ 61.427926][ T3964] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 61.438208][ T3964] EXT4-fs (loop1): filesystem is read-only [ 61.452547][ T3964] EXT4-fs (loop1): failed to initialize system zone (-117) [ 61.468619][ T3967] netlink: 14 bytes leftover after parsing attributes in process `syz.4.109'. [ 61.478882][ T3964] EXT4-fs (loop1): mount failed [ 61.487540][ T3967] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 61.520840][ T3968] x_tables: duplicate underflow at hook 1 [ 61.545147][ T3967] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 61.577504][ T3967] bond0 (unregistering): Released all slaves [ 61.614680][ T3973] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 61.628553][ T3973] netlink: 20 bytes leftover after parsing attributes in process `syz.0.111'. [ 61.699829][ T3981] vlan2: entered allmulticast mode [ 61.723943][ T28] audit: type=1400 audit(1776124184.180:348): avc: denied { create } for pid=3982 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 61.748340][ T3983] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3983 comm=syz.1.115 [ 61.800142][ T28] audit: type=1400 audit(1776124184.240:349): avc: denied { getopt } for pid=3982 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 61.866762][ T3992] loop4: detected capacity change from 0 to 512 [ 61.893353][ T3992] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 61.934574][ T3992] EXT4-fs (loop4): can't mount with commit=, fs mounted w/o journal [ 61.940476][ T3996] loop1: detected capacity change from 0 to 128 [ 62.249635][ T4005] loop0: detected capacity change from 0 to 128 [ 62.484808][ T4011] macvlan2: entered allmulticast mode [ 62.490904][ T4011] bridge0: entered allmulticast mode [ 62.497584][ T4011] bridge0: port 3(macvlan2) entered blocking state [ 62.507251][ T4011] bridge0: port 3(macvlan2) entered disabled state [ 62.517010][ T4011] bridge0: left allmulticast mode [ 62.687766][ T4014] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 62.739808][ T4015] netlink: 20 bytes leftover after parsing attributes in process `syz.3.124'. [ 63.139144][ T4017] netlink: 14 bytes leftover after parsing attributes in process `syz.4.125'. [ 63.150423][ T4017] x_tables: duplicate underflow at hook 1 [ 63.174083][ T4019] loop3: detected capacity change from 0 to 512 [ 63.208065][ T4019] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 63.238052][ T4019] EXT4-fs (loop3): filesystem is read-only [ 63.310369][ T4019] EXT4-fs (loop3): failed to initialize system zone (-117) [ 63.328282][ T4019] EXT4-fs (loop3): mount failed [ 63.410497][ T4025] FAULT_INJECTION: forcing a failure. [ 63.410497][ T4025] name failslab, interval 1, probability 0, space 0, times 0 [ 63.488110][ T4025] CPU: 1 UID: 0 PID: 4025 Comm: syz.4.128 Not tainted syzkaller #0 PREEMPT(full) [ 63.488261][ T4025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 63.488275][ T4025] Call Trace: [ 63.488291][ T4025] [ 63.488300][ T4025] __dump_stack+0x1d/0x30 [ 63.488329][ T4025] dump_stack_lvl+0x95/0xd0 [ 63.488352][ T4025] dump_stack+0x15/0x1b [ 63.488378][ T4025] should_fail_ex+0x263/0x280 [ 63.488407][ T4025] should_failslab+0x8c/0xb0 [ 63.488452][ T4025] kmem_cache_alloc_noprof+0x66/0x400 [ 63.488479][ T4025] ? security_inode_alloc+0x37/0x100 [ 63.488516][ T4025] security_inode_alloc+0x37/0x100 [ 63.488614][ T4025] inode_init_always_gfp+0x4b7/0x500 [ 63.488641][ T4025] ? __pfx_debugfs_alloc_inode+0x10/0x10 [ 63.488767][ T4025] alloc_inode+0x58/0x170 [ 63.488792][ T4025] new_inode+0x1d/0xe0 [ 63.488824][ T4025] __debugfs_create_file+0x97/0x2b0 [ 63.488932][ T4025] debugfs_create_file_full+0x3f/0x60 [ 63.488965][ T4025] ? __pfx_vlan_setup+0x10/0x10 [ 63.489048][ T4025] ref_tracker_dir_debugfs+0x10e/0x220 [ 63.489197][ T4025] alloc_netdev_mqs+0x1a7/0xa40 [ 63.489232][ T4025] rtnl_create_link+0x239/0x720 [ 63.489265][ T4025] rtnl_newlink_create+0x174/0x650 [ 63.489362][ T4025] ? security_capable+0x7b/0x90 [ 63.489388][ T4025] ? netlink_ns_capable+0x86/0xa0 [ 63.489417][ T4025] rtnl_newlink+0x1185/0x1400 [ 63.489447][ T4025] ? __memcg_slab_free_hook+0x14b/0x240 [ 63.489479][ T4025] ? __rcu_read_unlock+0x4e/0x70 [ 63.489498][ T4025] ? avc_has_perm_noaudit+0xab/0x130 [ 63.489608][ T4025] ? cred_has_capability+0x224/0x2a0 [ 63.489635][ T4025] ? selinux_capable+0x31/0x40 [ 63.489669][ T4025] ? security_capable+0x7b/0x90 [ 63.489795][ T4025] ? ns_capable+0x7c/0xb0 [ 63.489814][ T4025] ? __pfx_rtnl_newlink+0x10/0x10 [ 63.489835][ T4025] rtnetlink_rcv_msg+0x64b/0x720 [ 63.489860][ T4025] netlink_rcv_skb+0x123/0x220 [ 63.489903][ T4025] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 63.489933][ T4025] rtnetlink_rcv+0x1c/0x30 [ 63.489956][ T4025] netlink_unicast+0x5c0/0x690 [ 63.490066][ T4025] netlink_sendmsg+0x5c8/0x6f0 [ 63.490089][ T4025] ? __pfx_netlink_sendmsg+0x10/0x10 [ 63.490108][ T4025] ____sys_sendmsg+0x563/0x5b0 [ 63.490172][ T4025] ___sys_sendmsg+0x195/0x1e0 [ 63.490203][ T4025] __x64_sys_sendmsg+0xd4/0x160 [ 63.490230][ T4025] x64_sys_call+0x194c/0x3020 [ 63.490335][ T4025] do_syscall_64+0x12c/0x370 [ 63.490372][ T4025] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 63.490456][ T4025] RIP: 0033:0x7fb299f4c819 [ 63.490474][ T4025] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 63.490491][ T4025] RSP: 002b:00007fb2989a7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 63.490542][ T4025] RAX: ffffffffffffffda RBX: 00007fb29a1c5fa0 RCX: 00007fb299f4c819 [ 63.490555][ T4025] RDX: 0000000004000000 RSI: 0000200000000280 RDI: 0000000000000003 [ 63.490569][ T4025] RBP: 00007fb2989a7090 R08: 0000000000000000 R09: 0000000000000000 [ 63.490662][ T4025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 63.490677][ T4025] R13: 00007fb29a1c6038 R14: 00007fb29a1c5fa0 R15: 00007ffe19587b38 [ 63.490700][ T4025] [ 63.490791][ T4025] debugfs: out of free dentries, can not create file 'netdev@ffff88811b74b560' [ 63.917370][ T4025] vlan2: entered allmulticast mode [ 63.989530][ T4029] capability: warning: `syz.3.130' uses deprecated v2 capabilities in a way that may be insecure [ 64.324231][ T4042] xt_hashlimit: size too large, truncated to 1048576 [ 64.583933][ T4047] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 64.597496][ T4047] netlink: 20 bytes leftover after parsing attributes in process `syz.4.136'. [ 64.661693][ T4049] loop4: detected capacity change from 0 to 512 [ 64.671111][ T4049] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 64.695584][ T4049] EXT4-fs (loop4): filesystem is read-only [ 64.726418][ T4049] EXT4-fs (loop4): failed to initialize system zone (-117) [ 64.738166][ T4049] EXT4-fs (loop4): mount failed [ 64.898710][ T28] kauditd_printk_skb: 505 callbacks suppressed [ 64.898725][ T28] audit: type=1400 audit(1776124187.360:855): avc: denied { write } for pid=4051 comm="syz.2.138" name="dev_mcast" dev="proc" ino=4026532764 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 65.031755][ T4057] loop3: detected capacity change from 0 to 512 [ 65.073369][ T28] audit: type=1400 audit(1776124187.530:856): avc: denied { setopt } for pid=4051 comm="syz.2.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 65.088401][ T4057] EXT4-fs: Ignoring removed bh option [ 65.184071][ T4057] EXT4-fs: test_dummy_encryption option not supported [ 65.429830][ T28] audit: type=1400 audit(1776124187.890:857): avc: denied { create } for pid=4069 comm="syz.4.145" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=socket permissive=1 [ 65.556526][ T4066] loop3: detected capacity change from 0 to 1024 [ 65.568144][ T28] audit: type=1400 audit(1776124188.010:858): avc: denied { create } for pid=4069 comm="syz.4.145" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=unix_stream_socket permissive=1 [ 65.595889][ T4074] loop2: detected capacity change from 0 to 512 [ 65.628400][ T4074] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 65.653370][ T4076] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 65.664375][ T4076] netlink: 20 bytes leftover after parsing attributes in process `syz.4.147'. [ 65.679839][ T4066] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 65.685693][ T4074] EXT4-fs (loop2): filesystem is read-only [ 65.720576][ T4078] loop4: detected capacity change from 0 to 512 [ 65.729135][ T4066] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (30349!