last executing test programs: 7m33.861639124s ago: executing program 4 (id=1142): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000002140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff0200}]}) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x414, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2a1, &(0x7f0000000f40)="$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") r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) dup(0xffffffffffffffff) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) 7m33.795712724s ago: executing program 4 (id=1147): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="000086dd0500560000005400000060ec970001983a00fc000018c6ba35000000000000000700ff020000000000000000000000000001000000f7000000000000000000002c"], 0xfdef) 7m33.594855083s ago: executing program 4 (id=1164): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x24020000) close_range(r1, 0xffffffffffffffff, 0x0) syz_clone(0xd5ba2180, 0x0, 0x0, 0x0, 0x0, 0x0) 7m33.585539543s ago: executing program 32 (id=1164): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x24020000) close_range(r1, 0xffffffffffffffff, 0x0) syz_clone(0xd5ba2180, 0x0, 0x0, 0x0, 0x0, 0x0) 7m32.270092219s ago: executing program 33 (id=1202): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) timer_create(0x9, 0x0, &(0x7f0000000400)=0x0) timer_delete(r1) 7m10.634496219s ago: executing program 0 (id=2171): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r0, {0x2, 0x8, @dev}, 0xffffffff, 0x0, 0x100000}}, 0x2e) 7m10.564080509s ago: executing program 0 (id=2173): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) write$P9_RREAD(r0, &(0x7f0000000180)={0x50, 0x75, 0x1, {0x45, "917d7631df8a355d5f1a551a6646aebd2c236fc71b83302f6a0066d5a42813d9a7dc9fd79c700ddb91512b83782d48d18bcb6d0b2543915c62f353346493db09191b5408bd"}}, 0x50) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 7m10.389760398s ago: executing program 0 (id=2177): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x107842, 0xa) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0, 0x2) 7m10.229375527s ago: executing program 0 (id=2181): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) unlinkat(r1, &(0x7f0000000380)='./file0\x00', 0x200) 7m10.155519978s ago: executing program 0 (id=2183): r0 = semget$private(0x0, 0x6, 0x182) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x1}], 0x1, 0x0) semop(r0, &(0x7f00000000c0)=[{}, {}], 0x2) semop(r0, &(0x7f0000000180)=[{}, {}], 0x2) semctl$GETZCNT(r0, 0x2, 0xf, 0x0) 7m9.866634716s ago: executing program 0 (id=2186): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x6a, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x33, 0x0, @private, @broadcast}, {0x0, 0x0, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "abb99279fd89da307583e654afb42af2dc91b30b60e83d50", "66eb64f2e8a3742962ae5b2fb03f495701288cf603c82fce6302900c99be5aab"}}}}}}, 0x0) 7m9.844809576s ago: executing program 34 (id=2186): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x6a, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x33, 0x0, @private, @broadcast}, {0x0, 0x0, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "abb99279fd89da307583e654afb42af2dc91b30b60e83d50", "66eb64f2e8a3742962ae5b2fb03f495701288cf603c82fce6302900c99be5aab"}}}}}}, 0x0) 4m48.741847521s ago: executing program 1 (id=6921): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) sendto(r0, &(0x7f00000002c0)='%', 0x300000, 0x0, 0x0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r1, 0xffffffffffffffff, 0x0) 4m48.650936981s ago: executing program 1 (id=6925): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) alarm(0x40) 4m48.553657561s ago: executing program 1 (id=6929): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x24020000) syz_clone3(&(0x7f00000008c0)={0x15340180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x0], 0x1}, 0x58) 4m48.39148332s ago: executing program 1 (id=6935): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x1000000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20000, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) 4m48.30018887s ago: executing program 1 (id=6939): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',wfdno', @ANYRESHEX]) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8b"], 0x53) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000680)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [], 0x6b}}) 4m47.973348099s ago: executing program 1 (id=6947): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) 4m47.973131229s ago: executing program 35 (id=6947): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) 3m31.641956298s ago: executing program 2 (id=9288): r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') 3m31.509093227s ago: executing program 2 (id=9293): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000180)=@keyring={'key_or_keyring:', r2}) 3m31.345062177s ago: executing program 2 (id=9297): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000040000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) unshare(0x8000000) semtimedop(0x0, &(0x7f0000000280)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) unshare(0x2c040000) 3m31.273386167s ago: executing program 2 (id=9300): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b73, 0x1, @perf_config_ext={0x9, 0x40}, 0x14105, 0x30, 0x8, 0x3, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000540), 0x1, 0x4a3, &(0x7f0000000580)="$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") open(&(0x7f0000000040)='./bus\x00', 0x46b42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000500)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5c9d000ff8ee09e737ff0edf110ff4117639c2eb4b78c66ee677df701905b9aafab4afaaf755a3f6a004", "cba3d625780820d1cbf7db71038259ca171ce1a311ef97e4298d1e14ef01060000e9009600fdff00000000000000000000000000000000000400", "d300e6d6ae9ef30bea2a004000"}) 3m30.909453216s ago: executing program 2 (id=9310): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x13, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, r2, 0x0) 3m30.246973804s ago: executing program 2 (id=9333): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1, 0x0, 0x20000000000}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="83efffff00000000180012800e0001007769726567756172640000000400028008000a00", @ANYRES32], 0x40}}, 0x0) 3m30.209347914s ago: executing program 36 (id=9333): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1, 0x0, 0x20000000000}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="83efffff00000000180012800e0001007769726567756172640000000400028008000a00", @ANYRES32], 0x40}}, 0x0) 3m29.933321623s ago: executing program 5 (id=9342): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x13, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, r2, 0x0) 3m29.818433013s ago: executing program 5 (id=9346): syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./bus\x00', 0x2000002, &(0x7f0000000600)=ANY=[@ANYBLOB="6e6f6e756d7461696c3d302c646973636172640061727365743d63703835322c757466383d2023d6ffff756d7461696c3d302c6e6f6e75617461692c69010068619615f9a9d8fc3435392d322c756e695f786c6174653d312c73686f72746e616d653d77696e6e742c756e695f786c6174653d312c757466b83d312c756e695f786c6174653d302c756e695f786c6174653d302c73686f72706e616d653d6d697865642c726f6469722c7558b161690ebea4d224aa44b2a03f19e29ce5a380829b252cb2ba9d01000080000000002c4fb4e27388a38ca91b346d2e5535414e8214d26a"], 0x1, 0x371, &(0x7f00000020c0)="$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") r0 = creat(&(0x7f0000000280)='./bus\x00', 0x2) pwritev2(r0, &(0x7f0000000040)=[{&(0x7f0000000980)="ca", 0x1}], 0x1, 0xfffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x44000, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 3m29.341053681s ago: executing program 5 (id=9355): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000001080), 0x1, 0x4f7, &(0x7f0000000540)="$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") open(&(0x7f0000000140)='./bus\x00', 0x143142, 0x0) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x6000, 0x1) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) syncfs(r0) unlinkat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) 3m29.12576103s ago: executing program 5 (id=9359): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b73, 0x1, @perf_config_ext={0x9, 0x40}, 0x14105, 0x30, 0x8, 0x3, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000540), 0x1, 0x4a3, &(0x7f0000000580)="$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") open(&(0x7f0000000040)='./bus\x00', 0x46b42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000500)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5c9d000ff8ee09e737ff0edf110ff4117639c2eb4b78c66ee677df701905b9aafab4afaaf755a3f6a004", "cba3d625780820d1cbf7db71038259ca171ce1a311ef97e4298d1e14ef01060000e9009600fdff00000000000000000000000000000000000400", "d300e6d6ae9ef30bea2a004000"}) 3m28.684441909s ago: executing program 5 (id=9370): sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000885}, 0x4004010) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)={0xc000202b}) 3m28.216080107s ago: executing program 5 (id=9378): r0 = creat(&(0x7f0000000540)='./file0\x00', 0x0) close(r0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000850000000800000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000640), 0x4, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 3m28.194121677s ago: executing program 37 (id=9378): r0 = creat(&(0x7f0000000540)='./file0\x00', 0x0) close(r0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000850000000800000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000640), 0x4, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 3m24.743116996s ago: executing program 4 (id=9379): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b73, 0x1, @perf_config_ext={0x9, 0x40}, 0x14105, 0x30, 0x8, 0x3, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000540), 0x1, 0x4a3, &(0x7f0000000580)="$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") open(&(0x7f0000000040)='./bus\x00', 0x46b42, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000500)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5c9d000ff8ee09e737ff0edf110ff4117639c2eb4b78c66ee677df701905b9aafab4afaaf755a3f6a004", "cba3d625780820d1cbf7db71038259ca171ce1a311ef97e4298d1e14ef01060000e9009600fdff00000000000000000000000000000000000400", "d300e6d6ae9ef30bea2a004000"}) 3m24.478063125s ago: executing program 4 (id=9439): r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1}, 0x6e) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x4f) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') preadv(r2, &(0x7f0000001400)=[{&(0x7f0000001ac0)=""/209, 0xd1}], 0x1, 0xc1, 0x0) 3m22.72284936s ago: executing program 4 (id=9496): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1e, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) writev(r2, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}], 0x1) 3m22.72234434s ago: executing program 38 (id=9496): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1e, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) writev(r2, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}], 0x1) 59.554618968s ago: executing program 9 (id=12050): r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000140)={0x0, 0x0}) write(r1, &(0x7f0000000000)="fa", 0xfffffdef) madvise(&(0x7f000000b000/0x3000)=nil, 0x3000, 0x8) 55.057587344s ago: executing program 9 (id=12055): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x20081e, &(0x7f0000000000)={[{@auto_da_alloc}, {@dioread_lock}, {@auto_da_alloc}]}, 0xff, 0x4ef, &(0x7f00000003c0)="$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") r0 = socket(0x2, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000), 0xfea7) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x1, 0x10012, r1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x990, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"/2448]}, 0xa08) 53.85411183s ago: executing program 9 (id=12057): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r2, 0x0, 0xfffffffffffffffd}, 0x18) setns(r1, 0x24020000) syz_clone(0xd5ba2180, 0x0, 0x0, 0x0, 0x0, 0x0) 51.453370772s ago: executing program 9 (id=12060): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) preadv(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000001c0)=""/119, 0x77}], 0x2, 0x0, 0x0) 48.752382334s ago: executing program 9 (id=12066): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="07000000040000001800000042a0000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001800"], 0x48) 43.780406228s ago: executing program 9 (id=12072): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r1, 0x1, 0x0, 0x0, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x8000000003c) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000200)=@raw={'raw\x00', 0x8, 0x3, 0x538, 0xc8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x468, 0xffffffff, 0xffffffff, 0x468, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x62}, 0x0, 0x358, 0x3a0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_hsr\x00', {0x4, 0x8, 0x20, 0x5e1b2d47, 0xf91, 0x5, 0x4, 0x9f7, 0x18}, {0x8}}}, @common=@inet=@hashlimit3={{0x158}, {'veth0\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@private=0xa010102, 'wlan0\x00', {0xab43}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x598) 27.919595048s ago: executing program 39 (id=12072): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r1, 0x1, 0x0, 0x0, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x8000000003c) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000200)=@raw={'raw\x00', 0x8, 0x3, 0x538, 0xc8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x468, 0xffffffff, 0xffffffff, 0x468, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x62}, 0x0, 0x358, 0x3a0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_hsr\x00', {0x4, 0x8, 0x20, 0x5e1b2d47, 0xf91, 0x5, 0x4, 0x9f7, 0x18}, {0x8}}}, @common=@inet=@hashlimit3={{0x158}, {'veth0\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@private=0xa010102, 'wlan0\x00', {0xab43}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x598) 24.395702357s ago: executing program 6 (id=12096): r0 = io_uring_setup(0x2e34, &(0x7f0000000900)={0x0, 0x100, 0x80, 0x4}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a40000000160a03020000000000000000020000000900020073797a32000000000900010073797a3000000000140003800800024000000000080001400000000014000000110001"], 0x68}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000040000000000a40000000160a01080000000000000000020000000900020073797a30000000000900010073797a3000000000140003800800024000000000080001400000000014000000110001"], 0x68}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 20.760776035s ago: executing program 6 (id=12101): r0 = socket(0x2b, 0x1, 0x0) r1 = syz_io_uring_setup(0x110, &(0x7f0000000140)={0x0, 0xfad6}, &(0x7f0000000240), &(0x7f0000000280)) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) io_uring_enter(r1, 0xdb4, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_SYNC_CANCEL(r1, 0x18, &(0x7f0000000000)={0x0, r0, 0x23, {0x3b4, 0x6d3}, 0x6}, 0x1) 19.690544422s ago: executing program 7 (id=12103): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000000704000046ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r2}, 0x10) sendto$inet6(r0, &(0x7f0000000000)="04", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 17.050586154s ago: executing program 3 (id=12105): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x10, &(0x7f0000000600)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0902000000000000000001"], 0x24}}, 0x0) 16.765709743s ago: executing program 7 (id=12106): setgroups(0x0, 0x0) getgroups(0x1, &(0x7f0000000100)=[0xee00]) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='configfs\x00', 0x0, 0x0) setgroups(0x1, &(0x7f0000000140)=[r0]) setregid(0x0, r0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) 15.85870879s ago: executing program 6 (id=12107): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000092, &(0x7f00000008c0)={[{@jqfmt_vfsold}, {@usrjquota, 0x22}, {@errors_continue}, {@noload}, {@data_err_ignore}, {@grpjquota, 0x22}, {@journal_dev={'journal_dev', 0x3d, 0x2}}, {@errors_remount}, {@noblock_validity}]}, 0xfe, 0x45f, &(0x7f0000000440)="$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") 15.036506327s ago: executing program 8 (id=12108): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) r2 = syz_create_resource$binfmt(&(0x7f0000000040)='./file1\x00') execveat$binfmt(0xffffffffffffff9c, r2, &(0x7f0000000400)={[], 0x23}, 0x0, 0x0) 14.420041605s ago: executing program 7 (id=12109): syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x0, &(0x7f0000000c00), 0x1, 0xb80, &(0x7f0000000c40)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xa0242, 