last executing test programs: 6m8.710519763s ago: executing program 1 (id=1156): bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRESOCT], 0x50) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000500)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) execveat$binfmt(0xffffffffffffffff, 0x0, &(0x7f00000003c0)={[&(0x7f00000001c0)='/^:\x00']}, 0x0, 0xc7e9c013810671ad) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1e031c00008c71ef2885634a8270e71133"], 0xffdd) 6m8.515214925s ago: executing program 1 (id=1159): openat$pidfd(0xffffffffffffff9c, 0x0, 0x58900, 0x0) socket(0x80000000000000a, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) flock(r0, 0x5) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) flock(r2, 0x2) 6m7.665583018s ago: executing program 1 (id=1194): r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x3, 0x0) connect$unix(r1, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xd5b5, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) writev(r1, &(0x7f00000008c0)=[{&(0x7f0000000340)='9', 0x1}], 0x1) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000080)=0x7, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040)=0x4971, 0x4) recvmmsg(r0, &(0x7f0000000300), 0x40000000000049e, 0x1000000000fe, 0x0) 6m7.604647799s ago: executing program 1 (id=1198): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f00000006c0)='./file0\x00', 0x0, &(0x7f0000000680)={[{@unhide}, {@nocompress}, {@cruft}, {@map_off}, {@overriderock}]}, 0x1, 0x660, &(0x7f0000000fc0)="$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") mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x109041, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x81105a, 0x0) mount$bind(&(0x7f0000000880)='./file0/../file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x1adc11, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3125899, 0x0) umount2(&(0x7f00000001c0)='./file0/../file0\x00', 0x3) 6m7.538045129s ago: executing program 1 (id=1203): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)='%-010d \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000200)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@type_tag={0x2, 0x0, 0x0, 0x12, 0x1}, @func={0x9, 0x0, 0x0, 0xc, 0x5}]}}, 0x0, 0x32, 0x0, 0x0, 0xffff7fff, 0x10000, @value}, 0x28) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r3, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x30, r2, 0x10ada85e65c25359, 0x70bd2d, 0x8000000, {{0x6b}, {@void, @val={0xc, 0x99, {0x6aa, 0x6e}}}}, [@NL80211_ATTR_TID_CONFIG={0x10}]}, 0x30}, 0x1, 0x0, 0x0, 0x6000}, 0x4040804) 6m7.280964443s ago: executing program 1 (id=1216): syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x2a0471a, &(0x7f00000000c0)={[{@errors_remount}, {@bsdgroups}, {@nouid32}, {@jqfmt_vfsv0}, {@jqfmt_vfsv1}, {@oldalloc}, {@stripe={'stripe', 0x3d, 0x5}}]}, 0x2, 0x46b, &(0x7f0000000580)="$eJzs3M1vFOUfAPDvzLbw+/HWivgColaJsfGlpQWVgxeNJh4wmugB9VTbQgiFGloTIUSqMXgxMSR6Vo8m/gXevBj1ZGLiSe+GhCgX0FPNzM5Ad9ltt3TZrd3PJxl4nn2e7TzfPvPMPDPPbgPoWUPZP0nEtoj4LSIGqtnaCkPV/65dOTf595Vzk0ksLr72Z5LXu3rl3GRZtXzf1iIznEakHyXFTmrNnTl7YmJmZvp0kR+dP/nO6NyZs08ePzlxbPrY9KnxQ4cOHhh75unxp9oSZxbX1T3vz+7d/dIbF1+ePHLx7R+/ydq7rShfGsct2XTzS0NZ4H8t5urLHon/r2l36832Jemkr4sNYVUqEZF1V38+/geiEjc6byBe/LCrjQNuq+zatLl58cIisIEl0e0WAN1RXuiz+99y69DUY124/Fz1BiiL+1qxVUv6Ii3q9Nfd37bTUEQcWfjni2yLdjyHAABYwSeTnx+OJxrN/9K4e0m9HcUaymBE3BEROyPizojYFRF3ReR174mIe1e5//qloZvnP+mlWwqsRdn879libat2/lfO/mKwUuS25/H3J0ePz0zvL34nw9G/OcuPLbOP71745dNmZUvnf9mW7b+cCxbtuNRX94BuamJ+Ip+UtsHlDyL29DWKP7m+EpBExO6I2LO6H72jTBx/7Ou9zSqtHP8y2rDOtPhVxKPV/l+IuvhLyfLrk6P/i5np/aPlUXGzn36+8Gqz/a8p/jbI+n9L7fFflHx5pkgMvrV0vXYuVr1yeeH3j5ve09zq8b8peT0/H5XLru9NzM+fHovYlBzO8zWvj994b5kv62fxD+9rPP53Fu/J+v++iMgO4vsj4oGIeLBo+0MR8XBE7Fsm/h+eb162Hvp/quH57/rxP5jU9P/qE5UT33/bbP+t9f/BPDVcvJKf/1bQagPX8rsDAACA/4o0/wx8ko5cT6fpyEj1M/y7Yks6Mzs3//jR2XdPTVU/Kz8Y/Wn5pGtgyfPQsWSh+InV/HjxrLgsP1A8N/6sEnl+ZHJ2ZqrLsUOv29pk/Gf+qHS7dcBt12gdbbzBF9qAjad+/Ke12fOvdLIxQEf5vjb0rhXGf9qpdgCd5/oPvavR+D9fl7cWABuT6z/0LuMfepfxD72rbvxX4tdutQTooLV8r1+ilxORrotmtJRo/e9B3O7Em+ujGS0kun1mAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaI9/AwAA//9sbvBf") r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) 6m7.280281293s ago: executing program 32 (id=1216): syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x2a0471a, &(0x7f00000000c0)={[{@errors_remount}, {@bsdgroups}, {@nouid32}, {@jqfmt_vfsv0}, {@jqfmt_vfsv1}, {@oldalloc}, {@stripe={'stripe', 0x3d, 0x5}}]}, 0x2, 0x46b, &(0x7f0000000580)="$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") r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) 5m51.20793129s ago: executing program 4 (id=1515): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r4, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newlink={0x40, 0x10, 0xffffff1f, 0xfffffffc, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gretap={{0xb}, {0x8, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@dellink={0x20, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r4, 0x2201, 0x800}}, 0x20}}, 0x40040) 5m50.244565314s ago: executing program 4 (id=1527): openat$ppp(0xffffffffffffff9c, 0x0, 0x101042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0a00000001010000fc7f0000cc"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xbe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) 5m50.188113945s ago: executing program 4 (id=1529): r0 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000280)={0x10, 0x0, 0x25dfdbfb, 0x4140045e}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0x10}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000140)=@newtfilter={0x4c, 0x2c, 0xd27, 0x70bd28, 0x8000, {0x0, 0x0, 0x0, r4, {0x5}, {}, {0xa}}, [@filter_kind_options=@f_flow={{0x9}, {0x1c, 0x2, [@TCA_FLOW_MODE={0x8, 0x2, 0x1}, @TCA_FLOW_MASK={0x8, 0x6, 0x8}, @TCA_FLOW_KEYS={0x8, 0x1, 0x9200}]}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0xc010) 5m50.074928847s ago: executing program 4 (id=1532): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f00000006c0)='./file0\x00', 0x0, &(0x7f0000000680)={[{@unhide}, {@nocompress}, {@cruft}, {@map_off}, {@overriderock}]}, 0x1, 0x660, &(0x7f0000000fc0)="$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") mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x109041, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x81105a, 0x0) mount$bind(&(0x7f0000000880)='./file0/../file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x1adc11, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3125899, 0x0) umount2(&(0x7f00000001c0)='./file0/../file0\x00', 0x3) 5m50.062803437s ago: executing program 4 (id=1534): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000700)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000000050005000a00000012000300686173683a6e65742c706f7274"], 0x4c}}, 0x2) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x54, 0x9, 0x6, 0x201, 0x0, 0x0, {0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @remote}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e1f}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x88}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r3, 0x0, 0x2}, 0x18) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c000000030601010000000000000000000000000500010007"], 0x1c}}, 0x0) 5m45.992839474s ago: executing program 4 (id=1641): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r1) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x38, 0x1403, 0x1, 0x70bd2d, 0x25dfdbff, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'hsr0\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x20000010) 5m45.968080014s ago: executing program 33 (id=1641): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r1) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x38, 0x1403, 0x1, 0x70bd2d, 0x25dfdbff, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'hsr0\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x20000010) 11.262463651s ago: executing program 6 (id=4780): openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x18) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000380), 0x1, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f00000001c0)=@gcm_256={{0x304}, "6ae04425ace3f60c", "acba84f0a6731f234db1cc7f873918cf87310300", "0f9dafb4", "ec3fff9afd96e6c0"}, 0x38) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000140)=0x1) writev(r2, &(0x7f0000000080)=[{&(0x7f00000002c0)="ec", 0xfdef}], 0x1) close(r2) 10.189870906s ago: executing program 6 (id=4786): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x2, 0x0, 0x88}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffe6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x845, &(0x7f0000000340)=ANY=[@ANYBLOB='nfs,shortname=winnt,able,utf8=0,quiet,shortname=lower,check=strict,nfs=stale_rw,uni_xlate=1,uni_xlate=0,rodir,shortname=lower,\x00'], 0x0, 0x275, &(0x7f0000000a00)="$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") mount$bind(&(0x7f0000000240)='.\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x120584c, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) io_uring_setup(0x177d, 0x0) socket$nl_generic(0x10, 0x3, 0x10) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 9.566609795s ago: executing program 6 (id=4790): bpf$MAP_CREATE(0x0, 0x0, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7ff, @empty, 0x1}, {0xa, 0x4e20, 0x1ff, @dev={0xfe, 0x80, '\x00', 0x2f}, 0x9}, r1, 0xb}}, 0x48) 5.744841059s ago: executing program 3 (id=4806): r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0xffffffff}, 0x1c) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x33, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x1}]}, 0x10) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @empty, 0x80ad}, 0x1c) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) rseq(&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3}, 0x20, 0x0, 0x0) alarm(0x81) alarm(0x8) membarrier(0x10, 0x0) alarm(0x1) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x0, 0xbd, 0xe, 0x5}]}) 4.690591334s ago: executing program 6 (id=4808): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000015c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 4.062274803s ago: executing program 3 (id=4812): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)=0x0) timer_settime(r1, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) waitid(0x0, r2, 0x0, 0x8, 0xfffffffffffffffd) waitid(0x1, r2, 0x0, 0x4, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000160000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00'}, 0x10) 3.645937689s ago: executing program 6 (id=4814): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xa5d4}, 0x4c58, 0x5, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000003, 0x13, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000300)={0x0, &(0x7f0000000300)}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r1, 0x0, 0x0, 0x66) r2 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x1, @local}, 0x4a, {0x2, 0x4e23, @dev}}) socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/arp\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f0000000b40)=""/119, 0x77}], 0x1, 0x4000ffe, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r4, &(0x7f00000000c0)="b2", 0x5f65bd31, 0x20008840, &(0x7f0000000040)={0xa, 0x2, 0x80398, @loopback, 0xfffffffe}, 0x1c) 3.437188322s ago: executing program 2 (id=4816): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x5, 0x4, 0x4, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0xd, 0x4, 0x4, 0x9, 0x150, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) time(0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x2a240, 0x0) fcntl$setlease(r3, 0x400, 0x0) openat$cgroup_subtree(r3, 0x0, 0x2, 0x0) 3.000294127s ago: executing program 5 (id=4818): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2171, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000580), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r3, 0x323, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4801}, 0x4000) openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r4 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x8, 0x26, 0x40, 0x7, 0x0, 0x0, 0xa005a, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x1}, 0x100987, 0x2, 0xb, 0x4, 0x81, 0x2, 0x5, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x4, 0x12011, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x5d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_config_ext={0x5}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wpan0\x00'}) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, r1, 0x30b}, 0x14}}, 0x0) 2.998495078s ago: executing program 2 (id=4819): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x3, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="d2205d96c717ab96f0ded75d86dd", 0x0, 0xd5b5, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.996236597s ago: executing program 3 (id=4820): perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x6c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x6, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x1000, 0x0, 0x0, 0x0, 0x0, 0x0) socket(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x800, 0x10) open_tree(r2, &(0x7f0000000340)='./file0\x00', 0x800) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_rx_ring(r1, 0x107, 0x5, 0x0, 0x0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x22004001, 0x0, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) 2.753682181s ago: executing program 5 (id=4822): socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4110, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) syz_open_dev$mouse(&(0x7f0000000240), 0x9, 0x282000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x5) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @local}, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0700000000000000000005000000180001801400020073797a5f74756e0000000000000000000800038004000380080005"], 0x3c}}, 0x0) 2.566479293s ago: executing program 2 (id=4823): syz_open_procfs(0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x800000, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)="3700000013000318680907070000000f0000ff3f13000000170a001700000000040037000d00030001362564aa58b9a6c011f6bbf44dc4", 0x37}], 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)={{0x14}, [@NFT_MSG_NEWSET={0x2c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0x54}}, 0x0) socket(0x2, 0x4, 0x2) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r4, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000080)={0x38, r5, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x38}}, 0x0) 2.358441186s ago: executing program 0 (id=4824): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{}, &(0x7f0000000000), &(0x7f00000005c0)=r0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x70, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a, @void, @value}, 0x94) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff53000000800395032303030"], 0x15) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[], 0x15) r3 = dup(r2) write$P9_RLERRORu(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) chown(&(0x7f0000000240)='./file0\x00', 0xee00, 0x0) 2.357285826s ago: executing program 5 (id=4825): socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_NAME(0xf, 0x0) write$eventfd(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) munlockall() madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x8) 1.942180503s ago: executing program 2 (id=4826): syz_mount_image$ext4(&(0x7f0000000640)='ext4\x00', &(0x7f0000000200)='./file2\x00', 0x200000, &(0x7f0000000000)={[{@dioread_lock}, {@noquota}, {@errors_remount}, {@noblock_validity}]}, 0xfc, 0x564, &(0x7f00000008c0)="$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") r0 = open(&(0x7f0000000300)='./file1\x00', 0x14927e, 0x0) fallocate(r0, 0x0, 0x0, 0x1001f0) fallocate(r0, 0x3, 0x2, 0x10000) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0xc0a85320, &(0x7f00000003c0)={{0x80}, 'port0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000080)={0x3, 0x1, {0x2, 0x2, 0x4, 0x3, 0x8}, 0x6}) close(r1) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmat(r2, &(0x7f0000ffb000/0x3000)=nil, 0x2000) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105500, &(0x7f0000000040)=@usbdevfs_connect={0x6a0}) 1.733452935s ago: executing program 0 (id=4827): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x29, 0x8, 0x9, 0x2, 0x20, @private2, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0x8000, 0x8, 0x7ff, 0xef}}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010001f1ffd5cc000000000010adba1bcb00007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc0241, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x4508, &(0x7f0000000080)={[{@noinit_itable}, {@block_validity}, {@quota}, {@nombcache}]}, 0x1, 0x4e1, &(0x7f0000001400)="$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") syz_io_uring_setup(0x10d, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x2000, 0x0) ioctl$TIOCCBRK(r2, 0x5428) rseq(&(0x7f0000000300), 0x20, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 1.733200215s ago: executing program 5 (id=4828): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffc}]}) r0 