last executing test programs: 12.663174863s ago: executing program 1 (id=164): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) unshare(0x22020400) r1 = fsopen(&(0x7f0000000040)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) unshare(0x2060280) fsmount(r1, 0x0, 0x0) 12.488706235s ago: executing program 1 (id=166): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0x4}, 0x18) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x8895}, 0x4040850) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a54000000030a0fdb00000000000000000a0060050900030073797a30000000000900010073797a310000000014000480080002403cb140bb08000140000000030a000700726f757465000000080005400000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x44850}, 0x24000840) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r2, &(0x7f0000000000)={&(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0}, 0x0) 12.449660581s ago: executing program 1 (id=168): r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="020300090a0000000000000004000000030006000000000002000000ac1414000000000000000000020001000000000000000002fffffffb030005000000000002"], 0x50}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@private, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x6c}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x4}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmsg$key(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x9, 0x0, 0x9, 0x2}, 0x10}}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 12.415949425s ago: executing program 1 (id=170): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x1c, r4, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40089}, 0x8004) write$nci(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="710504960301020308094e670fbbe76cb4c0a1cbb5bd73ccd8ba31b0df491c1bf68ea78f47c27f6ebec43b6f708a7add0fdff5bcb7a78e1c8fdd69f331a6e32ddb78e752206ad663deab49b8a876e166f9278e505f54bfe86c8cfd085680030368"], 0x61) 11.52436559s ago: executing program 1 (id=190): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r0}, &(0x7f0000000400), &(0x7f00000005c0)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) 11.469906167s ago: executing program 1 (id=193): sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x4000c00) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0x205, &(0x7f0000000300)={[{@user_xattr}]}, 0x81, 0x633, &(0x7f0000000600)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000120000002400000008000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000005c0)='sched_switch\x00', r0}, 0x18) mount(0x0, &(0x7f0000000000)='.\x00', 0x0, 0x2200830, 0x0) 2.136911423s ago: executing program 3 (id=388): r0 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000170000de00000000ff000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) write$binfmt_elf32(r0, &(0x7f00000016c0)=ANY=[@ANYBLOB="7f454c4604070003070000000000000002000300030000000903000038000000fcffffff0e000000000020000100050000000000000000000300000008000000f30000007f00000004"], 0x58) close(r0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 2.022133528s ago: executing program 3 (id=389): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = fsopen(&(0x7f0000000140)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x1, 0x0) symlinkat(&(0x7f0000000000)='./file0/../file0\x00', r2, &(0x7f0000000080)='./file0\x00') readlinkat(r2, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000780)=""/198, 0xc6) 1.959526216s ago: executing program 3 (id=393): r0 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x80, 0x2, 0x1f9}, &(0x7f0000000000)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r0, 0x0, &(0x7f0000000040)='./file0\x00', 0x64, 0x183000, 0x12345}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x42002) io_uring_enter(r0, 0x47f6, 0x0, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) preadv(r3, &(0x7f0000004ec0)=[{&(0x7f0000004bc0)=""/68, 0x44}], 0x1, 0x8000, 0x0) 1.54589534s ago: executing program 3 (id=408): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a0000000400"], 0x50) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') read$msr(r0, &(0x7f0000000180)=""/174, 0xae) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000140)=ANY=[@ANYBLOB="440000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d616376746170000400028008000500", @ANYRES32=r3, @ANYBLOB="080003"], 0x44}}, 0x0) 1.490278616s ago: executing program 3 (id=410): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000002000)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) lchown(&(0x7f00000001c0)='./file0\x00', 0xee00, 0x0) 1.372009302s ago: executing program 3 (id=414): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x20}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000580)='kmem_cache_free\x00', r2, 0x0, 0x100000000000000}, 0x18) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCFLSH(r0, 0x400455c8, 0x0) 445.298442ms ago: executing program 4 (id=437): r0 = socket$phonet_pipe(0x23, 0x5, 0x2) connect$phonet_pipe(r0, &(0x7f0000000040)={0x23, 0x2, 0x0, 0x3}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) ioctl$SIOCPNENABLEPIPE(r0, 0x89ed, 0x0) 437.341223ms ago: executing program 2 (id=438): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x40000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x2, 0xffffffffffffffff}, 0x6025, 0x4005, 0xb, 0x0, 0x1, 0x1, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x5, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffffe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x304}, "db748d6b120426ad", "4fe429faa1e90c473725b5e429ac42fa", "917e060b", "92816af8b4efb2ad"}, 0x28) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x304}, "cc320e4a27cb5791", "1fd33c81cf7995313c09de00fd6ded74", "62266bd8", "1e00040000000100"}, 0x28) 416.018586ms ago: executing program 4 (id=439): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) 333.568507ms ago: executing program 4 (id=440): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b0000000700000008000000a6ad6a1a05"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a09000000000000000000020000000900020073794f310000000008000440080000000900010073797a3000000000080003400000000114000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="34000000150a03f5"], 0x34}, 0x1, 0x0, 0x0, 0x66df5cfbe53006d1}, 0x0) 328.914227ms ago: executing program 2 (id=441): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x42, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a300000000008000a40ffffffff580000000c0a010100000000000000000a0000060900020073797a30000000000900010073797a31000000012c0003802800008004000180200007800e000100636f6e6e6c696d6974"], 0xbc}, 0x1, 0x0, 0x0, 0x4000851}, 0x40) 272.022434ms ago: executing program 0 (id=443): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x6, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xf}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x6, 0x40, 0x3, 0x0, 0x4000000000, 0xd4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x100882, 0x7ff, 0x6, 0x3, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x100000a, 