=20869) [ 65.748101][ T4078] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 65.790431][ T4066] EXT4-fs error (device loop3): ext4_get_journal_inode:5888: comm syz.3.139: inode #1: comm syz.3.139: iget: illegal inode # [ 65.817847][ T4078] EXT4-fs (loop4): 1 truncate cleaned up [ 65.824495][ T4074] EXT4-fs (loop2): failed to initialize system zone (-117) [ 65.835008][ T4078] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 65.848765][ T4066] loop3: lost filesystem error report for type 5 error -117 [ 65.849661][ T4066] EXT4-fs (loop3): no journal found [ 65.858608][ C0] EXT4-fs (loop3): error count since last fsck: 1 [ 65.858721][ C0] EXT4-fs (loop3): initial error at time 1776124188: ext4_get_journal_inode:5888 [ 65.858911][ C0] EXT4-fs (loop3): last error at time 1776124188: ext4_get_journal_inode:5888 [ 65.870651][ T4074] EXT4-fs (loop2): mount failed [ 65.897646][ T4066] EXT4-fs (loop3): can't get journal size [ 65.929973][ T4066] EXT4-fs (loop3): failed to initialize system zone (-22) [ 65.938750][ T4066] EXT4-fs (loop3): mount failed [ 66.539916][ T4093] loop3: detected capacity change from 0 to 512 [ 66.737318][ T4093] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 66.794215][ T4093] EXT4-fs (loop3): filesystem is read-only [ 66.840394][ T4093] EXT4-fs (loop3): failed to initialize system zone (-117) [ 66.887908][ T4093] EXT4-fs (loop3): mount failed [ 67.047133][ T28] audit: type=1400 audit(1776132381.496:859): avc: denied { read } for pid=4095 comm="syz.0.152" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 67.112443][ T3806] Bluetooth: hci0: Frame reassembly failed (-84) [ 67.162675][ T4096] netlink: 4 bytes leftover after parsing attributes in process `syz.0.152'. [ 67.212914][ T4096] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 67.238082][ T28] audit: type=1400 audit(1776132381.496:860): avc: denied { open } for pid=4095 comm="syz.0.152" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 67.292538][ T4096] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 67.386049][ T4096] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 67.409999][ T28] audit: type=1400 audit(1776132381.556:861): avc: denied { ioctl } for pid=4095 comm="syz.0.152" path="socket:[6750]" dev="sockfs" ino=6750 ioctlcmd=0x48d7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 67.451639][ T4100] loop3: detected capacity change from 0 to 128 [ 67.459099][ T4096] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 67.568348][ T28] audit: type=1400 audit(1776132381.946:862): avc: denied { ioctl } for pid=4099 comm="syz.3.153" path="socket:[6761]" dev="sockfs" ino=6761 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 67.699571][ T4105] xt_hashlimit: size too large, truncated to 1048576 [ 67.749387][ T3314] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 67.866378][ T28] audit: type=1400 audit(1776132382.316:863): avc: denied { bind } for pid=4107 comm="syz.4.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 67.918090][ T28] audit: type=1400 audit(1776132382.316:864): avc: denied { setopt } for pid=4107 comm="syz.4.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 68.041034][ T4114] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 68.051708][ T4114] netlink: 20 bytes leftover after parsing attributes in process `syz.4.158'. [ 68.245825][ T4127] netlink: 14 bytes leftover after parsing attributes in process `syz.4.162'. [ 68.256986][ T4127] x_tables: duplicate underflow at hook 1 [ 68.296693][ T4134] loop4: detected capacity change from 0 to 512 [ 68.306112][ T4134] FAT-fs (loop4): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 68.349767][ T4136] loop1: detected capacity change from 0 to 512 [ 68.362217][ T4136] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 68.390768][ T4136] EXT4-fs (loop1): filesystem is read-only [ 68.401807][ T4136] EXT4-fs (loop1): failed to initialize system zone (-117) [ 68.418144][ T4136] EXT4-fs (loop1): mount failed [ 68.447165][ T4139] loop3: detected capacity change from 0 to 1024 [ 68.454360][ T4139] EXT4-fs: test_dummy_encryption option not supported [ 68.989208][ T4149] FAULT_INJECTION: forcing a failure. [ 68.989208][ T4149] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 69.051194][ T4149] CPU: 0 UID: 0 PID: 4149 Comm: syz.2.167 Not tainted syzkaller #0 PREEMPT(full) [ 69.051282][ T4149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 69.051293][ T4149] Call Trace: [ 69.051300][ T4149] [ 69.051308][ T4149] __dump_stack+0x1d/0x30 [ 69.051340][ T4149] dump_stack_lvl+0x95/0xd0 [ 69.051361][ T4149] dump_stack+0x15/0x1b [ 69.051399][ T4149] should_fail_ex+0x263/0x280 [ 69.051429][ T4149] should_fail+0xb/0x20 [ 69.051455][ T4149] should_fail_usercopy+0x1a/0x20 [ 69.051524][ T4149] _copy_from_user+0x1c/0xb0 [ 69.051554][ T4149] __sys_bpf+0x183/0x7e0 [ 69.051582][ T4149] __x64_sys_bpf+0x41/0x50 [ 69.051602][ T4149] x64_sys_call+0x10cb/0x3020 [ 69.051692][ T4149] do_syscall_64+0x12c/0x370 [ 69.051723][ T4149] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.051748][ T4149] RIP: 0033:0x7fe2c9c3c819 [ 69.051765][ T4149] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 69.051782][ T4149] RSP: 002b:00007fe2c8697028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 69.051900][ T4149] RAX: ffffffffffffffda RBX: 00007fe2c9eb5fa0 RCX: 00007fe2c9c3c819 [ 69.051915][ T4149] RDX: 0000000000000048 RSI: 00002000000017c0 RDI: 0000000000000005 [ 69.051926][ T4149] RBP: 00007fe2c8697090 R08: 0000000000000000 R09: 0000000000000000 [ 69.051937][ T4149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 69.051949][ T4149] R13: 00007fe2c9eb6038 R14: 00007fe2c9eb5fa0 R15: 00007fff48bbf848 [ 69.051970][ T4149] [ 69.435472][ T3970] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 71.346815][ T4174] netlink: 14 bytes leftover after parsing attributes in process `syz.2.173'. [ 71.364414][ T4167] xt_hashlimit: size too large, truncated to 1048576 [ 71.390407][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 71.390422][ T28] audit: type=1400 audit(1776132385.836:873): avc: denied { create } for pid=4165 comm="syz.4.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 71.439407][ T4178] x_tables: duplicate underflow at hook 1 [ 71.459463][ T4172] bond0: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 71.583848][ T28] audit: type=1400 audit(1776132385.936:874): avc: denied { block_suspend } for pid=4165 comm="syz.4.171" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 71.652980][ T4172] bond0 (unregistering): Released all slaves [ 71.697897][ T28] audit: type=1400 audit(1776132386.016:875): avc: denied { read write } for pid=4165 comm="syz.4.171" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 71.871606][ T4188] loop2: detected capacity change from 0 to 512 [ 71.888321][ T28] audit: type=1400 audit(1776132386.016:876): avc: denied { open } for pid=4165 comm="syz.4.171" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 71.953140][ T4188] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 71.998174][ T4188] EXT4-fs (loop2): filesystem is read-only [ 72.025602][ T4188] EXT4-fs (loop2): failed to initialize system zone (-117) [ 72.042027][ T28] audit: type=1400 audit(1776132386.026:877): avc: denied { write } for pid=4165 comm="syz.4.171" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 72.076251][ T28] audit: type=1400 audit(1776132386.296:878): avc: denied { ioctl } for pid=4185 comm="syz.3.175" path="pid:[4026532368]" dev="nsfs" ino=4026532368 ioctlcmd=0xb707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 72.279750][ T28] audit: type=1400 audit(1776132386.456:879): avc: denied { create } for pid=4190 comm="syz.3.