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x4}, &(0x7f00000001c0)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r0, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r5, 0x0, r4, 0x0, 0x10000008ebc, 0x0) splice(r3, 0x0, r6, 0x0, 0x25a5, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r7}, 0x10) write$P9_RVERSION(r4, &(0x7f0000000380)=ANY=[], 0x15) syz_emit_ethernet(0x33, &(0x7f0000000200)=ANY=[@ANYBLOB="e90c610faca20180c20000000800450100250000e0000100000000000000000000000000000000119078a20c00010000000009"], 0x0) 1.506466929s ago: executing program 2 (id=4829): r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000000080)={{}, {0x0, 0x3938700}}, 0x0) readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/33, 0x21}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000400)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "bd88818314ff7d84", "0b3ea924c47b25d7624cd362581725c7", "000400", "d5a1d50399459b68"}, 0x28) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r2) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r2) 1.488489319s ago: executing program 3 (id=4830): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffeffff, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) rename(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000007300)=@generic={&(0x7f0000000340)='./file1/file3\x00', r2}, 0x18) 1.487794569s ago: executing program 0 (id=4831): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='kfree\x00', r0}, 0x10) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x2) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000340), 0x6000) getgid() getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getgroups(0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x2, 0x8}}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@newtfilter={0x68, 0x28, 0xd27, 0x70bd28, 0x4, {0x0, 0x0, 0x0, r4, {0x1}, {0xd}, {0xfff1, 0x3d}}, [@filter_kind_options=@f_bpf={{0x8}, {0x34, 0x2, [@TCA_BPF_ACT={0x30, 0x1, [@m_bpf={0x2c, 0x17, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0x9, 0x1}}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000804}, 0x40) 1.265880932s ago: executing program 6 (id=4832): syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000740)='./file0\x00', 0x0, &(0x7f0000000000)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}, {@jqfmt_vfsv0}]}, 0xfd, 0x279, &(0x7f0000000780)="$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") mknodat(0xffffffffffffff9c, 0x0, 0x81c0, 0x0) renameat2(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) writev(0xffffffffffffffff, &(0x7f00000003c0), 0x0) writev(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x1000, 0x4}, &(0x7f00000001c0)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r0, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) rt_sigsuspend(&(0x7f00000002c0)={[0x225c17d03]}, 0x8) 1.058408265s ago: executing program 0 (id=4833): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syslog(0x2, 0x0, 0x0) r0 = socket$kcm(0x2d, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000340)={r0}) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x20000004}, 0x24040084) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x11, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0xd}, 0x104010, 0x0, 0x0, 0x4, 0x0, 0x5, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000140)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e20, 0x8, @ipv4={'\x00', '\xff\xff', @remote}, 0x5}}, 0x14) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000000)={0x7, {{0x2, 0x4e20, @private=0xa010100}}}, 0x88) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000100)='asymmetric\x00', 0x0, &(0x7f0000000140)="10", 0xfffff, r3) syz_clone(0x25000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x8e, &(0x7f0000000240)=ANY=[@ANYBLOB="bbbbbbbbbbbbe936e5922f9c00110101c225a07e3886a628b268817e1a3581cccc34d9a0112d54a55e10d02b7c1c59d56495e3fc7b5e3900d314b3ffb4fd79c56d5875c108de8964991229dc9e16b796b9e3874becec789cbdc54cb0f122face190f392d428fd75224761277063536ffe367f5626f104f948441108eca5ac5ec1c00000000000000000000000065ce5db0ecb9371d8000"], &(0x7f0000000100)={0x1, 0x4, [0xef1, 0x7ac, 0x81c, 0x2ae]}) 1.057180255s ago: executing program 2 (id=4834): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000002c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000200008385000000710000001801000002696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000300)='kmem_cache_free\x00', r0}, 0x18) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000004c0)=""/235) r1 = msgget$private(0x0, 0xfffffffffffffffd) msgrcv(r1, 0x0, 0x0, 0x1, 0x3000) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000100)={{0x0, 0x2, 0x40, 0x3, 0x7d}}) msgrcv(r1, 0x0, 0x0, 0x1, 0x0) msgsnd(r1, &(0x7f0000000400)={0x1}, 0x8, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x2, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x8, 0xe3, 0x80, 0x4}, {0xffff, 0x81, 0x7, 0x4}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) unshare(0x20000400) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) 1.056792465s ago: executing program 3 (id=4835): socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) symlinkat(0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x0, "ff00f7000000000000000000af88008300"}) r3 = syz_open_pts(r2, 0x141601) write(r3, &(0x7f0000000000)="d5", 0xfffffedf) close_range(r2, 0xffffffffffffffff, 0x0) 833.266498ms ago: executing program 0 (id=4836): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x9, 0x8, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x0) 831.061808ms ago: executing program 5 (id=4837): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x507344, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x2000, 0x1) gettid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) llistxattr(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='sys_enter\x00', r1}, 0x18) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000180), 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x200000000000000) 828.592338ms ago: executing program 3 (id=4838): syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @private=0xa010100}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x20}}, {0x2, 0x4e20, @local}, 0x114, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x2}) 455.15µs ago: executing program 0 (id=4839): fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x0, 0x0, 0x7fffffffffffffff, 0x80000000}) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000013000000850000008600000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mm_page_free\x00', r1}, 0x18) faccessat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32, @ANYRESDEC], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$inet(0x2, 0x80000, 0x8) pipe(&(0x7f0000000080)) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000200)="67d8902400aa303e97380e90231bdbdaf6a4bd866226b7cdb7c26858c4e4fd703be2f51ed6ddc4a47116ec2db75c7042a22491af0ffea4174a9de3350c14498396b28c7d1784d04aa38922721cb7816094cb82950fd012efd26d", 0x5a}, {&(0x7f0000000900)="0f198d5aa5caa1c55b84b414797cbdd4e8c576a921a070fc828060506683fd1106a961ac55b5b8ea3342ca7de5559ca2c14e05e42aed8ba14b2c78cb540f71a817d80fbf1945a046ebda494a8048a106a4d49d7f214735ada53397db3b203885ce39ee48d69465935eade21ce36e61826c52c82f038341d9bab5687c740ed3c18897094e7e1391eb84a4052e03c0c7c39ae86d454938f65e284620b99481c33d9f5e5b7a6c0d7548723f55b213c76be37f40c850c38e265758ebd8238257a146d6eced16fd658a784c928fea7a841db1a7fd6520442dae5fc0d3a3d3a5f16fcf6fe4f062ecdad7d0f3c6cd339339533c0ef28ad1e2729907094c3de93c1b1b00ad6df895d9907e4afb7565d3a8e9eaea020ed173c2179fb03e0944460989240a689c7fe795d310be4e7a6b778a903280dbf426b39c3603c49049980767e31edb997f59785184cbd7b907e0974f1073c745f71db0906cb51780f908fa61634af8ac85d9f04f3dff0a948e81cd3229a59aaeb00995358155343e3239588a0383e4df109d5ca24276d0d83a27d0e9bf681c1bbea12a6f3c20ad50f63430333bb327eb6ae32fe8809065bce26d2dc2fbb2b48d404637d61fd86852e0e1b6ccc6f75b1107aaa5f60ef45f94e953b3f213c3cb4ca4c716565078c666f84e1a99bb4cb5c7190648132f752753c938da6241607a742361d995188b23cb4b8269e98e822585695962620673433748e476f7cc3e37db88639c", 0x214}], 0x2}, 0x0) 0s ago: executing program 5 (id=4840): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x1000004, &(0x7f0000000d80)=ANY=[@ANYBLOB='shortname=lower,iocharset=iso8859-1,fmask=00000000000000000000066,uni_xlate=1,uni_xlate=0,fmask=00000000000000000000003,uid=', @ANYRESHEX=0x0, @ANYBLOB=',uni_xlate=0,utf8=1,check=strict,nonumtail=0,rodir,errors=continue,shortname=lower,umaQk=00000000000000000000007,rodir,sys_immutable,\x00', @ANYBLOB="1a961083c216e398b3852441fbacd14539194e81e2ec74ea00af4757fd632db5866c80f5b55492be6ad393d28d63023cd2e764a6bb41fa00d6c103356045fc3ade2c93339a56afb89b72a46f475c860a952e02dbf9c947a7cb75e89843f6d981fe7eed0ef37d5ab46550aa22", @ANYRES64], 0x6, 0x2bb, &(0x7f0000001240)="$eJzs3U9rI2UcB/DfpMkkKpgcPInggB48Ldu9ekmRXRB7cslBPWhxtyBNEFoo+AdjT169ePDgKxAEX4gX34HgVfBmhcLITGaapI1pIk3rls/n0l+feb4zv5k+tNNDn370yujgSRb7J1/+Fp1OEo1+9OM0iV40ovZ1zOl/GwDAs+w0z+PPfGKdXBIRnc21BQBs0Io//188r36+kbYAgA16/N777+zs7j58N8s68Wj0zfGg+M2++Dg5vrMfn8Qwnsb96MZZRPmi0IrybaEoH+V5Pm5mhV68PhofD4rk6MNfqvPv/BFR5rejG71y6Pxto8y/vftwO5uYyY+LPp6vrt8v8g+iGy+dh+fyDxbkY5DGG6/N9H8vuvHrx/FpDONJ2cQ0/9V2lr2Vf/fXFx8U7RX5ZHw8aJfzpvKtG/7SAAAAAAAAAAAAAAAAAAAAAABwh92r9s5pR7l/TzFU7b+zdVZ80oqs1pvfn2eST+oTze4PlOf5OI8f6v117mdZllcTp/lmvNyM5u3cNQAAAAAAAAAAAAAAAAAAAPy/HH32+cHecPj08FqKejeAZkT8/Tjiv56nPzPyaiyf3K6uuTccNqpyfk5zdiS26jlJxNI2ipu4psdyVfHcpZ6r4sef1j1h5+o5rcXXus6iXl0He8niZ9iOeqRTLZLv04jpnDRWvFb6b4fyWGf5pQsPdde+9/SFshgvmRPJssbe/H3y5KqR5OJdpOVTXRhvVcVM/MLaWGk9R2cSv/y9IrFbBwAAAAAAAAAAAAAAAAAAbNT0r38XHDxZGm3k7Y21BQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3avr//9coxlV4hclpHB41bvkeAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAuPv+CQAA///WoVye") renameat2(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file7\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f0000005c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) openat$vcs(0xffffffffffffff9c, 0x0, 0x401, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x88882, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r2, &(0x7f0000004200)='t', 0x1) sendfile(r2, r1, 0x0, 0x3ffff) sendfile(r2, r1, 0x0, 0x7ffff000) kernel console output (not intermixed with test programs): 92.859:12603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19149 comm="syz.3.3879" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff06f82e969 code=0x7ffc0000 [ 238.454535][ T29] audit: type=1400 audit(1747482592.859:12604): avc: denied { prog_load } for pid=19148 comm="syz.0.3878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 238.473792][ T29] audit: type=1400 audit(1747482592.859:12605): avc: denied { prog_load } for pid=19148 comm="syz.0.3878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 238.493124][ T29] audit: type=1400 audit(1747482592.859:12606): avc: denied { prog_load } for pid=19148 comm="syz.0.3878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 238.512352][ T29] audit: type=1400 audit(1747482592.859:12607): avc: denied { create } for pid=19148 comm="syz.0.3878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 238.533232][ T29] audit: type=1400 audit(1747482592.859:12608): avc: denied { create } for pid=19148 comm="syz.0.3878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 238.553989][ T29] audit: type=1400 audit(1747482592.869:12609): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 238.577315][ T29] audit: type=1326 audit(1747482592.869:12610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19149 comm="syz.3.3879" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff06f82e969 code=0x7ffc0000 [ 238.600830][ T29] audit: type=1400 audit(1747482592.869:12611): avc: denied { prog_load } for pid=19149 comm="syz.3.3879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 239.470607][T19158] netlink: 24 bytes leftover after parsing attributes in process `syz.5.3882'. [ 239.488848][T19158] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=19158 comm=syz.5.3882 [ 240.526895][T19179] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3886'. [ 243.477746][ T29] kauditd_printk_skb: 167 callbacks suppressed [ 243.477760][ T29] audit: type=1400 audit(1747482597.929:12779): avc: denied { prog_load } for pid=19231 comm="syz.5.3904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 243.505646][ T29] audit: type=1400 audit(1747482597.949:12780): avc: denied { create } for pid=19233 comm="syz.2.3905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=0 [ 243.525343][ T29] audit: type=1400 audit(1747482597.949:12781): avc: denied { prog_load } for pid=19233 comm="syz.2.3905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 243.544640][ T29] audit: type=1400 audit(1747482597.949:12782): avc: denied { allowed } for pid=19233 comm="syz.2.3905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 243.564151][ T29] audit: type=1400 audit(1747482597.949:12783): avc: denied { execute } for pid=19233 comm="syz.2.3905" path="/591/cpu.stat" dev="tmpfs" ino=3090 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 243.587343][ T29] audit: type=1400 audit(1747482597.949:12784): avc: denied { prog_load } for pid=19231 comm="syz.5.3904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 243.606541][ T29] audit: type=1400 audit(1747482597.949:12785): avc: denied { map_create } for pid=19231 comm="syz.5.3904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 243.625891][ T29] audit: type=1400 audit(1747482597.949:12786): avc: denied { prog_load } for pid=19231 comm="syz.5.3904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 243.645095][ T29] audit: type=1400 audit(1747482597.949:12787): avc: denied { prog_load } for pid=19231 comm="syz.5.3904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 243.664358][ T29] audit: type=1400 audit(1747482597.949:12788): avc: denied { prog_load } for pid=19231 comm="syz.5.3904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 244.146511][T19242] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3909'. [ 244.166636][T19242] bond1: entered promiscuous mode [ 244.172112][T19242] 8021q: adding VLAN 0 to HW filter on device macvlan0 [ 244.179742][T19242] bond1: left promiscuous mode [ 245.464537][T19297] netlink: 'syz.3.3918': attribute type 10 has an invalid length. [ 245.466235][T19294] hsr0 speed is unknown, defaulting to 1000 [ 245.472393][T19297] netlink: 40 bytes leftover after parsing attributes in process `syz.3.3918'. [ 245.478742][T19294] lo speed is unknown, defaulting to 1000 [ 245.507884][T19297] batadv0: entered promiscuous mode [ 245.513154][T19297] batadv0: entered allmulticast mode [ 245.518580][T19297] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 246.722984][T19331] hsr0 speed is unknown, defaulting to 1000 [ 246.729314][T19331] lo speed is unknown, defaulting to 1000 [ 248.484896][ T29] kauditd_printk_skb: 185 callbacks suppressed [ 248.484912][ T29] audit: type=1326 audit(1747482602.939:12974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19381 comm="syz.2.3935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fedcae15927 code=0x7ffc0000 [ 248.514618][ T29] audit: type=1326 audit(1747482602.939:12975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19381 comm="syz.2.3935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fedcadbab39 code=0x7ffc0000 [ 248.538155][ T29] audit: type=1326 audit(1747482602.939:12976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19381 comm="syz.2.3935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7fedcae1e969 code=0x7ffc0000 [ 248.561707][ T29] audit: type=1326 audit(1747482602.959:12977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19381 comm="syz.2.3935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fedcae15927 code=0x7ffc0000 [ 248.585240][ T29] audit: type=1326 audit(1747482602.959:12978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19381 comm="syz.2.3935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fedcadbab39 code=0x7ffc0000 [ 248.608703][ T29] audit: type=1326 audit(1747482602.959:12979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19381 comm="syz.2.3935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7fedcae1e969 code=0x7ffc0000 [ 248.632296][ T29] audit: type=1326 audit(1747482602.959:12980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19381 comm="syz.2.3935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fedcae15927 code=0x7ffc0000 [ 248.655822][ T29] audit: type=1326 audit(1747482602.959:12981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19381 comm="syz.2.3935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fedcadbab39 code=0x7ffc0000 [ 248.679431][ T29] audit: type=1326 audit(1747482602.959:12982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19381 comm="syz.2.3935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7fedcae1e969 code=0x7ffc0000 [ 248.702906][ T29] audit: type=1326 audit(1747482602.959:12983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19381 comm="syz.2.3935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedcae1e969 code=0x7ffc0000 [ 250.961802][T19400] netlink: 'syz.5.3944': attribute type 