0x4082172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000005000/0x4000)=nil) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) 229.78759ms ago: executing program 2 (id=444): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0xfffffffffffffffc}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r0}, &(0x7f0000000500), &(0x7f0000000540)=r1}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x6, 0x4, 0x0, 0x7ffc1ffb}]}) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) 229.4906ms ago: executing program 0 (id=445): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x2, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "87ee8ac6c46dad33", "2607080d7f4fcf00fd4ef2dece6c7c58", '\x00', '#\x00\x00@\x00'}, 0x28) writev(r0, &(0x7f0000000740)=[{&(0x7f00000008c0)="581a17919cc7", 0x6}], 0x1) 229.01471ms ago: executing program 4 (id=446): symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000600)='kfree\x00', r0}, 0x18) rmdir(&(0x7f0000004040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') connect(0xffffffffffffffff, &(0x7f0000000000)=@sco={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x80) r1 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x2000000b, 0xe0, &(0x7f0000000240)={0x3, 0x14, 0xfffa, 0x4360}, 0x8, 0x6, 0x7d, 0x0, 0x1, 0x101, 0x0}) 224.04241ms ago: executing program 2 (id=447): setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, 0x0, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0x1, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_rdma(0x10, 0x3, 0x14) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x140f, 0x1, 0x70bd29, 0x25dfdbfc}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) 199.172784ms ago: executing program 0 (id=448): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4003, 0x0, @loopback}, 0x1c) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x8, 0x0, 0x0, 0x0, {0xa, 0x4e20, 0x0, @empty}}}, 0x32) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r1, 0x29, 0x37, &(0x7f0000000000)=ANY=[], 0x8) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x34000}], 0x1) sendto$inet6(r1, 0x0, 0x0, 0x8, 0x0, 0x0) 169.066608ms ago: executing program 2 (id=449): socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x6, 0x8604, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fef, 0x1, @perf_bp={0x0, 0x3}, 0x8000, 0x10000, 0x0, 0x4, 0x6916, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) open(0x0, 0x24040, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="60000000020601080000000000000000000000001400078008001140000000000500150000000000050005000a000000050001000700000005000400000000000900020073797a310000000011000300686173683a6e65742c6e6574"], 0x60}}, 0x0) 114.521544ms ago: executing program 4 (id=450): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd2b, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000c00)=@newtfilter={0x48, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0x4}, {}, {0x8, 0xf}}, [@filter_kind_options=@f_matchall={{0xd}, {0x14, 0x2, [@TCA_MATCHALL_CLASSID={0x8, 0x1, {0x8, 0xe}}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x1}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) 114.143505ms ago: executing program 0 (id=451): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a05000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000218c0000000c0a01030000000000000000070000090900020073797a31000000000900010073797a3000000000600003805c000080080003400000000250000b802c0001800a0001006c696d697400"], 0x110}}, 0x0) 89.417318ms ago: executing program 2 (id=452): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000700)=0x1, r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xe, @empty, 0x2}, {0xa, 0x4e23, 0x7, @remote, 0x3}, r1, 0x7}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000740)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in={0x2, 0x4e23, @empty}}}, 0x90) 59.907312ms ago: executing program 0 (id=453): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) r3 = syz_io_uring_setup(0x112, &(0x7f00000002c0)={0x0, 0xf25c, 0x10000, 0x10003, 0x65, 0x0, r2}, &(0x7f0000000140), &(0x7f0000000280)) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 59.520151ms ago: executing program 4 (id=454): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e24, 0x1, @empty, 0x7}}, 0x5, 0x5bd7}, 0x90) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x6, @empty, 0x3}], 0x1c) sendmsg$inet6(r0, &(0x7f0000000800)={&(0x7f0000000080)={0xa, 0x4e24, 0x8, @loopback, 0x4}, 0x1c, &(0x7f0000000380)=[{&(0x7f00000000c0)="88", 0x1}], 0x1}, 0x4048043) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @empty}}, 0x5, 0x3, 0xf06, 0x1, 0x94, 0xfffffffd, 0x5}, 0x9c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000600)={0x0, @in6={{0xa, 0x4e60, 0xfffffff2, @empty, 0x9}}, 0x1000000, 0x31, 0xffff1893, 0x3, 0x25, 0x0, 0x1b}, 0x9c) 0s ago: executing program 0 (id=455): r0 = socket$nl_route(0x10, 0x3, 0x0) unshare(0x64000600) write(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'wg0\x00', 0x0}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000780)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', r1, 0x29, 0x0, 0x0, 0x0, 0x5a, @dev={0xfe, 0x80, '\x00', 0x24}, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7800, 0x7f, 0xfffffffc, 0xdc66}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl0\x00', r3, 0x0, 0x0, 0x1, 0x0, 0xd, @loopback, @empty, 0x700, 0x0, 0xfffffffc}}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.201' (ED25519) to the list of known hosts. [ 27.661830][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 27.661844][ T29] audit: type=1400 audit(1768379811.131:70): avc: denied { mounton } for pid=3305 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.690721][ T29] audit: type=1400 audit(1768379811.161:71): avc: denied { mount } for pid=3305 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.691412][ T3305] cgroup: Unknown subsys name 'net' [ 27.718321][ T29] audit: type=1400 audit(1768379811.191:72): avc: denied { unmount } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.840140][ T3305] cgroup: Unknown subsys name 'cpuset' [ 27.846203][ T3305] cgroup: Unknown subsys name 'rlimit' [ 27.956150][ T29] audit: type=1400 audit(1768379811.421:73): avc: denied { setattr } for pid=3305 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 27.980461][ T29] audit: type=1400 audit(1768379811.421:74): avc: denied { create } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.001040][ T29] audit: type=1400 audit(1768379811.421:75): avc: denied { write } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.021629][ T29] audit: type=1400 audit(1768379811.421:76): avc: denied { read } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.028137][ T3308] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.041977][ T29] audit: type=1400 audit(1768379811.421:77): avc: denied { mounton } for pid=3305 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.075186][ T29] audit: type=1400 audit(1768379811.421:78): avc: denied { mount } for pid=3305 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 28.098516][ T29] audit: type=1400 audit(1768379811.471:79): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 28.173356][ T3305] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.898895][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 29.920349][ T3323] chnl_net:caif_netlink_parms(): no params data found [ 29.934542][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 30.000601][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.007674][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.014859][ T3315] bridge_slave_0: entered allmulticast mode [ 30.021374][ T3315] bridge_slave_0: entered promiscuous mode [ 30.040159][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.047189][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.054413][ T3315] bridge_slave_1: entered allmulticast mode [ 30.060731][ T3315] bridge_slave_1: entered promiscuous mode [ 30.083685][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.090764][ T3323] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.097954][ T3323] bridge_slave_0: entered allmulticast mode [ 30.104319][ T3323] bridge_slave_0: entered promiscuous mode [ 30.128122][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.135295][ T3323] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.147609][ T3323] bridge_slave_1: entered allmulticast mode [ 30.154056][ T3323] bridge_slave_1: entered promiscuous mode [ 30.164460][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.171546][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.178687][ T3320] bridge_slave_0: entered allmulticast mode [ 30.185037][ T3320] bridge_slave_0: entered promiscuous mode [ 30.197034][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.209017][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.218281][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.225384][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.232890][ T3320] bridge_slave_1: entered allmulticast mode [ 30.239172][ T3320] bridge_slave_1: entered promiscuous mode [ 30.261010][ T3325] chnl_net:caif_netlink_parms(): no params data found [ 30.269653][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 30.283735][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.303634][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.313595][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.323653][ T3315] team0: Port device team_slave_0 added [ 30.334460][ T3315] team0: Port device team_slave_1 added [ 30.345004][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.393310][ T3323] team0: Port device team_slave_0 added [ 30.403398][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.410380][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.436396][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.447730][ T3320] team0: Port device team_slave_0 added [ 30.454005][ T3323] team0: Port device team_slave_1 added [ 30.464150][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.471110][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.497013][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.508701][ T3320] team0: Port device team_slave_1 added [ 30.552369][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.559351][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.585699][ T3323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.596506][ T3325] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.603579][ T3325] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.610821][ T3325] bridge_slave_0: entered allmulticast mode [ 30.617247][ T3325] bridge_slave_0: entered promiscuous mode [ 30.623598][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.630718][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.637806][ T3317] bridge_slave_0: entered allmulticast mode [ 30.644324][ T3317] bridge_slave_0: entered promiscuous mode [ 30.651336][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.658275][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.684245][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.695351][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.702310][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.728214][ T3323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.738971][ T3325] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.746023][ T3325] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.753267][ T3325] bridge_slave_1: entered allmulticast mode [ 30.759636][ T3325] bridge_slave_1: entered promiscuous mode [ 30.765787][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.773281][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.780451][ T3317] bridge_slave_1: entered allmulticast mode [ 30.786766][ T3317] bridge_slave_1: entered promiscuous mode [ 30.797656][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.804625][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.830575][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.873196][ T3315] hsr_slave_0: entered promiscuous mode [ 30.879246][ T3315] hsr_slave_1: entered promiscuous mode [ 30.891713][ T3325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.901927][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.912176][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.927622][ T3325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.948705][ T3323] hsr_slave_0: entered promiscuous mode [ 30.954628][ T3323] hsr_slave_1: entered promiscuous mode [ 30.960494][ T3323] debugfs: 'hsr0' already exists in 'hsr' [ 30.966227][ T3323] Cannot create hsr debugfs directory [ 30.997427][ T3320] hsr_slave_0: entered promiscuous mode [ 31.003557][ T3320] hsr_slave_1: entered promiscuous mode [ 31.009485][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 31.015330][ T3320] Cannot create hsr debugfs directory [ 31.021458][ T3317] team0: Port device team_slave_0 added [ 31.028069][ T3317] team0: Port device team_slave_1 added [ 31.034417][ T3325] team0: Port device team_slave_0 added [ 31.056909][ T3325] team0: Port device team_slave_1 added [ 31.087996][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.095010][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.120981][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.140799][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.147753][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.173708][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.184680][ T3325] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.191653][ T3325] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.217617][ T3325] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.240164][ T3325] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.247210][ T3325] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.273133][ T3325] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.321084][ T3317] hsr_slave_0: entered promiscuous mode [ 31.327113][ T3317] hsr_slave_1: entered promiscuous mode [ 31.332965][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 31.338672][ T3317] Cannot create hsr debugfs directory [ 31.381698][ T3325] hsr_slave_0: entered promiscuous mode [ 