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 72.506445][ T4188] EXT4-fs (loop2): mount failed [ 72.665098][ T28] audit: type=1400 audit(1776132386.986:880): avc: denied { mounton } for pid=4198 comm="syz.1.179" path="/27/file0" dev="tmpfs" ino=169 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 75.224319][ T4220] 9pnet_fd: p9_fd_create_tcp (4220): problem connecting socket to 127.0.0.1 [ 75.487241][ T4242] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 75.619198][ T4248] syz.2.193 uses obsolete (PF_INET,SOCK_PACKET) [ 75.711865][ T4250] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 75.878871][ T4250] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 76.748584][ T4238] 9pnet_fd: p9_fd_create_tcp (4238): problem connecting socket to 127.0.0.1 [ 77.653066][ T28] audit: type=1400 audit(1776132391.266:881): avc: denied { read } for pid=4261 comm="syz.2.198" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 78.530088][ T28] audit: type=1400 audit(1776132391.266:882): avc: denied { open } for pid=4261 comm="syz.2.198" path="/dev/cpu/0/msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 78.631230][ T4286] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 78.643687][ T4286] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 78.795350][ T4288] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 78.798097][ T28] audit: type=1400 audit(1776132391.326:883): avc: denied { firmware_load } for pid=4261 comm="syz.2.198" path="/lib/firmware/regulatory.db" dev="sda1" ino=448 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 78.845616][ T4288] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 80.321491][ T4304] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 80.321491][ T4304] The task syz.3.208 (4304) triggered the difference, watch for misbehavior. [ 80.401521][ T28] audit: type=1400 audit(1776132394.856:884): avc: denied { read write } for pid=4309 comm="syz.1.214" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 80.544377][ T28] audit: type=1400 audit(1776132394.856:885): avc: denied { open } for pid=4309 comm="syz.1.214" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 80.671309][ T28] audit: type=1400 audit(1776132394.896:886): avc: denied { create } for pid=4307 comm="syz.4.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 80.726510][ T28] audit: type=1400 audit(1776132395.046:887): avc: denied { write } for pid=4319 comm="syz.2.218" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 80.838528][ T28] audit: type=1400 audit(1776132395.296:888): avc: denied { bind } for pid=4327 comm="syz.4.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 80.904911][ T28] audit: type=1400 audit(1776132395.316:889): avc: denied { listen } for pid=4327 comm="syz.4.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 80.945169][ T28] audit: type=1400 audit(1776132395.336:890): avc: denied { read } for pid=4327 comm="syz.4.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 81.352345][ T4346] netlink: 'syz.1.227': attribute type 1 has an invalid length. [ 81.756646][ T4362] netlink: 'syz.1.230': attribute type 4 has an invalid length. [ 82.282528][ T4392] wg1 speed is unknown, defaulting to 1000 [ 82.318133][ T4392] wg1 speed is unknown, defaulting to 1000 [ 82.325602][ T4392] wg1 speed is unknown, defaulting to 1000 [ 82.332044][ T4392] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 82.333942][ T4394] netlink: 16 bytes leftover after parsing attributes in process `syz.0.243'. [ 82.340061][ T4392] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 82.354669][ T4394] geneve2: entered promiscuous mode [ 82.385164][ T4392] wg1 speed is unknown, defaulting to 1000 [ 82.392774][ T4392] wg1 speed is unknown, defaulting to 1000 [ 82.400775][ T4392] wg1 speed is unknown, defaulting to 1000 [ 82.415508][ T4392] wg1 speed is unknown, defaulting to 1000 [ 82.433186][ T4392] wg1 speed is unknown, defaulting to 1000 [ 82.722068][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 82.722084][ T28] audit: type=1400 audit(1776132397.066:901): avc: denied { read } for pid=4408 comm="syz.0.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 83.095988][ T4428] IPVS: sync thread started: state = BACKUP, mcast_ifn = wg2, syncid = 1, id = 0 [ 83.350473][ T4435] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 83.367794][ T4435] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 83.593579][ T4435] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 83.648629][ T4435] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 83.865100][ T4452] netlink: 28 bytes leftover after parsing attributes in process `syz.2.267'. [ 84.434460][ T28] audit: type=1400 audit(1776132398.886:902): avc: denied { write } for pid=4467 comm="syz.4.272" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 84.466309][ T4469] random: crng reseeded on system resumption [ 84.783625][ T28] audit: type=1400 audit(1776132398.886:903): avc: denied { open } for pid=4467 comm="syz.4.272" path="/dev/snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 84.870636][ T4477] siw: device registration error -23 [ 85.964273][ T28] audit: type=1400 audit(1776132400.406:904): avc: denied { write } for pid=4496 comm="syz.2.282" name="event2" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 85.990795][ T28] audit: type=1400 audit(1776132400.406:905): avc: denied { open } for pid=4496 comm="syz.2.282" path="/dev/input/event2" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 86.579525][ T4510] netlink: 16 bytes leftover after parsing attributes in process `syz.4.287'. [ 86.626064][ T4510] netlink: 'syz.4.287': attribute type 3 has an invalid length. [ 86.636172][ T4510] netlink: 208 bytes leftover after parsing attributes in process `syz.4.287'. [ 86.647671][ T4510] netlink: 'syz.4.287': attribute type 3 has an invalid length. [ 86.657770][ T4510] netlink: 208 bytes leftover after parsing attributes in process `syz.4.287'. [ 87.114168][ T28] audit: type=1400 audit(1776132401.566:906): avc: denied { mount } for pid=4523 comm="syz.2.293" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 87.166928][ T28] audit: type=1400 audit(1776132401.616:907): avc: denied { getopt } for pid=4525 comm="syz.4.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 87.343558][ T4545] random: crng reseeded on system resumption [ 87.419770][ T28] audit: type=1400 audit(1776132401.866:908): avc: denied { read } for pid=4546 comm="syz.2.304" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 87.551365][ T28] audit: type=1400 audit(1776132401.866:909): avc: denied { open } for pid=4546 comm="syz.2.304" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 87.779111][ T28] audit: type=1400 audit(1776132401.866:910): avc: denied { ioctl } for pid=4546 comm="syz.2.304" path="/dev/ppp" dev="devtmpfs" ino=140 ioctlcmd=0x7438 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 87.931059][ T28] audit: type=1400 audit(1776132401.876:911): avc: denied { create } for pid=4546 comm="syz.2.