39 has an invalid length. [ 251.611207][T19408] netlink: 'syz.5.3947': attribute type 4 has an invalid length. [ 253.509865][ T29] kauditd_printk_skb: 101 callbacks suppressed [ 253.509877][ T29] audit: type=1400 audit(1747482607.969:13085): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 253.539386][ T29] audit: type=1400 audit(1747482607.969:13086): avc: denied { read write } for pid=8561 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 253.812937][ T29] audit: type=1400 audit(1747482608.269:13087): avc: denied { prog_load } for pid=19429 comm="syz.2.3957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 253.832277][ T29] audit: type=1400 audit(1747482608.269:13088): avc: denied { prog_load } for pid=19429 comm="syz.2.3957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 253.851592][ T29] audit: type=1400 audit(1747482608.269:13089): avc: denied { create } for pid=19429 comm="syz.2.3957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 253.871932][ T29] audit: type=1400 audit(1747482608.269:13090): avc: denied { read } for pid=19429 comm="syz.2.3957" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=0 [ 253.896276][ T29] audit: type=1400 audit(1747482608.309:13091): avc: denied { create } for pid=19431 comm="syz.0.3958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 253.916100][ T29] audit: type=1400 audit(1747482608.309:13092): avc: denied { create } for pid=19431 comm="syz.0.3958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 253.935827][ T29] audit: type=1400 audit(1747482608.309:13093): avc: denied { map_create } for pid=19431 comm="syz.0.3958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 253.955175][ T29] audit: type=1400 audit(1747482608.319:13094): avc: denied { prog_load } for pid=19431 comm="syz.0.3958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.048377][ T29] kauditd_printk_skb: 142 callbacks suppressed [ 259.048389][ T29] audit: type=1400 audit(1747482613.499:13237): avc: denied { map_create } for pid=19492 comm="syz.2.3983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.073970][ T29] audit: type=1400 audit(1747482613.499:13238): avc: denied { prog_load } for pid=19492 comm="syz.2.3983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.093221][ T29] audit: type=1400 audit(1747482613.499:13239): avc: denied { prog_load } for pid=19492 comm="syz.2.3983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.260742][ T29] audit: type=1400 audit(1747482613.719:13240): avc: denied { map_create } for pid=19494 comm="syz.0.3984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.280160][ T29] audit: type=1400 audit(1747482613.719:13241): avc: denied { prog_load } for pid=19494 comm="syz.0.3984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.299460][ T29] audit: type=1400 audit(1747482613.719:13242): avc: denied { prog_load } for pid=19494 comm="syz.0.3984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.375620][ T29] audit: type=1400 audit(1747482613.829:13243): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 259.469198][ T29] audit: type=1400 audit(1747482613.929:13244): avc: denied { map_create } for pid=19500 comm="syz.5.3985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.471454][T19501] netlink: 'syz.5.3985': attribute type 4 has an invalid length. [ 259.488689][ T29] audit: type=1400 audit(1747482613.929:13245): avc: denied { prog_load } for pid=19500 comm="syz.5.3985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.528261][ T29] audit: type=1400 audit(1747482613.979:13246): avc: denied { read write } for pid=8561 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 260.334210][T19513] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3990'. [ 264.012624][T19553] hsr0 speed is unknown, defaulting to 1000 [ 264.018883][T19553] lo speed is unknown, defaulting to 1000 [ 264.100836][ T29] kauditd_printk_skb: 142 callbacks suppressed [ 264.100848][ T29] audit: type=1400 audit(1747482618.559:13389): avc: denied { create } for pid=19547 comm="syz.5.4004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 264.177890][ T29] audit: type=1400 audit(1747482618.629:13390): avc: denied { prog_load } for pid=19575 comm="syz.3.4007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 264.197190][ T29] audit: type=1400 audit(1747482618.629:13391): avc: denied { prog_load } for pid=19575 comm="syz.3.4007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 264.216524][ T29] audit: type=1400 audit(1747482618.629:13392): avc: denied { prog_load } for pid=19575 comm="syz.3.4007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 264.235848][ T29] audit: type=1400 audit(1747482618.629:13393): avc: denied { read write } for pid=8561 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 264.295434][ T29] audit: type=1400 audit(1747482618.749:13394): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 264.387915][ T29] audit: type=1400 audit(1747482618.839:13395): avc: denied { prog_load } for pid=19580 comm="syz.6.4008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 264.407836][ T29] audit: type=1400 audit(1747482618.849:13396): avc: denied { prog_load } for pid=19580 comm="syz.6.4008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 264.427221][ T29] audit: type=1326 audit(1747482618.849:13397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19580 comm="syz.6.4008" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f062f4ee969 code=0x7ffc0000 [ 264.450974][ T29] audit: type=1326 audit(1747482618.849:13398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19580 comm="syz.6.4008" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f062f4ee969 code=0x7ffc0000 [ 268.230523][T19618] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4024'. [ 268.241525][T19618] vlan0: entered promiscuous mode [ 268.246549][T19618] hsr0: entered promiscuous mode [ 268.660613][T19624] hsr0 speed is unknown, defaulting to 1000 [ 268.666829][T19624] lo speed is unknown, defaulting to 1000 [ 268.892911][T19649] hsr0 speed is unknown, defaulting to 1000 [ 268.899171][T19649] lo speed is unknown, defaulting to 1000 [ 269.203246][ T29] kauditd_printk_skb: 121 callbacks suppressed [ 269.203260][ T29] audit: type=1400 audit(1747482623.659:13520): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 269.511747][ T29] audit: type=1400 audit(1747482623.969:13521): avc: denied { prog_load } for pid=19677 comm="syz.5.4028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 269.531288][ T29] audit: type=1400 audit(1747482623.969:13522): avc: denied { create } for pid=19677 comm="syz.5.4028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 269.551313][ T29] audit: type=1400 audit(1747482623.969:13523): avc: denied { open } for pid=19677 comm="syz.5.4028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 269.570931][ T29] audit: type=1400 audit(1747482623.969:13524): avc: denied { map_create } for pid=19677 comm="syz.5.4028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 269.590321][ T29] audit: type=1400 audit(1747482623.969:13525): avc: denied { prog_load } for pid=19677 comm="syz.5.4028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 269.609661][ T29] audit: type=1400 audit(1747482623.969:13526): avc: denied { prog_load } for pid=19677 comm="syz.5.4028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 269.628896][ T29] audit: type=1400 audit(1747482623.969:13527): avc: denied { prog_load } for pid=19677 comm="syz.5.4028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 269.648076][ T29] audit: type=1400 audit(1747482623.969:13528): avc: denied { map_create } for pid=19677 comm="syz.5.4028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 269.667461][ T29] audit: type=1400 audit(1747482623.999:13529): avc: denied { read write } for pid=8561 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 272.277157][T19706] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4041'. [ 272.292557][T19706] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.305711][T19706] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4041'. [ 272.315918][T19706] bond0 (unregistering): Released all slaves [ 272.485394][T19773] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4042'. [ 273.984232][T19810] binfmt_misc: register: failed to install interpreter file ./file2 [ 274.242786][ T29] kauditd_printk_skb: 145 callbacks suppressed [ 274.242796][ T29] audit: type=1400 audit(1747482628.699:13675): avc: denied { prog_load } for pid=19811 comm="syz.0.4051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 274.268178][ T29] audit: type=1400 audit(1747482628.699:13676): avc: denied { create } for pid=19811 comm="syz.0.4051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 274.287801][ T29] audit: type=1400 audit(1747482628.699:13677): avc: denied { create } for pid=19811 comm="syz.0.4051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 274.399959][ T29] audit: type=1400 audit(1747482628.859:13678): avc: denied { create } for pid=19814 comm="syz.2.4052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 274.402742][T19815] netlink: 28 bytes leftover after parsing attributes in process `syz.2.4052'. [ 274.422017][ T29] audit: type=1400 audit(1747482628.859:13679): avc: denied { create } for pid=19814 comm="syz.2.4052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 274.428810][T19815] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4052'. [ 274.823573][ T29] audit: type=1400 audit(1747482629.279:13680): avc: denied { prog_load } for pid=19818 comm="syz.5.4053" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 274.830856][T19821] pim6reg1: entered promiscuous mode [ 274.848199][T19821] pim6reg1: entered allmulticast mode [ 274.850846][ T29] audit: type=1400 audit(1747482629.279:13681): avc: denied { prog_load } for pid=19820 comm="syz.3.4054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 274.873023][ T29] audit: type=1400 audit(1747482629.279:13682): avc: denied { map_create } for pid=19820 comm="syz.3.4054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 274.892343][ T29] audit: type=1400 audit(1747482629.279:13683): avc: denied { prog_load } for pid=19820 comm="syz.3.4054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 274.911546][ T29] audit: type=1400 audit(1747482629.279:13684): avc: denied { prog_load } for pid=19820 comm="syz.3.4054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 275.492904][T19845] netlink: 'syz.5.4058': attribute type 1 has an invalid length. [ 275.506704][T19845] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.518821][T19845] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4058'. [ 275.528954][T19845] bond0 (unregistering): Released all slaves [ 277.226587][T19924] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4062'. [ 277.241394][T19924] 8021q: adding VLAN 0 to HW filter on device bond2 [ 277.258950][T19924] 8021q: adding VLAN 0 to HW filter on device bond2 [ 277.265977][T19924] bond2: (slave vti0): The slave device specified does not support setting the MAC address [ 277.276528][T19924] bond2: (slave vti0): Error -95 calling set_mac_address [ 277.308059][T19962] bond2: (slave dummy0): Error -99 calling set_mac_address [ 279.327722][ T29] kauditd_printk_skb: 360 callbacks suppressed [ 279.327736][ T29] audit: type=1400 audit(1747482633.779:14045): avc: denied { map_create } for pid=19980 comm="syz.0.4071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 279.353290][ T29] audit: type=1400 audit(1747482633.779:14046): avc: denied { prog_load } for pid=19980 comm="syz.0.4071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 279.372509][ T29] audit: type=1400 audit(1747482633.779:14047): avc: denied { prog_load } for pid=19980 comm="syz.0.4071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 279.391805][ T29] audit: type=1400 audit(1747482633.779:14048): avc: denied { prog_load } for pid=19980 comm="syz.0.4071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 279.411062][ T29] audit: type=1400 audit(1747482633.779:14049): avc: denied { prog_load } for pid=19980 comm="syz.0.4071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 279.430328][ T29] audit: type=1400 audit(1747482633.779:14050): avc: denied { prog_load } for pid=19980 comm="syz.0.4071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 279.449630][ T29] audit: type=1400 audit(1747482633.799:14051): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 279.472922][ T29] audit: type=1400 audit(1747482633.799:14052): avc: denied { read } for pid=19982 comm="syz.5.4072" dev="nsfs" ino=4026533341 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 279.494307][ T29] audit: type=1400 audit(1747482633.799:14053): avc: denied { read } for pid=19982 comm="syz.5.4072" dev="nsfs" ino=4026533341 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 279.515715][ T29] audit: type=1400 audit(1747482633.799:14054): avc: denied { create } for pid=19982 comm="syz.5.4072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 279.967307][T19992] netlink: 'syz.0.4075': attribute type 4 has an invalid length. [ 279.977536][ T9] lo speed is unknown, defaulting to 1000 [ 279.979350][T19992] netlink: 'syz.0.4075': attribute type 4 has an invalid length. [ 279.983312][ T9] sxz0: Port: 1 Link DOWN [ 279.996095][T15281] lo speed is unknown, defaulting to 1000 [ 280.001926][T15281] sxz0: Port: 1 Link ACTIVE [ 281.298906][T20016] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.4083'. [ 281.308589][T20015] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.4083'. [ 284.414276][ T29] kauditd_printk_skb: 106 callbacks suppressed [ 284.414289][ T29] audit: type=1400 audit(1747482638.869:14161): avc: denied { prog_load } for pid=20053 comm="syz.0.4094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 284.439935][ T29] audit: type=1400 audit(1747482638.869:14162): avc: denied { create } for pid=20053 comm="syz.0.4094" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=0 [ 284.460851][ T29] audit: type=1400 audit(1747482638.909:14163): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 284.835269][ T29] audit: type=1400 audit(1747482639.289:14164): avc: denied { prog_load } for pid=20055 comm="syz.5.4095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 284.854807][ T29] audit: type=1400 audit(1747482639.289:14165): avc: denied { open } for pid=20055 comm="syz.5.4095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 284.874320][ T29] audit: type=1400 audit(1747482639.309:14166): avc: denied { read write } for pid=20055 comm="syz.5.4095" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 284.898604][ T29] audit: type=1326 audit(1747482639.339:14167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20055 comm="syz.5.4095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb32ea2e969 code=0x7ffc0000 [ 284.922286][ T29] audit: type=1326 audit(1747482639.339:14168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20055 comm="syz.5.4095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb32ea2e969 code=0x7ffc0000 [ 284.945831][ T29] audit: type=1326 audit(1747482639.339:14169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20055 comm="syz.5.4095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb32ea2e969 code=0x7ffc0000 [ 284.969468][ T29] audit: type=1400 audit(1747482639.339:14170): avc: denied { prog_load } for pid=20055 comm="syz.5.4095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.971417][T20086] netlink: 60 bytes leftover after parsing attributes in process `syz.3.4106'. [ 287.801153][T20104] netlink: 'syz.5.4111': attribute type 1 has an invalid length. [ 287.815795][T20104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 287.830083][T20104] bond0: (slave veth0_to_bond): Enslaving as an active interface with a down link [ 287.845013][T20104] vlan0: entered allmulticast mode [ 287.850150][T20104] veth1: entered allmulticast mode [ 287.855537][T20104] bond0: (slave vlan0): Opening slave failed [ 288.259728][T20149] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4115'. [ 289.722465][ T29] kauditd_printk_skb: 204 callbacks suppressed [ 289.722480][ T29] audit: type=1400 audit(1747482644.179:14375): avc: denied { prog_load } for pid=20166 comm="syz.2.4122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 289.750377][ T29] audit: type=1400 audit(1747482644.179:14376): avc: denied { prog_load } for pid=20166 comm="syz.2.4122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 289.769662][ T29] audit: type=1400 audit(1747482644.179:14377): avc: denied { mounton } for pid=20166 comm="syz.2.4122" path="/644/file0" dev="tmpfs" ino=3365 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 289.929843][ T29] audit: type=1400 audit(1747482644.389:14378): avc: denied { map_create } for pid=20168 comm="syz.3.4123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 289.952048][ T29] audit: type=1400 audit(1747482644.409:14379): avc: denied { prog_load } for pid=20168 comm="syz.3.4123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 289.954587][T20169] pim6reg1: entered promiscuous mode [ 289.971329][ T29] audit: type=1400 audit(1747482644.409:14380): avc: denied { prog_load } for pid=20168 