31.387640][ T3325] hsr_slave_1: entered promiscuous mode [ 31.393514][ T3325] debugfs: 'hsr0' already exists in 'hsr' [ 31.399222][ T3325] Cannot create hsr debugfs directory [ 31.478900][ T3315] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 31.497202][ T3315] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 31.512514][ T3315] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 31.527105][ T3315] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 31.549883][ T3323] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 31.560466][ T3323] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 31.579941][ T3323] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 31.588876][ T3323] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 31.609350][ T3320] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 31.621811][ T3320] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 31.631128][ T3320] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 31.641423][ T3320] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 31.665864][ T3317] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 31.680924][ T3317] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 31.689842][ T3317] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 31.701136][ T3317] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 31.728963][ T3325] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 31.739879][ T3325] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 31.748488][ T3325] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 31.762489][ T3325] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 31.778253][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.809418][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.820591][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.835385][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.842446][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.862145][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.869237][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.884991][ T3323] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.896203][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.907111][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.914210][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.930255][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.937339][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.949377][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.965010][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.972095][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.994517][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.001666][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.017040][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.037031][ T3325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.047294][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.062299][ T3325] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.078154][ T3323] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.093352][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.100516][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.111170][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.118292][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.134700][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.141788][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.166970][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.177955][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.185061][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.232003][ T3323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.264713][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.334517][ T3315] veth0_vlan: entered promiscuous mode [ 32.353181][ T3315] veth1_vlan: entered promiscuous mode [ 32.376527][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.399577][ T3323] veth0_vlan: entered promiscuous mode [ 32.407555][ T3325] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.426636][ T3315] veth0_macvtap: entered promiscuous mode [ 32.435735][ T3323] veth1_vlan: entered promiscuous mode [ 32.446686][ T3315] veth1_macvtap: entered promiscuous mode [ 32.455388][ T3320] veth0_vlan: entered promiscuous mode [ 32.472218][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.494078][ T3323] veth0_macvtap: entered promiscuous mode [ 32.507510][ T3323] veth1_macvtap: entered promiscuous mode [ 32.515304][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.524234][ T3320] veth1_vlan: entered promiscuous mode [ 32.541209][ T52] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.550408][ T52] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.559159][ T52] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.572145][ T52] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.593222][ T3317] veth0_vlan: entered promiscuous mode [ 32.599605][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.616165][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.628918][ T3320] veth0_macvtap: entered promiscuous mode [ 32.637133][ T3317] veth1_vlan: entered promiscuous mode [ 32.644707][ T3320] veth1_macvtap: entered promiscuous mode [ 32.653295][ T2484] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.670476][ T3315] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 32.692384][ T2484] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.703799][ T3317] veth0_macvtap: entered promiscuous mode [ 32.727133][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 32.727148][ T29] audit: type=1400 audit(1768379816.181:99): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 32.757343][ T29] audit: type=1400 audit(1768379816.181:100): avc: denied { open } for pid=3315 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 32.761489][ T3317] veth1_macvtap: entered promiscuous mode [ 32.781478][ T29] audit: type=1400 audit(1768379816.181:101): avc: denied { ioctl } for pid=3315 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 32.791676][ T3488] process 'syz.0.1' launched './file0' with NULL argv: empty string added [ 32.813597][ T29] audit: type=1400 audit(1768379816.191:102): avc: denied { open } for pid=3486 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 32.823629][ T2484] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.840117][ T29] audit: type=1400 audit(1768379816.191:103): avc: denied { perfmon } for pid=3486 comm="syz.0.1" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 32.862238][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.869409][ T29] audit: type=1400 audit(1768379816.191:104): avc: denied { kernel } for pid=3486 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 32.895710][ T29] audit: type=1400 audit(1768379816.191:105): avc: denied { tracepoint } for pid=3486 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 32.915158][ T29] audit: type=1400 audit(1768379816.251:106): avc: denied { watch watch_reads } for pid=3486 comm="syz.0.1" path="/0/file0" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 