last executing test programs: 31.434661096s ago: executing program 1 (id=934): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYRES64], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xbf, &(0x7f000000cf3d)=""/191, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000), 0x4) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000b60000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) sendmmsg(r3, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x101d0}], 0x1}}], 0x400000000000181, 0x9200000000000000) recvmmsg$unix(r2, &(0x7f0000005100)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)=""/94, 0x5e}], 0x1}}, {{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000002680)=""/70, 0x46}], 0x1}}], 0x2, 0x0, 0x0) 31.282993946s ago: executing program 1 (id=926): ioperm(0x5, 0xa2, 0x3) sync() r0 = inotify_init() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00'}, 0x10) sync() bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x4c) r3 = inotify_add_watch(r0, &(0x7f0000000240)='./file0\x00', 0x8c7) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYRES64=r3], 0x69) close(r2) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) 31.044081495s ago: executing program 1 (id=930): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x5}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000006c0)='./file0\x00', 0x19f, &(0x7f0000000100), 0x80, 0x550, &(0x7f0000000700)="$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") preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)=""/80, 0x50}], 0x1, 0x6, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 30.825376034s ago: executing program 1 (id=933): r0 = gettid() timer_create(0x8, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x101c0ca, &(0x7f0000000400)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c666d61736b3d30303030303030303030303030303030303030303036362c696f636861727365743d69736f383835392d312c6572726f72733d636f6e74696e75652c756e695f786c6174653d302c696f636861727365743d61736369692c726f6469722c73686f72746e616d653d6d697865642c756e695f786c6174653d302c757466383d302c757466383d302c756e695f786c6174653d312c64656275672c756e695f786c6174653d312c666d61736b3d30303030303030303030303030303030303030303030332c6e6f63617365aec489af6ba9723d4b17106f6d47b9ade1c253d4e3b08066427cae9f41fd1e1dd25a22ec22ad6e8bf6f67e052de91b544f2f4541f87a0c0b36e8d444150b35c110bda57fe7a9c06ba087cc975447082aaf95213301f3e04b70ea67a8aa0d582ca1a9525dba7116d80f126f782a78428b878fc79c0be9ad98cb6950995e6edba78e5301e8c8e69cc85beceb8b54f84a84787815ef9a18f1fe1c81b4c1830102f7e3236e2533e486ecb46ee53991c5bfe6289a474582b2e57741fd8de78f42097851bee74d4201c7767e0e0f4b34523150639b1291441ad01f2f72ed3679d7bca0e8b4e0689f883196af0d0dfe7344f276c1b4bd333882cf7879248ad423e3f21cd0cae2309519f9d40df23cf05d9c8d8f9d07da771ea1e3bcd8478fb989f770da17f700000000000000"], 0x6, 0x2c0, &(0x7f0000000900)="$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") r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$getregset(0x21, r2, 0x0, &(0x7f0000000100)={0x0}) openat(0xffffffffffffff9c, 0x0, 0x2a040, 0x120) ptrace$setopts(0x4200, r2, 0xffffffffffffff91, 0x40) syz_emit_ethernet(0x4a, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 29.901062361s ago: executing program 1 (id=948): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b707000008000000850000006900000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=@newqdisc={0xffffff23, 0x24, 0x4, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, {0x0, 0xf}, {0xfff2}, {0x3, 0xfff2}}}, 0x24}}, 0x0) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000007c0)=@newtfilter={0x78, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x2, 0x10}}, [@filter_kind_options=@f_matchall={{0xd}, {0x44, 0x2, [@TCA_MATCHALL_ACT={0x40, 0x2, [@m_simple={0x3c, 0x1, 0x0, 0x0, {{0xb}, {0x10, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0xb, 0x3, '.,\\-\\{\x00'}]}, {0x4}, {0xc}, {0xc, 0x8, {0x1, 0x3}}}}]}]}}]}, 0x78}}, 0x801) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, '\x00', 0x38}, 0x1}, 0x1c) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) r6 = dup(r2) write$UHID_INPUT(r6, &(0x7f0000001040)={0xc, {"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", 0x1000}}, 0x1006) 29.56438932s ago: executing program 1 (id=950): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) pwrite64(0xffffffffffffffff, &(0x7f0000000140)='2', 0xfdef, 0xfecc) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000540), 0x84) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x0, 0x0, 0x0, 0x3, 0x82, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xf}, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x5c, 