0x0) pwrite64(r0, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x107842, 0x42) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) sendfile(r1, r1, 0x0, 0x80000000) 14.119358924s ago: executing program 3 (id=12110): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000080)) ioctl$EVIOCGABS20(r1, 0x40044591, 0x0) 12.73422553s ago: executing program 6 (id=12111): r0 = open(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x118) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xd) r1 = socket$key(0xf, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vxcan0\x00'}) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000000)='veth1_to_bridge\x00') sendmsg$key(r1, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="020300030e000000000700000000000004000900a0000000e9255bb992464e73a02159d3720df19f7a1dfec30000000003000600000000000200000001000000000000000000000002000100000000fffffffb0d00"], 0x70}, 0x1, 0x7}, 0x0) 11.433091976s ago: executing program 3 (id=12112): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1, 0x0, 0xe}, 0x18) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$igmp(0x2, 0x3, 0x2) sendmmsg$inet(r2, &(0x7f0000004840)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000800)="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", 0x126}, {&(0x7f00000000c0)="15654d91fd691c85513e1dff9a607c8217479a71a5477af6dc523937c362c891afad759d937a08ca51d28419513cfb2df6efeaf3fc1b3b3a7c6403c4dcaead7eec60576bf60e65ef13a17fdb13fed40d65bd28b50a91ae2edc949328be69b2fac09c2cd5b8c36a0cc78ff862add091c2a40610e313fe192ecb054b57445696a4c6f9c2f8f201920480d6d5e8621d77a88d2087244fd50eee2d6ccfd03b713f3401890c1239064dfae7223cdbedf4edb3f38d590983d394", 0xb7}, {&(0x7f0000006a40)="21aac44f47fbf4f6496ce4e4b9a4d822b78eb9b455598c8b61d8495f74a4a25b52ff51750300f4c4ca6f376903868f6c4549a9614f3fe4b30498a27b658ee69fefa3edb52ed47b2ee8c004e5582c9bec82b153e8cf7f91e72d9054ffffbdbaf0fcd1c048ed3ee937b93ad633ad5a01d52d820466d46fbc4409535896a59dd1d94279d9c4df720e1871a57830a078e3c058ec6a5e0d2b233827600000000000000000ca00"/182, 0xb6}, {&(0x7f0000000180)="47b7ae525821a239fc7a10a2f198314f675756667db1e87b8453f3b2e6864abbac55304b04db64070368248b9b3d488fc59bc48e88b14f23a271edbd512b71e3d47f7f3885bb27e665e04225088a0f126d14ad611079f1fffffffffffffff94141486ed92c2044d31c44b77f94598161dc688a843a0b8fb4ed79cc3c5868cd25c4b1022527ef18f57c4badcf188e8e0f9b068464c66eebd146280afa02cf2a8bf5a08dabe729a88685a8c4e0b6b7157ae487c9e48618ecb59e1d4482ee80cbeaf965158d8fe068f8b6b717a6e3cdf43cb4ac3ea83cf81dc54cd8ac5d217600eb5b7b90fd85a70c1ab6d55ea72dd2dfd49ebce26f30f2fb1c76", 0xf9}, {&(0x7f0000000940)="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", 0x229}], 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="2400000000000000000000000700000001071336ac1414aaac1414aaac1e080100000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac14141d"], 0x48}}], 0x1, 0x0) 10.674014324s ago: executing program 7 (id=12113): unshare(0x20000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000180)='kfree\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0xb, 0x8400, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f00000017c0)={r2, &(0x7f0000001680), 0x0}, 0x20) 9.833256471s ago: executing program 8 (id=12114): r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x4, 0x1b, &(0x7f0000000200)=ANY=[], 0x0) capset(0x0, &(0x7f0000000040)={0x200000, 0x200000, 0x4, 0x0, 0x0, 0xfffffffe}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x91}, 0x2000c894) ioctl$EVIOCRMFF(r0, 0xc0085508, &(0x7f0000000040)=0x3) 9.087479329s ago: executing program 6 (id=12115): r0 = socket$inet6_sctp(0xa, 0x801, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0x2000000000000178, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x2}, 0x8) sendto$inet6(r0, &(0x7f0000000040)="aa", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) close_range(r0, r0, 0x0) 8.707817408s ago: executing program 3 (id=12116): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r3, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01dfffffff9a26000000210000000c00018008000100", @ANYRES32=r2], 0x20}, 0x1, 0x0, 0x0, 0x4000c00}, 0x0) 8.387169617s ago: executing program 7 (id=12117): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@private2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in=@multicast2}, @in=@loopback}}, 0xf0}}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000000)=0xe0, 0x4) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@broadcast, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2, 0x0) 6.762336032s ago: executing program 8 (id=12118): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x7ff, 0x4) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x9, 0x0, 0xffffffff}, 0x1c) syz_open_dev$MSR(0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) 5.913876358s ago: executing program 6 (id=12119): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000003680)='sched_switch\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'ip6gretap0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="500000001000cff50000000000000d4ed7eceb01", @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="0800280092ad000008000a00", @ANYRES32=r4], 0x50}}, 0x0) 5.703770508s ago: executing program 3 (id=12120): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x2000000, &(0x7f00000002c0)={[{@nodioread_nolock}, {@grpquota}, {@resgid}, {@oldalloc}, {@lazytime}, {@jqfmt_vfsv1}]}, 0x1, 0x500, &(0x7f0000000500)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0), 0xfea7) ioctl$FS_IOC_RESVSP(r1, 0x40305839, &(0x7f0000000000)={0x0, 0x0, 0x3, 0xfa68}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 4.913397456s ago: executing program 7 (id=12121): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x5fef, 0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x7b, 0x4) recvfrom$inet(r0, 0x0, 0x0, 0x2043, 0x0, 0x0) 4.629142925s ago: executing program 8 (id=12122): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1689b3e01f39404c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r2}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x39, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0xffff, 0x0, 0x1, 0xfffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 2.782164679s ago: executing program 3 (id=12123): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000380)={r4, r1, 0x25, 0x2, @val=@tcx={@void, @value}}, 0x1c) syz_emit_ethernet(0x7e, &(0x7f0000000600)=ANY=[], 0x0) 2.102443267s ago: executing program 8 (id=12124): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1008002, &(0x7f0000000300)={[{@grpquota}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x84}}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x3}}, {@lazytime}, {@jqfmt_vfsold}, {@usrquota}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x1, 0x10012, r0, 0x0) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x66842, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0xffffffe4}], 0x1, 0x1400, 0x0, 0x0) 0s ago: executing program 8 (id=12125): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_io_uring_setup(0x362a, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20c006, &(0x7f0000000200)={[{@i_version}, {@mblk_io_submit}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@discard}, {@data_err_abort}], [{@seclabel}]}, 0x1, 0x43d, &(0x7f0000000900)="$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") kernel console output (not intermixed with test programs): 3): avc: denied { read append open } for pid=26098 comm="syz.8.10067" path="/dev/sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 317.346870][T26115] bond1: entered promiscuous mode [ 317.351924][T26115] bond1: entered allmulticast mode [ 317.372487][T26115] 8021q: adding VLAN 0 to HW filter on device bond1 [ 317.393328][T26115] bond1 (unregistering): Released all slaves [ 317.499721][T26130] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6gre0, syncid = 1, id = 0 [ 317.506831][T26127] IPVS: stopping master sync thread 26130 ... [ 318.151290][T26171] bond1: entered promiscuous mode [ 318.156428][T26171] bond1: entered allmulticast mode [ 318.163008][T26171] 8021q: adding VLAN 0 to HW filter on device bond1 [ 318.193264][T26171] bond1 (unregistering): Released all slaves [ 318.451071][T26188] bond1: entered promiscuous mode [ 318.456183][T26188] bond1: entered allmulticast mode [ 318.461598][T26188] 8021q: adding VLAN 0 to HW filter on device bond1 [ 318.480135][T26188] bond1 (unregistering): Released all slaves [ 318.596008][T26199] IPv6: sit1: Disabled Multicast RS [ 318.604699][T26199] sit1: entered allmulticast mode [ 318.668343][T26206] hub 6-0:1.0: USB hub found [ 318.678128][T26206] hub 6-0:1.0: 8 ports detected [ 318.692528][T26209] sit0: entered allmulticast mode [ 318.723523][T26209] sit0: entered promiscuous mode [ 318.919494][T26222] bond1: entered promiscuous mode [ 318.924665][T26222] bond1: entered allmulticast mode [ 318.931746][T26222] 8021q: adding VLAN 0 to HW filter on device bond1 [ 318.947442][T26222] bond1 (unregistering): Released all slaves [ 319.007146][T26226] lo speed is unknown, defaulting to 1000 [ 319.514155][T26263] netlink: 28 bytes leftover after parsing attributes in process `syz.7.10114'. [ 320.060334][T26303] pim6reg: entered allmulticast mode [ 320.087791][T26303] pim6reg: left allmulticast mode [ 320.388985][T26328] sd 0:0:1:0: device reset [ 320.611805][T26342] geneve3: entered promiscuous mode [ 320.617074][T26342] geneve3: entered allmulticast mode [ 320.938244][T26368] netlink: 24 bytes leftover after parsing attributes in process `syz.7.10162'. [ 321.058457][T26376] sd 0:0:1:0: device reset [ 321.774024][T26418] sd 0:0:1:0: device reset [ 321.836914][T26419] ref_ctr_offset mismatch. inode: 0xb5a offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 321.961658][T26425] bond1: entered promiscuous mode [ 321.966831][T26425] bond1: entered allmulticast mode [ 321.996932][T26425] 8021q: adding VLAN 0 to HW filter on device bond1 [ 322.037756][T26435] xt_CT: You must specify a L4 protocol and not use inversions on it [ 322.044342][T26425] bond1 (unregistering): Released all slaves [ 322.088336][ T29] kauditd_printk_skb: 1459 callbacks suppressed [ 322.088351][ T29] audit: type=1400 audit(2000000005.010:68683): avc: denied { prog_load } for pid=26436 comm="syz.7.10177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 322.147600][ T29] audit: type=1400 audit(2000000005.010:68684): avc: denied { bpf } for pid=26436 comm="syz.7.10177" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 322.168480][ T29] audit: type=1400 audit(2000000005.020:68685): avc: denied { prog_load } for pid=26436 comm="syz.7.10177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 322.187814][ T29] audit: type=1400 audit(2000000005.020:68686): avc: denied { bpf } for pid=26436 comm="syz.7.10177" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 322.208625][ T29] audit: type=1400 audit(2000000005.020:68687): avc: denied { perfmon } for pid=26436 comm="syz.7.10177" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 322.229868][ T29] audit: type=1400 audit(2000000005.020:68688): avc: denied { prog_run } for pid=26436 comm="syz.7.10177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 322.249172][ T29] audit: type=1400 audit(2000000005.040:68689): avc: denied { map_create } for pid=26440 comm="syz.6.10182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 322.268583][ T29] audit: type=1400 audit(2000000005.040:68690): avc: denied { perfmon } for pid=26440 comm="syz.6.10182" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 322.289860][ T29] audit: type=1400 audit(2000000005.050:68691): avc: denied { map_read map_write } for pid=26440 comm="syz.6.10182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 322.297388][T26450] netlink: 4 bytes leftover after parsing attributes in process `syz.8.10183'. [ 322.319791][ T29] audit: type=1400 audit(2000000005.070:68692): avc: denied { prog_load } for pid=26440 comm="syz.6.10182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 322.356704][T26450] netdevsim netdevsim8 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 322.364974][T26450] netdevsim netdevsim8 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 322.373308][T26450] netdevsim netdevsim8 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 322.381717][T26450] netdevsim netdevsim8 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 322.445216][T26450] vxlan0: entered promiscuous mode [ 323.100997][T26497] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 323.605644][T26526] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 323.952157][T26554] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 324.374849][T26585] hub 9-0:1.0: USB hub found [ 324.400854][T26585] hub 9-0:1.0: 8 ports detected [ 324.489990][T26590] netlink: 95 bytes leftover after parsing attributes in process `syz.3.10239'. [ 324.544191][T26593] IPVS: stopping master sync thread 26589 ... [ 324.616406][T26597] 9pnet: p9_errstr2errno: server reported unknown error ‌@يخ‚ح(للي«Q00000000000000000005 [ 324.841112][T26596] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 324.851602][T26596] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 324.949388][T26626] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6gre0, syncid = 65540, id = 0 [ 324.961424][T26625] IPVS: stopping master sync thread 26626 ... [ 325.020541][T26633] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6gre0, syncid = 65540, id = 0 [ 325.031553][T26632] IPVS: stopping master sync thread 26633 ... [ 325.442934][T26649] netlink: 95 bytes leftover after parsing attributes in process `syz.9.10260'. [ 325.565683][T26666] netlink: 95 bytes leftover after parsing attributes in process `syz.6.10280'. [ 325.982737][T26682] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 325.992133][T26682] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 326.800924][T26741] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 326.812929][T26741] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 327.092944][ T29] kauditd_printk_skb: 1110 callbacks suppressed [ 327.092959][ T29] audit: type=1400 audit(2000000010.010:69803): avc: denied { prog_load } for pid=26769 comm="syz.3.10317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 327.118648][ T29] audit: type=1400 audit(2000000010.010:69804): avc: denied { bpf } for pid=26769 comm="syz.3.10317" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 327.148260][ T29] audit: type=1400 audit(2000000010.060:69805): avc: denied { prog_load } for pid=26772 comm="syz.8.10319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 327.167727][ T29] audit: type=1400 audit(2000000010.060:69806): avc: denied { bpf } for pid=26772 comm="syz.8.10319" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 327.188498][ T29] audit: type=1400 audit(2000000010.060:69807): avc: denied { perfmon } for pid=26772 comm="syz.8.10319" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 327.209649][ T29] audit: type=1400 audit(2000000010.060:69808): avc: denied { bpf } for pid=26772 comm="syz.8.10319" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 327.230427][ T29] audit: type=1400 audit(2000000010.060:69809): avc: denied { prog_run } for pid=26772 comm="syz.8.10319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 327.249719][ T29] audit: type=1400 audit(2000000010.060:69810): avc: denied { create } for pid=26772 comm="syz.8.10319" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 327.271476][ T29] audit: type=1400 audit(2000000010.060:69811): avc: denied { map } for pid=26772 comm="syz.8.10319" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83388 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 327.295932][ T29] audit: type=1400 audit(2000000010.060:69812): avc: denied { read write } for pid=26772 comm="syz.8.10319" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83388 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 327.643278][T26790] rdma_op ffff88810529a980 conn xmit_rdma 0000000000000000 [ 327.690031][T26795] Cannot find add_set index 0 as target [ 327.805844][T26801] vhci_hcd: invalid port number 15 [ 327.811000][T26801] vhci_hcd: invalid port number 15 [ 327.900669][T26813] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=26813 comm=syz.7.10335 [ 327.913419][T26813] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=26813 comm=syz.7.10335 [ 328.047810][T26824] serio: Serial port ptm0 [ 328.101330][T26832] netlink: 28 bytes leftover after parsing attributes in process `syz.9.10344'. [ 328.176345][T26836] Cannot find add_set index 0 as target [ 328.228505][T26842] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=26842 comm=syz.9.10348 [ 328.241184][T26842] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=26842 comm=syz.9.10348 [ 328.271507][T26845] rdma_op ffff88810b58bd80 