comm="syz.3.4123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 289.976597][T20169] pim6reg1: entered allmulticast mode [ 289.995756][ T29] audit: type=1400 audit(1747482644.409:14381): avc: denied { prog_load } for pid=20168 comm="syz.3.4123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 289.995776][ T29] audit: type=1400 audit(1747482644.409:14382): avc: denied { prog_load } for pid=20168 comm="syz.3.4123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.138276][ T29] audit: type=1400 audit(1747482644.589:14383): avc: denied { prog_load } for pid=20174 comm="syz.0.4124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.157892][ T29] audit: type=1400 audit(1747482644.599:14384): avc: denied { prog_load } for pid=20174 comm="syz.0.4124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.762716][T20181] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4127'. [ 290.780958][T20181] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=20181 comm=syz.0.4127 [ 292.680986][T20205] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4133'. [ 292.682649][T20203] netlink: 'syz.0.4132': attribute type 27 has an invalid length. [ 292.712115][T15281] lo speed is unknown, defaulting to 1000 [ 292.717903][T15281] sxz0: Port: 1 Link DOWN [ 295.013109][ T29] kauditd_printk_skb: 83 callbacks suppressed [ 295.013124][ T29] audit: type=1400 audit(1747482649.469:14468): avc: denied { prog_load } for pid=20232 comm="syz.0.4140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 295.038843][ T29] audit: type=1400 audit(1747482649.469:14469): avc: denied { mounton } for pid=20232 comm="+}[@" path="/880/file0" dev="tmpfs" ino=4590 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 295.061255][ T29] audit: type=1400 audit(1747482649.499:14470): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 295.433843][ T29] audit: type=1400 audit(1747482649.889:14471): avc: denied { open } for pid=20234 comm="syz.5.4141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 295.453726][ T29] audit: type=1400 audit(1747482649.889:14472): avc: denied { open } for pid=20234 comm="syz.5.4141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 295.473262][ T29] audit: type=1400 audit(1747482649.889:14473): avc: denied { map_create } for pid=20234 comm="syz.5.4141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 295.492537][ T29] audit: type=1400 audit(1747482649.889:14474): avc: denied { prog_load } for pid=20234 comm="syz.5.4141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 295.511840][ T29] audit: type=1400 audit(1747482649.889:14475): avc: denied { bpf } for pid=20234 comm="syz.5.4141" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 295.532488][ T29] audit: type=1400 audit(1747482649.889:14476): avc: denied { prog_load } for pid=20234 comm="syz.5.4141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 295.551667][ T29] audit: type=1400 audit(1747482649.889:14477): avc: denied { prog_load } for pid=20234 comm="syz.5.4141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 297.782859][T20257] netlink: 'syz.5.4150': attribute type 6 has an invalid length. [ 297.995711][T20259] xt_connbytes: Forcing CT accounting to be enabled [ 298.002380][T20259] Cannot find add_set index 0 as target [ 298.436617][T20263] netlink: 'syz.2.4153': attribute type 1 has an invalid length. [ 298.454796][T20263] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4153'. [ 298.466264][T20263] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 298.474098][T20263] bond3: (slave batadv1): Enslaving as a backup interface with an up link [ 298.486746][T20263] bond3 (unregistering): (slave batadv1): Releasing backup interface [ 298.495973][T20263] bond3 (unregistering): Released all slaves [ 298.976979][T20336] hsr0 speed is unknown, defaulting to 1000 [ 298.983286][T20336] lo speed is unknown, defaulting to 1000 [ 299.075013][T20360] hsr0 speed is unknown, defaulting to 1000 [ 299.081331][T20360] lo speed is unknown, defaulting to 1000 [ 300.052274][ T29] kauditd_printk_skb: 100 callbacks suppressed [ 300.052288][ T29] audit: type=1400 audit(1747482654.509:14578): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 300.123563][ T29] audit: type=1400 audit(1747482654.579:14579): avc: denied { map_create } for pid=20392 comm="syz.2.4159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 300.142961][ T29] audit: type=1400 audit(1747482654.579:14580): avc: denied { prog_load } for pid=20392 comm="syz.2.4159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 300.162215][ T29] audit: type=1400 audit(1747482654.579:14581): avc: denied { prog_load } for pid=20392 comm="syz.2.4159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 300.181421][ T29] audit: type=1400 audit(1747482654.579:14582): avc: denied { prog_load } for pid=20392 comm="syz.2.4159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 300.200608][ T29] audit: type=1400 audit(1747482654.579:14583): avc: denied { prog_load } for pid=20392 comm="syz.2.4159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 300.329223][ T29] audit: type=1400 audit(1747482654.789:14584): avc: denied { create } for pid=20394 comm="syz.0.4160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 300.363378][ T29] audit: type=1400 audit(1747482654.809:14585): avc: denied { prog_load } for pid=20394 comm="syz.0.4160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 300.382685][ T29] audit: type=1400 audit(1747482654.809:14586): avc: denied { create } for pid=20394 comm="syz.0.4160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 300.402356][ T29] audit: type=1400 audit(1747482654.809:14587): avc: denied { prog_load } for pid=20398 comm="syz.3.4163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 305.156661][ T29] kauditd_printk_skb: 98 callbacks suppressed [ 305.156674][ T29] audit: type=1400 audit(1747482659.609:14686): avc: denied { create } for pid=20442 comm="syz.0.4178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 305.182508][ T29] audit: type=1400 audit(1747482659.609:14687): avc: denied { create } for pid=20442 comm="syz.0.4178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 305.202301][ T29] audit: type=1400 audit(1747482659.609:14688): avc: denied { map_create } for pid=20442 comm="syz.0.4178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 305.221585][ T29] audit: type=1400 audit(1747482659.609:14689): avc: denied { prog_load } for pid=20442 comm="syz.0.4178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 305.240909][ T29] audit: type=1400 audit(1747482659.649:14690): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 305.369258][ T29] audit: type=1400 audit(1747482659.829:14691): avc: denied { create } for pid=20444 comm="syz.5.4179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 305.394907][ T29] audit: type=1400 audit(1747482659.849:14692): avc: denied { map_create } for pid=20444 comm="syz.5.4179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 305.414393][ T29] audit: type=1400 audit(1747482659.849:14693): avc: denied { prog_load } for pid=20444 comm="syz.5.4179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 305.433719][ T29] audit: type=1400 audit(1747482659.849:14694): avc: denied { prog_load } for pid=20444 comm="syz.5.4179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 305.453005][ T29] audit: type=1400 audit(1747482659.849:14695): avc: denied { create } for pid=20444 comm="syz.5.4179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 306.238210][T20465] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4185'. [ 310.260711][ T29] kauditd_printk_skb: 130 callbacks suppressed [ 310.260726][ T29] audit: type=1400 audit(1747482664.719:14826): avc: denied { map_create } for pid=20512 comm="syz.2.4202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.279674][T20513] syzkaller0: entered promiscuous mode [ 310.286811][ T29] audit: type=1400 audit(1747482664.719:14827): avc: denied { prog_load } for pid=20512 comm="syz.2.4202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.291816][T20513] syzkaller0: entered allmulticast mode [ 310.310988][ T29] audit: type=1400 audit(1747482664.719:14828): avc: denied { prog_load } for pid=20512 comm="syz.2.4202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.469343][ T29] audit: type=1400 audit(1747482664.929:14829): avc: denied { map_create } for pid=20519 comm="syz.3.4203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.488933][ T29] audit: type=1400 audit(1747482664.929:14830): avc: denied { prog_load } for pid=20519 comm="syz.3.4203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.508190][ T29] audit: type=1400 audit(1747482664.929:14831): avc: denied { prog_load } for pid=20519 comm="syz.3.4203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.527572][ T29] audit: type=1400 audit(1747482664.929:14832): avc: denied { create } for pid=20519 comm="syz.3.4203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 310.548342][ T29] audit: type=1400 audit(1747482664.929:14833): avc: denied { create } for pid=20519 comm="syz.3.4203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 310.569103][ T29] audit: type=1400 audit(1747482664.949:14834): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.676339][ T29] audit: type=1400 audit(1747482665.129:14835): avc: denied { prog_load } for pid=20521 comm="syz.0.4204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 311.771392][T20528] serio: Serial port ptm0 [ 312.591363][T20541] pim6reg1: entered promiscuous mode [ 312.596919][T20541] pim6reg1: entered allmulticast mode [ 313.645827][T20557] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4215'. [ 313.660287][T20557] 8021q: adding VLAN 0 to HW filter on device bond2 [ 313.672002][T20557] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4215'. [ 313.682164][T20557] bond2 (unregistering): Released all slaves [ 315.560677][ T29] kauditd_printk_skb: 90 callbacks suppressed [ 315.560687][ T29] audit: type=1400 audit(1747482670.019:14926): avc: denied { open } for pid=20632 comm="syz.0.4220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 315.586783][ T29] audit: type=1400 audit(1747482670.019:14927): avc: denied { create } for pid=20632 comm="syz.0.4220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 315.607525][ T29] audit: type=1400 audit(1747482670.049:14928): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 315.980869][ T29] audit: type=1400 audit(1747482670.439:14929): avc: denied { map_create } for pid=20637 comm="syz.0.4222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 316.002386][ T29] audit: type=1400 audit(1747482670.439:14930): avc: denied { prog_load } for pid=20637 comm="syz.0.4222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 316.021675][ T29] audit: type=1400 audit(1747482670.439:14931): avc: denied { name_bind } for pid=20637 comm="syz.0.4222" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 316.043509][ T29] audit: type=1400 audit(1747482670.459:14932): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 316.401042][ T29] audit: type=1400 audit(1747482670.859:14933): avc: denied { prog_load } for pid=20639 comm="syz.2.4223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 316.407327][T20640] pim6reg1: entered promiscuous mode [ 316.423018][ T29] audit: type=1400 audit(1747482670.859:14934): avc: denied { map_create } for pid=20639 comm="syz.2.4223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 316.425550][T20640] pim6reg1: entered allmulticast mode [ 316.450322][ T29] audit: type=1400 audit(1747482670.859:14935): avc: denied { prog_load } for pid=20639 comm="syz.2.4223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 318.719772][T20651] syzkaller0: entered promiscuous mode [ 318.725390][T20651] syzkaller0: entered allmulticast mode [ 319.151691][T20661] hsr0 speed is unknown, defaulting to 1000 [ 319.157905][T20661] lo speed is unknown, defaulting to 1000 [ 320.625209][ T29] kauditd_printk_skb: 63 callbacks suppressed [ 320.625224][ T29] audit: type=1400 audit(1747482675.079:14999): avc: denied { read } for pid=20701 comm="syz.2.4237" dev="nsfs" ino=4026533342 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 320.656708][ T29] audit: type=1400 audit(1747482675.079:15000): avc: denied { read write } for pid=20702 comm="syz.0.4239" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 320.680456][ T29] audit: type=1400 audit(1747482675.089:15001): avc: denied { map_create } for pid=20703 comm="syz.3.4238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 320.699772][ T29] audit: type=1400 audit(1747482675.089:15002): avc: denied { prog_load } for pid=20703 comm="syz.3.4238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 320.719078][ T29] audit: type=1400 audit(1747482675.089:15003): avc: denied { prog_load } for pid=20703 comm="syz.3.4238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 320.738339][ T29] audit: type=1400 audit(1747482675.089:15004): avc: denied { mount } for pid=20703 comm="syz.3.4238" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=0 [ 320.760767][ T29] audit: type=1400 audit(1747482675.099:15005): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 320.785105][ T29] audit: type=1400 audit(1747482675.099:15006): avc: denied { allowed } for pid=20701 comm="syz.2.4237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 320.804649][ T29] audit: type=1400 audit(1747482675.099:15007): avc: denied { prog_load } for pid=20701 comm="syz.2.4237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 320.823873][ T29] audit: type=1400 audit(1747482675.109:15008): avc: denied { create } for pid=20702 comm="syz.0.4239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 322.128550][T20732] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4246'. [ 322.137914][T20732] netlink: 28 bytes leftover after parsing attributes in process `syz.0.4246'. [ 323.813023][T20751] netlink: 28 bytes leftover after parsing attributes in process `syz.6.4254'. [ 323.822079][T20751] netlink: 28 bytes leftover after parsing attributes in process `syz.6.4254'. [ 325.632160][ T29] kauditd_printk_skb: 146 callbacks suppressed [ 325.632174][ T29] audit: type=1400 audit(1747482680.089:15155): avc: denied { prog_load } for pid=20774 comm="syz.0.4263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 325.661003][ T29] audit: type=1400 audit(1747482680.089:15156): avc: denied { map_create } for pid=20774 comm="syz.0.4263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 325.707949][ T29] audit: type=1400 audit(1747482680.159:15157): avc: denied { prog_load } for pid=20772 comm="syz.6.4262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 325.729673][ T29] audit: type=1400 audit(1747482680.189:15158): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 325.755671][ T29] audit: type=1400 audit(1747482680.209:15159): avc: denied { create } for pid=20778 comm="syz.5.4264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 325.802026][ T29] audit: type=1400 audit(1747482680.229:15160): avc: denied { map_create } for pid=20778 comm="syz.5.4264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 325.821454][ T29] audit: type=1400 audit(1747482680.239:15161): avc: denied { prog_load } for pid=20772 comm="syz.6.4262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 325.845310][ T29] audit: type=1400 audit(1747482680.289:15162): avc: denied { read write } for pid=8561 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.889999][ T29] audit: type=1400 audit(1747482680.349:15163): avc: denied { read write } for pid=10679 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.959602][ T29] audit: type=1400 audit(1747482680.419:15164): avc: denied { prog_load } for pid=20783 comm="syz.0.4265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 327.228364][T20801] futex_wake_op: syz.6.4272 tries to shift op by -1; fix this program [ 329.567337][T20832] binfmt_misc: register: failed to install interpreter file ./file2 [ 329.568875][T20834] binfmt_misc: register: failed to install interpreter file ./file2 [ 329.783728][T20836] netlink: 'syz.2.4284': attribute type 4 has an invalid length. [ 329.795550][T20836] netlink: 'syz.2.4284': attribute type 4 has an invalid length. [ 330.692245][ T29] kauditd_printk_skb: 131 callbacks suppressed [ 330.692260][ T29] audit: type=1400 audit(1747482685.149:15296): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 330.948791][ T29] audit: type=1400 audit(1747482685.409:15297): avc: denied { prog_load } for pid=20847 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.957581][T20848] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 330.967558][ T29] audit: type=1400 audit(1747482685.409:15298): avc: denied { prog_load } for pid=20847 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.994661][ T29] audit: type=1400 audit(1747482685.409:15299): avc: denied { prog_load } for pid=20847 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 331.013431][ T29] audit: type=1400 audit(1747482685.409:15300): avc: denied { read write } for pid=20847 comm="+}[@" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 331.109622][ T29] audit: type=1400 audit(1747482685.569:15301): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 