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 87.958220][ T28] audit: type=1326 audit(1776132401.876:912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.2.304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe2c9c3c819 code=0x7ffc0000 [ 87.992624][ T28] audit: type=1326 audit(1776132401.876:913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.2.304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe2c9c3c819 code=0x7ffc0000 [ 88.019888][ T28] audit: type=1326 audit(1776132401.876:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.2.304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe2c9c3c819 code=0x7ffc0000 [ 88.055665][ T28] audit: type=1326 audit(1776132401.876:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.2.304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe2c9c3c819 code=0x7ffc0000 [ 88.057453][ T4566] netlink: 8 bytes leftover after parsing attributes in process `syz.2.312'. [ 88.082965][ T28] audit: type=1326 audit(1776132401.876:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.2.304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe2c9c3c819 code=0x7ffc0000 [ 88.150595][ T28] audit: type=1326 audit(1776132401.876:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.2.304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fe2c9c3c819 code=0x7ffc0000 [ 88.188069][ T4566] netlink: 24 bytes leftover after parsing attributes in process `syz.2.312'. [ 88.208144][ T28] audit: type=1326 audit(1776132401.876:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.2.304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe2c9c3c819 code=0x7ffc0000 [ 88.236218][ T4566] netlink: 24 bytes leftover after parsing attributes in process `syz.2.312'. [ 88.260430][ T28] audit: type=1326 audit(1776132401.876:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4546 comm="syz.2.304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe2c9c3c819 code=0x7ffc0000 [ 88.290410][ T4574] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 88.306238][ T4574] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 88.350449][ T4582] random: crng reseeded on system resumption [ 88.576752][ T4593] syzkaller0: entered promiscuous mode [ 88.584123][ T4593] syzkaller0: entered allmulticast mode [ 88.747151][ T4598] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 88.892142][ T4602] netlink: 4 bytes leftover after parsing attributes in process `syz.4.325'. [ 91.531276][ T4655] netlink: 28 bytes leftover after parsing attributes in process `syz.4.345'. [ 92.169182][ T4668] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 92.311774][ T4671] netlink: 8 bytes leftover after parsing attributes in process `syz.4.345'. [ 92.350808][ T4668] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 92.419777][ T4673] loop2: detected capacity change from 0 to 512 [ 92.538416][ T4673] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 92.593032][ T4673] EXT4-fs (loop2): filesystem is read-only [ 92.668430][ T4673] EXT4-fs (loop2): failed to initialize system zone (-117) [ 92.721557][ T4673] EXT4-fs (loop2): mount failed [ 92.859303][ T4684] loop3: detected capacity change from 0 to 1024 [ 92.901795][ T4684] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 93.000402][ T3312] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 93.820921][ T4706] netlink: 272 bytes leftover after parsing attributes in process `syz.3.364'. [ 93.879788][ T4710] netlink: 8 bytes leftover after parsing attributes in process `syz.3.366'. [ 93.992574][ T4717] netlink: 248 bytes leftover after parsing attributes in process `syz.1.370'. [ 94.089618][ T4724] netlink: 28 bytes leftover after parsing attributes in process `syz.1.372'. [ 94.111494][ T4727] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 94.165301][ T4727] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 94.201436][ T4731] netlink: 8 bytes leftover after parsing attributes in process `syz.1.372'. [ 94.252280][ T4733] netlink: 272 bytes leftover after parsing attributes in process `syz.2.377'. [ 95.181569][ T4751] netlink: 248 bytes leftover after parsing attributes in process `syz.0.382'. [ 95.442290][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 95.442305][ T28] audit: type=1400 audit(1776132409.896:925): avc: denied { name_bind } for pid=4752 comm="syz.0.383" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 95.478871][ T4753] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 95.508182][ T4753] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 95.728799][ T28] audit: type=1400 audit(1776132410.186:926): avc: denied { allowed } for pid=4758 comm="syz.1.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 95.864009][ T28] audit: type=1400 audit(1776132410.316:927): avc: denied { create } for pid=4764 comm="syz.3.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 95.943382][ T28] audit: type=1400 audit(1776132410.346:928): avc: denied { connect } for pid=4764 comm="syz.3.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 96.018135][ T28] audit: type=1400 audit(1776132410.346:929): avc: denied { write } for pid=4764 comm="syz.3.389" path="socket:[7962]" dev="sockfs" ino=7962 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 96.220041][ T4780] netlink: 248 bytes leftover after parsing attributes in process `syz.1.394'. [ 96.275574][ T4784] netlink: 4 bytes leftover after parsing attributes in process `syz.0.398'. [ 96.538599][ T4812] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 96.588161][ T4812] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 96.648189][ T4822] netlink: 4 bytes leftover after parsing attributes in process `syz.2.417'. [ 96.650825][ T4823] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 96.707188][ T4827] syzkaller0: entered promiscuous mode [ 96.713539][ T4827] syzkaller0: entered allmulticast mode [ 96.790986][ T4823] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 96.870422][ T28] audit: type=1400 audit(1776132411.326:930): avc: denied { bind } for pid=4836 comm="syz.3.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 96.941585][ T28] audit: type=1400 audit(1776132411.326:931): avc: denied { listen } for pid=4836 comm="syz.3.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 97.050421][ T28] audit: type=1400 audit(1776132411.326:932): avc: denied { accept } for pid=4836 comm="syz.3.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 97.388659][ T4868] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 97.401835][ T4868] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 98.226719][ T28] audit: type=1400 audit(1776132412.656:933): avc: denied { write } for pid=4902 comm="syz.3.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 98.300789][ T28] audit: type=1400 audit(1776132412.656:934): avc: denied { read } for pid=4902 comm="syz.3.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 99.813395][ T4949] netlink: 'syz.4.468': attribute type 16 has an invalid length. [ 99.838076][ T4949] netlink: 'syz.4.468': attribute type 17 has an invalid length. [ 99.908524][ T4947] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.925255][ T4947] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.017702][ T4957] random: crng reseeded on system resumption [ 100.074081][ T4959] loop1: detected capacity change from 0 to 512 [ 100.120230][ T4959] EXT4-fs: inline encryption not supported [ 100.222053][ T4949] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 100.254813][ T4933] lec:lec_atm_close: lec0: Shut down! [ 100.265679][ T4959] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 100.307414][ T4959] ext4 filesystem being mounted at /78/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 100.527022][ T4981] __nla_validate_parse: 3 callbacks suppressed [ 100.527039][ T4981] netlink: 28 bytes leftover after parsing attributes in process `syz.3.477'. [ 100.665145][ T4981] netlink: 8 bytes leftover after parsing attributes in process `syz.3.477'. [ 100.750933][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 100.750948][ T28] audit: type=1400 audit(1776132415.206:946): avc: denied { add_name } for pid=4967 comm="dhcpcd-run-hook" name="resolv.conf.lec0.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 100.751238][ T28] audit: type=1400 audit(1776132415.206:947): avc: denied { create } for pid=4967 comm="dhcpcd-run-hook" name="resolv.conf.lec0.