conn xmit_rdma 0000000000000000 [ 328.434077][T26859] netlink: 28 bytes leftover after parsing attributes in process `syz.8.10357'. [ 328.560986][T26872] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=26872 comm=syz.8.10362 [ 328.573781][T26872] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=26872 comm=syz.8.10362 [ 328.640626][T26874] vhci_hcd: invalid port number 15 [ 328.645804][T26874] vhci_hcd: invalid port number 15 [ 328.808606][T26892] netlink: 28 bytes leftover after parsing attributes in process `syz.3.10372'. [ 329.044602][T26914] vhci_hcd: invalid port number 15 [ 329.049795][T26914] vhci_hcd: invalid port number 15 [ 329.101614][T26922] devtmpfs: Unknown parameter 'posixacl' [ 329.139367][T26926] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 329.789389][T26956] vhci_hcd: invalid port number 15 [ 329.794557][T26956] vhci_hcd: invalid port number 15 [ 330.211659][T26999] netlink: 32 bytes leftover after parsing attributes in process `syz.6.10418'. [ 330.226126][T26997] vhci_hcd: invalid port number 15 [ 330.231270][T26997] vhci_hcd: invalid port number 15 [ 330.318583][T27008] netlink: 76 bytes leftover after parsing attributes in process `syz.8.10423'. [ 330.564228][T27029] netlink: 596 bytes leftover after parsing attributes in process `syz.8.10434'. [ 330.917300][T27053] bond1: entered promiscuous mode [ 330.922391][T27053] bond1: entered allmulticast mode [ 330.933538][T27053] 8021q: adding VLAN 0 to HW filter on device bond1 [ 330.945432][T27053] bond1 (unregistering): Released all slaves [ 331.047093][T27058] serio: Serial port ptm0 [ 331.335598][T27090] netlink: 32 bytes leftover after parsing attributes in process `syz.7.10456'. [ 332.239663][ T29] kauditd_printk_skb: 1260 callbacks suppressed [ 332.239676][ T29] audit: type=1400 audit(2000000015.160:71073): avc: denied { create } for pid=27132 comm="syz.9.10478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 332.282771][ T29] audit: type=1400 audit(2000000015.180:71074): avc: denied { prog_load } for pid=27136 comm="syz.7.10477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 332.302098][ T29] audit: type=1400 audit(2000000015.180:71075): avc: denied { bpf } for pid=27136 comm="syz.7.10477" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 332.323238][ T29] audit: type=1400 audit(2000000015.180:71076): avc: denied { prog_load } for pid=27136 comm="syz.7.10477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 332.342614][ T29] audit: type=1400 audit(2000000015.180:71077): avc: denied { bpf } for pid=27136 comm="syz.7.10477" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 332.363369][ T29] audit: type=1400 audit(2000000015.180:71078): avc: denied { perfmon } for pid=27136 comm="syz.7.10477" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 332.384605][ T29] audit: type=1400 audit(2000000015.180:71079): avc: denied { prog_run } for pid=27136 comm="syz.7.10477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 332.403821][ T29] audit: type=1400 audit(2000000015.190:71080): avc: denied { prog_load } for pid=27136 comm="syz.7.10477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 332.423129][ T29] audit: type=1400 audit(2000000015.200:71081): avc: denied { bpf } for pid=27136 comm="syz.7.10477" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 332.443921][ T29] audit: type=1400 audit(2000000015.200:71082): avc: denied { perfmon } for pid=27136 comm="syz.7.10477" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 333.034335][T27187] SELinux: failed to load policy [ 333.075420][T27190] netlink: 100 bytes leftover after parsing attributes in process `syz.3.10504'. [ 333.129073][T27192] netlink: 28 bytes leftover after parsing attributes in process `syz.9.10502'. [ 333.138242][T27192] tipc: Started in network mode [ 333.143120][T27192] tipc: Node identity 7, cluster identity 5 [ 333.148997][T27192] tipc: Node number set to 7 [ 333.207628][T27195] xt_CT: You must specify a L4 protocol and not use inversions on it [ 333.291264][T27202] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 333.661920][T27225] netlink: 100 bytes leftover after parsing attributes in process `syz.6.10517'. [ 333.712490][T27228] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 334.157424][T27270] netlink: 100 bytes leftover after parsing attributes in process `syz.8.10540'. [ 334.311484][T27282] netlink: 28 bytes leftover after parsing attributes in process `syz.8.10543'. [ 334.320636][T27282] tipc: Started in network mode [ 334.325554][T27282] tipc: Node identity 7, cluster identity 5 [ 334.331517][T27282] tipc: Node number set to 7 [ 334.576534][T27305] netlink: 100 bytes leftover after parsing attributes in process `syz.9.10554'. [ 335.149513][T27336] netlink: 28 bytes leftover after parsing attributes in process `syz.7.10571'. [ 335.158667][T27336] netlink: 28 bytes leftover after parsing attributes in process `syz.7.10571'. [ 336.079000][T27354] pim6reg: entered allmulticast mode [ 336.099088][T27354] pim6reg: left allmulticast mode [ 336.296923][T27377] netlink: 28 bytes leftover after parsing attributes in process `syz.6.10583'. [ 336.306070][T27377] tipc: Started in network mode [ 336.310942][T27377] tipc: Node identity 7, cluster identity 5 [ 336.316937][T27377] tipc: Node number set to 7 [ 336.970467][T27437] serio: Serial port ptm0 [ 337.106815][T27451] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 337.204995][T27453] xt_CT: You must specify a L4 protocol and not use inversions on it [ 337.252356][ T29] kauditd_printk_skb: 1213 callbacks suppressed [ 337.252370][ T29] audit: type=1400 audit(2000000020.170:72296): avc: denied { create } for pid=27462 comm="syz.6.10629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 337.309038][ T29] audit: type=1400 audit(2000000020.210:72297): avc: denied { ioctl } for pid=27462 comm="syz.6.10629" path="socket:[85517]" dev="sockfs" ino=85517 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 337.334220][ T29] audit: type=1400 audit(2000000020.210:72298): avc: denied { map_create } for pid=27462 comm="syz.6.10629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 337.353724][ T29] audit: type=1400 audit(2000000020.210:72299): avc: denied { map_read map_write } for pid=27462 comm="syz.6.10629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 337.373869][ T29] audit: type=1400 audit(2000000020.210:72300): avc: denied { prog_load } for pid=27462 comm="syz.6.10629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 337.393300][ T29] audit: type=1400 audit(2000000020.210:72301): avc: denied { bpf } for pid=27462 comm="syz.6.10629" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 337.414133][ T29] audit: type=1400 audit(2000000020.210:72302): avc: denied { perfmon } for pid=27462 comm="syz.6.10629" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 337.435425][ T29] audit: type=1400 audit(2000000020.210:72303): avc: denied { prog_run } for pid=27462 comm="syz.6.10629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 337.454664][ T29] audit: type=1400 audit(2000000020.220:72304): avc: denied { map_create } for pid=27464 comm="syz.9.10630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 337.474079][ T29] audit: type=1400 audit(2000000020.220:72305): avc: denied { map_create } for pid=27462 comm="syz.6.10629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 337.632852][T27483] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 337.736306][T27487] netlink: 28 bytes leftover after parsing attributes in process `syz.7.10639'. [ 337.745398][T27487] tipc: Started in network mode [ 337.750244][T27487] tipc: Node identity 7, cluster identity 5 [ 337.756174][T27487] tipc: Node number set to 7 [ 339.160182][T27605] x_tables: unsorted underflow at hook 3 [ 339.611043][T27637] x_tables: unsorted underflow at hook 3 [ 340.250476][T27679] atomic_op ffff88810451c528 conn xmit_atomic 0000000000000000 [ 340.259020][T27682] netlink: 28 bytes leftover after parsing attributes in process `syz.6.10732'. [ 340.349739][T27687] ip6tnl1: entered promiscuous mode [ 340.355065][T27687] ip6tnl1: entered allmulticast mode [ 340.784643][T27725] ip6tnl1: entered promiscuous mode [ 340.789932][T27725] ip6tnl1: entered allmulticast mode [ 341.019436][T27743] ALSA: seq fatal error: cannot create timer (-19) [ 341.197885][T27765] sd 0:0:1:0: device reset [ 341.212533][T27766] netlink: 28 bytes leftover after parsing attributes in process `syz.3.10766'. [ 341.221666][T27766] tipc: Started in network mode [ 341.226571][T27766] tipc: Node identity 7, cluster identity 5 [ 341.232480][T27766] tipc: Node number set to 7 [ 341.798269][T27808] ALSA: seq fatal error: cannot create timer (-19) [ 341.819396][T27811] sd 0:0:1:0: device reset [ 342.166862][T27835] sd 0:0:1:0: device reset [ 342.253915][ T29] kauditd_printk_skb: 1462 callbacks suppressed [ 342.253927][ T29] audit: type=1400 audit(2000000025.180:73768): avc: denied { prog_load } for pid=27842 comm="syz.6.10822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 342.280620][ T29] audit: type=1400 audit(2000000025.180:73769): avc: denied { bpf } for pid=27842 comm="syz.6.10822" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 342.318876][ T29] audit: type=1400 audit(2000000025.180:73770): avc: denied { prog_load } for pid=27845 comm="syz.3.10812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 342.338260][ T29] audit: type=1400 audit(2000000025.180:73771): avc: denied { bpf } for pid=27845 comm="syz.3.10812" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 342.359077][ T29] audit: type=1400 audit(2000000025.180:73772): avc: denied { perfmon } for pid=27845 comm="syz.3.10812" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 342.380251][ T29] audit: type=1400 audit(2000000025.180:73773): avc: denied { prog_run } for pid=27845 comm="syz.3.10812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 342.399584][ T29] audit: type=1400 audit(2000000025.230:73774): avc: denied { map_create } for pid=27844 comm="syz.8.10821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 342.419021][ T29] audit: type=1400 audit(2000000025.230:73775): avc: denied { map_read map_write } for pid=27844 comm="syz.8.10821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 342.439131][ T29] audit: type=1400 audit(2000000025.230:73776): avc: denied { prog_load } for pid=27844 comm="syz.8.10821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 342.458641][ T29] audit: type=1400 audit(2000000025.230:73777): avc: denied { bpf } for pid=27844 comm="syz.8.10821" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 342.532940][T27857] netlink: 'syz.8.10827': attribute type 298 has an invalid length. [ 342.637658][T27868] netlink: 28 bytes leftover after parsing attributes in process `syz.6.10814'. [ 343.490151][T27904] tipc: New replicast peer: fe80:0000:0000:0000:0000:0000:0000:00bb [ 343.498384][T27904] tipc: Enabled bearer , priority 10 [ 343.511989][T27903] netlink: 'syz.8.10838': attribute type 3 has an invalid length. [ 343.529122][T27908] netlink: 8 bytes leftover after parsing attributes in process `syz.6.10840'. [ 343.538257][T27908] netlink: 8 bytes leftover after parsing attributes in process `syz.6.10840'. [ 343.772043][T27929] netlink: 28 bytes leftover after parsing attributes in process `syz.9.10848'. [ 344.155083][T27961] netlink: 'syz.3.10867': attribute type 298 has an invalid length. [ 344.294329][T27972] sch_tbf: burst 0 is lower than device lo mtu (82) ! [ 344.308295][T27975] netlink: 'syz.7.10874': attribute type 3 has an invalid length. [ 344.481779][T27991] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10881'. [ 344.490818][T27991] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10881'. [ 344.629767][T28003] netlink: 'syz.3.10887': attribute type 3 has an invalid length. [ 344.970095][T28037] netlink: 16 bytes leftover after parsing attributes in process `syz.6.10905'. [ 345.098528][T28054] bridge0: entered promiscuous mode [ 345.104228][T28054] macvlan2: entered promiscuous mode [ 345.110939][T28054] bridge0: port 3(macvlan2) entered blocking state [ 345.117597][T28054] bridge0: port 3(macvlan2) entered disabled state [ 345.126886][T28054] macvlan2: entered allmulticast mode [ 345.132380][T28054] bridge0: entered allmulticast mode [ 345.140488][T28054] macvlan2: left allmulticast mode [ 345.145770][T28054] bridge0: left allmulticast mode [ 345.155344][T28054] bridge0: left promiscuous mode [ 345.164440][T28056] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 345.287232][T28067] netlink: 28 bytes leftover after parsing attributes in process `syz.6.10915'. [ 345.296332][T28067] netlink: 108 bytes leftover after parsing attributes in process `syz.6.10915'. [ 345.308688][T28067] netlink: 28 bytes leftover after parsing attributes in process `syz.6.10915'. [ 345.331560][T28072] tipc: New replicast peer: fe80:0000:0000:0000:0000:0000:0000:00bb [ 345.339890][T28072] tipc: Enabled bearer , priority 10 [ 345.515791][T28086] sch_tbf: burst 0 is lower than device lo mtu (82) ! [ 345.557700][T28084] lo speed is unknown, defaulting to 1000 [ 345.798760][T28108] tipc: Enabling of bearer rejected, failed to enable media [ 346.182217][T28139] tipc: Enabling of bearer rejected, failed to enable media [ 346.817729][T28165] SELinux: syz.9.10962 (28165) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 346.885472][T28173] program +}[@ is using a deprecated SCSI ioctl, please convert it to SG_IO [ 347.797307][ T29] kauditd_printk_skb: 1321 callbacks suppressed [ 347.797319][ T29] audit: type=1400 audit(2000000030.710:75099): avc: denied { map_create } for pid=28179 comm="syz.3.10973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 347.823060][ T29] audit: type=1400 audit(2000000030.710:75100): avc: denied { map_read map_write } for pid=28179 comm="syz.3.10973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 347.843217][ T29] audit: type=1400 audit(2000000030.720:75101): avc: denied { prog_load } for pid=28179 comm="syz.3.10973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 347.862625][ T29] audit: type=1400 audit(2000000030.720:75102): avc: denied { bpf } for pid=28179 comm="syz.3.10973" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 347.883488][ T29] audit: type=1400 audit(2000000030.720:75103): avc: denied { perfmon } for pid=28179 comm="syz.3.10973" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 347.904697][ T29] audit: type=1400 audit(2000000030.720:75104): avc: denied { prog_load } for pid=28181 comm="syz.7.10981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 347.923988][ T29] audit: type=1400 audit(2000000030.720:75105): avc: denied { bpf } for pid=28181 comm="syz.7.10981" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 347.944806][ T29] audit: type=1400 audit(2000000030.720:75106): avc: denied { perfmon } for pid=28181 comm="syz.7.10981" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 347.965963][ T29] audit: type=1400 audit(2000000030.720:75107): avc: denied { create } for pid=28180 comm="syz.6.10972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 347.974372][T28191] random: crng reseeded on system resumption [ 347.992254][ T29] audit: type=1400 audit(2000000030.720:75108): avc: denied { prog_load } for pid=28179 comm="syz.3.10973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 348.347097][T28217] bridge0: entered promiscuous mode [ 348.352388][T28217] macvlan2: entered promiscuous mode [ 348.359592][T28217] bridge0: port 1(macvlan2) entered blocking state [ 348.366344][T28217] bridge0: port 1(macvlan2) entered disabled state [ 348.373442][T28217] macvlan2: entered allmulticast mode [ 348.378894][T28217] bridge0: entered allmulticast mode [ 348.385260][T28217] macvlan2: left allmulticast mode [ 348.390433][T28217] bridge0: left allmulticast mode [ 348.397681][T28217] bridge0: left promiscuous mode [ 348.542665][T28232] program +}[@ is using a deprecated SCSI ioctl, please convert it to SG_IO [ 348.606179][T28236] netlink: 'syz.8.11005': attribute type 21 has an invalid length. [ 348.632958][T28236] __nla_validate_parse: 14 callbacks suppressed [ 348.632972][T28236] netlink: 132 bytes leftover after parsing attributes in process `syz.8.11005'. [ 348.648374][T28236] netlink: 'syz.8.11005': attribute type 1 has an invalid length. [ 348.657004][T28239] random: crng reseeded on system resumption [ 348.760883][T28243] lo speed is unknown, defaulting to 1000 [ 349.835963][T28328] netlink: 8 bytes leftover after parsing attributes in process `syz.7.11040'. [ 350.066267][T28348] SELinux: Context GPL is not valid (left unmapped). [ 350.164814][T28356] netlink: 'syz.9.11053': attribute type 3 has an invalid length. [ 350.241047][T28362] wireguard0: entered promiscuous mode [ 350.246635][T28362] wireguard0: entered allmulticast mode [ 350.461788][T28374] netlink: 