0x2, 0x8, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0xfffffffc}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0xb}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x4}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r2 = socket(0x2a, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000440)={'ip_vti0\x00', 0x0}) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000000)=ANY=[@ANYRES8=r0, @ANYRESOCT=r2, @ANYBLOB="d5d3a4aa000000000000000000000000001b6c9dc1d9f611371e62363da2346d0a35", @ANYRES16=r2, @ANYRESHEX, @ANYRES32=r0], 0x48) 29.48790466s ago: executing program 32 (id=950): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) pwrite64(0xffffffffffffffff, &(0x7f0000000140)='2', 0xfdef, 0xfecc) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000540), 0x84) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x0, 0x0, 0x0, 0x3, 0x82, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xf}, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x5c, 0x2, 0x8, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0xfffffffc}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0xb}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x4}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r2 = socket(0x2a, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000440)={'ip_vti0\x00', 0x0}) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000000)=ANY=[@ANYRES8=r0, @ANYRESOCT=r2, @ANYBLOB="d5d3a4aa000000000000000000000000001b6c9dc1d9f611371e62363da2346d0a35", @ANYRES16=r2, @ANYRESHEX, @ANYRES32=r0], 0x48) 27.685812465s ago: executing program 4 (id=975): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000700), &(0x7f00000000c0), 0xff, r0}, 0x38) open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r4 = dup(r3) write$P9_RLERRORu(r4, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x14, 0x0, 0x800, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x44) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe935"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) 27.496369544s ago: executing program 4 (id=976): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) get_robust_list(0x0, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x8}, 0x18) r3 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0xf, &(0x7f0000000380)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x18) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) io_setup(0x8, &(0x7f00000002c0)=0x0) io_destroy(r4) 27.340412303s ago: executing program 4 (id=977): socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_open_dev$tty20(0xc, 0x4, 0x0) syz_io_uring_setup(0x1868, 0x0, 0x0, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) syz_io_uring_submit(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x141a82, 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:mouse_device_t:s0\x00', 0x24, 0x0) 27.339305754s ago: executing program 4 (id=979): r0 = gettid() timer_create(0x8, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x101c0ca, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x6, 0x2c0, &(0x7f0000000900)="$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") r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$getregset(0x21, r2, 0x0, &(0x7f0000000100)={0x0}) openat(0xffffffffffffff9c, 0x0, 0x2a040, 0x120) ptrace$setopts(0x4200, r2, 0xffffffffffffff91, 0x40) syz_emit_ethernet(0x4a, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) 26.460699881s ago: executing program 4 (id=985): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x12, 0xa, 0x9, 0x0, 0x0, {0x2}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x5}]}], {0x14}}, 0x64}}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) write$selinux_context(0xffffffffffffffff, &(0x7f00000001c0)='system_u:object_r:getty_etc_t:s0\x00', 0x21) 26.0843024s ago: executing program 4 (id=989): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000010a850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x8, 0x0, 0x7ffc0002}]}) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800714, &(0x7f0000000500), 0xff, 