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 100.751468][ T28] audit: type=1400 audit(1776132415.206:948): avc: denied { write } for pid=4967 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.lec0.link" dev="tmpfs" ino=3227 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 100.751654][ T28] audit: type=1400 audit(1776132415.206:949): avc: denied { append } for pid=4967 comm="dhcpcd-run-hook" name="resolv.conf.lec0.link" dev="tmpfs" ino=3227 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 100.769775][ T4995] loop0: detected capacity change from 0 to 512 [ 100.776870][ T4995] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 100.798748][ T28] audit: type=1400 audit(1776132415.256:950): avc: denied { setattr } for pid=4958 comm="syz.1.473" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 100.925736][ T28] audit: type=1400 audit(1776132415.276:951): avc: denied { remove_name } for pid=5000 comm="rm" name="resolv.conf.lec0.link" dev="tmpfs" ino=3227 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 100.953182][ T28] audit: type=1400 audit(1776132415.276:952): avc: denied { unlink } for pid=5000 comm="rm" name="resolv.conf.lec0.link" dev="tmpfs" ino=3227 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 100.968562][ T4995] EXT4-fs (loop0): 1 truncate cleaned up [ 101.044698][ T4995] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 101.233890][ T28] audit: type=1400 audit(1776132415.686:953): avc: denied { add_name } for pid=4958 comm="syz.1.473" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 101.328141][ T1033] lec:lec_start_xmit: lec0:No lecd attached [ 102.281456][ T5030] netlink: 8 bytes leftover after parsing attributes in process `syz.2.489'. [ 102.648546][ T5030] netlink: 4 bytes leftover after parsing attributes in process `syz.2.489'. [ 102.756945][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 102.781510][ T3805] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 102.808890][ T3805] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 102.860876][ T3805] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 102.892071][ T3805] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 102.971863][ T3313] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 103.018335][ T5040] random: crng reseeded on system resumption [ 103.038317][ T28] audit: type=1400 audit(1776140609.473:954): avc: denied { write } for pid=5037 comm="syz.2.490" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 103.248260][ T28] audit: type=1400 audit(1776140609.473:955): avc: denied { open } for pid=5037 comm="syz.2.490" path="/dev/snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 103.427389][ T5049] syzkaller0: entered promiscuous mode [ 103.461763][ T5049] syzkaller0: entered allmulticast mode [ 103.485998][ T5049] TC_ACT_REPEAT abuse ? [ 104.190381][ T5078] netlink: 'syz.4.502': attribute type 3 has an invalid length. [ 104.210184][ T5078] netlink: 208 bytes leftover after parsing attributes in process `syz.4.502'. [ 104.280425][ T5081] netlink: 28 bytes leftover after parsing attributes in process `syz.4.503'. [ 104.320218][ T5082] IPVS: sync thread started: state = BACKUP, mcast_ifn = wg2, syncid = 1, id = 0 [ 104.388291][ T5087] netlink: 4 bytes leftover after parsing attributes in process `syz.1.505'. [ 104.422165][ T5090] netlink: 8 bytes leftover after parsing attributes in process `syz.4.503'. [ 104.896396][ T5112] netlink: 12 bytes leftover after parsing attributes in process `syz.1.513'. [ 105.688361][ T5139] syzkaller0: entered promiscuous mode [ 105.742866][ T5139] syzkaller0: entered allmulticast mode [ 105.754504][ T5139] TC_ACT_REPEAT abuse ? [ 105.915675][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 105.915688][ T28] audit: type=1400 audit(1776140612.363:961): avc: denied { connect } for pid=5140 comm="syz.3.522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 106.089230][ T28] audit: type=1400 audit(1776140612.443:962): avc: denied { mounton } for pid=5142 comm="syz.3.523" path="/106/file0" dev="tmpfs" ino=573 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 106.656597][ T5157] syzkaller0: entered promiscuous mode [ 106.665177][ T5157] syzkaller0: entered allmulticast mode [ 106.702031][ T5161] netlink: 'syz.4.527': attribute type 5 has an invalid length. [ 106.981102][ T5185] netlink: 'syz.3.539': attribute type 3 has an invalid length. [ 106.989395][ T5185] netlink: 208 bytes leftover after parsing attributes in process `syz.3.539'. [ 107.017994][ C1] lec0: NETDEV WATCHDOG: CPU: 1: transmit queue 0 timed out 5690 ms [ 107.028089][ C1] lec:lec_tx_timeout: lec0 [ 107.033142][ C1] lec:lec_start_xmit: lec0:No lecd attached [ 107.162227][ T5176] syzkaller0: entered promiscuous mode [ 107.181123][ T5176] syzkaller0: entered allmulticast mode [ 108.463285][ T5231] netlink: 'syz.2.551': attribute type 3 has an invalid length. [ 108.502788][ T5235] tipc: Enabling of bearer rejected, failed to enable media [ 108.515617][ T5231] netlink: 208 bytes leftover after parsing attributes in process `syz.2.551'. [ 109.057741][ T5254] syzkaller0: entered promiscuous mode [ 109.109975][ T5254] syzkaller0: entered allmulticast mode [ 109.256184][ T5271] netlink: 'syz.4.567': attribute type 3 has an invalid length. [ 109.275947][ T5271] netlink: 208 bytes leftover after parsing attributes in process `syz.4.567'. [ 109.290980][ T5264] syzkaller0: entered promiscuous mode [ 109.292367][ T28] audit: type=1400 audit(1776140615.743:963): avc: denied { connect } for pid=5273 comm="syz.1.568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 109.298110][ T5264] syzkaller0: entered allmulticast mode [ 109.804693][ T5310] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 109.847001][ T5310] batadv_slave_0: entered promiscuous mode [ 109.978647][ T5314] netlink: 16 bytes leftover after parsing attributes in process `syz.0.581'. [ 109.979335][ T5312] syzkaller0: entered promiscuous mode [ 109.995610][ T5312] syzkaller0: entered allmulticast mode [ 109.996038][ T5314] netlink: 'syz.0.581': attribute type 3 has an invalid length. [ 110.011584][ T5314] netlink: 208 bytes leftover after parsing attributes in process `syz.0.581'. [ 110.172520][ T5329] random: crng reseeded on system resumption [ 110.716813][ T5344] netlink: 16 bytes leftover after parsing attributes in process `syz.4.593'. [ 110.795606][ T5349] netlink: 'syz.4.593': attribute type 3 has an invalid length. [ 110.818552][ T5349] netlink: 208 bytes leftover after parsing attributes in process `syz.4.593'. [ 110.837942][ T28] audit: type=1400 audit(1776140617.293:964): avc: denied { append } for pid=5347 comm="syz.3.595" name="event2" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 111.418009][ T28] audit: type=1400 audit(1776140617.863:965): avc: denied { load_policy } for pid=5366 comm="syz.4.603" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 111.445428][ T5368] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 111.456884][ T5369] random: crng reseeded on system resumption [ 111.463857][ T5368] SELinux: failed to load policy [ 111.642141][ T28] audit: type=1400 audit(1776140618.083:966): avc: denied { setopt } for pid=5389 comm="syz.4.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 111.793850][ T5408] random: crng reseeded on system resumption [ 112.048447][ C1] lec0: NETDEV WATCHDOG: CPU: 1: transmit queue 0 timed out 5010 ms [ 112.057121][ C1] lec:lec_tx_timeout: lec0 [ 112.061803][ C1] lec:lec_start_xmit: lec0:No lecd attached [ 112.464888][ T5429] netlink: 4 bytes leftover after parsing attributes in process `syz.3.623'. [ 113.029448][ T5444] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5444 comm=syz.4.630 [ 113.057204][ T5444] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=5444 comm=syz.4.630 [ 113.235036][ T5460] netlink: 4 bytes leftover after parsing attributes in process `syz.1.638'. [ 113.577085][ T5474] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 113.664428][ T5479] loop5: detected capacity change from 0 to 7 [ 113.713114][ T5474] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 113.816685][ T5474] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 113.840102][ T5474] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 114.649185][ T5512] netlink: 28 bytes leftover after parsing attributes in process `syz.3.651'. [ 114.659434][ T5512] netlink: 28 bytes leftover after parsing attributes in process `syz.3.651'. [ 114.671710][ T5512] netlink: 28 bytes leftover after parsing attributes in process `syz.3.651'. [ 114.684371][ T5512] netlink: 28 bytes leftover after parsing attributes in process `syz.3.651'. [ 114.696976][ T5512] netlink: 28 bytes leftover after parsing attributes in process `syz.3.651'. [ 114.709010][ T5512] netlink: 28 bytes leftover after parsing attributes in process `syz.3.651'. [ 