8 bytes leftover after parsing attributes in process `syz.9.11060'. [ 350.839392][T28402] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 350.845789][T28402] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 350.877196][T28402] hsr_slave_0: left promiscuous mode [ 350.885273][T28402] hsr_slave_1: left promiscuous mode [ 350.900790][T28401] netlink: 'syz.3.11074': attribute type 12 has an invalid length. [ 351.149584][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.157124][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.164601][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.193483][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.201004][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.208466][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.216023][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.223470][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.231032][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.238538][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.246006][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.253597][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.261053][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.268499][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.275925][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.283348][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.290740][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.298168][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.307601][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.315047][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.322438][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.330174][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.337655][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.345146][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.352552][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.360005][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.367432][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.374918][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.382308][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.389753][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.397198][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.405060][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.412444][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.419944][ T35] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 351.441638][T28427] lo speed is unknown, defaulting to 1000 [ 351.558353][ T35] hid-generic 0000:0000:0000.000B: hidraw0: HID v0.00 Device [syz0] on syz1 [ 352.086644][T28477] netlink: 4 bytes leftover after parsing attributes in process `syz.3.11108'. [ 352.107219][T28478] tmpfs: Unknown parameter 'nolazytimeےے' [ 352.306626][T28488] ip6erspan0: entered promiscuous mode [ 352.312129][T28488] ip6erspan0: entered allmulticast mode [ 352.802932][ T29] kauditd_printk_skb: 1330 callbacks suppressed [ 352.802946][ T29] audit: type=1400 audit(2000000035.730:76439): avc: denied { bpf } for pid=28525 comm="syz.9.11131" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 352.811766][T28530] ebt_among: dst integrity fail: 15c [ 352.830064][ T29] audit: type=1400 audit(2000000035.730:76440): avc: denied { read } for pid=28528 comm="syz.7.11133" dev="nsfs" ino=4026532830 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 352.838081][ T29] audit: type=1400 audit(2000000035.730:76441): avc: denied { prog_run } for pid=28525 comm="syz.9.11131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 352.876203][ T29] audit: type=1400 audit(2000000035.730:76442): avc: denied { open } for pid=28528 comm="syz.7.11133" path="net:[4026532830]" dev="nsfs" ino=4026532830 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 352.899815][ T29] audit: type=1400 audit(2000000035.730:76443): avc: denied { create } for pid=28528 comm="syz.7.11133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 352.920222][ T29] audit: type=1400 audit(2000000035.800:76444): avc: denied { ioctl } for pid=28528 comm="syz.7.11133" path="socket:[89351]" dev="sockfs" ino=89351 ioctlcmd=0x48c8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 352.945749][ T29] audit: type=1400 audit(2000000035.800:76445): avc: denied { ioctl } for pid=28528 comm="syz.7.11133" path="socket:[89351]" dev="sockfs" ino=89351 ioctlcmd=0x48d2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 352.990626][ T29] audit: type=1400 audit(2000000035.890:76446): avc: denied { prog_load } for pid=28532 comm="syz.7.11134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 353.009984][ T29] audit: type=1400 audit(2000000035.890:76447): avc: denied { bpf } for pid=28532 comm="syz.7.11134" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 353.030783][ T29] audit: type=1400 audit(2000000035.890:76448): avc: denied { perfmon } for pid=28532 comm="syz.7.11134" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 353.294199][T28554] netlink: 'syz.3.11145': attribute type 3 has an invalid length. [ 353.302072][T28554] netlink: 8 bytes leftover after parsing attributes in process `syz.3.11145'. [ 354.004511][T28583] netlink: 'syz.6.11159': attribute type 4 has an invalid length. [ 354.153309][T28582] netlink: 4 bytes leftover after parsing attributes in process `syz.7.11157'. [ 354.295810][T28591] IPv6: NLM_F_CREATE should be specified when creating new route [ 355.918577][T28660] can0: slcan on ptm0. [ 356.073987][T28659] can0 (unregistered): slcan off ptm0. [ 356.204982][T28672] dummy0: entered promiscuous mode [ 356.240974][T28672] dummy0: left promiscuous mode [ 356.538165][T28687] 9p: Unknown Cache mode or invalid value m [ 357.876415][ T29] kauditd_printk_skb: 847 callbacks suppressed [ 357.876428][ T29] audit: type=1400 audit(2000000040.800:77296): avc: denied { map_create } for pid=28730 comm="syz.9.11224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 357.948154][ T29] audit: type=1400 audit(2000000040.800:77297): avc: denied { perfmon } for pid=28730 comm="syz.9.11224" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 357.969402][ T29] audit: type=1400 audit(2000000040.800:77298): avc: denied { map_read map_write } for pid=28730 comm="syz.9.11224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 357.989524][ T29] audit: type=1400 audit(2000000040.850:77299): avc: denied { prog_load } for pid=28730 comm="syz.9.11224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 358.008929][ T29] audit: type=1400 audit(2000000040.850:77300): avc: denied { bpf } for pid=28730 comm="syz.9.11224" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 358.029722][ T29] audit: type=1400 audit(2000000040.850:77301): avc: denied { perfmon } for pid=28730 comm="syz.9.11224" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 358.050927][ T29] audit: type=1400 audit(2000000040.860:77302): avc: denied { prog_run } for pid=28730 comm="syz.9.11224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 358.239492][ T29] audit: type=1400 audit(2000000040.910:77303): avc: denied { map_create } for pid=28733 comm="syz.8.11227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 358.258953][ T29] audit: type=1400 audit(2000000040.910:77304): avc: denied { bpf } for pid=28733 comm="syz.8.11227" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 358.279814][ T29] audit: type=1400 audit(2000000040.910:77305): avc: denied { map_read map_write } for pid=28733 comm="syz.8.11227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 358.550605][T28744] lo speed is unknown, defaulting to 1000 [ 360.021375][T28806] ref_ctr_offset mismatch. inode: 0x6bb offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 360.239857][T28812] netlink: 16 bytes leftover after parsing attributes in process `syz.8.11264'. [ 360.432461][T28817] vlan0: entered allmulticast mode [ 361.034044][T28838] x_tables: ip6_tables: TCPMSS target: only valid for protocol 6 [ 361.387577][T28854] netlink: 16 bytes leftover after parsing attributes in process `syz.6.11282'. [ 361.433534][T28854] (unnamed net_device) (uninitialized): option primary_reselect: invalid value (192) [ 361.550182][T28859] netlink: 'syz.7.11285': attribute type 1 has an invalid length. [ 361.558210][T28859] netlink: 16 bytes leftover after parsing attributes in process `syz.7.11285'. [ 362.162924][T28888] netlink: 4 bytes leftover after parsing attributes in process `syz.3.11298'. [ 362.250647][T28895] pim6reg1: entered promiscuous mode [ 362.256237][T28895] pim6reg1: entered allmulticast mode [ 362.291264][T28898] macvtap1: entered promiscuous mode [ 362.296637][T28898] bridge0: entered promiscuous mode [ 362.301966][T28898] macvtap1: entered allmulticast mode [ 362.307387][T28898] bridge0: entered allmulticast mode [ 362.336846][T28898] bridge0: left allmulticast mode [ 362.341958][T28898] bridge0: left promiscuous mode [ 362.588187][T28905] netlink: 'syz.7.11306': attribute type 21 has an invalid length. [ 362.606476][T28905] netlink: 132 bytes leftover after parsing attributes in process `syz.7.11306'. [ 362.615712][T28905] netlink: 'syz.7.11306': attribute type 1 has an invalid length. [ 362.821415][T28919] bridge0: entered allmulticast mode [ 362.836513][T28919] pim6reg: entered allmulticast mode [ 362.953541][ T29] kauditd_printk_skb: 895 callbacks suppressed [ 362.953555][ T29] audit: type=1400 audit(2000000301.871:78201): avc: denied { create } for pid=28920 comm="syz.7.11314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 362.985520][ T29] audit: type=1400 audit(2000000301.901:78203): avc: denied { prog_load } for pid=28921 comm="syz.8.11315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 363.005362][ T29] audit: type=1400 audit(2000000301.901:78202): avc: denied { write } for pid=28920 comm="syz.7.11314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 363.025994][ T29] audit: type=1400 audit(2000000301.901:78204): avc: denied { bpf } for pid=28921 comm="syz.8.11315" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 363.046842][ T29] audit: type=1400 audit(2000000301.901:78205): avc: denied { perfmon } for pid=28921 comm="syz.8.11315" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 363.071896][ T29] audit: type=1400 audit(2000000301.991:78206): avc: denied { read } for pid=28920 comm="syz.7.11314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 363.092673][ T29] audit: type=1400 audit(2000000301.991:78207): avc: denied { read } for pid=28920 comm="syz.7.11314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 363.178273][T28929] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 363.264214][ T29] audit: type=1400 audit(2000000302.041:78208): avc: denied { map_create } for pid=28922 comm="syz.3.11316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 363.283733][ T29] audit: type=1400 audit(2000000302.041:78209): avc: denied { bpf } for pid=28922 comm="syz.3.11316" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 363.304810][ T29] audit: type=1400 audit(2000000302.041:78210): avc: denied { map_read map_write } for pid=28922 comm="syz.3.11316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 363.631321][T28946] smc: net device bond0 applied user defined pnetid S [ 363.656042][T28946] smc: net device bond0 erased user defined pnetid S [ 364.746102][T28994] netlink: 'syz.3.11346': attribute type 12 has an invalid length. [ 364.754144][T28994] netlink: 'syz.3.11346': attribute type 29 has an invalid length. [ 364.762057][T28994] netlink: 148 bytes leftover after parsing attributes in process `syz.3.11346'. [ 364.771247][T28994] netlink: 'syz.3.11346': attribute type 1 has an invalid length. [ 364.779087][T28994] netlink: 'syz.3.11346': attribute type 2 has an invalid length. [ 364.786978][T28994] netlink: 39 bytes leftover after parsing attributes in process `syz.3.11346'. [ 365.369774][T29018] netlink: 8 bytes leftover after parsing attributes in process `syz.3.11360'. [ 365.952968][T29045] block device autoloading is deprecated and will be removed. [ 365.995387][T29045] syz.6.11370: attempt to access beyond end of device [ 365.995387][T29045] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 366.313978][T29053] batadv_slave_1: entered promiscuous mode [ 366.394836][T29052] batadv_slave_1: left promiscuous mode [ 366.674596][T29075] netlink: 8 bytes leftover after parsing attributes in process `syz.7.11381'. [ 367.314531][T29099] 9pnet_fd: Insufficient options for proto=fd [ 367.529737][T29102] lo speed is unknown, defaulting to 1000 [ 368.027667][ T29] kauditd_printk_skb: 1109 callbacks suppressed [ 368.027681][ T29] audit: type=1400 audit(2000000306.941:79320): avc: denied { prog_load } for pid=29122 comm="syz.6.11403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 368.053440][ T29] audit: type=1400 audit(2000000306.941:79321): avc: denied { bpf } for pid=29122 comm="syz.6.11403" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 368.108491][T29125] netlink: 8 bytes leftover after parsing attributes in process `syz.7.11404'. [ 368.224940][ T29] audit: type=1400 audit(2000000307.001:79322): avc: denied { open } for pid=29122 comm="syz.6.11403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 368.244741][ T29] audit: type=1400 audit(2000000307.001:79323): avc: denied { perfmon } for pid=29122 comm="syz.6.11403" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 368.266011][ T29] audit: type=1400 audit(2000000307.001:79324): avc: denied { kernel } for pid=29122 comm="syz.6.11403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 368.285800][ T29] audit: type=1400 audit(2000000307.011:79325): avc: denied { map_create } for pid=29123 comm="syz.7.11404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 368.305640][ T29] audit: type=1400 audit(2000000307.011:79326): avc: denied { map_read map_write } for pid=29123 comm="syz.7.11404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 368.325749][ T29] audit: type=1400 audit(2000000307.011:79327): avc: denied { prog_load } for pid=29123 comm="syz.7.11404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 368.345066][ T29] audit: type=1400 audit(2000000307.011:79328): avc: denied { bpf } for pid=29123 comm="syz.7.11404" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 368.366101][ T29] audit: type=1400 audit(2000000307.011:79329): avc: denied { perfmon } for pid=29123 comm="syz.7.11404" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 368.562093][T29135] netlink: 20 bytes leftover after parsing attributes in process `syz.8.11409'. [ 369.683118][T29184] syzkaller1: entered promiscuous mode [ 369.688639][T29184] syzkaller1: entered allmulticast mode [ 370.156096][T29201] batadv1: entered promiscuous mode [ 370.174208][T29201] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 370.190931][T29203] siw: device registration error -23 [ 370.354730][T29213] atomic_op ffff888128833528 conn xmit_atomic 0000000000000000 [ 371.027697][T29241] x_tables: duplicate underflow at hook 4 [ 371.090301][T29248] 9pnet: p9_errstr2errno: server reported unknown error [ 371.188889][T29249] xt_hashlimit: max too large, truncated to 1048576 [ 371.854485][T29273] wireguard0: entered promiscuous mode [ 371.860064][T29273] wireguard0: entered allmulticast mode [ 371.948219][T29280] netlink: 4 bytes leftover after parsing attributes in process `syz.3.11475'. [ 371.985723][T29280] (unnamed net_device) (uninitialized): Invalid ad_actor_system MAC address. [ 371.994562][T29280] (unnamed net_device) (uninitialized): option ad_actor_system: invalid value (79) [ 372.016175][T29282] netlink: 8 bytes leftover after parsing attributes in process `syz.9.11476'. [ 372.219090][T29285] netlink: 'syz.8.11477': attribute type 15 has an invalid length. [ 372.241045][T29288] atomic_op ffff888128832928 conn xmit_atomic 0000000000000000 [ 373.037832][ T29] kauditd_printk_skb: 688 callbacks suppressed [ 373.037847][ T29] audit: type=1326 audit(2000000311.951:80018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29327 comm="syz.7.11499" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa6851acda9 code=0x7ffc0000 [ 373.067848][ T29] audit: type=1326 audit(2000000311.951:80019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29327 comm="syz.7.11499" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa6851acda9 code=0x7ffc0000 [ 373.091639][ T29] audit: type=1326 audit(2000000311.951:80020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29327 comm="syz.7.11499" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa6851acda9 code=0x7ffc0000 [ 373.115324][ T29] audit: type=1326 audit(2000000311.951:80021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29327 comm="syz.7.11499" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa6851acda9 code=0x7ffc0000 [ 373.139111][ T29] audit: type=1400 audit(2000000311.951:80022): avc: denied { prog_load } for pid=29327 comm="syz.7.11499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 373.158519][ T29] audit: type=1400 audit(2000000311.951:80023): avc: denied { bpf } for pid=29327 comm="syz.7.11499" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 373.179305][ T29] audit: type=1400 audit(2000000311.951:80024): avc: denied { perfmon } for pid=29327 comm="syz.7.11499" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 373.200506][ T29] audit: type=1400 audit(2000000311.951:80025): avc: denied { bpf } for pid=29327 comm="syz.7.11499" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 373.203846][T29330] netlink: 'syz.3.11498': attribute type 1 has an invalid length. [ 373.221364][ T29] audit: type=1400 audit(2000000311.951:80026): avc: denied { prog_run } for pid=29327 comm="syz.7.11499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 373.221389][ T29] audit: type=1326 audit(2000000311.951:80027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29327 comm="syz.7.11499" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa6851acda9 code=0x7ffc0000 [ 373.273943][T29330] netlink: 16179 bytes leftover after parsing attributes in process `syz.3.11498'. [ 373.869675][T29352] SELinux: syz.9.11509 (29352) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 374.235730][T29370] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11517'. [ 374.331923][T29370] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11517'. [ 374.549817][T29370] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11517'. [ 374.751552][T29389] lo speed is unknown, defaulting to 1000 [ 374.976132][T29402] tmpfs: Unknown parameter 'm' [ 375.151789][T29413] vlan2: entered allmulticast mode [ 375.156971][T29413] bridge_slave_0: entered allmulticast mode [ 375.181771][T29413] bridge_slave_0: left allmulticast mode [ 375.230082][T29411] serio: Serial port ttyS3 [ 375.240290][T29414] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 375.264892][T29420] 9pnet_fd: Insufficient options for proto=fd [ 375.474849][T29424] usb usb1: usbfs: interface 0 claimed by hub while 'syz.6.11539' sets config #0 [ 375.733815][T29438] tipc: New replicast peer: 10.1.1.2 [ 375.739164][T29438] tipc: Enabled bearer , priority 10 [ 375.881015][T29437] lo speed is unknown, defaulting to 1000 [ 375.929196][T29448] netlink: 4 bytes leftover after parsing attributes in process `syz.9.11548'. [ 376.156587][T29450] wireguard0: entered promiscuous mode [ 376.162102][T29450] wireguard0: entered allmulticast mode [ 376.300549][T29463] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 376.340063][T29463] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 376.482104][T29466] netlink: 'syz.9.11557': attribute type 1 has an invalid length. [ 376.490021][T29466] netlink: 16 bytes leftover after parsing attributes in process `syz.9.11557'. [ 376.785763][T29479] netlink: 16 bytes leftover after parsing attributes in process `syz.3.11562'. [ 377.233498][T29499] netlink: 12 bytes leftover after parsing attributes in process `syz.9.11570'. [ 377.256739][T29499] bridge0: port 3(batadv0) entered blocking state [ 377.263271][T29499] bridge0: port 3(batadv0) entered disabled state [ 377.278094][T29499] batadv0: entered allmulticast mode [ 377.286359][T29499] batadv0: entered promiscuous mode [ 377.498042][T29510] netlink: 16 bytes leftover after parsing attributes in process `syz.3.11576'. [ 377.630334][T29515] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11578'. [ 377.763646][T10722] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 377.773042][T10722] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 378.043158][ T29] kauditd_printk_skb: 713 callbacks suppressed [ 378.043173][ T29] audit: type=1400 audit(2000000316.961:80741): avc: denied { setopt } for pid=29531 comm="syz.7.11585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 378.091242][T29532] ip6t_REJECT: TCP_RESET illegal for non-tcp [ 378.111794][ T29] audit: type=1400 audit(2000000316.991:80742): avc: denied { mounton } for pid=29523 comm="syz.3.11582" path="/proc/879/task" dev="proc" ino=93390 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 378.134812][ T29] audit: type=1400 audit(2000000316.991:80743): avc: denied { mount } for pid=29523 comm="syz.3.11582" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 378.156888][ T29] audit: type=1400 audit(2000000317.021:80744): avc: denied { map_create } for pid=29533 comm="syz.6.11586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 378.176335][ T29] audit: type=1400 audit(2000000317.021:80745): avc: denied { bpf } for pid=29533 comm="syz.6.11586" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 378.203512][ T29] audit: type=1400 audit(2000000317.121:80746): avc: denied { prog_load } for pid=29533 comm="syz.6.11586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 378.223021][ T29] audit: type=1400 audit(2000000317.121:80747): avc: denied { bpf } for pid=29533 comm="syz.6.11586" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 378.243866][ T29] audit: type=1400 audit(2000000317.121:80748): avc: denied { perfmon } for pid=29533 comm="syz.6.11586" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 378.264995][ T29] audit: type=1400 audit(2000000317.121:80749): avc: denied { map_create } for pid=29533 comm="syz.6.11586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 378.292076][ T29] audit: type=1400 audit(2000000317.121:80750): avc: denied { map_read map_write } for pid=29533 comm="syz.6.11586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 380.267786][T29625] rdma_rxe: rxe_newlink: failed to add tunl0 [ 380.551294][T29636] syzkaller1: entered promiscuous mode [ 380.556945][T29636] syzkaller1: entered allmulticast mode [ 381.295355][T29676] netlink: 32 bytes leftover after parsing attributes in process `syz.9.11649'. [ 381.602088][T29488] kernel write not supported for file /snd/seq (pid: 29488 comm: kworker/1:2) [ 381.752037][T29696] netlink: 'syz.7.11663': attribute type 1 has an invalid length. [ 381.792993][T29696] bond1: entered promiscuous mode [ 381.811212][T29696] 8021q: adding VLAN 0 to HW filter on device bond1 [ 381.877874][T29696] 8021q: adding VLAN 0 to HW filter on device bond1 [ 381.999861][T29696] bond1: (slave ip6gre1): The slave device specified does not support setting the MAC address [ 382.010262][T29696] bond1: (slave ip6gre1): Setting fail_over_mac to active for active-backup mode [ 382.154076][T29696] bond1: (slave ip6gre1): making interface the new active one [ 382.161667][T29696] ip6gre1: entered promiscuous mode [ 382.194076][T29696] bond1: (slave ip6gre1): Enslaving as an active interface with an up link [ 382.444003][T29721] vhci_hcd: invalid port number 0 [ 382.565854][T29727] netlink: 60 bytes leftover after parsing attributes in process `syz.8.11672'. [ 382.584518][T29728] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 1280 [ 382.597247][T29727] netlink: 60 bytes leftover after parsing attributes in process `syz.8.11672'. [ 382.709196][T29727] netlink: 60 bytes leftover after parsing attributes in process `syz.8.11672'. [ 382.730534][T29727] netlink: 60 bytes leftover after parsing attributes in process `syz.8.11672'. [ 382.960830][T29727] netlink: 60 bytes leftover after parsing attributes in process `syz.8.11672'. [ 382.980151][T29727] netlink: 60 bytes leftover after parsing attributes in process `syz.8.11672'. [ 383.068884][ T29] kauditd_printk_skb: 684 callbacks suppressed [ 383.068898][ T29] audit: type=1400 audit(2000000321.981:81435): avc: denied { map_create } for pid=29745 comm="syz.9.11681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 383.094704][ T29] audit: type=1400 audit(2000000321.981:81436): avc: denied { bpf } for pid=29745 comm="syz.9.11681" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 383.139723][ T29] audit: type=1400 audit(2000000322.041:81437): avc: denied { map_read map_write } for pid=29745 comm="syz.9.11681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 383.159968][ T29] audit: type=1400 audit(2000000322.041:81438): avc: denied { prog_load } for pid=29745 comm="syz.9.11681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 383.179424][ T29] audit: type=1400 audit(2000000322.041:81439): avc: denied { bpf } for pid=29745 comm="syz.9.11681" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 383.200223][ T29] audit: type=1400 audit(2000000322.051:81440): avc: denied { map_create } for pid=29746 comm="syz.3.11682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 383.219656][ T29] audit: type=1400 audit(2000000322.051:81441): avc: denied { map_read map_write } for pid=29746 comm="syz.3.11682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 383.368917][ T29] audit: type=1400 audit(2000000322.081:81442): avc: denied { prog_load } for pid=29745 comm="syz.9.11681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 383.388352][ T29] audit: type=1400 audit(2000000322.081:81443): avc: denied { bpf } for pid=29745 comm="syz.9.11681" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 383.409162][ T29] audit: type=1400 audit(2000000322.081:81444): avc: denied { perfmon } for pid=29745 comm="syz.9.11681" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 383.523457][T29761] wireguard0: entered promiscuous mode [ 383.529009][T29761] wireguard0: entered allmulticast mode [ 383.998826][T29788] block device autoloading is deprecated and will be removed. [ 384.015678][T29791] netlink: 240 bytes leftover after parsing attributes in process `syz.6.11695'. [ 384.279102][T29800] loop7: detected capacity change from 0 to 512 [ 384.323076][T29800] EXT4-fs (loop7): revision level too high, forcing read-only mode [ 384.344311][T29800] EXT4-fs (loop7): orphan cleanup on readonly fs [ 384.378518][T29800] EXT4-fs warning (device loop7): ext4_enable_quotas:7145: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 384.447655][T29800] EXT4-fs (loop7): Cannot turn on quotas: error -117 [ 384.499798][T29800] EXT4-fs error (device loop7): ext4_validate_block_bitmap:441: comm syz.7.11704: bg 0: block 40: padding at end of block bitmap is not set [ 384.543192][T29800] EXT4-fs error (device loop7) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 384.552459][T29800] EXT4-fs (loop7): 1 truncate cleaned up [ 384.562912][T29800] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 384.610126][T29800] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 384.723253][T29818] IPVS: Unknown mcast interface: wg1 [ 384.818539][ T8406] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 385.284012][T29846] loop7: detected capacity change from 0 to 512 [ 385.331940][T29846] EXT4-fs error (device loop7): ext4_xattr_ibody_find:2240: inode #15: comm syz.7.11723: corrupted in-inode xattr: invalid ea_ino [ 385.390763][T29846] EXT4-fs error (device loop7): ext4_orphan_get:1394: comm syz.7.11723: couldn't read orphan inode 15 (err -117) [ 385.442176][T29846] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 385.590046][ T8406] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 386.340421][T29882] netlink: 'syz.7.11739': attribute type 1 has an invalid length. [ 386.348357][T29882] netlink: 'syz.7.11739': attribute type 2 has an invalid length. [ 386.391783][T29882] netlink: 4 bytes leftover after parsing attributes in process `syz.7.11739'. [ 386.467759][T29880] wireguard0: entered promiscuous mode [ 386.474254][T29880] wireguard0: entered allmulticast mode [ 386.909611][T29909] loop7: detected capacity change from 0 to 512 [ 386.922352][T29909] EXT4-fs (loop7): mounting ext3 file system using the ext4 subsystem [ 386.934325][T29909] EXT4-fs (loop7): invalid journal inode [ 386.940505][T29909] EXT4-fs (loop7): can't get journal size [ 386.950019][T29909] EXT4-fs (loop7): 1 truncate cleaned up [ 386.957575][T29909] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 387.018085][ T8406] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 387.319923][T29921] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pid=29921 comm=syz.7.11751 [ 387.418710][T29932] team0: Port device vlan2 added [ 388.090171][ T29] kauditd_printk_skb: 682 callbacks suppressed [ 388.090187][ T29] audit: type=1400 audit(2000000327.011:82126): avc: denied { read write } for pid=8406 comm="syz-executor" name="loop7" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 388.119907][ T29] audit: type=1400 audit(2000000327.011:82127): avc: denied { read write open } for pid=8406 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 388.144218][ T29] audit: type=1400 audit(2000000327.011:82128): avc: denied { ioctl } for pid=8406 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=678 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 388.249239][ T29] audit: type=1400 audit(2000000327.071:82129): avc: denied { prog_load } for pid=29954 comm="syz.8.11769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 388.268652][ T29] audit: type=1400 audit(2000000327.071:82130): avc: denied { bpf } for pid=29954 comm="syz.8.11769" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 388.289711][ T29] audit: type=1400 audit(2000000327.071:82131): avc: denied { perfmon } for pid=29954 comm="syz.8.11769" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 388.310955][ T29] audit: type=1400 audit(2000000327.071:82132): avc: denied { prog_run } for pid=29954 comm="syz.8.11769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 388.330195][ T29] audit: type=1400 audit(2000000327.121:82133): avc: denied { map_create } for pid=29957 comm="syz.6.11771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 388.349707][ T29] audit: type=1400 audit(2000000327.121:82134): avc: denied { perfmon } for pid=29957 comm="syz.6.11771" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 388.370912][ T29] audit: type=1400 audit(2000000327.121:82135): avc: denied { map_read map_write } for pid=29957 comm="syz.6.11771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 388.483465][T29963] loop3: detected capacity change from 0 to 128 [ 389.172323][T30004] xt_hashlimit: size too large, truncated to 1048576 [ 389.181800][T30003] 9pnet: p9_errstr2errno: server reported unknown error [ 389.903051][T30030] syzkaller0: entered promiscuous mode [ 389.908558][T30030] syzkaller0: entered allmulticast mode [ 390.297561][T30045] macvlan0: entered promiscuous mode [ 390.336528][T30045] ipvlan0: entered promiscuous mode [ 390.358125][T30045] ipvlan0: left promiscuous mode [ 390.375876][T30045] macvlan0: left promiscuous mode [ 390.848977][T30072] bond1: entered promiscuous mode [ 390.854122][T30072] bond1: entered allmulticast mode [ 390.892140][T30072] 8021q: adding VLAN 0 to HW filter on device bond1 [ 390.951285][T30072] bond1 (unregistering): Released all slaves [ 391.140450][T30086] netlink: 4 bytes leftover after parsing attributes in process `syz.3.11825'. [ 391.150853][T30086] bridge_slave_1: left allmulticast mode [ 391.156607][T30086] bridge_slave_1: left promiscuous mode [ 391.162305][T30086] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.378258][T30086] bridge_slave_0: left allmulticast mode [ 391.383971][T30086] bridge_slave_0: left promiscuous mode [ 391.389719][T30086] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.876008][T30117] loop7: detected capacity change from 0 to 512 [ 391.896349][T30117] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 391.909695][T30117] ext4 filesystem being mounted at /1951/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 392.227619][ T8406] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 392.488468][T30129] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 394.374812][ T29] kauditd_printk_skb: 804 callbacks suppressed [ 394.374827][ T29] audit: type=1400 audit(2000000333.291:82940): avc: denied { map_create } for pid=30141 comm="syz.9.11850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 394.428574][T30145] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 394.459846][ T29] audit: type=1400 audit(2000000333.291:82941): avc: denied { map_read map_write } for pid=30141 comm="syz.9.11850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 394.480061][ T29] audit: type=1400 audit(2000000333.321:82942): avc: denied { prog_load } for pid=30142 comm="syz.8.11849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 394.499368][ T29] audit: type=1400 audit(2000000333.321:82943): avc: denied { bpf } for pid=30142 comm="syz.8.11849" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 394.520213][ T29] audit: type=1400 audit(2000000333.331:82944): avc: denied { map_create } for pid=30140 comm="syz.7.11851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 394.539680][ T29] audit: type=1400 audit(2000000333.331:82945): avc: denied { map_read map_write } for pid=30140 