0x485, &(0x7f0000001040)="$eJzs3M9rHFUcAPDvTJL+bhNrrba2Gq1i8UfSpFV78KCi4EFB0EM9xiSttdtGmgi2BI0i9SgF7+JR8C/w5kXUgwheFTxKoWgQmnqKzK9mu9mkSZpkbfbzgc2+t/Nm3/vOzNt9My+zAbSt3uxPErEjIn6LiO4ie3OB3uJpZnpy+Pr05HASs7Nv/JXk5a5NTw5XRav1tpeZw2lE+mkSzyfz6x2/cPHMUK02er7M90+cfa9//MLFp06fHTo1emr03ODx48eODjz7zODTqxJnFte1/R+OHdj3yluXXxs+cfntH7/JmrX3YLG8Po5but4koCZ6s63292yucdmjy2j7nWBnXTrpbGFDWJaOiMh2V1fe/7ujI+Z2Xne8/ElLGwesqey7afPCi6dmgQ0siVa3AGiN6os+O/+tHus09PhfuPpCxKYyPTM9OTxzI/7OSMvXu9aw/t6IODH175fZI5Z7HQIAYAXysc2TzcZ/aezNn4u5jl3lHEpPRNwVEbsj4u6I2BMR90TkZe+NiPuKlWe7l1h/b0N+/vgnvdK0zaskG/89Vzf2m6mLv3zq6ShzO/P4u5KTp2ujR8ptcji6Nmf5gUXq+O6lXz9faFn9+C97ZPVXY8GyAVc6Gy7QjQxNDK3WRrj6ccT+zmbxJzdmArIjYF9E7F/eW++qEqcf//rAQoVuHf8iVmGeafariMeK/T8VDfFXksXnJ/u3RG30SH91VMz30y+XXl+o/tuKfxVk+3/bzcd/Q4nuf5JivrYrarXR8+PLr+PS758teE6z0uN/U/JmPmf98zvFax8MTUycH4jYlLya56tzuvz1wbl1q3xVPov/8KHm/X93uU4W//0RkR3EByPigYh4sGz7QxHxcEQcWiT+H1585N1F4k8iiZbu/5Gmn383jv+epH6+fgWJjjPff7vQjPnS9v+xmMo/awv5598tLLWBt7n5AAAA4I6QRsSOSNK+It27I9K0r6/4H/49sS2tjY1PPHFy7P1zI8U9Aj3RlVZXurrrrocOJFPlOxb5wfJacbX8aHnd+IuOrXm+b3isNtLi2KHdbb+5/0fV/zN/drS6dcCac78WtK/G/p+2qB3A+lvK979zAdiYmvT/ra1oB7D+nP9D+2rW/z9qyBv/w8Y0v///0eQn64CNyPgf2pf+D+1L/4e2dDv39a88Ud0ssPL32bLkO/zbJVH94sVa1rU15l6JtOUht1Ei6zHrW+ncb6gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADcyf4LAAD///ss5ts=") lsetxattr$system_posix_acl(&(0x7f0000000400)='.\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000800008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="100000000000000020"], 0x5c, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x48140, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x65) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000006280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newtaction={0x98, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{}, 0x2, r4}}]}, {0x4, 0xa}, {0xc}, {0xc}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) 26.08405003s ago: executing program 33 (id=989): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000010a850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x8, 0x0, 0x7ffc0002}]}) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800714, &(0x7f0000000500), 0xff, 0x485, &(0x7f0000001040)="$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") lsetxattr$system_posix_acl(&(0x7f0000000400)='.\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000800008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="100000000000000020"], 0x5c, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x48140, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x65) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000006280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newtaction={0x98, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{}, 0x2, r4}}]}, {0x4, 0xa}, {0xc}, {0xc}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) 3.874886972s ago: executing program 2 (id=1200): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = socket(0x400000000010, 0x3, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0x7}, {}, {0x7}}, [@filter_kind_options=@f_flow={{0x9}, {0x24, 0x2, [@TCA_FLOW_EMATCHES={0x20, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x10, 0x2, 0x0, 0x0, {{0x1, 0x2, 0xff37}, {0x9}}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x800) 3.694416201s ago: executing program 2 (id=1203): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='mmap_lock_acquire_returned\x00', r1}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3000003, 0x4031, 0xffffffffffffffff, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) mkdir(0x0, 0x0) openat$incfs(0xffffffffffffff9c, 0x0, 0x1a10c1, 0x0) lchown(0x0, 0x0, 0xee00) socket$netlink(0x10, 0x3, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="540000000308010100000000000000000a000000050003002f0000000600024000000000240004800800024000000000080001400000fcff070001"], 0x54}}, 0x0) 2.738056168s ago: executing program 2 (id=1214): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f0000000400)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x18000, 0xfffffffffffffffd, 0x1, 0x2fe, &(0x7f00000000c0)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) unshare(0x62040200) 1.810384845s ago: executing program 6 (id=1219): getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/address_bits', 0x202, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)={0x15, 0x65, 0xffff, 0x4, 0x8, '9P2000.u'}, 0x15) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) getpgid(0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000400)='./file1\x00', 0x200000, &(0x7f0000000100)={[{@jqfmt_vfsv1}, {@nodelalloc}, {@delalloc}, {@prjquota}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7c}}, {@nouid32}, {@resgid}, {@nobarrier}, {@sysvgroups}]}, 0x1, 0x573, &(0x7f0000001140)="$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") 1.008441463s ago: executing program 0 (id=1232): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000013007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x2) r3 = getpid() process_vm_readv(r3, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) r4 = syz_open_procfs$pagemap(0x0, &(0x7f0000000040)) ioctl$PAGEMAP_SCAN(r4, 