32.938114][ T29] audit: type=1400 audit(1768379816.251:107): avc: denied { execute } for pid=3486 comm="syz.0.1" name="file0" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 32.961235][ T29] audit: type=1400 audit(1768379816.291:108): avc: denied { execute_no_trans } for pid=3486 comm="syz.0.1" path="/0/file0" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 32.969132][ T2484] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.997873][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.010165][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.023339][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.036362][ T2244] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.055837][ T2244] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.064758][ T3325] veth0_vlan: entered promiscuous mode [ 33.078072][ T2244] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.103912][ T3325] veth1_vlan: entered promiscuous mode [ 33.123952][ T2244] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.138600][ T2244] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.154654][ T2244] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.167073][ T3325] veth0_macvtap: entered promiscuous mode [ 33.174886][ T2244] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.187196][ T3325] veth1_macvtap: entered promiscuous mode [ 33.215110][ T3325] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.237401][ T2244] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.248350][ T3325] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.285025][ T3505] netlink: 'syz.2.3': attribute type 3 has an invalid length. [ 33.292558][ T3505] netlink: 'syz.2.3': attribute type 1 has an invalid length. [ 33.300124][ T3505] netlink: 181400 bytes leftover after parsing attributes in process `syz.2.3'. [ 33.315853][ T52] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.355002][ T52] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.374192][ T52] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.411738][ T52] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.462713][ T3523] gretap0: entered promiscuous mode [ 33.468786][ T3523] netlink: 8 bytes leftover after parsing attributes in process `syz.1.13'. [ 33.477606][ T3523] gretap0: left promiscuous mode [ 33.543180][ T3530] ip6gretap0: entered promiscuous mode [ 33.553753][ T3530] ip6gretap0: left promiscuous mode [ 33.684128][ T3549] netlink: 12 bytes leftover after parsing attributes in process `syz.0.27'. [ 33.693769][ T3549] netlink: 12 bytes leftover after parsing attributes in process `syz.0.27'. [ 33.703075][ T3549] Zero length message leads to an empty skb [ 33.775156][ T3560] netlink: 4 bytes leftover after parsing attributes in process `syz.0.32'. [ 33.793810][ T3560] netlink: 24 bytes leftover after parsing attributes in process `syz.0.32'. [ 33.841480][ T3564] loop1: detected capacity change from 0 to 512 [ 33.853750][ T3567] netlink: 8 bytes leftover after parsing attributes in process `syz.4.34'. [ 33.876767][ T3564] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 33.894413][ T3569] 8021q: adding VLAN 0 to HW filter on device bond1 [ 33.908679][ T3564] ext4 filesystem being mounted at /6/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 33.927726][ T3578] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 33.945565][ T3578] wireguard0: entered promiscuous mode [ 33.951332][ T3578] wireguard0: entered allmulticast mode [ 33.980733][ T3320] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.137686][ T3599] syz.1.47 (3599) used greatest stack depth: 10192 bytes left [ 34.219026][ T3608] netlink: 8 bytes leftover after parsing attributes in process `syz.1.50'. [ 34.228802][ T3608] netlink: 16 bytes leftover after parsing attributes in process `syz.1.50'. [ 34.267451][ T3614] netlink: 'syz.4.51': attribute type 10 has an invalid length. [ 34.276073][ T3613] gretap1: entered promiscuous mode [ 34.287339][ T3614] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.296549][ T3614] bond0: (slave team0): Enslaving as an active interface with an up link [ 34.364042][ T3624] netlink: 68 bytes leftover after parsing attributes in process `syz.0.58'. [ 34.532572][ T3647] bridge0: port 3(batadv1) entered blocking state [ 34.539195][ T3647] bridge0: port 3(batadv1) entered disabled state [ 34.546555][ T3647] batadv1: entered allmulticast mode [ 34.566698][ T3647] batadv1: entered promiscuous mode [ 34.827657][ T3660] IPVS: Error connecting to the multicast addr [ 35.039824][ T909] batman_adv: batadv1: No IGMP Querier present - multicast optimizations disabled [ 35.049375][ T909] batman_adv: batadv1: No MLD Querier present - multicast optimizations disabled [ 35.365427][ T3697] loop1: detected capacity change from 0 to 512 [ 35.396956][ T3697] ======================================================= [ 35.396956][ T3697] WARNING: The mand mount option has been deprecated and [ 35.396956][ T3697] and is ignored by this kernel. Remove the mand [ 35.396956][ T3697] option from the mount to silence this warning. [ 35.396956][ T3697] ======================================================= [ 35.438853][ T3697] EXT4-fs: Ignoring removed orlov option [ 35.444583][ T3697] EXT4-fs: Ignoring removed i_version option [ 35.450795][ T3697] EXT4-fs: Ignoring removed nomblk_io_submit option [ 35.465463][ T3697] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 35.473514][ T3697] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=c040e118, mo2=0002] [ 35.482581][ T3697] EXT4-fs (loop1): orphan cleanup on readonly fs [ 35.489169][ T3697] EXT4-fs warning (device loop1): ext4_enable_quotas:7221: Failed to enable quota tracking (type=1, err=-22, ino=4). Please run e2fsck to fix. [ 35.503823][ T3697] EXT4-fs (loop1): Cannot turn on quotas: error -22 [ 35.512146][ T3697] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz.1.89: bg 0: block 40: padding at end of block bitmap is not set [ 35.526790][ T3697] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6689: Corrupt filesystem [ 35.536179][ T3697] EXT4-fs (loop1): 1 truncate cleaned up [ 35.552374][ T3697] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 35.580042][ T3697] EXT4-fs (loop1): shut down requested (1) [ 35.586453][ T3697] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop1 ino=16 [ 35.606599][ T3697] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop1 ino=16 [ 35.626820][ T3697] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop1 ino=16 [ 35.652076][ T3702] syz.2.91 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 35.662985][ T3320] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.732205][ T3717] loop2: detected capacity change from 0 to 512 [ 35.761837][ T3717] EXT4-fs: Ignoring removed mblk_io_submit option [ 35.776409][ T3717] EXT4-fs error (device loop2): ext4_get_branch:178: inode #11: block 4294967295: comm syz.2.96: invalid block [ 35.813074][ T3717] EXT4-fs error (device loop2): ext4_free_branches:1023: inode #11: comm syz.2.96: invalid indirect mapped block 4294967295 (level 1) [ 35.831254][ T3725] syz.1.98 