comm="syz.7.11851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 394.559805][ T29] audit: type=1400 audit(2000000333.341:82946): avc: denied { prog_load } for pid=30140 comm="syz.7.11851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 394.579222][ T29] audit: type=1400 audit(2000000333.341:82947): avc: denied { bpf } for pid=30140 comm="syz.7.11851" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 394.600008][ T29] audit: type=1400 audit(2000000333.341:82948): avc: denied { perfmon } for pid=30140 comm="syz.7.11851" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 394.621236][ T29] audit: type=1400 audit(2000000333.341:82949): avc: denied { prog_run } for pid=30140 comm="syz.7.11851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 394.971616][T30162] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 395.021038][T30162] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 395.123142][T30165] ref_ctr_offset mismatch. inode: 0x121c offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 395.343186][T30177] bond2: entered promiscuous mode [ 395.348285][T30177] bond2: entered allmulticast mode [ 395.355968][T30177] 8021q: adding VLAN 0 to HW filter on device bond2 [ 395.411330][T30177] bond2 (unregistering): Released all slaves [ 395.457096][T30184] netlink: 48 bytes leftover after parsing attributes in process `syz.3.11863'. [ 395.739603][T30201] loop7: detected capacity change from 0 to 128 [ 395.833169][T30201] EXT4-fs (loop7): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 395.848671][T30201] ext4 filesystem being mounted at /1957/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 395.911947][T30207] loop3: detected capacity change from 0 to 4096 [ 396.006474][T30207] EXT4-fs: Ignoring removed nomblk_io_submit option [ 396.013464][ T8406] EXT4-fs (loop7): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 396.130759][T30207] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 396.239376][T24853] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 396.381983][T30220] lo speed is unknown, defaulting to 1000 [ 396.568874][T30236] loop7: detected capacity change from 0 to 512 [ 396.613278][T30236] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 396.696964][T30236] EXT4-fs (loop7): 1 truncate cleaned up [ 396.788680][T30236] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 396.830653][ T8406] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 397.364777][T30266] netlink: 12 bytes leftover after parsing attributes in process `syz.8.11894'. [ 397.413574][T30267] block device autoloading is deprecated and will be removed. [ 397.506204][T30271] pim6reg: entered allmulticast mode [ 397.523438][T30274] macvlan0: entered allmulticast mode [ 397.528849][T30274] veth1_vlan: entered allmulticast mode [ 397.630225][T30276] 9pnet_fd: Insufficient options for proto=fd [ 397.664738][T30271] veth1_vlan: left allmulticast mode [ 397.832185][T30282] netlink: 'syz.3.11900': attribute type 1 has an invalid length. [ 397.845969][T30271] macvlan0 (unregistering): left allmulticast mode [ 397.909029][T30282] bond1: entered promiscuous mode [ 397.986278][T30285] team0: Port device team_slave_1 removed [ 397.994075][T30285] bond1: (slave team_slave_1): making interface the new active one [ 398.002064][T30285] team_slave_1: entered promiscuous mode [ 398.017737][T30285] bond1: (slave team_slave_1): Enslaving as an active interface with an up link [ 398.333461][T30303] loop3: detected capacity change from 0 to 1024 [ 398.347470][T30303] EXT4-fs: Ignoring removed mblk_io_submit option [ 398.382385][T30303] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 398.773359][T24853] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 399.390083][ T29] kauditd_printk_skb: 839 callbacks suppressed [ 399.390099][ T29] audit: type=1400 audit(2000000338.301:83789): avc: denied { read write } for pid=24853 comm="syz-executor" name="loop3" dev="devtmpfs" ino=679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 399.439207][ T29] audit: type=1326 audit(2000000338.321:83790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30346 comm="syz.6.11927" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ea400cda9 code=0x7ffc0000 [ 399.463157][ T29] audit: type=1326 audit(2000000338.321:83791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30346 comm="syz.6.11927" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ea400cda9 code=0x7ffc0000 [ 399.486874][ T29] audit: type=1326 audit(2000000338.321:83792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30346 comm="syz.6.11927" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7ea400cda9 code=0x7ffc0000 [ 399.510722][ T29] audit: type=1400 audit(2000000338.321:83793): avc: denied { prog_load } for pid=30346 comm="syz.6.11927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 399.530066][ T29] audit: type=1400 audit(2000000338.321:83794): avc: denied { bpf } for pid=30346 comm="syz.6.11927" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 399.550855][ T29] audit: type=1400 audit(2000000338.321:83795): avc: denied { perfmon } for pid=30346 comm="syz.6.11927" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 399.572083][ T29] audit: type=1400 audit(2000000338.321:83796): avc: denied { bpf } for pid=30346 comm="syz.6.11927" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 399.592873][ T29] audit: type=1400 audit(2000000338.321:83797): avc: denied { prog_run } for pid=30346 comm="syz.6.11927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 399.612119][ T29] audit: type=1326 audit(2000000338.321:83798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30346 comm="syz.6.11927" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ea400cda9 code=0x7ffc0000 [ 400.073699][T30369] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 400.120737][T30369] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub [ 400.233897][T30374] loop3: detected capacity change from 0 to 512 [ 400.241606][T30374] EXT4-fs: Ignoring removed nobh option [ 400.373633][T30374] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 400.415405][T30374] ext4 filesystem being mounted at /491/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 400.452351][T30388] netlink: 60 bytes leftover after parsing attributes in process `syz.8.11944'. [ 400.479030][T30374] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz.3.11939: bg 0: block 224: padding at end of block bitmap is not set [ 400.496700][T30374] EXT4-fs (loop3): Remounting filesystem read-only [ 400.512903][T30388] netlink: 60 bytes leftover after parsing attributes in process `syz.8.11944'. [ 400.523067][T24853] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 400.674821][T30388] netlink: 60 bytes leftover after parsing attributes in process `syz.8.11944'. [ 400.705952][T30388] netlink: 60 bytes leftover after parsing attributes in process `syz.8.11944'. [ 400.874670][T30414] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 400.882938][T30408] vhci_hcd vhci_hcd.0: pdev(9) rhport(1) sockfd(6) [ 400.889450][T30408] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 400.897472][T30408] vhci_hcd vhci_hcd.0: Device attached [ 400.933787][T30405] vhci_hcd vhci_hcd.0: pdev(9) rhport(0) sockfd(3) [ 400.940320][T30405] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 400.947800][T30405] vhci_hcd vhci_hcd.0: Device attached [ 400.960777][T30388] netlink: 60 bytes leftover after parsing attributes in process `syz.8.11944'. [ 400.983004][T30388] netlink: 60 bytes leftover after parsing attributes in process `syz.8.11944'. [ 401.037569][T30408] vhci_hcd vhci_hcd.0: pdev(9) rhport(3) sockfd(8) [ 401.044104][T30408] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 401.051791][T30408] vhci_hcd vhci_hcd.0: Device attached [ 401.075402][T30425] SELinux: security policydb version 18 (MLS) not backwards compatible [ 401.084127][T30405] vhci_hcd vhci_hcd.0: pdev(9) rhport(4) sockfd(5) [ 401.090738][T30405] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 401.098224][T30405] vhci_hcd vhci_hcd.0: Device attached [ 401.107159][T30425] SELinux: failed to load policy [ 401.117258][T30405] vhci_hcd vhci_hcd.0: pdev(9) rhport(5) sockfd(13) [ 401.123913][T30405] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 401.131623][T30405] vhci_hcd vhci_hcd.0: Device attached [ 401.158266][T30426] vhci_hcd: connection closed [ 401.158449][T10737] vhci_hcd: stop threads [ 401.167463][T10737] vhci_hcd: release socket [ 401.171955][T10737] vhci_hcd: disconnect device [ 401.180525][T30423] vhci_hcd: connection closed [ 401.181448][T30407] vhci_hcd: connection closed [ 401.191771][T30420] vhci_hcd: connection closed [ 401.193071][T29283] vhci_hcd: vhci_device speed not set [ 401.202096][T30412] vhci_hcd: connection closed [ 401.219166][T10737] vhci_hcd: stop threads [ 401.228172][T10737] vhci_hcd: release socket [ 401.232678][T10737] vhci_hcd: disconnect device [ 401.247680][T10737] vhci_hcd: stop threads [ 401.251965][T10737] vhci_hcd: release socket [ 401.256503][T10737] vhci_hcd: disconnect device [ 401.285698][T10737] vhci_hcd: stop threads [ 401.290032][T10737] vhci_hcd: release socket [ 401.294541][T10737] vhci_hcd: disconnect device [ 401.310234][T10737] vhci_hcd: stop threads [ 401.314570][T10737] vhci_hcd: release socket [ 401.319088][T10737] vhci_hcd: disconnect device [ 401.332626][T29283] usb 19-2: new full-speed USB device number 2 using vhci_hcd [ 401.383483][T29283] usb 19-2: enqueue for inactive port 1 [ 401.389064][T29283] usb 19-2: enqueue for inactive port 1 [ 401.453074][T29283] usb 19-2: enqueue for inactive port 1 [ 401.553656][T29283] vhci_hcd: vhci_device speed not set [ 401.614906][T30440] loop7: detected capacity change from 0 to 512 [ 401.660771][T30440] EXT4-fs: Ignoring removed bh option [ 401.689465][T30440] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 401.765207][T30440] EXT4-fs (loop7): 1 truncate cleaned up [ 401.771162][T30440] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 401.861907][T30449] netlink: 16 bytes leftover after parsing attributes in process `syz.6.11965'. [ 401.882101][T30454] SET target dimension over the limit! [ 402.008280][ T8406] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 402.508324][T30480] x_tables: unsorted underflow at hook 4 [ 402.990473][T30506] syz.6.11988: attempt to access beyond end of device [ 402.990473][T30506] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 403.089122][T30504] netlink: 16 bytes leftover after parsing attributes in process `syz.9.11987'. [ 404.118214][ C1] vxcan0: j1939_tp_rxtimer: 0xffff888118e8ba00: rx timeout, send abort [ 404.126587][ C1] vxcan0: j1939_tp_rxtimer: 0xffff888118e8b600: rx timeout, send abort [ 404.142886][ C1] vxcan0: j1939_xtp_rx_abort_one: 0xffff888118e8ba00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 404.157354][ C1] vxcan0: j1939_xtp_rx_abort_one: 0xffff888118e8b600: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 404.424325][ T29] kauditd_printk_skb: 611 callbacks suppressed [ 404.424337][ T29] audit: type=1400 audit(2000000343.331:84408): avc: denied { prog_load } for pid=30524 comm="syz.7.11997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 404.450905][ T29] audit: type=1400 audit(2000000343.341:84409): avc: denied { bpf } for pid=30524 comm="syz.7.11997" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 404.472225][ T29] audit: type=1400 audit(2000000343.341:84410): avc: denied { perfmon } for pid=30524 comm="syz.7.11997" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 404.913771][ T29] audit: type=1400 audit(2000000343.421:84411): avc: denied { perfmon } for pid=30524 comm="syz.7.11997" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 404.935468][ T29] audit: type=1400 audit(2000000343.421:84412): avc: denied { bpf } for pid=30524 comm="syz.7.11997" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 404.956888][ T29] audit: type=1400 audit(2000000343.461:84413): avc: denied { read write } for pid=24853 comm="syz-executor" name="loop3" dev="devtmpfs" ino=679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 404.980829][ T29] audit: type=1400 audit(2000000343.461:84414): avc: denied { open } for pid=24853 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 405.004755][ T29] audit: type=1400 audit(2000000343.461:84415): avc: denied { ioctl } for pid=24853 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=679 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 405.030159][ T29] audit: type=1400 audit(2000000343.561:84416): avc: denied { create } for pid=30524 comm="syz.7.11997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 405.050287][ T29] audit: type=1400 audit(2000000343.561:84417): avc: denied { write } for pid=30524 comm="syz.7.11997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 409.813151][ T29] kauditd_printk_skb: 63 callbacks suppressed [ 409.813167][ T29] audit: type=1400 audit(2000000348.721:84481): avc: denied { map_create } for pid=30587 comm="syz.9.12003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 409.839662][ T29] audit: type=1400 audit(2000000348.721:84482): avc: denied { bpf } for pid=30587 comm="syz.9.12003" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 409.860994][ T29] audit: type=1400 audit(2000000348.721:84483): avc: denied { map_read map_write } for pid=30587 comm="syz.9.12003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 410.412748][ T29] audit: type=1400 audit(2000000349.241:84484): avc: denied { prog_load } for pid=30589 comm="syz.3.12004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 410.432662][ T29] audit: type=1400 audit(2000000349.241:84485): avc: denied { bpf } for pid=30589 comm="syz.3.12004" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 410.732822][ T29] audit: type=1400 audit(2000000349.381:84486): avc: denied { prog_load } for pid=30589 comm="syz.3.12004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 410.752658][ T29] audit: type=1400 audit(2000000349.381:84487): avc: denied { bpf } for pid=30589 comm="syz.3.12004" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 410.773964][ T29] audit: type=1400 audit(2000000349.381:84488): avc: denied { perfmon } for pid=30589 comm="syz.3.12004" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 410.795613][ T29] audit: type=1400 audit(2000000349.391:84489): avc: denied { prog_run } for pid=30589 comm="syz.3.12004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 411.328156][ T29] audit: type=1400 audit(2000000349.731:84490): avc: denied { read write } for pid=24853 comm="syz-executor" name="loop3" dev="devtmpfs" ino=679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 412.028177][T30599] wireguard0: entered promiscuous mode [ 412.034677][T30599] wireguard0: entered allmulticast mode [ 414.047304][T30604] dummy0: entered promiscuous mode [ 414.167922][T30604] macvtap1: entered promiscuous mode [ 414.174876][T30604] macvtap1: entered allmulticast mode [ 414.180250][T30604] dummy0: entered allmulticast mode [ 414.704286][T30604] dummy0: left allmulticast mode [ 414.710957][T30604] dummy0: left promiscuous mode [ 414.889629][ T29] kauditd_printk_skb: 64 callbacks suppressed [ 414.889643][ T29] audit: type=1400 audit(2000000353.801:84555): avc: denied { map_create } for pid=30611 comm="syz.7.12012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 414.916113][ T29] audit: type=1400 audit(2000000353.801:84556): avc: denied { map_read map_write } for pid=30611 comm="syz.7.12012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 415.272928][ T29] audit: type=1400 audit(2000000353.861:84557): avc: denied { prog_load } for pid=30611 comm="syz.7.12012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 415.292806][ T29] audit: type=1400 audit(2000000353.861:84558): avc: denied { bpf } for pid=30611 comm="syz.7.12012" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 415.314072][ T29] audit: type=1400 audit(2000000353.861:84559): avc: denied { perfmon } for pid=30611 comm="syz.7.12012" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 415.335925][ T29] audit: type=1400 audit(2000000353.861:84560): avc: denied { bpf } for pid=30611 comm="syz.7.12012" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 415.357217][ T29] audit: type=1400 audit(2000000353.861:84561): avc: denied { prog_run } for pid=30611 comm="syz.7.12012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 415.376929][ T29] audit: type=1400 audit(2000000353.951:84562): avc: denied { create } for pid=30611 comm="syz.7.12012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 415.397211][ T29] audit: type=1400 audit(2000000354.071:84563): avc: denied { write } for pid=30611 comm="syz.7.12012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 415.417467][ T29] audit: type=1400 audit(2000000354.081:84564): avc: denied { connect } for pid=30611 