0xc0606610, &(0x7f00000004c0)={0x60, 0x0, &(0x7f0000165000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0, 0x0, 0x0, 0x4, 0x73, 0x0, 0x26}) readv(r2, &(0x7f0000001ac0)=[{&(0x7f0000000240)=""/177, 0xb1}], 0x1) ioctl$TIOCVHANGUP(r2, 0x5437, 0x2) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$PTP_PIN_SETFUNC2(r5, 0x40603d10, &(0x7f0000000180)={'\x00', 0x3, 0x3, 0x4}) 976.080753ms ago: executing program 2 (id=1234): socket$nl_netfilter(0x10, 0x3, 0xc) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x5, &(0x7f0000006680)) semtimedop(0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x18, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x204058, &(0x7f0000000100)=ANY=[@ANYBLOB='showassoc,nocompress,hide,overriderockperm,check=relaxed,mode=0x0000000000000b,nocompress,block=0x0000000000000400,\x00\x00\x00'], 0xff, 0x52c, &(0x7f0000000580)="$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") r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000268000/0x4000)=nil, 0x4000, 0x1000002, 0x4016012, r0, 0x0) mount$nfs(&(0x7f0000000100)='...', &(0x7f0000000140)='./file0\x00', 0x0, 0x2000, 0x0) semop(0x0, &(0x7f00000000c0)=[{}, {}], 0x2) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x33, &(0x7f0000000640)={0x1, &(0x7f0000000680)=[{0x6, 0x0, 0x0, 0x2}]}, 0x10) 889.909693ms ago: executing program 2 (id=1236): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, 0x0, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f00000000c0)=0x45) sendmsg$inet_sctp(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@sndrcv={0x30, 0x84, 0x1, {0x80, 0x2, 0x204, 0x5, 0x6, 0xc896, 0x6ee, 0x2, r5}}], 0x30, 0x2000}, 0x6) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000480)={r5, 0xad, "bf8f851fe2564f64dff236e2f23e572aa55a58bd1966927ab348a072f7dee7348a243b0b7835f3fb3956c72f81db1197d889ce185a8cf7e6f77d15771e12e3b2c4b946a7dee27534f1927256c13a251d785ca5115a847d4e9d5d31102c904aa7214dc9e88e0992e53733bc244c107c253152f49df982ef192026a0292cff3556f356b089fc02cf6c244bdba04b9eca5c6046dc1e0a2e3ea8de49fa511e12e0ccff8cbb7ea66f9ce1c728c7aca2"}, &(0x7f0000000400)=0xb5) 857.287453ms ago: executing program 2 (id=1238): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$unix(0x1, 0x5, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000080)={0x20, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x4, 0xfffffffe, @ipv4={'\x00', '\xff\xff', @remote}}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}}}, 0x108) r4 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x108) r5 = fcntl$dupfd(r4, 0x0, r1) read$msr(r5, &(0x7f00000004c0)=""/119, 0x77) r6 = dup2(r1, r0) close_range(r6, 0xffffffffffffffff, 0x0) 643.994992ms ago: executing program 3 (id=1243): eventfd2(0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@newtaction={0xa0, 0x30, 0x9, 0x0, 0x0, {}, [{0x8c, 0x1, [@m_bpf={0x88, 0x1, 0x0, 0x0, {{0x8}, {0x60, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{}, {}, {0x3, 0x0, 0x0, 0x1000000}, {}, {}, {}, {0x6}]}, @TCA_ACT_BPF_PARMS={0x18}]}, {}, {0xc}, {0xc}}}]}]}, 0xa0}}, 0x0) 598.486122ms ago: executing program 3 (id=1244): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="0100"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="f40100"}) 579.005402ms ago: executing program 3 (id=1245): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x0, 0x0, 0x0, 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xa63, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x5, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x89}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000000200)=r3) write$cgroup_devices(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="1e0306003c5c980128846360864666702c1ffe800000000000"], 0xffdd) 513.241322ms ago: executing program 5 (id=1246): socket$can_bcm(0x1d, 0x2, 0x2) socket$packet(0x11, 0x2, 0x300) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000180)="d7", 0x1}], 0x1}}], 0x1, 0x0) shutdown(r0, 0x1) r1 = syz_io_uring_setup(0x6165, &(0x7f0000000300)={0x0, 0x0, 0x10100, 0x0, 0x3}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB='9'], 0x38}}, 0x4000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r5, &(0x7f0000000180)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r4, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x402}}) io_uring_enter(r1, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 508.240211ms ago: executing program 0 (id=1247): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4000000000002, 0x800000000003}, 0x100000, 0x5dd8, 0x3, 0x0, 0x0, 0x8, 0xdffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = getpid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000100)={0x0, 