uses obsolete (PF_INET,SOCK_PACKET) [ 35.858829][ T3717] EXT4-fs error (device loop2): ext4_free_branches:1023: inode #11: comm syz.2.96: invalid indirect mapped block 4294967295 (level 1) [ 35.890404][ T3717] EXT4-fs (loop2): 2 truncates cleaned up [ 35.908346][ T3717] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.943024][ T3717] EXT4-fs error (device loop2): ext4_inlinedir_to_tree:1324: inode #12: block 7: comm syz.2.96: path /15/file0/file0: bad entry in directory: directory entry overrun - offset=196864, inode=4278190093, rec_len=196860, size=60 fake=0 [ 35.997788][ T3649] syz.3.69 (3649) used greatest stack depth: 7264 bytes left [ 36.035945][ T3317] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.052064][ T3729] serio: Serial port ptm0 [ 36.593051][ T3779] loop3: detected capacity change from 0 to 2048 [ 36.608956][ T3781] loop1: detected capacity change from 0 to 128 [ 36.612432][ T3779] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000900 r/w without journal. Quota mode: none. [ 36.651841][ T3781] syz.1.124: attempt to access beyond end of device [ 36.651841][ T3781] loop1: rw=2049, sector=145, nr_sectors = 8 limit=128 [ 36.665556][ T3781] syz.1.124: attempt to access beyond end of device [ 36.665556][ T3781] loop1: rw=2049, sector=161, nr_sectors = 8 limit=128 [ 36.679117][ T3781] syz.1.124: attempt to access beyond end of device [ 36.679117][ T3781] loop1: rw=2049, sector=177, nr_sectors = 24 limit=128 [ 36.694336][ T3781] syz.1.124: attempt to access beyond end of device [ 36.694336][ T3781] loop1: rw=2049, sector=209, nr_sectors = 8 limit=128 [ 36.696047][ T3779] EXT4-fs error (device loop3): ext4_mb_generate_buddy:1306: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 36.708043][ T3781] syz.1.124: attempt to access beyond end of device [ 36.708043][ T3781] loop1: rw=2049, sector=225, nr_sectors = 8 limit=128 [ 36.722914][ T3779] EXT4-fs (loop3): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 2048 with error 28 [ 36.738343][ T3781] syz.1.124: attempt to access beyond end of device [ 36.738343][ T3781] loop1: rw=2049, sector=241, nr_sectors = 8 limit=128 [ 36.748356][ T3779] EXT4-fs (loop3): This should not happen!! Data will be lost [ 36.748356][ T3779] [ 36.748373][ T3779] EXT4-fs (loop3): Total free blocks count 0 [ 36.762668][ T3781] syz.1.124: attempt to access beyond end of device [ 36.762668][ T3781] loop1: rw=2049, sector=257, nr_sectors = 8 limit=128 [ 36.771352][ T3779] EXT4-fs (loop3): Free/Dirty block details [ 36.777509][ T3781] syz.1.124: attempt to access beyond end of device [ 36.777509][ T3781] loop1: rw=2049, sector=273, nr_sectors = 8 limit=128 [ 36.790657][ T3779] EXT4-fs (loop3): free_blocks=2415919104 [ 36.790685][ T3779] EXT4-fs (loop3): dirty_blocks=2352 [ 36.790704][ T3779] EXT4-fs (loop3): Block reservation details [ 36.796976][ T3781] syz.1.124: attempt to access beyond end of device [ 36.796976][ T3781] loop1: rw=2049, sector=289, nr_sectors = 9 limit=128 [ 36.809912][ T3779] EXT4-fs (loop3): i_reserved_data_blocks=147 [ 37.017736][ T2484] EXT4-fs (loop3): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 2 with error 28 [ 37.104877][ T3801] vhci_hcd vhci_hcd.0: default hub control req: 0000 v0000 i0000 l65535 [ 37.183530][ T3819] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 37.183736][ T3818] IPVS: stopping master sync thread 3819 ... [ 37.269079][ T3831] loop1: detected capacity change from 0 to 512 [ 37.276114][ T3829] loop3: detected capacity change from 0 to 512 [ 37.297282][ T3831] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 37.310414][ T3831] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 37.328334][ T3829] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 37.342999][ T3829] ext4 filesystem being mounted at /22/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 37.358126][ T3831] EXT4-fs warning (device loop1): ext4_expand_extra_isize_ea:2857: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 37.386466][ T3831] EXT4-fs (loop1): 1 truncate cleaned up [ 37.397991][ T3831] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 37.472498][ T3323] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.500184][ T3320] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.523310][ T3841] netlink: 'syz.3.144': attribute type 1 has an invalid length. [ 37.651472][ T3848] loop0: detected capacity change from 0 to 256 [ 38.263569][ T29] kauditd_printk_skb: 244 callbacks suppressed [ 38.263615][ T29] audit: type=1400 audit(1768379821.731:352): avc: denied { create } for pid=3870 comm="syz.2.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 38.304512][ T29] audit: type=1400 audit(1768379821.761:353): avc: denied { write } for pid=3870 comm="syz.2.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 38.911926][ T3903] Illegal XDP return value 4294967294 on prog (id 104) dev syz_tun, expect packet loss! [ 38.922351][ T29] audit: type=1400 audit(1768379822.301:354): avc: denied { name_bind } for pid=3898 comm="syz.1.160" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=udp_socket permissive=1 [ 39.050086][ T29] audit: type=1400 audit(1768379822.501:355): avc: denied { name_bind } for pid=3916 comm="syz.1.163" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 39.264667][ T29] audit: type=1400 audit(1768379822.731:356): avc: denied { mount } for pid=3971 comm="syz.1.164" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 39.531643][ T29] audit: type=1400 audit(1768379823.001:357): avc: denied { watch } for pid=4000 comm="syz.2.174" path="/31" dev="tmpfs" ino=171 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 39.672163][ T29] audit: type=1400 audit(1768379823.141:358): avc: denied { kexec_image_load } for pid=4013 comm="syz.2.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 39.709387][ T4018] __nla_validate_parse: 10 callbacks suppressed [ 39.709403][ T4018] netlink: 12 bytes leftover after parsing attributes in process `syz.2.182'. [ 39.728943][ T4018] netlink: 12 bytes leftover after parsing attributes in process `syz.2.182'. [ 39.728992][ T55] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 39.739422][ T29] audit: type=1400 audit(1768379823.161:359): avc: denied { bpf } for pid=4013 comm="syz.2.180" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 39.767055][ T55] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 39.767124][ T55] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 39.775901][ T29] audit: type=1400 audit(1768379823.161:360): avc: denied { view } for pid=4013 comm="syz.2.180" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 39.827872][ T55] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 39.842018][ T29] audit: type=1400 audit(1768379823.311:361): avc: denied { perfmon } for pid=4021 comm="syz.2.183" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 39.926121][ T4026] loop2: detected capacity change from 0 to 512 [ 39.940335][ T4026] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 39.955898][ T4026] ext4 filesystem being mounted at /38/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 