comm="syz.7.12012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 420.350369][ T29] kauditd_printk_skb: 82 callbacks suppressed [ 420.350384][ T29] audit: type=1400 audit(2000000359.261:84647): avc: denied { map_create } for pid=30632 comm="syz.9.12020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 420.376984][ T29] audit: type=1400 audit(2000000359.261:84648): avc: denied { bpf } for pid=30632 comm="syz.9.12020" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 420.398272][ T29] audit: type=1400 audit(2000000359.261:84649): avc: denied { map_read map_write } for pid=30632 comm="syz.9.12020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.012635][ T29] audit: type=1400 audit(2000000359.751:84650): avc: denied { prog_load } for pid=30632 comm="syz.9.12020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.032494][ T29] audit: type=1400 audit(2000000359.751:84651): avc: denied { bpf } for pid=30632 comm="syz.9.12020" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 421.054210][ T29] audit: type=1400 audit(2000000359.751:84652): avc: denied { perfmon } for pid=30632 comm="syz.9.12020" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 421.075931][ T29] audit: type=1400 audit(2000000359.751:84653): avc: denied { bpf } for pid=30632 comm="syz.9.12020" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 421.097248][ T29] audit: type=1400 audit(2000000359.761:84654): avc: denied { prog_run } for pid=30632 comm="syz.9.12020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.116968][ T29] audit: type=1400 audit(2000000359.841:84655): avc: denied { read write } for pid=24853 comm="syz-executor" name="loop3" dev="devtmpfs" ino=679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 421.140883][ T29] audit: type=1400 audit(2000000359.841:84656): avc: denied { open } for pid=24853 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 421.357257][T30640] 9pnet: p9_errstr2errno: server reported unknown error ‌@يخ‚ح(للي«QhQI¸¥ [ 425.380076][ T29] kauditd_printk_skb: 55 callbacks suppressed [ 425.380124][ T29] audit: type=1400 audit(2000000364.291:84712): avc: denied { create } for pid=30656 comm="syz.8.12029" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 425.408813][ T29] audit: type=1400 audit(2000000364.291:84713): avc: denied { map } for pid=30656 comm="syz.8.12029" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=97385 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 425.433798][ T29] audit: type=1400 audit(2000000364.291:84714): avc: denied { read write } for pid=30656 comm="syz.8.12029" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=97385 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 425.672796][ T29] audit: type=1400 audit(2000000364.471:84715): avc: denied { map_create } for pid=30654 comm="syz.9.12027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 425.692793][ T29] audit: type=1400 audit(2000000364.481:84716): avc: denied { map_read map_write } for pid=30654 comm="syz.9.12027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 425.962841][ T29] audit: type=1400 audit(2000000364.591:84717): avc: denied { prog_load } for pid=30654 comm="syz.9.12027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 425.982838][ T29] audit: type=1400 audit(2000000364.591:84718): avc: denied { bpf } for pid=30654 comm="syz.9.12027" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 426.004232][ T29] audit: type=1400 audit(2000000364.591:84719): avc: denied { perfmon } for pid=30654 comm="syz.9.12027" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 426.026028][ T29] audit: type=1400 audit(2000000364.611:84720): avc: denied { prog_run } for pid=30654 comm="syz.9.12027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 426.726400][T30664] loop3: detected capacity change from 0 to 2048 [ 426.742954][ T29] audit: type=1400 audit(2000000365.231:84721): avc: denied { prog_load } for pid=30659 comm="syz.8.12032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 427.289027][T30664] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 429.106613][T24853] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 430.426603][ T29] kauditd_printk_skb: 70 callbacks suppressed [ 430.426641][ T29] audit: type=1400 audit(2000000369.341:84792): avc: denied { open } for pid=8406 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 430.457220][ T29] audit: type=1400 audit(2000000369.341:84793): avc: denied { ioctl } for pid=8406 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=678 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 431.084272][ T29] audit: type=1400 audit(2000000369.991:84794): avc: denied { prog_load } for pid=30681 comm="syz.6.12038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 431.104189][ T29] audit: type=1400 audit(2000000369.991:84795): avc: denied { bpf } for pid=30681 comm="syz.6.12038" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 431.125528][ T29] audit: type=1400 audit(2000000369.991:84796): avc: denied { perfmon } for pid=30681 comm="syz.6.12038" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 431.147302][ T29] audit: type=1400 audit(2000000369.991:84797): avc: denied { bpf } for pid=30681 comm="syz.6.12038" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 431.168638][ T29] audit: type=1400 audit(2000000370.001:84798): avc: denied { prog_run } for pid=30681 comm="syz.6.12038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 431.512905][ T29] audit: type=1400 audit(2000000370.201:84799): avc: denied { create } for pid=30681 comm="syz.6.12038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 431.533639][ T29] audit: type=1400 audit(2000000370.211:84800): avc: denied { ioctl } for pid=30681 comm="syz.6.12038" path="socket:[97424]" dev="sockfs" ino=97424 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 432.324115][ T29] audit: type=1400 audit(2000000371.241:84801): avc: denied { open } for pid=30683 comm="syz.7.12039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 433.623737][T30690] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30690 comm=syz.8.12041 [ 437.332583][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 437.332599][ T29] audit: type=1400 audit(2000000376.021:84839): avc: denied { create } for pid=30694 comm="syz.3.12042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 437.359567][ T29] audit: type=1400 audit(2000000376.051:84840): avc: denied { map_create } for pid=30694 comm="syz.3.12042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 437.379516][ T29] audit: type=1400 audit(2000000376.051:84841): avc: denied { bpf } for pid=30694 comm="syz.3.12042" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 437.400896][ T29] audit: type=1400 audit(2000000376.051:84842): avc: denied { map_read map_write } for pid=30694 comm="syz.3.12042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 437.421619][ T29] audit: type=1400 audit(2000000376.111:84843): avc: denied { prog_load } for pid=30694 comm="syz.3.12042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 437.441512][ T29] audit: type=1400 audit(2000000376.111:84844): avc: denied { bpf } for pid=30694 comm="syz.3.12042" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 437.462882][ T29] audit: type=1400 audit(2000000376.121:84845): avc: denied { prog_load } for pid=30694 comm="syz.3.12042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 437.482766][ T29] audit: type=1400 audit(2000000376.121:84846): avc: denied { bpf } for pid=30694 comm="syz.3.12042" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 437.504159][ T29] audit: type=1400 audit(2000000376.121:84847): avc: denied { perfmon } for pid=30694 comm="syz.3.12042" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 437.525925][ T29] audit: type=1400 audit(2000000376.131:84848): avc: denied { prog_run } for pid=30694 comm="syz.3.12042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 443.040289][ T29] kauditd_printk_skb: 58 callbacks suppressed [ 443.040303][ T29] audit: type=1400 audit(2000000381.951:84907): avc: denied { map_create } for pid=30718 comm="syz.7.12051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 443.066868][ T29] audit: type=1400 audit(2000000381.951:84908): avc: denied { perfmon } for pid=30718 comm="syz.7.12051" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 443.088502][ T29] audit: type=1400 audit(2000000381.951:84909): avc: denied { map_read map_write } for pid=30718 comm="syz.7.12051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 443.522798][ T29] audit: type=1400 audit(2000000382.041:84910): avc: denied { prog_load } for pid=30718 comm="syz.7.12051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 443.542708][ T29] audit: type=1400 audit(2000000382.041:84911): avc: denied { bpf } for pid=30718 comm="syz.7.12051" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 443.564131][ T29] audit: type=1400 audit(2000000382.061:84912): avc: denied { prog_load } for pid=30718 comm="syz.7.12051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 443.583908][ T29] audit: type=1400 audit(2000000382.061:84913): avc: denied { perfmon } for pid=30718 comm="syz.7.12051" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 443.605502][ T29] audit: type=1400 audit(2000000382.071:84914): avc: denied { prog_run } for pid=30718 comm="syz.7.12051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 443.625239][ T29] audit: type=1400 audit(2000000382.421:84915): avc: denied { read write } for pid=8406 comm="syz-executor" name="loop7" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 443.649156][ T29] audit: type=1400 audit(2000000382.421:84916): avc: denied { open } for pid=8406 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 445.289636][T30723] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 445.410850][T30723] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 448.134872][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 448.134887][ T29] audit: type=1400 audit(2000000387.051:84957): avc: denied { prog_load } for pid=30737 comm="syz.8.12056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 448.160815][ T29] audit: type=1400 audit(2000000387.051:84958): avc: denied { bpf } for pid=30737 comm="syz.8.12056" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 448.182910][ T29] audit: type=1400 audit(2000000387.051:84959): avc: denied { perfmon } for pid=30737 comm="syz.8.12056" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 448.593771][ T29] audit: type=1400 audit(2000000387.181:84960): avc: denied { prog_load } for pid=30737 comm="syz.8.12056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 448.613612][ T29] audit: type=1400 audit(2000000387.181:84961): avc: denied { bpf } for pid=30737 comm="syz.8.12056" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 448.635162][ T29] audit: type=1400 audit(2000000387.181:84962): avc: denied { perfmon } for pid=30737 comm="syz.8.12056" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 448.656847][ T29] audit: type=1400 audit(2000000387.181:84963): avc: denied { prog_run } for pid=30737 comm="syz.8.12056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 448.676813][ T29] audit: type=1400 audit(2000000387.211:84964): avc: denied { create } for pid=30737 comm="syz.8.12056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 448.697537][ T29] audit: type=1400 audit(2000000387.231:84965): avc: denied { read write } for pid=24853 comm="syz-executor" name="loop3" dev="devtmpfs" ino=679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 448.721529][ T29] audit: type=1400 audit(2000000387.231:84966): avc: denied { open } for pid=24853 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 449.540151][T30747] netlink: 340 bytes leftover after parsing attributes in process `syz.7.12061'. [ 453.177073][ T29] kauditd_printk_skb: 62 callbacks suppressed [ 453.177086][ T29] audit: type=1400 audit(2000000392.091:85029): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 453.339865][ T29] audit: type=1400 audit(2000000392.091:85030): avc: denied { search } for pid=2981 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 453.362325][ T29] audit: type=1400 audit(2000000392.091:85031): avc: denied { append } for pid=2981 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 453.385317][ T29] audit: type=1400 audit(2000000392.091:85032): avc: denied { open } for pid=2981 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 453.408675][ T29] audit: type=1400 audit(2000000392.091:85033): avc: denied { getattr } for pid=2981 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 453.432056][ T29] audit: type=1400 audit(2000000392.251:85034): avc: denied { map_create } for pid=30754 comm="syz.9.12066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 453.452138][ T29] audit: type=1400 audit(2000000392.251:85035): avc: denied { map_read map_write } for pid=30754 comm="syz.9.12066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 454.313146][ T29] audit: type=1400 audit(2000000392.461:85036): avc: denied { map_create } for pid=30763 comm="syz.3.12067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 454.333077][ T29] audit: type=1400 audit(2000000392.461:85037): avc: denied { map_read map_write } for pid=30763 comm="syz.3.12067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 454.353701][ T29] audit: type=1400 audit(2000000392.531:85038): avc: denied { prog_load } for pid=30763 comm="syz.3.12067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 458.403394][ T29] kauditd_printk_skb: 77 callbacks suppressed [ 458.403408][ T29] audit: type=1400 audit(2000000397.311:85116): avc: denied { prog_load } for pid=30782 comm="syz.8.12074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 458.429369][ T29] audit: type=1400 audit(2000000397.311:85117): avc: denied { bpf } for pid=30782 comm="syz.8.12074" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 458.450634][ T29] audit: type=1400 audit(2000000397.311:85118): avc: denied { perfmon } for pid=30782 comm="syz.8.12074" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 458.472289][ T29] audit: type=1400 audit(2000000397.311:85119): avc: denied { perfmon } for pid=30782 comm="syz.8.12074" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 458.493939][ T29] audit: type=1400 audit(2000000397.311:85120): avc: denied { bpf } for pid=30782 comm="syz.8.12074" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 458.515276][ T29] audit: type=1400 audit(2000000397.321:85121): avc: denied { prog_run } for pid=30782 comm="syz.8.12074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 458.788703][T30781] xt_hashlimit: size too large, truncated to 1048576 [ 459.407137][T30787] loop3: detected capacity change from 0 to 256 [ 459.583933][ T29] audit: type=1400 audit(2000000397.371:85122): avc: denied { prog_load } for pid=30779 comm="syz.9.12072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 459.608848][ T29] audit: type=1400 audit(2000000397.371:85123): avc: denied { bpf } for pid=30779 comm="syz.9.12072" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 459.630768][ T29] audit: type=1400 audit(2000000397.541:85124): avc: denied { create } for pid=30779 comm="syz.9.12072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 459.651423][ T29] audit: type=1400 audit(2000000397.641:85125): avc: denied { setopt } for pid=30779 comm="syz.9.12072" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 459.952755][T30780] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 462.422186][T30780] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 464.353661][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 464.353677][ T29] audit: type=1400 audit(2000000403.251:85186): avc: denied { map_create } for pid=30800 comm="syz.6.12080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 464.353698][ T29] audit: type=1400 audit(2000000403.251:85187): avc: denied { perfmon } for pid=30800 comm="syz.6.12080" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 464.353746][ T29] audit: type=1400 audit(2000000403.251:85188): avc: denied { map_read map_write } for pid=30800 comm="syz.6.12080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 464.419076][ T29] audit: type=1400 audit(2000000403.331:85189): avc: denied { open } for pid=30803 comm="syz.8.12082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 464.419099][ T29] audit: type=1400 audit(2000000403.331:85190): avc: denied { perfmon } for pid=30803 comm="syz.8.12082" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 464.419120][ T29] audit: type=1400 audit(2000000403.331:85191): avc: denied { kernel } for pid=30803 comm="syz.8.12082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 464.435412][ T29] audit: type=1400 audit(2000000403.351:85192): avc: denied { prog_load } for pid=30800 comm="syz.6.12080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 464.435435][ T29] audit: type=1400 audit(2000000403.351:85193): avc: denied { bpf } for pid=30800 comm="syz.6.12080" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 464.435498][ T29] audit: type=1400 audit(2000000403.351:85194): avc: denied { perfmon } for pid=30800 comm="syz.6.12080" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 464.435518][ T29] audit: type=1400 audit(2000000403.351:85195): avc: denied { prog_run } for pid=30800 comm="syz.6.12080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 464.597237][T30805] loop7: detected capacity change from 0 to 2048 [ 464.843243][T30805] loop7: p1 < > p4 [ 464.974048][T30805] loop7: p4 size 8388608 extends beyond EOD, truncated [ 465.181943][T30780] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 469.183326][T30824] netlink: 4 bytes leftover after parsing attributes in process `syz.3.12087'. [ 470.361882][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 470.361896][ T29] audit: type=1400 audit(2000000409.271:85234): avc: denied { map_create } for pid=30825 comm="syz.6.12089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 470.388911][ T29] audit: type=1400 audit(2000000409.271:85235): avc: denied { perfmon } for pid=30825 comm="syz.6.12089" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 470.410855][ T29] audit: type=1400 audit(2000000409.271:85236): avc: denied { map_read map_write } for pid=30825 comm="syz.6.12089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 470.724326][ T29] audit: type=1400 audit(2000000409.411:85237): avc: denied { execute } for pid=30826 comm="syz.8.12088" path="/944/cpu.stat" dev="tmpfs" ino=4872 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 470.748293][ T29] audit: type=1400 audit(2000000409.581:85238): avc: denied { prog_load } for pid=30825 comm="syz.6.12089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 470.768768][ T29] audit: type=1400 audit(2000000409.581:85239): avc: denied { bpf } for pid=30825 comm="syz.6.12089" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 470.790222][ T29] audit: type=1400 audit(2000000409.581:85240): avc: denied { perfmon } for pid=30825 comm="syz.6.12089" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 471.063678][T30780] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.126838][ T29] audit: type=1400 audit(2000000409.811:85241): avc: denied { bpf } for pid=30825 comm="syz.6.12089" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 471.148374][ T29] audit: type=1400 audit(2000000409.821:85242): avc: denied { prog_run } for pid=30825 comm="syz.6.12089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 471.168276][ T29] audit: type=1400 audit(2000000409.951:85243): avc: denied { open } for pid=30825 comm="syz.6.12089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 472.423049][T30780] netdevsim netdevsim9 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 473.403683][T30780] netdevsim netdevsim9 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 473.709240][T30780] netdevsim netdevsim9 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 474.099339][T30780] netdevsim netdevsim9 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 475.680206][ T29] kauditd_printk_skb: 66 callbacks suppressed [ 475.680268][ T29] audit: type=1400 audit(2000000414.591:85310): avc: denied { read write } for pid=24853 comm="syz-executor" name="loop3" dev="devtmpfs" ino=679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 475.972957][ T29] audit: type=1400 audit(2000000414.681:85311): avc: denied { open } for pid=24853 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 475.996826][ T29] audit: type=1400 audit(2000000414.681:85312): avc: denied { ioctl } for pid=24853 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=679 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 476.364557][T30849] SELinux: Context system_u:object_r:apt_var_log_t:s0 is not valid (left unmapped). [ 476.612802][ T29] audit: type=1400 audit(2000000414.921:85313): avc: denied { map_create } for pid=30848 comm="syz.7.12095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 476.633130][ T29] audit: type=1400 audit(2000000414.921:85314): avc: denied { perfmon } for pid=30848 comm="syz.7.12095" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 476.654881][ T29] audit: type=1400 audit(2000000414.921:85315): avc: denied { map_read map_write } for pid=30848 comm="syz.7.12095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 476.675490][ T29] audit: type=1400 audit(2000000415.021:85316): avc: denied { prog_load } for pid=30848 comm="syz.7.12095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 476.695311][ T29] audit: type=1400 audit(2000000415.021:85317): avc: denied { bpf } for pid=30848 comm="syz.7.12095" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 476.717320][ T29] audit: type=1400 audit(2000000415.021:85318): avc: denied { perfmon } for pid=30848 comm="syz.7.12095" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 476.739035][ T29] audit: type=1400 audit(2000000415.021:85319): avc: denied { bpf } for pid=30848 comm="syz.7.12095" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 480.270527][T30831] lo speed is unknown, defaulting to 1000 [ 481.459470][ T29] kauditd_printk_skb: 54 callbacks suppressed [ 481.459484][ T29] audit: type=1400 audit(2000000420.371:85374): avc: denied { read } for pid=30871 comm="syz.6.12101" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 481.684016][ T29] audit: type=1400 audit(2000000420.411:85375): avc: denied { open } for pid=30871 comm="syz.6.12101" path="/dev/cpu/0/msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 481.708449][ T29] audit: type=1400 audit(2000000420.421:85376): avc: denied { create } for pid=30871 comm="syz.6.12101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 481.728757][ T29] audit: type=1400 audit(2000000420.441:85377): avc: denied { prog_load } for pid=30870 comm="syz.3.12102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 481.748740][ T29] audit: type=1400 audit(2000000420.441:85378): avc: denied { bpf } for pid=30870 comm="syz.3.12102" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 481.770062][ T29] audit: type=1400 audit(2000000420.441:85379): avc: denied { perfmon } for pid=30870 comm="syz.3.12102" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 481.791777][ T29] audit: type=1400 audit(2000000420.491:85380): avc: denied { map_create } for pid=30870 comm="syz.3.12102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 481.811726][ T29] audit: type=1400 audit(2000000420.491:85381): avc: denied { create } for pid=30870 comm="syz.3.12102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 481.832089][ T29] audit: type=1400 audit(2000000420.501:85382): avc: denied { write } for pid=30870 comm="syz.3.12102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 481.852342][ T29] audit: type=1400 audit(2000000420.521:85383): avc: denied { map_create } for pid=30873 comm="syz.7.12103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 484.256929][T10721] netdevsim netdevsim9 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 485.902840][T10721] netdevsim netdevsim9 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 486.853897][T30890] loop7: detected capacity change from 0 to 4096 [ 486.872613][ T29] kauditd_printk_skb: 49 callbacks suppressed [ 486.872629][ T29] audit: type=1400 audit(2000000425.721:85433): avc: denied { read write } for pid=30889 comm="syz.7.12109" name="loop7" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 486.902671][ T29] audit: type=1400 audit(2000000425.771:85434): avc: denied { read write open } for pid=30889 comm="syz.7.12109" path="/dev/loop7" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 486.927520][ T29] audit: type=1400 audit(2000000425.771:85435): avc: denied { ioctl } for pid=30889 comm="syz.7.12109" path="/dev/loop7" dev="devtmpfs" ino=678 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 486.952773][ T29] audit: type=1400 audit(2000000425.771:85436): avc: denied { mounton } for pid=30889 comm="syz.7.12109" path="/2010/file0" dev="tmpfs" ino=10306 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 487.352936][ T29] audit: type=1400 audit(2000000426.181:85437): avc: denied { prog_load } for pid=30891 comm="syz.3.12110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 487.372810][ T29] audit: type=1400 audit(2000000426.181:85438): avc: denied { bpf } for pid=30891 comm="syz.3.12110" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 487.394154][ T29] audit: type=1400 audit(2000000426.181:85439): avc: denied { perfmon } for pid=30891 comm="syz.3.12110" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 487.415760][ T29] audit: type=1400 audit(2000000426.191:85440): avc: denied { prog_run } for pid=30891 comm="syz.3.12110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 487.435692][ T29] audit: type=1400 audit(2000000426.211:85441): avc: denied { map_create } for pid=30893 comm="syz.8.12108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 487.455605][ T29] audit: type=1400 audit(2000000426.211:85442): avc: denied { bpf } for pid=30893 comm="syz.8.12108" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 487.612481][T10721] netdevsim netdevsim9 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 487.716283][T30890] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 488.264713][ T8406] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 488.993975][T10721] netdevsim netdevsim9 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 490.662351][T30831] chnl_net:caif_netlink_parms(): no params data found [ 492.213558][ T29] kauditd_printk_skb: 74 callbacks suppressed [ 492.213572][ T29] audit: type=1400 audit(2000000431.101:85517): avc: denied { create } for pid=30917 comm="syz.6.12115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 492.240366][ T29] audit: type=1400 audit(2000000431.101:85518): avc: denied { prog_load } for pid=30917 comm="syz.6.12115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 492.260291][ T29] audit: type=1400 audit(2000000431.101:85519): avc: denied { bpf } for pid=30917 comm="syz.6.12115" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 492.281796][ T29] audit: type=1400 audit(2000000431.131:85520): avc: denied { prog_load } for pid=30917 comm="syz.6.12115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 492.301747][ T29] audit: type=1400 audit(2000000431.131:85521): avc: denied { perfmon } for pid=30917 comm="syz.6.12115" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 492.638886][T10721] batadv0: left allmulticast mode [ 492.645158][T10721] batadv0: left promiscuous mode [ 492.651505][T10721] bridge0: port 3(batadv0) entered disabled state [ 492.959435][T10721] bridge_slave_1: left allmulticast mode [ 492.966415][T10721] bridge_slave_1: left promiscuous mode [ 492.973318][T10721] bridge0: port 2(bridge_slave_1) entered disabled state [ 492.999585][ T29] audit: type=1400 audit(2000000431.141:85522): avc: denied { prog_run } for pid=30917 comm="syz.6.12115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 493.019627][ T29] audit: type=1400 audit(2000000431.241:85523): avc: denied { setopt } for pid=30917 comm="syz.6.12115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 493.040088][ T29] audit: type=1400 audit(2000000431.251:85524): avc: denied { write } for pid=30917 comm="syz.6.12115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 493.060460][ T29] audit: type=1400 audit(2000000431.251:85525): avc: denied { connect } for pid=30917 comm="syz.6.12115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 493.080979][ T29] audit: type=1400 audit(2000000431.251:85526): avc: denied { name_connect } for pid=30917 comm="syz.6.12115" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 493.349133][T10721] bridge_slave_0: left allmulticast mode [ 493.355719][T10721] bridge_slave_0: left promiscuous mode [ 493.362460][T10721] bridge0: port 1(bridge_slave_0) entered disabled state [ 495.053468][T30929] loop3: detected capacity change from 0 to 512 [ 495.061312][T30929] EXT4-fs: Ignoring removed oldalloc option [ 495.192993][T30929] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 495.447220][T30929] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 495.613911][T30929] ext4 filesystem being mounted at /527/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 496.684459][T24853] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 498.331147][ T29] kauditd_printk_skb: 63 callbacks suppressed [ 498.331161][ T29] audit: type=1400 audit(2000000437.241:85590): avc: denied { map_create } for pid=30943 comm="syz.3.12123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 498.357797][ T29] audit: type=1400 audit(2000000437.241:85591): avc: denied { map_read map_write } for pid=30943 comm="syz.3.12123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 498.536151][ T29] audit: type=1400 audit(2000000437.371:85592): avc: denied { prog_load } for pid=30943 comm="syz.3.12123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 498.556616][ T29] audit: type=1400 audit(2000000437.371:85593): avc: denied { bpf } for pid=30943 comm="syz.3.12123" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 498.577919][ T29] audit: type=1400 audit(2000000437.371:85594): avc: denied { perfmon } for pid=30943 comm="syz.3.12123" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 498.599660][ T29] audit: type=1400 audit(2000000437.381:85595): avc: denied { prog_run } for pid=30943 comm="syz.3.12123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 498.927338][ T29] audit: type=1400 audit(2000000437.841:85596): avc: denied { open } for pid=30946 comm="syz.8.12124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 498.947460][ T29] audit: type=1400 audit(2000000437.841:85597): avc: denied { perfmon } for pid=30946 comm="syz.8.12124" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 498.969122][ T29] audit: type=1400 audit(2000000437.841:85598): avc: denied { kernel } for pid=30946 comm="syz.8.12124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 500.203002][ C0] ================================================================== [ 500.211124][ C0] BUG: KCSAN: data-race in can_receive / can_stat_update [ 500.218176][ C0] [ 500.220492][ C0] read to 0xffff88812d70fce8 of 8 bytes by interrupt on cpu 1: [ 500.228038][ C0] can_stat_update+0x444/0x6b0 [ 500.232825][ C0] call_timer_fn+0x3a/0x300 [ 500.237392][ C0] __run_timer_base+0x417/0x640 [ 500.242259][ C0] run_timer_softirq+0x31/0x70 [ 500.247036][ C0] handle_softirqs+0xbf/0x280 [ 500.251722][ C0] do_softirq+0x5e/0x90 [ 500.255891][ C0] __local_bh_enable_ip+0x6e/0x70 [ 500.260931][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 500.265885][ C0] nsim_dev_trap_report_work+0x522/0x620 [ 500.271526][ C0] process_scheduled_works+0x483/0x9a0 [ 500.276985][ C0] worker_thread+0x51d/0x6f0 [ 500.281581][ C0] kthread+0x4ae/0x520 [ 500.285660][ C0] ret_from_fork+0x4b/0x60 [ 500.290088][ C0] ret_from_fork_asm+0x1a/0x30 [ 500.294861][ C0] SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 500.297177][ C0] read-write to 0xffff88812d70fce8 of 8 bytes by interrupt on cpu 0: [ 500.305238][ C0] can_receive+0x62/0x1f0 [ 500.309578][ C0] can_rcv+0xe7/0x180 [ 500.313573][ C0] __netif_receive_skb+0x123/0x280 [ 500.318698][ C0] process_backlog+0x22e/0x440 [ 500.323469][ C0] __napi_poll+0x63/0x3c0 [ 500.327798][ C0] net_rx_action+0x3a1/0x7f0 [ 500.332384][ C0] handle_softirqs+0xbf/0x280 [ 500.337068][ C0] do_softirq+0x5e/0x90 [ 500.341230][ C0] __local_bh_enable_ip+0x6e/0x70 [ 500.346261][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 500.351214][ C0] lock_sock_nested+0x10f/0x140 [ 500.356076][ C0] sockopt_lock_sock+0x42/0x50 [ 500.360851][ C0] do_ip_getsockopt+0xb57/0x11a0 [ 500.365794][ C0] ip_getsockopt+0x5c/0x170 [ 500.370307][ C0] tcp_getsockopt+0xaa/0xe0 [ 500.374823][ C0] sock_common_getsockopt+0x5b/0x70 [ 500.380027][ C0] do_sock_getsockopt+0x1ca/0x260 [ 500.382941][ T29] audit: type=1400 audit(2000000439.251:85599): avc: denied { write } for pid=3268 comm="syz-executor" path="pipe:[2335]" dev="pipefs" ino=2335 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 500.385052][ C0] __x64_sys_getsockopt+0x18c/0x200 [ 500.385080][ C0] x64_sys_call+0x1288/0x2dc0 [ 500.385104][ C0] do_syscall_64+0xc9/0x1c0 [ 500.385127][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 500.385149][ C0] [ 500.385152][ C0] value changed: 0x00000000000206ce -> 0x0000000000000000 [ 500.385162][ C0] [ 500.385165][ C0] Reported by Kernel Concurrency Sanitizer on: [ 500.446340][ C0] CPU: 0 UID: 0 PID: 19122 Comm: syz-executor Not tainted 6.13.0-syzkaller-09383-gebbb8be421ee #0 [ 500.457022][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 500.467084][ C0] ==================================================================