331.174680][ T29] audit: type=1400 audit(1747482685.629:15302): avc: denied { prog_load } for pid=20857 comm="syz.0.4291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 331.219437][ T29] audit: type=1400 audit(1747482685.679:15303): avc: denied { prog_load } for pid=20863 comm="syz.5.4292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 331.240645][ T29] audit: type=1400 audit(1747482685.699:15304): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 331.398457][ T29] audit: type=1400 audit(1747482685.849:15305): avc: denied { allowed } for pid=20868 comm="syz.2.4293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 331.813319][T20875] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4296'. [ 331.822336][T20875] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4296'. [ 331.833464][T20875] netdevsim netdevsim6 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 331.842205][T20875] netdevsim netdevsim6 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 331.850949][T20875] netdevsim netdevsim6 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 331.859806][T20875] netdevsim netdevsim6 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 333.599430][T20913] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4309'. [ 333.616504][T20913] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4309'. [ 336.135016][ T29] kauditd_printk_skb: 154 callbacks suppressed [ 336.135030][ T29] audit: type=1400 audit(1747482690.589:15460): avc: denied { create } for pid=20970 comm="syz.0.4320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 336.162103][ T29] audit: type=1400 audit(1747482690.589:15461): avc: denied { open } for pid=20970 comm="syz.0.4320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 336.181561][ T29] audit: type=1400 audit(1747482690.589:15462): avc: denied { map_create } for pid=20970 comm="syz.0.4320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 336.200933][ T29] audit: type=1400 audit(1747482690.589:15463): avc: denied { name_bind } for pid=20970 comm="syz.0.4320" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 336.363532][ T29] audit: type=1400 audit(1747482690.819:15464): avc: denied { map_create } for pid=20973 comm="syz.5.4321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 336.382906][ T29] audit: type=1400 audit(1747482690.819:15465): avc: denied { map_create } for pid=20973 comm="syz.5.4321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 336.402384][ T29] audit: type=1400 audit(1747482690.819:15466): avc: denied { prog_load } for pid=20973 comm="syz.5.4321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 336.421605][ T29] audit: type=1400 audit(1747482690.819:15467): avc: denied { name_bind } for pid=20973 comm="syz.5.4321" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 336.481648][ T29] audit: type=1400 audit(1747482690.939:15468): avc: denied { read write } for pid=8561 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 336.779887][ T29] audit: type=1400 audit(1747482691.239:15469): avc: denied { create } for pid=20977 comm="syz.2.4322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 341.190079][ T29] kauditd_printk_skb: 360 callbacks suppressed [ 341.190094][ T29] audit: type=1400 audit(1747482695.649:15830): avc: denied { open } for pid=21031 comm="syz.0.4340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 341.220662][ T29] audit: type=1400 audit(1747482695.649:15831): avc: denied { map_create } for pid=21031 comm="syz.0.4340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 341.226811][T21034] pim6reg1: entered promiscuous mode [ 341.240272][ T29] audit: type=1400 audit(1747482695.649:15832): avc: denied { prog_load } for pid=21031 comm="syz.0.4340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 341.245474][T21034] pim6reg1: entered allmulticast mode [ 341.264662][ T29] audit: type=1400 audit(1747482695.649:15833): avc: denied { prog_load } for pid=21031 comm="syz.0.4340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 341.289318][ T29] audit: type=1400 audit(1747482695.649:15834): avc: denied { prog_load } for pid=21031 comm="syz.0.4340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 341.308540][ T29] audit: type=1400 audit(1747482695.649:15835): avc: denied { mount } for pid=21031 comm="syz.0.4340" name="/" dev="ramfs" ino=41516 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=0 [ 341.330984][ T29] audit: type=1400 audit(1747482695.669:15836): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 341.354335][ T29] audit: type=1400 audit(1747482695.679:15837): avc: denied { prog_load } for pid=21033 comm="syz.5.4341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 341.373542][ T29] audit: type=1400 audit(1747482695.679:15838): avc: denied { map_create } for pid=21033 comm="syz.5.4341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 341.392853][ T29] audit: type=1400 audit(1747482695.679:15839): avc: denied { prog_load } for pid=21033 comm="syz.5.4341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 341.429260][T21043] netlink: 'syz.2.4345': attribute type 13 has an invalid length. [ 341.437122][T21043] lo: entered promiscuous mode [ 341.442085][T21043] lo: entered allmulticast mode [ 341.447777][T21043] tunl0: entered promiscuous mode [ 341.452895][T21043] tunl0: entered allmulticast mode [ 341.460097][T21043] gre0: entered promiscuous mode [ 341.465131][T21043] gre0: entered allmulticast mode [ 341.471714][T21043] gretap0: entered promiscuous mode [ 341.476921][T21043] gretap0: entered allmulticast mode [ 341.485116][T21043] erspan0: entered promiscuous mode [ 341.490364][T21043] erspan0: entered allmulticast mode [ 341.498622][T21043] ip_vti0: entered promiscuous mode [ 341.503837][T21043] ip_vti0: entered allmulticast mode [ 341.509827][T21043] ip6_vti0: entered promiscuous mode [ 341.515103][T21043] ip6_vti0: entered allmulticast mode [ 341.521157][T21043] sit0: entered promiscuous mode [ 341.526123][T21043] sit0: entered allmulticast mode [ 341.531687][T21043] ip6tnl0: entered promiscuous mode [ 341.536932][T21043] ip6tnl0: entered allmulticast mode [ 341.542649][T21043] ip6gre0: entered promiscuous mode [ 341.547840][T21043] ip6gre0: entered allmulticast mode [ 341.553698][T21043] ip6gretap0: entered promiscuous mode [ 341.559220][T21043] ip6gretap0: entered allmulticast mode [ 341.567388][T21043] bridge0: entered promiscuous mode [ 341.572683][T21043] bridge0: entered allmulticast mode [ 341.578876][T21043] $Hÿ: entered promiscuous mode [ 341.583938][T21043] bond_slave_0: entered promiscuous mode [ 341.589658][T21043] bond_slave_1: entered promiscuous mode [ 341.595432][T21043] $Hÿ: entered allmulticast mode [ 341.600577][T21043] bond_slave_0: entered allmulticast mode [ 341.606370][T21043] bond_slave_1: entered allmulticast mode [ 341.613458][T21043] team0: entered promiscuous mode [ 341.618510][T21043] team_slave_0: entered promiscuous mode [ 341.624159][T21043] team_slave_1: entered promiscuous mode [ 341.630115][T21043] hsr_slave_0: entered promiscuous mode [ 341.635753][T21043] team0: entered allmulticast mode [ 341.640863][T21043] team_slave_0: entered allmulticast mode [ 341.646614][T21043] team_slave_1: entered allmulticast mode [ 341.652344][T21043] hsr_slave_0: entered allmulticast mode [ 341.659608][T21043] dummy0: entered promiscuous mode [ 341.664748][T21043] dummy0: entered allmulticast mode [ 341.670167][T21043] nlmon0: entered promiscuous mode [ 341.675324][T21043] nlmon0: entered allmulticast mode [ 341.680989][T21043] caif0: entered promiscuous mode [ 341.685998][T21043] caif0: entered allmulticast mode [ 341.691317][T21043] veth0: entered promiscuous mode [ 341.696338][T21043] veth0: entered allmulticast mode [ 341.701727][T21043] veth1: entered promiscuous mode [ 341.706790][T21043] veth1: entered allmulticast mode [ 341.712153][T21043] wg0: entered promiscuous mode [ 341.717005][T21043] wg0: entered allmulticast mode [ 341.722079][T21043] wg1: entered promiscuous mode [ 341.726973][T21043] wg1: entered allmulticast mode [ 341.732138][T21043] wg2: entered promiscuous mode [ 341.736972][T21043] wg2: entered allmulticast mode [ 341.742149][T21043] veth0_to_bridge: entered promiscuous mode [ 341.748092][T21043] veth0_to_bridge: entered allmulticast mode [ 341.754434][T21043] veth1_to_bridge: entered promiscuous mode [ 341.760342][T21043] veth1_to_bridge: entered allmulticast mode [ 341.766580][T21043] veth0_to_bond: entered promiscuous mode [ 341.772310][T21043] veth0_to_bond: entered allmulticast mode [ 341.778427][T21043] veth1_to_bond: entered promiscuous mode [ 341.784145][T21043] veth1_to_bond: entered allmulticast mode [ 341.790242][T21043] veth0_to_team: entered promiscuous mode [ 341.795947][T21043] veth0_to_team: entered allmulticast mode [ 341.802125][T21043] veth1_to_team: entered promiscuous mode [ 341.807862][T21043] veth1_to_team: entered allmulticast mode [ 341.814075][T21043] veth0_to_batadv: entered promiscuous mode [ 341.819993][T21043] veth0_to_batadv: entered allmulticast mode [ 341.826059][T21043] batadv_slave_0: entered promiscuous mode [ 341.831863][T21043] batadv_slave_0: entered allmulticast mode [ 341.837978][T21043] veth1_to_batadv: entered promiscuous mode [ 341.843878][T21043] veth1_to_batadv: entered allmulticast mode [ 341.850152][T21043] batadv_slave_1: entered promiscuous mode [ 341.856047][T21043] batadv_slave_1: entered allmulticast mode [ 341.862370][T21043] xfrm0: entered promiscuous mode [ 341.867430][T21043] xfrm0: entered allmulticast mode [ 341.872708][T21043] veth0_to_hsr: entered promiscuous mode [ 341.878394][T21043] veth0_to_hsr: entered allmulticast mode [ 341.884435][T21043] veth1_to_hsr: entered promiscuous mode [ 341.890104][T21043] veth1_to_hsr: entered allmulticast mode [ 341.896016][T21043] hsr_slave_1: entered promiscuous mode [ 341.901587][T21043] hsr_slave_1: entered allmulticast mode [ 341.907514][T21043] veth1_virt_wifi: entered promiscuous mode [ 341.913403][T21043] veth1_virt_wifi: entered allmulticast mode [ 341.919532][T21043] veth0_virt_wifi: entered promiscuous mode [ 341.925494][T21043] veth0_virt_wifi: entered allmulticast mode [ 341.931641][T21043] geneve0: entered promiscuous mode [ 341.936819][T21043] geneve0: entered allmulticast mode [ 341.942205][T21043] geneve1: entered promiscuous mode [ 341.947439][T21043] geneve1: entered allmulticast mode [ 341.953004][T21043] ip6gre1: entered promiscuous mode [ 341.958370][T21043] ip6gre1: entered allmulticast mode [ 341.963918][T21043] netdevsim netdevsim2 eth0: entered promiscuous mode [ 341.970687][T21043] netdevsim netdevsim2 eth0: entered allmulticast mode [ 341.977677][T21043] netdevsim netdevsim2 eth1: entered promiscuous mode [ 341.984483][T21043] netdevsim netdevsim2 eth1: entered allmulticast mode [ 341.991532][T21043] netdevsim netdevsim2 eth2: entered promiscuous mode [ 341.998339][T21043] netdevsim netdevsim2 eth2: entered allmulticast mode [ 342.005364][T21043] netdevsim netdevsim2 eth3: entered promiscuous mode [ 342.012202][T21043] netdevsim netdevsim2 eth3: entered allmulticast mode [ 342.019292][T21043] gretap1: entered promiscuous mode [ 342.024547][T21043] gretap1: entered allmulticast mode [ 342.032246][T21043] batadv0: entered promiscuous mode [ 342.037442][T21043] batadv0: entered allmulticast mode [ 342.042990][T21043] ip6tnl1: entered promiscuous mode [ 342.048181][T21043] ip6tnl1: entered allmulticast mode [ 342.053864][T21043] bridge1: entered promiscuous mode [ 342.059085][T21043] bridge1: entered allmulticast mode [ 342.065089][T21043] ip6gre2: entered promiscuous mode [ 342.070779][T21043] ip6tnl2: entered promiscuous mode [ 342.075977][T21043] ip6tnl2: entered allmulticast mode [ 342.081456][T21043] veth2: entered promiscuous mode [ 342.086461][T21043] veth2: entered allmulticast mode [ 342.092066][T21043] veth3: entered promiscuous mode [ 342.097116][T21043] veth3: entered allmulticast mode [ 342.102517][T21043] veth4: entered promiscuous mode [ 342.107622][T21043] veth4: entered allmulticast mode [ 342.113048][T21043] veth5: entered promiscuous mode [ 342.118067][T21043] veth5: entered allmulticast mode [ 342.123360][T21043] wireguard0: entered promiscuous mode [ 342.128869][T21043] wireguard0: entered allmulticast mode [ 342.134566][T21043] bridge2: entered promiscuous mode [ 342.139776][T21043] bridge2: entered allmulticast mode [ 342.145296][T21043] bond0: entered promiscuous mode [ 342.150404][T21043] bond0: entered allmulticast mode [ 342.155614][T21043] bond1: entered promiscuous mode [ 342.160706][T21043] bond1: entered allmulticast mode [ 342.166106][T21043] ip6_vti1: entered promiscuous mode [ 342.171389][T21043] ip6_vti1: entered allmulticast mode [ 342.176953][T21043] bridge3: entered promiscuous mode [ 342.182176][T21043] bridge3: entered allmulticast mode [ 342.188000][T21043] bond2: entered promiscuous mode [ 342.193048][T21043] bond2: entered allmulticast mode [ 342.198325][T21043] ip6_vti2: entered promiscuous mode [ 342.203607][T21043] ip6_vti2: entered allmulticast mode [ 342.209255][T21043] batadv1: entered promiscuous mode [ 342.214449][T21043] batadv1: entered allmulticast mode [ 346.140473][T21082] hsr0 speed is unknown, defaulting to 1000 [ 346.146690][T21082] lo speed is unknown, defaulting to 1000 [ 346.203702][ T29] kauditd_printk_skb: 128 callbacks suppressed [ 346.203717][ T29] audit: type=1400 audit(1747482929.661:15968): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 346.547145][ T29] audit: type=1400 audit(1747482930.001:15969): avc: denied { open } for pid=21106 comm="syz.5.4362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 346.566629][ T29] audit: type=1400 audit(1747482930.001:15970): avc: denied { open } for pid=21106 comm="syz.5.4362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 346.586150][ T29] audit: type=1400 audit(1747482930.001:15971): avc: denied { create } for pid=21106 comm="syz.5.4362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 346.605787][ T29] audit: type=1400 audit(1747482930.001:15972): avc: denied { create } for pid=21106 comm="syz.5.4362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 346.625506][ T29] audit: type=1400 audit(1747482930.031:15973): avc: denied { read write } for pid=8561 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 346.753156][ T29] audit: type=1400 audit(1747482930.211:15974): avc: denied { prog_load } for pid=21108 comm="syz.0.4363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 346.772566][ T29] audit: type=1400 audit(1747482930.211:15975): avc: denied { open } for pid=21108 comm="syz.0.4363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 346.792069][ T29] audit: type=1400 audit(1747482930.211:15976): avc: denied { map_create } for pid=21108 comm="syz.0.4363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 346.811413][ T29] audit: type=1400 audit(1747482930.211:15977): avc: denied { prog_load } for pid=21108 comm="syz.0.4363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 348.010373][T21119] pim6reg1: entered promiscuous mode [ 348.015708][T21119] pim6reg1: entered allmulticast mode [ 349.071373][T21135] SELinux: syz.0.4372 (21135) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 350.175509][T21162] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(4) [ 350.182048][T21162] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 350.189705][T21162] vhci_hcd vhci_hcd.0: Device attached [ 350.196833][T21164] vhci_hcd: connection closed [ 350.196936][T12340] vhci_hcd: stop threads [ 350.206082][T12340] vhci_hcd: release socket [ 350.210583][T12340] vhci_hcd: disconnect device [ 350.789401][T21176] bond_slave_1: mtu less than device minimum [ 351.434209][ T29] kauditd_printk_skb: 113 callbacks suppressed [ 351.434224][ T29] audit: type=1400 audit(1747482934.891:16091): avc: denied { map_create } for pid=21189 comm="syz.0.4388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 351.460007][ T29] audit: type=1400 audit(1747482934.891:16092): avc: denied { prog_load } for pid=21189 comm="syz.0.4388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 351.479376][ T29] audit: type=1400 audit(1747482934.891:16093): avc: denied { prog_load } for pid=21189 comm="syz.0.4388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 351.498606][ T29] audit: type=1400 audit(1747482934.891:16094): avc: denied { prog_load } for pid=21189 comm="syz.0.4388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 351.517899][ T29] audit: type=1400 audit(1747482934.891:16095): avc: denied { prog_load } for pid=21189 comm="syz.0.4388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 351.537095][ T29] audit: type=1400 audit(1747482934.891:16096): avc: denied { create } for pid=21189 comm="syz.0.4388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 351.557770][ T29] audit: type=1400 audit(1747482934.921:16097): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 351.581323][ T29] audit: type=1400 audit(1747482934.941:16098): avc: denied { watch } for pid=21191 comm="syz.2.4389" path="/704/control" dev="tmpfs" ino=3680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 351.640524][ T29] audit: type=1400 