39.984635][ T3317] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.123778][ T800] tipc: Subscription rejected, illegal request [ 40.306974][ T4037] netlink: 'syz.2.189': attribute type 1 has an invalid length. [ 40.314742][ T4037] netlink: 224 bytes leftover after parsing attributes in process `syz.2.189'. [ 40.345796][ T4043] netlink: 12 bytes leftover after parsing attributes in process `syz.3.192'. [ 40.354755][ T4043] netlink: 4 bytes leftover after parsing attributes in process `syz.3.192'. [ 40.410837][ T2244] netdevsim netdevsim3 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 40.419684][ T4043] netlink: 12 bytes leftover after parsing attributes in process `syz.3.192'. [ 40.428598][ T4043] netlink: 4 bytes leftover after parsing attributes in process `syz.3.192'. [ 40.437741][ T2244] netdevsim netdevsim3 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 40.446613][ T2244] netdevsim netdevsim3 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 40.456921][ T2244] netdevsim netdevsim3 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 40.642054][ T4065] netlink: 68 bytes leftover after parsing attributes in process `syz.2.201'. [ 40.660068][ T12] tipc: Subscription rejected, illegal request [ 40.813828][ T4083] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=260 sclass=netlink_audit_socket pid=4083 comm=syz.2.211 [ 41.445749][ C1] hrtimer: interrupt took 37468 ns [ 43.670537][ T29] kauditd_printk_skb: 82 callbacks suppressed [ 43.670552][ T29] audit: type=1400 audit(1768379827.141:444): avc: denied { setopt } for pid=4235 comm="syz.2.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 43.748114][ T29] audit: type=1400 audit(1768379827.171:445): avc: denied { read write } for pid=4238 comm="syz.3.258" name="rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 43.772231][ T29] audit: type=1400 audit(1768379827.171:446): avc: denied { open } for pid=4238 comm="syz.3.258" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 43.809785][ T4239] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.817046][ T4239] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.877047][ T4239] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 43.889699][ T4239] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 43.928059][ T4243] geneve2: entered promiscuous mode [ 43.944972][ T4189] netdevsim netdevsim3 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 43.968356][ T4189] netdevsim netdevsim3 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 43.992975][ T4189] netdevsim netdevsim3 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 44.022261][ T4189] netdevsim netdevsim3 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 44.161648][ T4254] loop0: detected capacity change from 0 to 512 [ 44.205810][ T4254] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 44.220091][ T4254] ext4 filesystem being mounted at /72/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 44.293362][ T3315] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.464557][ T29] audit: type=1326 audit(1768379827.931:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4269 comm="syz.2.269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc74246f749 code=0x7ffc0000 [ 44.487903][ T29] audit: type=1326 audit(1768379827.931:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4269 comm="syz.2.269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc74246f749 code=0x7ffc0000 [ 44.610008][ T29] audit: type=1326 audit(1768379827.931:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4269 comm="syz.2.269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc74246f749 code=0x7ffc0000 [ 44.633489][ T29] audit: type=1326 audit(1768379827.931:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4269 comm="syz.2.269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc74246f749 code=0x7ffc0000 [ 44.656776][ T29] audit: type=1326 audit(1768379827.931:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4269 comm="syz.2.269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc74246f749 code=0x7ffc0000 [ 44.680068][ T29] audit: type=1326 audit(1768379827.931:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4269 comm="syz.2.269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc74246f749 code=0x7ffc0000 [ 44.703347][ T29] audit: type=1326 audit(1768379827.931:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4269 comm="syz.2.269" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc74246f749 code=0x7ffc0000 [ 44.949391][ T4279] SELinux: failed to load policy [ 45.001711][ T4283] netlink: 4 bytes leftover after parsing attributes in process `syz.2.275'. [ 45.025980][ T4283] netlink: 4 bytes leftover after parsing attributes in process `syz.2.275'. [ 45.102051][ T4289] loop2: detected capacity change from 0 to 128 [ 45.151514][ T4293] netlink: 4 bytes leftover after parsing attributes in process `syz.3.280'. [ 45.183780][ T4293] netlink: 12 bytes leftover after parsing attributes in process `syz.3.280'. [ 45.265911][ T4302] netlink: 48 bytes leftover after parsing attributes in process `syz.3.285'. [ 45.365951][ T4311] loop3: detected capacity change from 0 to 512 [ 45.376206][ T4313] netlink: 'syz.2.298': attribute type 3 has an invalid length. [ 45.406075][ T4311] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 45.455418][ T4311] ext4 filesystem being mounted at /52/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 45.468262][ T4324] SELinux: Context system_u:object_r:userio_device_t:s0 is not valid (left unmapped). [ 45.500761][ T4311] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #2: comm syz.3.289: corrupted inode contents [ 45.542516][ T4311] EXT4-fs error (device loop3): ext4_dirty_inode:6502: inode #2: comm syz.3.289: mark_inode_dirty error [ 45.569259][ T4311] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #2: comm syz.3.289: corrupted inode contents [ 45.589484][ T4311] EXT4-fs error (device loop3): __ext4_ext_dirty:206: inode #2: comm syz.3.289: mark_inode_dirty error [ 45.639116][ T3323] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.024313][ T4372] netlink: 'syz.3.302': attribute type 3 has an invalid length. [ 46.079597][ T4373] netlink: 'syz.4.303': attribute type 12 has an invalid length. [ 46.106336][ T4379] loop3: detected capacity change from 0 to 128 [ 46.834674][ T4406] netlink: 300 bytes leftover after parsing attributes in process `syz.4.316'. [ 46.955625][ T4409] loop4: detected capacity change from 0 to 256 [ 47.610243][ T4429] netlink: 83992 bytes leftover after parsing attributes in process `syz.3.326'. [ 47.649536][ T4429] netlink: zone id is out of range [ 47.654662][ T4429] netlink: zone id is out of range [ 47.674051][ T4429] netlink: zone id is out of range [ 47.679230][ T4429] netlink: zone id is out of range [ 47.693613][ T4429] netlink: set zone limit has 8 unknown bytes [ 47.769528][ T4440] mmap: syz.3.332 (4440) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 47.993381][ T4461] netlink: 12 bytes leftover after parsing attributes in process `syz.2.341'. [ 