114.721489][ T5512] netlink: 28 bytes leftover after parsing attributes in process `syz.3.651'. [ 114.734280][ T5512] netlink: 28 bytes leftover after parsing attributes in process `syz.3.651'. [ 115.486239][ T5520] netlink: 'syz.2.655': attribute type 3 has an invalid length. [ 115.818337][ T5551] program syz.2.664 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 115.954948][ T5557] syzkaller0: entered promiscuous mode [ 115.976009][ T5557] syzkaller0: entered allmulticast mode [ 116.389839][ T5575] random: crng reseeded on system resumption [ 117.078004][ C1] lec0: NETDEV WATCHDOG: CPU: 1: transmit queue 0 timed out 5010 ms [ 117.087122][ C1] lec:lec_tx_timeout: lec0 [ 117.092022][ C1] lec:lec_start_xmit: lec0:No lecd attached [ 117.531616][ T5606] __nla_validate_parse: 17 callbacks suppressed [ 117.531633][ T5606] netlink: 8 bytes leftover after parsing attributes in process `syz.3.680'. [ 118.589689][ T5618] netlink: 8 bytes leftover after parsing attributes in process `syz.4.687'. [ 118.724130][ T28] audit: type=1400 audit(1776140625.173:967): avc: denied { read } for pid=5628 comm="syz.2.691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 118.807354][ T5636] netlink: 16 bytes leftover after parsing attributes in process `syz.1.694'. [ 118.850977][ T5636] netlink: 'syz.1.694': attribute type 3 has an invalid length. [ 118.869246][ T5636] netlink: 208 bytes leftover after parsing attributes in process `syz.1.694'. [ 119.732136][ T5659] syzkaller0: entered promiscuous mode [ 119.739113][ T5659] syzkaller0: entered allmulticast mode [ 120.252772][ T28] audit: type=1400 audit(1776140626.703:968): avc: denied { create } for pid=5686 comm="syz.0.714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 120.372107][ T28] audit: type=1400 audit(1776140626.723:969): avc: denied { sys_admin } for pid=5686 comm="syz.0.714" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 120.546764][ T5705] netlink: 4 bytes leftover after parsing attributes in process `syz.0.718'. [ 120.832912][ T5719] random: crng reseeded on system resumption [ 120.855418][ T5721] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 120.951910][ T28] audit: type=1400 audit(1776140627.373:970): avc: denied { create } for pid=5711 comm="syz.1.724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 120.977103][ T5721] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 120.986731][ T5723] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 121.025506][ T5723] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 121.035896][ T28] audit: type=1400 audit(1776140627.373:971): avc: denied { bind } for pid=5711 comm="syz.1.724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 121.454434][ T5734] netlink: 28 bytes leftover after parsing attributes in process `syz.4.733'. [ 121.593093][ T5736] netlink: 8 bytes leftover after parsing attributes in process `syz.4.733'. [ 121.744637][ T5746] wg1 speed is unknown, defaulting to 1000 [ 122.007146][ T5752] syzkaller0: entered promiscuous mode [ 122.042747][ T5752] syzkaller0: entered allmulticast mode [ 122.107999][ C1] lec0: NETDEV WATCHDOG: CPU: 1: transmit queue 0 timed out 5010 ms [ 122.118215][ C1] lec:lec_tx_timeout: lec0 [ 122.123377][ C1] lec:lec_start_xmit: lec0:No lecd attached [ 122.133054][ T5758] netlink: 16 bytes leftover after parsing attributes in process `syz.2.742'. [ 122.151495][ T5758] netlink: 'syz.2.742': attribute type 3 has an invalid length. [ 122.178171][ T5758] netlink: 208 bytes leftover after parsing attributes in process `syz.2.742'. [ 122.214566][ T5764] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 122.221993][ T5764] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 122.238665][ T5764] vhci_hcd vhci_hcd.0: Device attached [ 122.263666][ T5765] usbip_core: unknown command [ 122.271316][ T5765] vhci_hcd: unknown pdu 0 [ 122.282354][ T5765] usbip_core: unknown command [ 122.294979][ T30] vhci_hcd vhci_hcd.3: stop threads [ 122.302961][ T30] vhci_hcd vhci_hcd.3: release socket [ 122.313543][ T5775] netlink: 'syz.2.747': attribute type 3 has an invalid length. [ 122.323160][ T30] vhci_hcd vhci_hcd.3: disconnect device [ 122.397505][ T5777] syzkaller0: entered promiscuous mode [ 122.404122][ T5777] syzkaller0: entered allmulticast mode [ 122.860772][ T28] audit: type=1400 audit(1776140629.143:972): avc: denied { ioctl } for pid=5782 comm="syz.0.753" path="socket:[11918]" dev="sockfs" ino=11918 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 123.263393][ T5796] syzkaller0: entered promiscuous mode [ 123.331849][ T5796] syzkaller0: entered allmulticast mode [ 123.750210][ T5808] syzkaller0: entered promiscuous mode [ 123.757424][ T5809] netlink: 16 bytes leftover after parsing attributes in process `syz.4.757'. [ 123.777440][ T5808] syzkaller0: entered allmulticast mode [ 123.808207][ T5809] netlink: 'syz.4.757': attribute type 3 has an invalid length. [ 123.823627][ T5809] netlink: 208 bytes leftover after parsing attributes in process `syz.4.757'. [ 123.847215][ T5815] syzkaller0: entered promiscuous mode [ 123.853508][ T5815] syzkaller0: entered allmulticast mode [ 123.962089][ T28] audit: type=1400 audit(1776140630.413:973): avc: denied { ioctl } for pid=5822 comm="syz.0.767" path="socket:[12506]" dev="sockfs" ino=12506 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 124.240764][ T5845] syzkaller0: entered promiscuous mode [ 124.247032][ T5845] syzkaller0: entered allmulticast mode [ 124.291801][ T5846] syzkaller0: entered promiscuous mode [ 124.565511][ T5846] syzkaller0: entered allmulticast mode [ 124.886161][ T5860] random: crng reseeded on system resumption [ 125.245003][ T5863] syzkaller0: entered promiscuous mode [ 125.259937][ T5863] syzkaller0: entered allmulticast mode [ 125.278275][ T5867] netlink: 8 bytes leftover after parsing attributes in process `syz.0.785'. [ 125.572871][ T5880] syzkaller0: entered promiscuous mode [ 125.608399][ T5880] syzkaller0: entered allmulticast mode [ 125.656326][ T5885] syzkaller0: entered promiscuous mode [ 125.665206][ T5887] netlink: 16 bytes leftover after parsing attributes in process `syz.4.793'. [ 125.680858][ T5885] syzkaller0: entered allmulticast mode [ 125.702416][ T5887] netlink: 'syz.4.793': attribute type 3 has an invalid length. [ 125.719576][ T5887] netlink: 208 bytes leftover after parsing attributes in process `syz.4.793'. [ 126.036515][ T5913] syzkaller0: entered promiscuous mode [ 126.043424][ T5913] syzkaller0: entered allmulticast mode [ 126.043866][ T5909] netlink: 16 bytes leftover after parsing attributes in process `syz.0.805'. [ 126.074746][ T5909] netlink: 'syz.0.805': attribute type 3 has an invalid length. [ 126.091676][ T5909] netlink: 208 bytes leftover after parsing attributes in process `syz.0.805'. [ 126.182873][ T5921] syzkaller0: entered promiscuous mode [ 126.192167][ T5921] syzkaller0: entered allmulticast mode [ 126.378314][ T5934] IPVS: sync thread started: state = BACKUP, mcast_ifn = wg2, syncid = 1, id = 0 [ 126.535044][ T5942] netlink: 8 bytes leftover after parsing attributes in process `syz.4.811'. [ 126.555263][ T5943] netlink: 8 bytes leftover after parsing attributes in process `syz.2.813'. [ 126.658047][ T5942] netlink: 20 bytes leftover after parsing attributes in process `syz.4.811'. [ 126.692853][ T5953] netlink: 'syz.0.818': attribute type 1 has an invalid length. [ 126.743740][ T5956] syzkaller0: entered promiscuous mode [ 126.750211][ T5956] syzkaller0: entered allmulticast mode [ 126.766816][ T5957] netlink: 'syz.0.819': attribute type 3 has an invalid length. [ 127.105328][ T5987] tmpfs: Bad value for 'mpol' [ 127.138034][ C1] lec0: NETDEV WATCHDOG: CPU: 1: transmit queue 0 timed out 5010 ms [ 127.138980][ T28] audit: type=1400 audit(1776140633.553:974): avc: denied { lock } for pid=5986 comm="syz.1.843" path="socket:[13365]" dev="sockfs" ino=13365 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 127.147290][ C1] lec:lec_tx_timeout: lec0 [ 127.181419][ C1] lec:lec_start_xmit: lec0:No lecd attached [ 127.218012][ T28] audit: type=1400 audit(1776140633.553:975): avc: denied { mounton } for pid=5986 comm="syz.1.843" path="/syzcgroup/unified/syz1" dev="cgroup2" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 127.384799][ T5990] SELinux: Context system_u:object_r:boot_t:s0 is not valid (left unmapped). [ 127.635257][ T5993] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 127.643209][ T5993] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 127.823514][ T28] audit: type=1400 audit(1776140633.833:976): avc: denied { connect } for pid=5986 comm="syz.1.843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 127.846721][ T28] audit: type=1400 audit(1776140633.843:977): avc: denied { relabelto } for pid=5986 comm="syz.1.843" name="syz1" dev="cgroup2" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:boot_t:s0" [ 127.874567][ T28] audit: type=1400 audit(1776140633.843:978): avc: denied { associate } for pid=5986 comm="syz.1.843" name="syz1" dev="cgroup2" ino=54 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:boot_t:s0" [ 127.905928][ T5993] vhci_hcd vhci_hcd.0: Device attached [ 127.917987][ T5996] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 128.099141][ T5996] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 128.154853][ T5994] vhci_hcd: cannot find a urb of seqnum 1 max seqnum 0 [ 128.188023][ T3419] usb 9-1: new low-speed USB device number 2 using vhci_hcd [ 128.196025][ T5995] vhci_hcd: sendmsg failed!, ret=-32 for 48 [ 128.211179][ T6007] syzkaller0: entered promiscuous mode [ 128.228580][ T3806] vhci_hcd vhci_hcd.4: stop threads [ 128.233965][ T3806] vhci_hcd vhci_hcd.4: release socket [ 128.239789][ T6007] syzkaller0: entered allmulticast mode [ 128.248137][ T3806] vhci_hcd vhci_hcd.4: disconnect device [ 128.779342][ T28] audit: type=1400 audit(1776140635.173:979): avc: denied { append } for pid=6025 comm="syz.4.847" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 129.928431][ T6047] syzkaller0: entered promiscuous mode [ 129.948082][ T6047] syzkaller0: entered allmulticast mode [ 130.168882][ T6051] syzkaller0: entered promiscuous mode [ 130.176380][ T6051] syzkaller0: entered allmulticast mode [ 130.332391][ T6061] __nla_validate_parse: 8 callbacks suppressed [ 130.332407][ T6061] netlink: 48 bytes leftover after parsing attributes in process `syz.4.862'. [ 130.549154][ T6082] netlink: 28 bytes leftover after parsing attributes in process `syz.4.870'. [ 130.640496][ T6089] netlink: 8 bytes leftover after parsing attributes in process `syz.4.870'. [ 130.643540][ T6088] syzkaller0: entered promiscuous mode [ 130.668387][ T6088] syzkaller0: entered allmulticast mode [ 130.881171][ T6102] netlink: 4 bytes leftover after parsing attributes in process `syz.2.859'. [ 131.266028][ T28] audit: type=1400 audit(1776140637.713:980): avc: denied { write } for pid=6124 comm="syz.4.883" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 131.376559][ T6136] netlink: 4 bytes leftover after parsing attributes in process `syz.0.887'. [ 131.396575][ T6134] syzkaller0: entered promiscuous mode [ 131.403696][ T6134] syzkaller0: entered allmulticast mode [ 131.735489][ T6163] wg1 speed is unknown, defaulting to 1000 [ 132.026961][ T6170] netlink: 40 bytes leftover after parsing attributes in process `syz.3.897'. [ 132.438744][ T6178] netlink: 4 bytes leftover after parsing attributes in process `syz.2.900'. [ 132.569916][ T6186] syzkaller0: entered promiscuous mode [ 132.589171][ T6186] syzkaller0: entered allmulticast mode [ 133.007988][ C1] lec0: NETDEV WATCHDOG: CPU: 1: transmit queue 0 timed out 5820 ms [ 133.016779][ C1] lec:lec_tx_timeout: lec0 [ 133.028005][ C1] lec:lec_start_xmit: lec0:No lecd attached [ 133.101738][ T28] audit: type=1400 audit(1776140639.553:981): avc: denied { read } for pid=6203 comm="syz.2.911" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 133.209903][ T28] audit: type=1400 audit(1776140639.593:982): avc: denied { open } for pid=6203 comm="syz.2.911" path="/dev/rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 133.296136][ T28] audit: type=1400 audit(1776140639.593:983): avc: denied { ioctl } for pid=6203 comm="syz.2.911" path="/dev/rtc0" dev="devtmpfs" ino=244 ioctlcmd=0x700b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 133.339221][ T3419] usb 9-1: enqueue for inactive port 0 [ 133.349293][ T3419] usb 9-1: enqueue for inactive port 0 [ 133.422512][ T3419] vhci_hcd vhci_hcd.4: vhci_device speed not set [ 133.653098][ T6219] xt_CT: You must specify a L4 protocol and not use inversions on it [ 133.731292][ T6217] loop1: detected capacity change from 0 to 256 [ 133.926530][ T6217] FAT-fs (loop1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 134.657430][ T28] audit: type=1400 audit(1776140641.103:984): avc: denied { getopt } for pid=6216 comm="syz.1.916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 134.951385][ T6228] netlink: 28 bytes leftover after parsing attributes in process `syz.3.919'. [ 135.634771][ T6229] random: crng reseeded on system resumption [ 135.709662][ T28] audit: type=1400 audit(1776140642.143:985): avc: denied { create } for pid=6216 comm="syz.1.916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 136.227731][ T6233] syzkaller0: entered promiscuous mode [ 136.235362][ T6234] netlink: 8 bytes leftover after parsing attributes in process `syz.3.919'. [ 136.248087][ T6233] syzkaller0: entered allmulticast mode [ 136.409103][ T6238] netlink: 4 bytes leftover after parsing attributes in process `syz.2.921'. [ 137.027646][ T6273] wg1 speed is unknown, defaulting to 1000 [ 137.332723][ T6277] random: crng reseeded on system resumption [ 137.636253][ T28] audit: type=1326 audit(1776140644.083:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6272 comm="syz.0.931" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fef9b0ac819 code=0x0 [ 137.639645][ T6284] netlink: 28 bytes leftover after parsing attributes in process `syz.1.935'. [ 137.699281][ T6283] syzkaller0: entered promiscuous mode [ 137.718390][ T6283] syzkaller0: entered allmulticast mode [ 137.752027][ T6287] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 137.786502][ T6287] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 137.917773][ T6291] netlink: 8 bytes leftover after parsing attributes in process `syz.1.935'. [ 138.038056][ C1] lec0: NETDEV WATCHDOG: CPU: 1: transmit queue 0 timed out 5010 ms [ 138.050292][ C1] lec:lec_tx_timeout: lec0 [ 138.057115][ C1] lec:lec_start_xmit: lec0:No lecd attached [ 138.947930][ T6327] netlink: 32 bytes leftover after parsing attributes in process `syz.0.947'. [ 139.216943][ T6333] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 139.323406][ T6333] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 139.594625][ T6333] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 139.609614][ T6348] random: crng reseeded on system resumption [ 139.621654][ T6350] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6350 comm=syz.4.957 [ 139.646176][ T6333] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 139.703125][ T6350] netlink: 'syz.4.957': attribute type 1 has an invalid length. [ 139.780849][ T6350] bond0: (slave gretap1): Enslaving as an active interface with an up link [ 139.818554][ T6350] vlan2: entered allmulticast mode [ 139.851128][ T6350] bond0: entered allmulticast mode [ 139.869427][ T6350] gretap1: entered allmulticast mode [ 139.969608][ T6364] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 140.039623][ T6364] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 140.588305][ T6373] netlink: 28 bytes leftover after parsing attributes in process `syz.0.966'. [ 141.030525][ T6389] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 141.189602][ T6389] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 142.495119][ T28] audit: type=1400 audit(1776140648.943:987): avc: denied { write } for pid=6411 comm="syz.1.978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 142.703501][ T6420] loop3: detected capacity change from 0 to 512 [ 