audit(1747482935.101:16099): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 351.861283][ T29] audit: type=1400 audit(1747482935.321:16100): avc: denied { read write } for pid=8561 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 352.101548][T21199] hsr0 speed is unknown, defaulting to 1000 [ 352.107644][T21199] lo speed is unknown, defaulting to 1000 [ 354.199344][T21243] bridge0: port 1(macvlan0) entered blocking state [ 354.205921][T21243] bridge0: port 1(macvlan0) entered disabled state [ 354.212686][T21243] macvlan0: entered allmulticast mode [ 354.218220][T21243] bridge0: entered allmulticast mode [ 354.229941][T21243] macvlan0: left allmulticast mode [ 354.235076][T21243] bridge0: left allmulticast mode [ 356.444275][T21272] netlink: 60 bytes leftover after parsing attributes in process `syz.0.4412'. [ 356.604239][ T29] kauditd_printk_skb: 168 callbacks suppressed [ 356.604261][ T29] audit: type=1400 audit(1747482940.061:16269): avc: denied { map_create } for pid=21281 comm="syz.3.4415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 356.605989][T21282] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4415'. [ 356.629747][ T29] audit: type=1400 audit(1747482940.061:16270): avc: denied { map_create } for pid=21281 comm="syz.3.4415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 356.629772][ T29] audit: type=1400 audit(1747482940.061:16271): avc: denied { prog_load } for pid=21281 comm="syz.3.4415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 356.629808][ T29] audit: type=1400 audit(1747482940.061:16272): avc: denied { create } for pid=21281 comm="syz.3.4415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 356.629834][ T29] audit: type=1400 audit(1747482940.061:16273): avc: denied { prog_load } for pid=21281 comm="syz.3.4415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 356.716351][ T29] audit: type=1400 audit(1747482940.061:16274): avc: denied { create } for pid=21281 comm="syz.3.4415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 356.736963][ T29] audit: type=1400 audit(1747482940.121:16275): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 356.761337][ T29] audit: type=1400 audit(1747482940.121:16276): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 356.809145][ T29] audit: type=1400 audit(1747482940.271:16277): avc: denied { prog_load } for pid=21283 comm="syz.6.4416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 356.828922][ T29] audit: type=1400 audit(1747482940.271:16278): avc: denied { prog_load } for pid=21283 comm="syz.6.4416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 358.912624][T21316] netlink: 'syz.2.4427': attribute type 16 has an invalid length. [ 358.920531][T21316] netlink: 'syz.2.4427': attribute type 17 has an invalid length. [ 358.937962][T21316] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 359.982368][T21352] netlink: 'syz.2.4435': attribute type 4 has an invalid length. [ 360.904624][T21358] hsr0 speed is unknown, defaulting to 1000 [ 360.910818][T21358] lo speed is unknown, defaulting to 1000 [ 361.466359][T21393] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4442'. [ 361.672277][ T29] kauditd_printk_skb: 176 callbacks suppressed [ 361.672291][ T29] audit: type=1400 audit(1747482945.131:16455): avc: denied { prog_load } for pid=21394 comm="syz.5.4443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 361.712297][ T29] audit: type=1400 audit(1747482945.161:16456): avc: denied { prog_load } for pid=21394 comm="syz.5.4443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 361.731772][ T29] audit: type=1400 audit(1747482945.161:16457): avc: denied { read } for pid=21394 comm="syz.5.4443" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 361.754626][ T29] audit: type=1400 audit(1747482945.161:16458): avc: denied { module_request } for pid=21394 comm="syz.5.4443" kmod="netdev-syz_tun" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 361.776880][ T29] audit: type=1400 audit(1747482945.161:16459): avc: denied { sys_module } for pid=21394 comm="syz.5.4443" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 361.798133][ T29] audit: type=1400 audit(1747482945.161:16460): avc: denied { map_create } for pid=21394 comm="syz.5.4443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 361.817493][ T29] audit: type=1400 audit(1747482945.161:16461): avc: denied { map_create } for pid=21394 comm="syz.5.4443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 361.836932][ T29] audit: type=1400 audit(1747482945.161:16462): avc: denied { prog_load } for pid=21394 comm="syz.5.4443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 361.856131][ T29] audit: type=1400 audit(1747482945.161:16463): avc: denied { name_bind } for pid=21396 comm="syz.0.4445" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 361.878196][ T29] audit: type=1400 audit(1747482945.161:16464): avc: denied { create } for pid=21396 comm="syz.0.4445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 362.958828][T21412] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4451'. [ 364.432167][T21430] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4458'. [ 366.944175][ T29] kauditd_printk_skb: 168 callbacks suppressed [ 366.944186][ T29] audit: type=1400 audit(1747482950.401:16633): avc: denied { open } for pid=21453 comm="syz.2.4464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 366.970258][ T29] audit: type=1400 audit(1747482950.401:16634): avc: denied { map_create } for pid=21453 comm="syz.2.4464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 366.989670][ T29] audit: type=1400 audit(1747482950.401:16635): avc: denied { prog_load } for pid=21453 comm="syz.2.4464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 367.008988][ T29] audit: type=1400 audit(1747482950.401:16636): avc: denied { prog_load } for pid=21453 comm="syz.2.4464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 367.028197][ T29] audit: type=1400 audit(1747482950.401:16637): avc: denied { prog_load } for pid=21453 comm="syz.2.4464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 367.047436][ T29] audit: type=1400 audit(1747482950.401:16638): avc: denied { prog_load } for pid=21453 comm="syz.2.4464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 367.066693][ T29] audit: type=1400 audit(1747482950.401:16639): avc: denied { prog_load } for pid=21453 comm="syz.2.4464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 367.785076][ T29] audit: type=1400 audit(1747482951.241:16640): avc: denied { prog_load } for pid=21455 comm="syz.0.4465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 367.806585][ T29] audit: type=1326 audit(1747482951.241:16641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21455 comm="syz.0.4465" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd7f338e969 code=0x7ffc0000 [ 367.830248][ T29] audit: type=1326 audit(1747482951.241:16642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21455 comm="syz.0.4465" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd7f338e969 code=0x7ffc0000 [ 369.109322][T21481] netlink: 'syz.5.4474': attribute type 4 has an invalid length. [ 369.117596][T21481] netlink: 'syz.5.4474': attribute type 4 has an invalid length. [ 369.353638][T21488] bond3: entered promiscuous mode [ 369.358730][T21488] bond3: entered allmulticast mode [ 369.364148][T21488] 8021q: adding VLAN 0 to HW filter on device bond3 [ 369.372194][T21488] batman_adv: batadv1: Adding interface: bond3 [ 369.378371][T21488] batman_adv: batadv1: The MTU of interface bond3 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 369.403906][T21488] batman_adv: batadv1: Interface activated: bond3 [ 371.280366][T21547] hsr0 speed is unknown, defaulting to 1000 [ 371.286714][T21547] lo speed is unknown, defaulting to 1000 [ 372.135944][ T29] kauditd_printk_skb: 394 callbacks suppressed [ 372.135958][ T29] audit: type=1400 audit(1747482955.591:17037): avc: denied { create } for pid=21576 comm="syz.0.4491" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=0 [ 372.163660][ T29] audit: type=1400 audit(1747482955.591:17038): avc: denied { prog_load } for pid=21576 comm="syz.0.4491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 372.182961][ T29] audit: type=1400 audit(1747482955.621:17039): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 372.552630][ T29] audit: type=1400 audit(1747482956.011:17040): avc: denied { map_create } for pid=21578 comm="syz.5.4492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 372.558751][T21579] Ÿë: port 1(veth0_to_bridge) entered blocking state [ 372.574632][ T29] audit: type=1400 audit(1747482956.011:17041): avc: denied { prog_load } for pid=21578 comm="syz.5.4492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 372.578932][T21579] Ÿë: port 1(veth0_to_bridge) entered disabled state [ 372.598399][ T29] audit: type=1400 audit(1747482956.011:17042): avc: denied { prog_load } for pid=21578 comm="syz.5.4492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 372.605770][T21579] veth0_to_bridge: entered allmulticast mode [ 372.624544][ T29] audit: type=1400 audit(1747482956.011:17043): avc: denied { open } for pid=21578 comm="syz.5.4492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 372.631090][T21579] veth0_to_bridge: entered promiscuous mode [ 372.649999][ T29] audit: type=1400 audit(1747482956.011:17044): avc: denied { bpf } for pid=21578 comm="syz.5.4492" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 372.701707][ T29] audit: type=1400 audit(1747482956.161:17045): avc: denied { read write } for pid=8561 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 373.186907][ T29] audit: type=1400 audit(1747482956.641:17046): avc: denied { create } for pid=21582 comm="syz.0.4493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 373.619469][T21591] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4496'. [ 373.643993][T21592] syzkaller0: entered promiscuous mode [ 373.649567][T21592] syzkaller0: entered allmulticast mode [ 373.844395][T21613] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4500'. [ 373.848200][T21611] netlink: 96 bytes leftover after parsing attributes in process `syz.3.4499'. [ 374.496699][T21621] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4503'. [ 375.158966][T21642] syzkaller0: entered promiscuous mode [ 375.164446][T21642] syzkaller0: entered allmulticast mode [ 375.366999][T21650] hsr0 speed is unknown, defaulting to 1000 [ 375.373168][T21650] lo speed is unknown, defaulting to 1000 [ 375.794487][T21677] wg2: entered promiscuous mode [ 375.799468][T21677] wg2: entered allmulticast mode [ 376.649449][T21687] netlink: 24 bytes leftover after parsing attributes in process `syz.3.4516'. [ 377.296289][ T29] kauditd_printk_skb: 198 callbacks suppressed [ 377.296303][ T29] audit: type=1400 audit(1747482961.752:17245): avc: denied { map_create } for pid=21710 comm="syz.3.4521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 377.322032][ T29] audit: type=1400 audit(1747482961.752:17246): avc: denied { map_create } for pid=21708 comm="syz.0.4520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 377.341397][ T29] audit: type=1400 audit(1747482961.752:17247): avc: denied { prog_load } for pid=21708 comm="syz.0.4520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 377.360758][ T29] audit: type=1400 audit(1747482961.752:17248): avc: denied { prog_load } for pid=21710 comm="syz.3.4521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 377.379972][ T29] audit: type=1400 audit(1747482961.752:17249): avc: denied { prog_load } for pid=21710 comm="syz.3.4521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 377.399345][ T29] audit: type=1400 audit(1747482961.802:17250): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 377.423619][ T29] audit: type=1400 audit(1747482961.842:17251): avc: denied { prog_load } for pid=21714 comm="syz.5.4522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 377.442874][ T29] audit: type=1400 audit(1747482961.842:17252): avc: denied { map_create } for pid=21714 comm="syz.5.4522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 377.462187][ T29] audit: type=1400 audit(1747482961.842:17253): avc: denied { prog_load } for pid=21714 comm="syz.5.4522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 377.481383][ T29] audit: type=1400 audit(1747482961.842:17254): avc: denied { prog_load } for pid=21714 comm="syz.5.4522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 377.805339][T21725] hsr0 speed is unknown, defaulting to 1000 [ 377.811974][T21725] lo speed is unknown, defaulting to 1000 [ 377.886425][T21752] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4526'. [ 377.895483][T21752] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4526'. [ 378.312455][T21755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21755 comm=syz.3.4527 [ 379.404799][T21773] hsr0 speed is unknown, defaulting to 1000 [ 379.415294][T21773] lo speed is unknown, defaulting to 1000 [ 380.005177][T21801] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4535'. [ 382.623497][ T29] kauditd_printk_skb: 396 callbacks suppressed [ 382.623513][ T29] audit: type=1400 audit(1747482967.082:17651): avc: denied { prog_load } for pid=21814 comm="syz.2.4542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 382.633065][T21817] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4543'. [ 382.662397][ T29] audit: type=1400 audit(1747482967.092:17652): avc: denied { create } for pid=21816 comm="syz.3.4543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 382.682840][ T29] audit: type=1400 audit(1747482967.092:17653): avc: denied { create } for pid=21816 comm="syz.3.4543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 382.702610][ T29] audit: type=1400 audit(1747482967.092:17654): avc: denied { create } for pid=21816 comm="syz.3.4543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 382.722411][ T29] audit: type=1400 audit(1747482967.112:17655): avc: denied { create } for pid=21814 comm="syz.2.4542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 382.743024][ T29] audit: type=1400 audit(1747482967.112:17656): avc: denied { create } for pid=21814 comm="syz.2.4542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 382.763681][ T29] audit: type=1400 audit(1747482967.152:17657): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 382.787951][ T29] audit: type=1400 audit(1747482967.182:17658): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 382.832156][ T29] audit: type=1400 audit(1747482967.292:17659): avc: denied { create } for pid=21818 comm="syz.5.4544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 382.851870][ T29] audit: type=1400 audit(1747482967.292:17660): avc: denied { create } for pid=21818 comm="syz.5.4544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 383.039772][T21821] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4545'. [ 383.247295][T21824] netlink: 'syz.2.4546': attribute type 4 has an invalid length. [ 383.255455][T21824] netlink: 'syz.2.4546': attribute type 4 has an invalid length. [ 383.872393][T21830] netlink: 'syz.0.4548': attribute type 4 has an invalid length. [ 383.881056][T21830] netlink: 'syz.0.4548': attribute type 4 has an invalid length. [ 383.889850][T15265] lo speed is unknown, defaulting to 1000 [ 383.895612][T15265] sxz0: Port: 1 Link ACTIVE [ 384.515482][T21833] bridge4: entered allmulticast mode [ 385.416976][T21859] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 385.999712][T21864] sch_tbf: burst 3298 is lower than device lo mtu (11337746) ! [ 386.212781][T21867] netlink: 28 bytes leftover after parsing attributes in process `syz.5.4560'. [ 387.461605][T21874] TCP: out of memory -- consider tuning tcp_mem [ 387.697465][ T29] kauditd_printk_skb: 92 callbacks suppressed [ 387.697476][ T29] audit: type=1400 audit(1747482972.152:17753): avc: denied { read write } for pid=10679 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 387.732043][ T29] audit: type=1400 audit(1747482972.192:17754): avc: denied { prog_load } for pid=21898 comm="syz.0.4571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 387.755894][ T29] audit: type=1400 audit(1747482972.212:17755): avc: denied { map_create } for pid=21898 comm="syz.0.4571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 387.775313][ T29] audit: type=1400 audit(1747482972.212:17756): avc: denied { prog_load } for pid=21898 comm="syz.0.4571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 387.861781][ T29] audit: type=1400 audit(1747482972.322:17757): avc: denied { prog_load } for pid=21899 comm="syz.3.4572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 387.881121][ T29] audit: type=1400 audit(1747482972.322:17758): avc: denied { map_create } for pid=21899 comm="syz.3.4572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 387.900584][ T29] audit: type=1400 audit(1747482972.322:17759): avc: denied { create } for pid=21899 comm="syz.3.4572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 387.920273][ T29] audit: type=1400 audit(1747482972.342:17760): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 387.950302][ T29] audit: type=1400 audit(1747482972.402:17761): avc: denied { create } for pid=21904 