48.002434][ T4461] hsr_slave_0: left promiscuous mode [ 48.008202][ T4461] hsr_slave_1: left promiscuous mode [ 48.174659][ T4474] netlink: 20 bytes leftover after parsing attributes in process `syz.4.348'. [ 48.217053][ T4481] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 48.279034][ T4489] netlink: 'syz.4.355': attribute type 1 has an invalid length. [ 48.286989][ T4489] netlink: 'syz.4.355': attribute type 2 has an invalid length. [ 48.309291][ T4489] netlink: 4 bytes leftover after parsing attributes in process `syz.4.355'. [ 48.423877][ T4499] SELinux: failed to load policy [ 48.832827][ T29] kauditd_printk_skb: 169 callbacks suppressed [ 48.832842][ T29] audit: type=1400 audit(1768379832.301:623): avc: denied { name_bind } for pid=4510 comm="syz.3.365" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 48.952526][ T36] IPVS: starting estimator thread 0... [ 49.039591][ T4519] IPVS: using max 2448 ests per chain, 122400 per kthread [ 49.048640][ T29] audit: type=1400 audit(1768379832.511:624): avc: denied { search } for pid=4522 comm="syz.4.370" name="/" dev="configfs" ino=1449 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 49.079566][ T29] audit: type=1400 audit(1768379832.511:625): avc: denied { search } for pid=4522 comm="syz.4.370" name="/" dev="configfs" ino=1449 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 49.101681][ T29] audit: type=1400 audit(1768379832.511:626): avc: denied { read open } for pid=4522 comm="syz.4.370" path="/" dev="configfs" ino=1449 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 49.344462][ T4540] loop4: detected capacity change from 0 to 1024 [ 49.353710][ T4540] EXT4-fs: Ignoring removed mblk_io_submit option [ 49.376575][ T4540] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 49.417036][ T29] audit: type=1400 audit(1768379832.871:627): avc: denied { add_name } for pid=4539 comm="syz.4.379" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 49.441037][ T3325] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 49.539080][ T4557] vlan2: entered promiscuous mode [ 49.544178][ T4557] gretap0: entered promiscuous mode [ 49.610985][ T29] audit: type=1400 audit(1768379833.081:628): avc: denied { setopt } for pid=4559 comm="syz.0.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 49.682807][ T29] audit: type=1326 audit(1768379833.151:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4561 comm="syz.4.387" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52d175f749 code=0x7ffc0000 [ 49.742038][ T29] audit: type=1326 audit(1768379833.181:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4561 comm="syz.4.387" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f52d175f749 code=0x7ffc0000 [ 49.765344][ T29] audit: type=1326 audit(1768379833.181:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4561 comm="syz.4.387" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52d175f749 code=0x7ffc0000 [ 49.788570][ T29] audit: type=1326 audit(1768379833.181:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4561 comm="syz.4.387" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52d175f749 code=0x7ffc0000 [ 50.084955][ T4598] __nla_validate_parse: 2 callbacks suppressed [ 50.084974][ T4598] netlink: 76 bytes leftover after parsing attributes in process `syz.0.404'. [ 50.425450][ T4205] Bluetooth: hci0: Frame reassembly failed (-84) [ 50.432731][ T4618] loop0: detected capacity change from 0 to 512 [ 50.450234][ T4618] ext4: Unknown parameter 'appraise_type' [ 50.530297][ T4623] hub 9-0:1.0: USB hub found [ 50.544732][ T4623] hub 9-0:1.0: 8 ports detected [ 50.554974][ T4625] binfmt_misc: register: failed to install interpreter file ./file0 [ 51.043157][ T4641] loop4: detected capacity change from 0 to 512 [ 51.051607][ T4641] EXT4-fs: Ignoring removed mblk_io_submit option [ 51.060318][ T4641] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 51.073409][ T4641] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a042c118, mo2=0002] [ 51.090376][ T4641] System zones: 1-12 [ 51.094713][ T4641] EXT4-fs error (device loop4): ext4_iget_extra_inode:5073: inode #15: comm syz.4.424: corrupted in-inode xattr: e_value size too large [ 51.109420][ T4641] EXT4-fs error (device loop4): ext4_orphan_get:1396: comm syz.4.424: couldn't read orphan inode 15 (err -117) [ 51.145064][ T4641] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 51.192376][ T3325] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.288707][ T4660] netlink: 48 bytes leftover after parsing attributes in process `syz.0.433'. [ 51.499038][ T4675] netlink: 12 bytes leftover after parsing attributes in process `syz.2.441'. [ 51.517716][ T4679] netlink: 4 bytes leftover after parsing attributes in process `syz.4.440'. [ 51.527367][ T4679] netlink: 32 bytes leftover after parsing attributes in process `syz.4.440'. [ 51.620327][ T4685] usb usb6: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 51.627712][ T4685] vhci_hcd vhci_hcd.2: invalid port number 96 [ 51.633891][ T4685] vhci_hcd vhci_hcd.2: default hub control req: 0314 vfffa i0060 l0 [ 51.685923][ T4697] netlink: 28 bytes leftover after parsing attributes in process `syz.0.451'. [ 51.694910][ T4697] netlink: 28 bytes leftover after parsing attributes in process `syz.0.451'. [ 51.703809][ T4697] netlink: 28 bytes leftover after parsing attributes in process `syz.0.451'. [ 51.822833][ T3005] ================================================================== [ 51.830948][ T3005] BUG: KCSAN: data-race in d_make_discardable / lookup_fast [ 51.838277][ T3005] [ 51.840592][ T3005] write to 0xffff888107ee49c0 of 4 bytes by task 3309 on cpu 0: [ 51.848207][ T3005] d_make_discardable+0x4f/0xa0 [ 51.853058][ T3005] simple_unlink+0x68/0x80 [ 51.857502][ T3005] shmem_unlink+0x12d/0x140 [ 51.862009][ T3005] vfs_unlink+0x28b/0x440 [ 51.866327][ T3005] do_unlinkat+0x1cd/0x4b0 [ 51.870735][ T3005] __x64_sys_unlink+0x2e/0x40 [ 51.875499][ T3005] x64_sys_call+0x2f48/0x3000 [ 51.880179][ T3005] do_syscall_64+0xca/0x2b0 [ 51.884701][ T3005] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 51.890587][ T3005] [ 51.892903][ T3005] read to 0xffff888107ee49c0 of 4 bytes by task 3005 on cpu 1: [ 51.900429][ T3005] lookup_fast+0xf0/0x320 [ 51.904767][ T3005] path_lookupat+0x15c/0x500 [ 51.909359][ T3005] filename_lookup+0x147/0x340 [ 51.914126][ T3005] do_readlinkat+0x7d/0x320 [ 51.918632][ T3005] __x64_sys_readlink+0x47/0x60 [ 51.923496][ T3005] x64_sys_call+0x2af1/0x3000 [ 51.928258][ T3005] do_syscall_64+0xca/0x2b0 [ 51.932846][ T3005] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 51.938728][ T3005] [ 51.941036][ T3005] value changed: 0x08300080 -> 0x00004080 [ 51.946735][ T3005] [ 51.949046][ T3005] Reported by Kernel Concurrency Sanitizer on: [ 51.955196][ T3005] CPU: 1 UID: 0 PID: 3005 Comm: udevd Not tainted syzkaller #0 PREEMPT(voluntary) [ 51.964473][ T3005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 51.974516][ T3005] ================================================================== [ 52.439517][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110