142.728522][ T6420] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 142.775270][ T6420] EXT4-fs (loop3): filesystem is read-only [ 142.787084][ T6420] EXT4-fs (loop3): failed to initialize system zone (-117) [ 142.843638][ T6420] EXT4-fs (loop3): mount failed [ 143.077982][ C1] lec0: NETDEV WATCHDOG: CPU: 1: transmit queue 0 timed out 5010 ms [ 143.089182][ C1] lec:lec_tx_timeout: lec0 [ 143.096026][ C1] lec:lec_start_xmit: lec0:No lecd attached [ 144.669470][ T6491] netlink: 28 bytes leftover after parsing attributes in process `syz.0.997'. [ 144.807694][ T6507] netlink: 16 bytes leftover after parsing attributes in process `syz.3.1001'. [ 144.820296][ T6507] netlink: 'syz.3.1001': attribute type 3 has an invalid length. [ 144.829301][ T6507] netlink: 208 bytes leftover after parsing attributes in process `syz.3.1001'. [ 144.890498][ T6505] syzkaller0: entered promiscuous mode [ 144.898004][ T6505] syzkaller0: entered allmulticast mode [ 146.016399][ T6548] syz_tun: entered allmulticast mode [ 146.059399][ T6548] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 146.111459][ T6548] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 146.215755][ T6564] loop3: detected capacity change from 0 to 1024 [ 146.225606][ T6564] EXT4-fs: test_dummy_encryption option not supported [ 147.240350][ T6578] netlink: 'syz.1.1023': attribute type 3 has an invalid length. [ 147.290871][ T6580] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 147.343356][ T6580] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 147.367901][ T6580] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 147.405352][ T6580] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 147.451801][ T28] audit: type=1400 audit(1776140653.903:988): avc: denied { shutdown } for pid=6579 comm="syz.2.1024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 148.107997][ C1] lec0: NETDEV WATCHDOG: CPU: 1: transmit queue 0 timed out 5010 ms [ 148.117101][ C1] lec:lec_tx_timeout: lec0 [ 148.127984][ C1] lec:lec_start_xmit: lec0:No lecd attached [ 148.378561][ T6590] loop1: detected capacity change from 0 to 256 [ 148.546889][ T6590] FAT-fs (loop1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 148.601552][ T6592] syzkaller0: entered promiscuous mode [ 148.610213][ T6592] syzkaller0: entered allmulticast mode [ 148.800701][ T6602] loop0: detected capacity change from 0 to 512 [ 148.943805][ T6602] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended [ 148.964258][ T6602] EXT4-fs (loop0): filesystem is read-only [ 148.980558][ T6602] EXT4-fs (loop0): failed to initialize system zone (-117) [ 148.990589][ T6602] EXT4-fs (loop0): mount failed [ 149.248235][ T6625] tipc: Started in network mode [ 149.269061][ T6625] tipc: Node identity ac1414aa, cluster identity 4711 [ 149.280091][ T6625] tipc: Enabled bearer , priority 10 [ 149.434956][ T6625] tipc: Enabled bearer , priority 0 [ 149.901797][ T6641] loop4: detected capacity change from 0 to 1024 [ 149.915230][ T6641] EXT4-fs: test_dummy_encryption option not supported [ 150.010507][ T6653] IPVS: sync thread started: state = BACKUP, mcast_ifn = wg2, syncid = 1, id = 0 [ 150.088964][ T6656] loop3: detected capacity change from 0 to 512 [ 150.191086][ T6656] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 150.248536][ T6656] EXT4-fs (loop3): filesystem is read-only [ 150.259472][ T6656] EXT4-fs (loop3): failed to initialize system zone (-117) [ 150.269982][ T6656] EXT4-fs (loop3): mount failed [ 150.548219][ T3356] tipc: Node number set to 2886997162 [ 151.941104][ T6675] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1054'. [ 151.992242][ T6672] x_tables: duplicate underflow at hook 1 [ 152.711431][ T6687] syzkaller0: entered promiscuous mode [ 152.734833][ T6687] syzkaller0: entered allmulticast mode [ 152.758046][ T28] audit: type=1400 audit(1776140659.203:989): avc: denied { setopt } for pid=6692 comm="syz.3.1062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 152.784620][ T6690] bridge0: entered promiscuous mode [ 152.805218][ T6690] macvlan2: entered allmulticast mode [ 152.820193][ T6690] bridge0: entered allmulticast mode [ 152.832630][ T6690] bridge0: port 3(macvlan2) entered blocking state [ 152.842558][ T6690] bridge0: port 3(macvlan2) entered disabled state [ 152.854385][ T6690] bridge0: left allmulticast mode [ 152.861953][ T6690] bridge0: left promiscuous mode [ 153.042131][ T6706] loop0: detected capacity change from 0 to 256 [ 153.085506][ T6706] FAT-fs (loop0): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 153.148133][ C1] lec0: NETDEV WATCHDOG: CPU: 1: transmit queue 0 timed out 5020 ms [ 153.159584][ C1] lec:lec_tx_timeout: lec0 [ 153.166535][ C1] lec:lec_start_xmit: lec0:No lecd attached [ 153.494048][ T6716] loop0: detected capacity change from 0 to 512 [ 153.515792][ T6716] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended [ 153.577809][ T6716] EXT4-fs (loop0): filesystem is read-only [ 153.608168][ T6716] EXT4-fs (loop0): failed to initialize system zone (-117) [ 153.625935][ T6716] EXT4-fs (loop0): mount failed [ 153.735933][ T6719] loop3: detected capacity change from 0 to 512 [ 153.817979][ T6719] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 153.834230][ T6719] EXT4-fs (loop3): filesystem is read-only [ 153.839467][ T6728] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1075'. [ 153.860151][ T6719] EXT4-fs (loop3): failed to initialize system zone (-117) [ 153.869286][ T6719] EXT4-fs (loop3): mount failed [ 153.888237][ T6728] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1075'. [ 153.924822][ T3318] ================================================================== [ 153.933907][ T3318] BUG: KCSAN: data-race in shmem_add_to_page_cache / shmem_getattr [ 153.943562][ T3318] [ 153.946248][ T3318] read-write to 0xffff88811d948de8 of 8 bytes by task 6730 on cpu 1: [ 153.954667][ T3318] shmem_add_to_page_cache+0x4b2/0x5b0 [ 153.960932][ T3318] shmem_get_folio_gfp+0x4f3/0xd60 [ 153.966525][ T3318] shmem_write_begin+0xfc/0x1f0 [ 153.972017][ T3318] generic_perform_write+0x183/0x490 [ 153.977678][ T3318] shmem_file_write_iter+0xc5/0xf0 [ 153.983074][ T3318] __kernel_write_iter+0x319/0x590 [ 153.988902][ T3318] dump_user_range+0xa7d/0xdb0 [ 153.994467][ T3318] elf_core_dump+0x21a2/0x2330 [ 153.999860][ T3318] coredump_write+0xacc/0xdd0 [ 154.005395][ T3318] vfs_coredump+0x26c7/0x3130 [ 154.010525][ T3318] get_signal+0xd80/0xf60 [ 154.015917][ T3318] arch_do_signal_or_restart+0x96/0x450 [ 154.022283][ T3318] irqentry_exit+0xf7/0x520 [ 154.027264][ T3318] asm_exc_page_fault+0x26/0x30 [ 154.032872][ T3318] [ 154.035483][ T3318] read to 0xffff88811d948de8 of 8 bytes by task 3318 on cpu 0: [ 154.043593][ T3318] shmem_getattr+0x68/0x200 [ 154.048389][ T3318] vfs_getattr_nosec+0x146/0x1e0 [ 154.053787][ T3318] vfs_getattr+0x48/0x60 [ 154.058596][ T3318] vfs_statx_path+0x28/0x140 [ 154.063814][ T3318] vfs_statx+0xc4/0x170 [ 154.068888][ T3318] vfs_fstatat+0x118/0x170 [ 154.074562][ T3318] __se_sys_newfstatat+0x55/0x3e0 [ 154.082332][ T3318] __x64_sys_newfstatat+0x55/0x70 [ 154.089122][ T3318] x64_sys_call+0x2c64/0x3020 [ 154.095758][ T3318] do_syscall_64+0x12c/0x370 [ 154.101763][ T3318] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 154.108400][ T3318] [ 154.110981][ T3318] value changed: 0x000000000000028b -> 0x000000000000028c [ 154.121235][ T3318] [ 154.124515][ T3318] Reported by Kernel Concurrency Sanitizer on: [ 154.132942][ T3318] CPU: 0 UID: 0 PID: 3318 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full) [ 154.145576][ T3318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 154.157744][ T3318] ================================================================== [ 154.212375][ T6734] loop2: detected capacity change from 0 to 1024 [ 154.225241][ T6734] EXT4-fs: test_dummy_encryption option not supported [ 158.198114][ C1] lec0: NETDEV WATCHDOG: CPU: 1: transmit queue 0 timed out 5020 ms [ 158.210484][ C1] lec:lec_tx_timeout: lec0 [ 158.215902][ C1] lec:lec_start_xmit: lec0:No lecd attached