comm="syz.5.4573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 387.970967][ T29] audit: type=1400 audit(1747482972.402:17762): avc: denied { create } for pid=21904 comm="syz.5.4573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 388.591849][T21920] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4580'. [ 389.231922][T21924] netlink: 14 bytes leftover after parsing attributes in process `syz.0.4581'. [ 389.444445][T21933] netlink: 'syz.6.4585': attribute type 1 has an invalid length. [ 389.482085][T21933] veth9: entered promiscuous mode [ 389.488677][T21933] bond3: (slave veth9): Enslaving as a backup interface with a down link [ 389.520291][T21980] syzkaller0: entered promiscuous mode [ 389.525858][T21980] syzkaller0: entered allmulticast mode [ 390.080035][T21990] syzkaller0: entered promiscuous mode [ 390.085525][T21990] syzkaller0: entered allmulticast mode [ 390.769431][T22011] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4596'. [ 390.979490][T22018] bridge0: entered allmulticast mode [ 392.687167][T22044] bridge6: the hash_elasticity option has been deprecated and is always 16 [ 392.709948][ T29] kauditd_printk_skb: 227 callbacks suppressed [ 392.709963][ T29] audit: type=1400 audit(1747482977.172:17990): avc: denied { read write } for pid=8561 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 392.786589][ T29] audit: type=1400 audit(1747482977.242:17991): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 392.882998][ T29] audit: type=1400 audit(1747482977.342:17992): avc: denied { prog_load } for pid=22054 comm="syz.2.4609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 392.894494][T22055] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.904905][ T29] audit: type=1400 audit(1747482977.342:17993): avc: denied { prog_load } for pid=22054 comm="syz.2.4609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 392.928583][ T29] audit: type=1400 audit(1747482977.342:17994): avc: denied { prog_load } for pid=22054 comm="syz.2.4609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 392.947923][ T29] audit: type=1400 audit(1747482977.342:17995): avc: denied { prog_load } for pid=22054 comm="syz.2.4609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 392.967199][ T29] audit: type=1400 audit(1747482977.342:17996): avc: denied { create } for pid=22054 comm="syz.2.4609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 392.988604][T22055] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.996704][T22055] $Hÿ: (slave bond_slave_0): Releasing backup interface [ 393.005047][T22055] $Hÿ: (slave bond_slave_1): Releasing backup interface [ 393.014967][T22055] team0: Port device team_slave_0 removed [ 393.021761][T22055] team0: Port device team_slave_1 removed [ 393.028440][T22055] team0: Port device hsr_slave_0 removed [ 393.297663][ T29] audit: type=1400 audit(1747482977.752:17997): avc: denied { prog_load } for pid=22056 comm="syz.0.4610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 393.307258][T22057] hsr0 speed is unknown, defaulting to 1000 [ 393.323240][T22057] lo speed is unknown, defaulting to 1000 [ 393.454110][ T29] audit: type=1400 audit(1747482977.912:17998): avc: denied { create } for pid=22056 comm="syz.0.4610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 393.477630][ T29] audit: type=1400 audit(1747482977.912:17999): avc: denied { map_create } for pid=22056 comm="syz.0.4610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 393.769337][T22086] netlink: 'syz.3.4613': attribute type 27 has an invalid length. [ 393.777487][T22086] batadv0: left promiscuous mode [ 393.782539][T22086] batadv0: left allmulticast mode [ 393.788180][T22086] wg2: left promiscuous mode [ 393.792851][T22086] wg2: left allmulticast mode [ 393.798453][T22086] ip6erspan0: left promiscuous mode [ 393.804122][T22086] batman_adv: batadv1: Interface deactivated: bond3 [ 393.811883][T22086] bond3: left promiscuous mode [ 393.816724][T22086] bond3: left allmulticast mode [ 393.840830][T22087] hsr0 speed is unknown, defaulting to 1000 [ 393.847041][T22087] lo speed is unknown, defaulting to 1000 [ 393.954609][T22112] hsr0 speed is unknown, defaulting to 1000 [ 393.961078][T22112] lo speed is unknown, defaulting to 1000 [ 395.391553][T22142] tls_set_device_offload: netdev not found [ 396.223607][T22147] netlink: 'syz.5.4619': attribute type 1 has an invalid length. [ 396.242838][T22147] 8021q: adding VLAN 0 to HW filter on device bond2 [ 396.257082][T22147] ip6erspan0: entered promiscuous mode [ 396.264747][T22147] bond2: (slave ip6erspan0): making interface the new active one [ 396.274050][T22147] bond2: (slave ip6erspan0): Enslaving as an active interface with an up link [ 396.291636][T22147] vlan0: entered allmulticast mode [ 396.296762][T22147] bond2: entered allmulticast mode [ 396.301898][T22147] ip6erspan0: entered allmulticast mode [ 396.308098][T22147] bond2: (slave vlan0): the slave hw address is in use by the bond; couldn't find a slave with a free hw address to give it (this should not have happened) [ 396.663602][T22199] netlink: 32 bytes leftover after parsing attributes in process `syz.2.4624'. [ 397.954248][ T29] kauditd_printk_skb: 439 callbacks suppressed [ 397.954262][ T29] audit: type=1400 audit(2000000001.280:18439): avc: denied { prog_load } for pid=22218 comm="syz.3.4633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.982170][ T29] audit: type=1400 audit(2000000001.280:18440): avc: denied { prog_load } for pid=22220 comm="syz.6.4634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 398.001442][ T29] audit: type=1400 audit(2000000001.290:18441): avc: denied { prog_load } for pid=22218 comm="syz.3.4633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 398.020831][ T29] audit: type=1400 audit(2000000001.310:18442): avc: denied { read write } for pid=22218 comm="syz.3.4633" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 398.045001][ T29] audit: type=1400 audit(2000000001.350:18443): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 398.162836][ T29] audit: type=1400 audit(2000000001.490:18444): avc: denied { prog_load } for pid=22223 comm="syz.0.4635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 398.182188][ T29] audit: type=1400 audit(2000000001.500:18445): avc: denied { prog_load } for pid=22223 comm="syz.0.4635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 398.277745][ T29] audit: type=1400 audit(2000000001.600:18446): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 398.577473][ T29] audit: type=1400 audit(2000000001.900:18447): avc: denied { map_create } for pid=22227 comm="syz.5.4636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 398.597030][ T29] audit: type=1400 audit(2000000001.900:18448): avc: denied { prog_load } for pid=22227 comm="syz.5.4636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 399.202970][T22232] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(5) [ 399.209506][T22232] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 399.216932][T22232] vhci_hcd vhci_hcd.0: Device attached [ 399.224589][T22233] vhci_hcd: connection closed [ 399.224717][T12341] vhci_hcd: stop threads [ 399.233752][T12341] vhci_hcd: release socket [ 399.238140][T12341] vhci_hcd: disconnect device [ 401.123458][T22258] pim6reg1: entered promiscuous mode [ 401.128885][T22258] pim6reg1: entered allmulticast mode [ 401.954436][T22271] netlink: 60 bytes leftover after parsing attributes in process `syz.6.4651'. [ 402.991135][T22282] netlink: 'syz.0.4654': attribute type 1 has an invalid length. [ 403.005499][T22282] 8021q: adding VLAN 0 to HW filter on device bond0 [ 403.021037][T22282] 8021q: adding VLAN 0 to HW filter on device bond0 [ 403.028059][T22282] bond0: (slave vxcan3): The slave device specified does not support setting the MAC address [ 403.039239][T22282] bond0: (slave vxcan3): Error -95 calling set_mac_address [ 403.069025][T22324] erspan0: entered allmulticast mode [ 403.121532][ T29] kauditd_printk_skb: 98 callbacks suppressed [ 403.121547][ T29] audit: type=1400 audit(2000000006.450:18547): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 403.204399][ T29] audit: type=1400 audit(2000000006.530:18548): avc: denied { execmem } for pid=22325 comm="syz.5.4655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 403.256664][ T29] audit: type=1400 audit(2000000006.580:18549): avc: denied { prog_load } for pid=22325 comm="syz.5.4655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 403.421989][ T29] audit: type=1326 audit(2000000006.750:18550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22333 comm="syz.0.4657" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd7f338e969 code=0x7ffc0000 [ 403.445757][ T29] audit: type=1326 audit(2000000006.750:18551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22333 comm="syz.0.4657" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd7f338e969 code=0x7ffc0000 [ 403.501624][ T29] audit: type=1400 audit(2000000006.800:18552): avc: denied { prog_load } for pid=22333 comm="syz.0.4657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 403.520913][ T29] audit: type=1400 audit(2000000006.800:18553): avc: denied { prog_load } for pid=22333 comm="syz.0.4657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 403.540182][ T29] audit: type=1400 audit(2000000006.800:18554): avc: denied { prog_load } for pid=22333 comm="syz.0.4657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 403.559390][ T29] audit: type=1326 audit(2000000006.810:18555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22333 comm="syz.0.4657" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd7f338e969 code=0x7ffc0000 [ 403.582993][ T29] audit: type=1400 audit(2000000006.810:18556): avc: denied { map_create } for pid=22333 comm="syz.0.4657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 406.864255][T22364] hsr0 speed is unknown, defaulting to 1000 [ 406.870404][T22364] lo speed is unknown, defaulting to 1000 [ 407.433908][T22396] futex_wake_op: syz.2.4672 tries to shift op by -1; fix this program [ 408.478183][ T29] kauditd_printk_skb: 155 callbacks suppressed [ 408.478240][ T29] audit: type=1400 audit(2000000011.800:18712): avc: denied { prog_load } for pid=22400 comm="syz.0.4674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 408.479379][T22401] macsec0: entered promiscuous mode [ 408.509138][ T29] audit: type=1400 audit(2000000011.800:18713): avc: denied { prog_load } for pid=22400 comm="syz.0.4674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 408.528407][ T29] audit: type=1400 audit(2000000011.810:18714): avc: denied { prog_load } for pid=22400 comm="syz.0.4674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 408.547730][ T29] audit: type=1400 audit(2000000011.810:18715): avc: denied { prog_load } for pid=22400 comm="syz.0.4674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 408.567035][ T29] audit: type=1400 audit(2000000011.810:18716): avc: denied { prog_load } for pid=22400 comm="syz.0.4674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 408.586248][ T29] audit: type=1400 audit(2000000011.860:18717): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 408.685511][ T29] audit: type=1400 audit(2000000012.010:18718): avc: denied { map_create } for pid=22402 comm="syz.2.4675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 408.704943][ T29] audit: type=1400 audit(2000000012.010:18719): avc: denied { prog_load } for pid=22402 comm="syz.2.4675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 408.724171][ T29] audit: type=1400 audit(2000000012.010:18720): avc: denied { bpf } for pid=22402 comm="syz.2.4675" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 408.724193][ T29] audit: type=1400 audit(2000000012.010:18721): avc: denied { create } for pid=22402 comm="syz.2.4675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 410.176437][T22424] bridge_slave_0: left promiscuous mode [ 410.182250][T22424] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.191615][T22419] Cannot find del_set index 3 as target [ 410.212373][T22424] bridge_slave_1: left allmulticast mode [ 410.218031][T22424] bridge_slave_1: left promiscuous mode [ 410.223705][T22424] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.234669][T22424] bond0: (slave bond_slave_0): Releasing backup interface [ 410.243291][T22424] bond0: (slave bond_slave_1): Releasing backup interface [ 410.255786][T22424] team0: Port device team_slave_0 removed [ 410.262939][T22424] team0: Port device team_slave_1 removed [ 410.271838][T22424] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 410.279544][T22424] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 410.288124][T22424] bond2: (slave veth3): Releasing active interface [ 410.302376][T22424] bond3: (slave veth9): Releasing backup interface [ 410.827944][T22438] netlink: 9 bytes leftover after parsing attributes in process `syz.3.4689'. [ 410.855614][T22441] syzkaller0: entered promiscuous mode [ 410.861185][T22441] syzkaller0: entered allmulticast mode [ 410.868509][T22438] gretap0: entered promiscuous mode [ 410.887010][T22438] netlink: 5 bytes leftover after parsing attributes in process `syz.3.4689'. [ 410.905776][T22438] 0ªX¹¦D: renamed from gretap0 [ 410.912328][T22438] 0ªX¹¦D: left promiscuous mode [ 410.917210][T22438] 0ªX¹¦D: entered allmulticast mode [ 410.923330][T22438] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 411.778188][T22461] xt_hashlimit: invalid interval [ 411.846841][T22463] netlink: 460 bytes leftover after parsing attributes in process `syz.0.4694'. [ 412.462185][T22478] netlink: 9 bytes leftover after parsing attributes in process `syz.2.4702'. [ 412.471286][T22478] 0·: renamed from hsr_slave_1 [ 412.478170][T22478] 0·: left promiscuous mode [ 412.483109][T22478] A link change request failed with some changes committed already. Interface c0· may have been left with an inconsistent configuration, please check. [ 412.537363][T22486] netlink: 'syz.3.4706': attribute type 5 has an invalid length. [ 412.545311][T22486] netlink: 152 bytes leftover after parsing attributes in process `syz.3.4706'. [ 412.585660][T22497] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 413.970564][ T29] kauditd_printk_skb: 221 callbacks suppressed [ 413.970577][ T29] audit: type=1400 audit(2000000017.290:18943): avc: denied { prog_load } for pid=22505 comm="syz.3.4714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 413.971255][ T29] audit: type=1400 audit(2000000017.300:18944): avc: denied { map_create } for pid=22505 comm="syz.3.4714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 413.971443][ T29] audit: type=1400 audit(2000000017.300:18945): avc: denied { prog_load } for pid=22505 comm="syz.3.4714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 413.971661][ T29] audit: type=1400 audit(2000000017.300:18946): avc: denied { create } for pid=22505 comm="syz.3.4714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 413.971978][ T29] audit: type=1400 audit(2000000017.300:18947): avc: denied { prog_load } for pid=22505 comm="syz.3.4714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 413.987706][ T29] audit: type=1400 audit(2000000017.310:18948): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 414.130814][ T29] audit: type=1400 audit(2000000017.460:18949): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 414.166057][ T29] audit: type=1400 audit(2000000017.490:18950): avc: denied { read write } for pid=22507 comm="syz.5.4715" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 414.190427][ T29] audit: type=1400 audit(2000000017.490:18951): avc: denied { map_create } for pid=22507 comm="syz.5.4715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 414.209874][ T29] audit: type=1400 audit(2000000017.490:18952): avc: denied { prog_load } for pid=22507 comm="syz.5.4715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 416.317085][T22516] IPv6: NLM_F_CREATE should be specified when creating new route [ 416.851193][T22522] hsr0 speed is unknown, defaulting to 1000 [ 416.857273][T22522] lo speed is unknown, defaulting to 1000 [ 419.076292][ T29] kauditd_printk_skb: 105 callbacks suppressed [ 419.076306][ T29] audit: type=1400 audit(2000000022.400:19058): avc: denied { create } for pid=22578 comm="syz.6.4733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 419.105890][ T29] audit: type=1400 audit(2000000022.400:19059): avc: denied { map_create } for pid=22578 comm="syz.6.4733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 419.125363][ T29] audit: type=1400 audit(2000000022.400:19060): avc: denied { prog_load } for pid=22578 comm="syz.6.4733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 419.144593][ T29] audit: type=1400 audit(2000000022.400:19061): avc: denied { prog_load } for pid=22578 comm="syz.6.4733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 419.164036][ T29] audit: type=1400 audit(2000000022.460:19062): avc: denied { read write } for pid=22578 comm="syz.6.4733" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 419.188332][ T29] audit: type=1400 audit(2000000022.480:19063): avc: denied { remount } for pid=22578 comm="syz.6.4733" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 419.208313][ T29] audit: type=1400 audit(2000000022.500:19064): avc: denied { read write } for pid=10679 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 419.285314][ T29] audit: type=1400 audit(2000000022.610:19065): avc: denied { prog_load } for pid=22581 comm="syz.2.4734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 419.305145][ T29] audit: type=1400 audit(2000000022.610:19066): avc: denied { create } for pid=22581 comm="syz.2.4734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 419.326088][ T29] audit: type=1400 audit(2000000022.610:19067): avc: denied { create } for pid=22581 comm="syz.2.4734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 419.923007][T22586] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4736'. [ 420.123903][T22590] lo: left allmulticast mode [ 422.023477][T22614] netlink: 3 bytes leftover after parsing attributes in process `syz.0.4745'. [ 422.032461][T22614] 0ªX¹¦À: renamed from caif0 [ 422.038771][T22614] 0ªX¹¦À: entered allmulticast mode [ 422.043972][T22614] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 422.229935][T22616] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4746'. [ 422.244039][T22616] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4746'. [ 422.656483][T22625] netlink: 'syz.5.4749': attribute type 4 has an invalid length. [ 423.708015][T22634] sit0: entered allmulticast mode [ 424.175726][ T29] kauditd_printk_skb: 268 callbacks suppressed [ 424.175739][ T29] audit: type=1400 audit(2000000027.500:19336): avc: denied { prog_load } for pid=22637 comm="syz.0.4755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 424.201157][ T29] audit: type=1400 audit(2000000027.510:19337): avc: denied { prog_load } for pid=22637 comm="syz.0.4755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 424.220413][ T29] audit: type=1400 audit(2000000027.510:19338): avc: denied { prog_load } for pid=22637 comm="syz.0.4755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 424.239678][ T29] audit: type=1400 audit(2000000027.510:19339): avc: denied { read write } for pid=22637 comm="syz.0.4755" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 424.964532][ T29] audit: type=1400 audit(2000000028.290:19340): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 424.990637][ T29] audit: type=1400 audit(2000000028.320:19341): avc: denied { map_create } for pid=22640 comm="syz.5.4756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 425.010012][ T29] audit: type=1400 audit(2000000028.320:19342): avc: denied { prog_load } for pid=22640 comm="syz.5.4756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 425.029309][ T29] audit: type=1400 audit(2000000028.320:19343): avc: denied { prog_load } for pid=22640 comm="syz.5.4756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 425.049239][ T29] audit: type=1400 audit(2000000028.320:19344): avc: denied { map_create } for pid=22640 comm="syz.5.4756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 425.068590][ T29] audit: type=1400 audit(2000000028.320:19345): avc: denied { prog_load } for pid=22640 comm="syz.5.4756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 426.253907][T22651] netlink: 24 bytes leftover after parsing attributes in process `syz.5.4761'. [ 429.068487][T22679] xt_CT: You must specify a L4 protocol and not use inversions on it [ 429.222692][ T29] kauditd_printk_skb: 125 callbacks suppressed [ 429.222708][ T29] audit: type=1400 audit(2000000032.550:19471): avc: denied { read write } for pid=8561 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 429.266748][ T29] audit: type=1400 audit(2000000032.590:19472): avc: denied { prog_load } for pid=22680 comm="syz.0.4772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 429.286033][ T29] audit: type=1400 audit(2000000032.590:19473): avc: denied { create } for pid=22680 comm="syz.0.4772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 429.306883][ T29] audit: type=1400 audit(2000000032.590:19474): avc: denied { create } for pid=22680 comm="syz.0.4772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 429.327789][ T29] audit: type=1400 audit(2000000032.590:19475): avc: denied { map_create } for pid=22680 comm="syz.0.4772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 429.347113][ T29] audit: type=1400 audit(2000000032.590:19476): avc: denied { prog_load } for pid=22680 comm="syz.0.4772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 429.366355][ T29] audit: type=1400 audit(2000000032.600:19477): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 429.389724][ T29] audit: type=1400 audit(2000000032.700:19478): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 429.432048][ T29] audit: type=1400 audit(2000000032.760:19479): avc: denied { map_create } for pid=22682 comm="syz.5.4773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 429.454300][ T29] audit: type=1400 audit(2000000032.760:19480): avc: denied { create } for pid=22682 comm="syz.5.4773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 429.677211][T22692] syzkaller0: entered promiscuous mode [ 429.682789][T22692] syzkaller0: entered allmulticast mode [ 429.718617][T22699] hsr0 speed is unknown, defaulting to 1000 [ 429.724946][T22699] lo speed is unknown, defaulting to 1000 [ 430.102555][T22726] netlink: 'syz.2.4778': attribute type 1 has an invalid length. [ 430.127348][T22726] 8021q: adding VLAN 0 to HW filter on device bond3 [ 430.143251][T22726] 8021q: adding VLAN 0 to HW filter on device bond3 [ 430.150648][T22726] bond3: (slave vxcan1): The slave device specified does not support setting the MAC address [ 430.162311][T22726] bond3: (slave vxcan1): Error -95 calling set_mac_address [ 430.196826][T22769] veth7: entered promiscuous mode [ 430.203067][T22769] bond3: (slave veth7): Enslaving as an active interface with a down link [ 430.215848][T22769] erspan0: left promiscuous mode [ 430.222688][T22769] bond3: (slave erspan0): making interface the new active one [ 430.230370][T22769] bond3: (slave erspan0): Enslaving as an active interface with an up link [ 430.731924][T22791] netlink: 'syz.0.4783': attribute type 21 has an invalid length. [ 430.743861][T22791] netlink: 132 bytes leftover after parsing attributes in process `syz.0.4783'. [ 431.777760][T22807] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4789'. [ 434.514559][ T29] kauditd_printk_skb: 203 callbacks suppressed [ 434.514572][ T29] audit: type=1400 audit(2000000037.840:19684): avc: denied { map_create } for pid=22831 comm="syz.2.4799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 434.515888][T22832] xt_cgroup: invalid path, errno=-2 [ 434.520850][ T29] audit: type=1400 audit(2000000037.840:19685): avc: denied { prog_load } for pid=22831 comm="syz.2.4799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 434.731350][ T29] audit: type=1400 audit(2000000038.060:19686): avc: denied { prog_load } for pid=22833 comm="syz.0.4800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 434.753095][ T29] audit: type=1400 audit(2000000038.060:19687): avc: denied { map_create } for pid=22833 comm="syz.0.4800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 434.760573][T22834] hsr0 speed is unknown, defaulting to 1000 [ 434.772623][ T29] audit: type=1400 audit(2000000038.060:19688): avc: denied { prog_load } for pid=22833 comm="syz.0.4800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 434.779023][T22834] lo speed is unknown, defaulting to 1000 [ 434.854653][ T29] audit: type=1400 audit(2000000038.180:19689): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 434.939605][ T29] audit: type=1400 audit(2000000038.270:19690): avc: denied { map_create } for pid=22861 comm="syz.5.4801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 434.954641][T22864] netlink: 'syz.2.4802': attribute type 4 has an invalid length. [ 434.966731][ T29] audit: type=1400 audit(2000000038.270:19691): avc: denied { prog_load } for pid=22861 comm="syz.5.4801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 434.966753][ T29] audit: type=1400 audit(2000000038.270:19692): avc: denied { allowed } for pid=22861 comm="syz.5.4801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 435.005531][ T29] audit: type=1400 audit(2000000038.270:19693): avc: denied { prog_load } for pid=22861 comm="syz.5.4801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 437.071995][T22886] hsr0 speed is unknown, defaulting to 1000 [ 437.078517][T22886] lo speed is unknown, defaulting to 1000 [ 438.562313][T22933] wg2: left promiscuous mode [ 438.567036][T22933] wg2: left allmulticast mode [ 438.588565][T22933] wg2: entered promiscuous mode [ 438.593449][T22933] wg2: entered allmulticast mode [ 438.984216][T22941] netlink: 3 bytes leftover after parsing attributes in process `syz.2.4823'. [ 438.993191][T22941] 0ªX¹¦À: renamed from caif0 [ 438.999892][T22941] 0ªX¹¦À: left promiscuous mode [ 439.004825][T22941] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 439.816500][ T29] kauditd_printk_skb: 570 callbacks suppressed [ 439.816512][ T29] audit: type=1326 audit(2000000043.140:20264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22948 comm="syz.0.4827" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd7f338e969 code=0x7ffc0000 [ 439.849103][ T29] audit: type=1326 audit(2000000043.140:20265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22949 comm="syz.5.4828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb32ea2e969 code=0x7ffc0000 [ 439.872729][ T29] audit: type=1326 audit(2000000043.140:20266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22949 comm="syz.5.4828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb32ea2e969 code=0x7ffc0000 [ 439.896380][ T29] audit: type=1326 audit(2000000043.140:20267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22949 comm="syz.5.4828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=425 compat=0 ip=0x7fb32ea2e969 code=0x7ffc0000 [ 439.896403][ T29] audit: type=1400 audit(2000000043.140:20268): avc: denied { allowed } for pid=22949 comm="syz.5.4828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 439.896422][ T29] audit: type=1326 audit(2000000043.140:20269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22949 comm="syz.5.4828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fb32ea2e9a3 code=0x7ffc0000 [ 439.896512][ T29] audit: type=1326 audit(2000000043.140:20270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22949 comm="syz.5.4828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fb32ea2e9a3 code=0x7ffc0000 [ 439.896534][ T29] audit: type=1326 audit(2000000043.140:20271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22949 comm="syz.5.4828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb32ea2e969 code=0x7ffc0000 [ 440.010078][ T29] audit: type=1326 audit(2000000043.140:20272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22949 comm="syz.5.4828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb32ea2e969 code=0x7ffc0000 [ 440.033706][ T29] audit: type=1326 audit(2000000043.150:20273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22949 comm="syz.5.4828" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb32ea2e969 code=0x7ffc0000 [ 440.066920][T22960] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4831'. [ 442.048513][T22986] ================================================================== [ 442.056636][T22986] BUG: KCSAN: data-race in atime_needs_update / inode_update_timestamps [ 442.065000][T22986] [ 442.067318][T22986] write to 0xffff8881112d8f7c of 4 bytes by task 22985 on cpu 1: [ 442.075045][T22986] inode_update_timestamps+0x147/0x270 [ 442.080513][T22986] file_update_time+0x20e/0x2b0 [ 442.085374][T22986] shmem_file_write_iter+0x9c/0xf0 [ 442.090501][T22986] iter_file_splice_write+0x5ef/0x970 [ 442.095877][T22986] direct_splice_actor+0x156/0x2a0 [ 442.101000][T22986] splice_direct_to_actor+0x312/0x680 [ 442.106377][T22986] do_splice_direct+0xda/0x150 [ 442.111137][T22986] do_sendfile+0x380/0x640 [ 442.115552][T22986] __x64_sys_sendfile64+0x105/0x150 [ 442.120757][T22986] x64_sys_call+0xb39/0x2fb0 [ 442.125354][T22986] do_syscall_64+0xd0/0x1a0 [ 442.129866][T22986] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 442.135764][T22986] [ 442.138085][T22986] read to 0xffff8881112d8f7c of 4 bytes by task 22986 on cpu 0: [ 442.145712][T22986] atime_needs_update+0x2a8/0x3e0 [ 442.150744][T22986] touch_atime+0x4a/0x330 [ 442.155090][T22986] shmem_file_splice_read+0x582/0x5d0 [ 442.160486][T22986] splice_direct_to_actor+0x26c/0x680 [ 442.165856][T22986] do_splice_direct+0xda/0x150 [ 442.170620][T22986] do_sendfile+0x380/0x640 [ 442.175031][T22986] __x64_sys_sendfile64+0x105/0x150 [ 442.180239][T22986] x64_sys_call+0xb39/0x2fb0 [ 442.184827][T22986] do_syscall_64+0xd0/0x1a0 [ 442.189324][T22986] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 442.195219][T22986] [ 442.197534][T22986] value changed: 0x160dd492 -> 0x16a66b15 [ 442.203244][T22986] [ 442.205554][T22986] Reported by Kernel Concurrency Sanitizer on: [ 442.211710][T22986] CPU: 0 UID: 0 PID: 22986 Comm: syz.5.4840 Tainted: G W 6.15.0-rc6-syzkaller-00278-g172a9d94339c #0 PREEMPT(voluntary) [ 442.225777][T22986] Tainted: [W]=WARN [ 442.229571][T22986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 442.239628][T22986] ================================================================== [ 443.186233][T12338] bond3 (unregistering): (slave erspan0): Releasing active interface [ 443.350056][T12338] $Hÿ (unregistering): Released all slaves [ 443.357803][T12338] bond0 (unregistering): Released all slaves [ 443.365566][T12338] bond1 (unregistering): Released all slaves [ 443.373990][T12338] bond2 (unregistering): Released all slaves [ 443.381684][T12338] bond3 (unregistering): (slave veth7): Releasing active interface [ 443.390583][T12338] bond3 (unregistering): Released all slaves [ 443.810714][T12338] netdevsim netdevsim5 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 443.869145][T12338] netdevsim netdevsim5 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 443.909323][T12338] netdevsim netdevsim5 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 443.969144][T12338] netdevsim netdevsim5 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 444.390979][T12338] netdevsim netdevsim6 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 444.429192][T12338] netdevsim netdevsim6 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 444.469400][T12338] netdevsim netdevsim6 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 444.529240][T12338] netdevsim netdevsim6 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 444.593443][T12338] veth0_to_bridge: left allmulticast mode [ 444.599214][T12338] veth0_to_bridge: left promiscuous mode [ 444.604882][T12338] Ÿë: port 1(veth0_to_bridge) entered disabled state [ 444.630434][T12338] bond2 (unregistering): (slave ip6erspan0): Releasing active interface [ 444.639076][T12338] ip6erspan0 (unregistering): left allmulticast mode [ 445.469823][T12338] bond1 (unregistering): Released all slaves [ 445.477604][T12338] bond0 (unregistering): (slave veth0_to_bond): Releasing active interface [ 445.486862][T12338] bond0 (unregistering): Released all slaves [ 445.494423][T12338] bond2 (unregistering): Released all slaves [ 445.502168][T12338]  (unregistering): Released all slaves [ 445.510136][T12338] bond0 (unregistering): Released all slaves [ 445.518157][T12338] bond1 (unregistering): Released all slaves [ 445.525697][T12338] bond2 (unregistering): Released all slaves [ 445.533674][T12338] batman_adv: batadv1: Removing interface: bond3 [ 445.540440][T12338] bond3 (unregistering): Released all slaves [ 445.548057][T12338] bond1 (unregistering): Released all slaves [ 445.555724][T12338] bond2 (unregistering): Released all slaves [ 445.563532][T12338] bond0 (unregistering): Released all slaves [ 445.571904][T12338] bond0 (unregistering): Released all slaves [ 445.579945][T12338] bond1 (unregistering): Released all slaves [ 445.587652][T12338] bond2 (unregistering): Released all slaves [ 445.596083][T12338] bond3 (unregistering): Released all slaves [ 445.634593][T12338] tipc: Left network mode [ 445.639092][T12338] tipc: Disabling bearer [ 445.644337][T12338] tipc: Left network mode [ 445.648989][T12338] tipc: Disabling bearer [ 445.654222][T12338] tipc: Left network mode [ 445.663707][T12338] hsr_slave_0: left promiscuous mode [ 445.671016][T12338] hsr_slave_1: left promiscuous mode [ 445.676615][T12338] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 445.683950][T12338] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 445.692424][T12338] hsr_slave_0: left promiscuous mode [ 445.698047][T12338] hsr_slave_1: left promiscuous mode [ 445.704212][T12338] hsr_slave_0: left promiscuous mode [ 445.709853][T12338] hsr_slave_1: left promiscuous mode [ 445.716633][T12338] hsr_slave_0: left promiscuous mode [ 445.722348][T12338] hsr_slave_1: left promiscuous mode [ 445.889076][T23044] lo speed is unknown, defaulting to 1000 [ 445.894851][T23044] infiniband sxz0: ib_query_port failed (-19) [ 446.801841][T12338] IPVS: stop unused estimator thread 0... [ 446.807997][T12338] IPVS: stop unused estimator thread 0...