0x4100, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r3, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}]}, 0x3c}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0x1800, 0x4) sendmsg$DEVLINK_CMD_RATE_GET(r2, 0x0, 0x4000884) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 507.770062ms ago: executing program 3 (id=1248): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) fcntl$getown(r1, 0x9) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000003580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0xffffffffffffffff}], 0x9, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 444.289611ms ago: executing program 3 (id=1249): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4400000004080101000000000000000003000002050003002f0000000500030011000000050003002100000006000240886c000005000300210000000500030011"], 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x804) openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) r4 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'netdevsim0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 443.313131ms ago: executing program 6 (id=1250): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1000, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="a0010000", @ANYRES16=r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x1a0}}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r6, &(0x7f0000005780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @rights={{0x18, 0x1, 0x1, [r5, r5]}}], 0x30, 0x8000}}], 0x1, 0x0) 370.854771ms ago: executing program 3 (id=1251): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000002c0)='rpm_return_int\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @empty}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f7, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000540)}) r3 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000000000406d0422c2000000000001090224000100000000090400000103000000092100000001220b0009058103"], 0x0) syz_usb_control_io$hid(r3, 0x0, 0x0) syz_usb_connect$cdc_ncm(0x3, 0x80, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6e, 0x2, 0x1, 0x76, 0x90, 0x4, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x7, 0x24, 0x6, 0x0, 0x1, "f80b"}, {0x5, 0x24, 0x0, 0x6}, {0xd, 0x24, 0xf, 0x1, 0x40001, 0x9d, 0x7ff, 0xc}, {0x6, 0x24, 0x1a, 0x9, 0x5}, [@acm={0x4, 0x24, 0x2, 0x8}, @mbim={0xc, 0x24, 0x1b, 0x6, 0x0, 0x0, 0x2, 0x3, 0x7}]}, {{0x9, 0x5, 0x81, 0x3, 0x200, 0x6, 0x1, 0x3}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0xe, 0x7, 0xe1}}, {{0x9, 0x5, 0x3, 0x2, 0x40, 0x90, 0x2, 0x5}}}}}}}]}}, &(0x7f00000003c0)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x0, 0x7, 0x7, 0x1, 0x40, 0x25}, 0x3f, &(0x7f0000000340)={0x5, 0xf, 0x3f, 0x5, [@ss_container_id={0x14, 0x10, 0x4, 0x8, "33def095a51c5be11612f997d90e8e3e"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0x5, 0x7, 0x7fff}, @wireless={0xb, 0x10, 0x1, 0x6, 0x2, 0x3, 0x6a, 0xff78, 0xc4}, @ext_cap={0x7, 0x10, 0x2, 0x2, 0x1, 0xd, 0x4}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x6, 0x86, 0x2, 0xff}]}, 0x5, [{0xae, &(0x7f0000000140)=@string={0xae, 0x3, "549d3fca9b1838c91f9ffb084b530d61c3fcf76b6fc645d3862cd20dd09ef21d940c6de8cf17553a93374b6155abaa75a4407d3e82398ae31f57f1785914cb18f682c6d1b7dfcd9c9dda0c88db13f1a4b6a3f0f1038d8a3a25f7b65f81a3e927ad5e2b91d566ae338dc91400aba553ddbd2ea44b23386654350dc96b5b6f27cd4d5f3bc6ba8c489a128fbea294b7b0e9866502e58770543962e70d13b1ba216c93af23022df6a9b7ca9a7fe7"}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x500a}}, {0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="0e03fc7f01806fd82338519b269d19078f8cc18cf3f35832cb43995ff9af32a0658b94a8286a5d93afbda589e14202475e66d89a8f4e04b44d0e474494cf0d66aba8a2b04c773b45a9a2f1"]}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x44f}}, {0x4, &(0x7f0000000300)=@lang_id={0x4}}]}) syz_usb_control_io(r3, &(0x7f0000000100)={0x2c, &(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00\v'], 0x0, 0x0, 0x0, 0x0}, 0x0) 304.227401ms ago: executing program 5 (id=1252): r0 = socket$packet(0x11, 0x2, 0x300) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000796412000000000000000001851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000106608000000001000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xd, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r1, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0xd25}) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000880)={r2, 0x400, 0x0, [0x5, 0x101, 0xf, 0x400, 0x5], [0x1b9, 0x68a1, 0x4, 0x7, 0x4, 0x8000, 0x100000001, 0xc, 0x59b5, 0x100000000, 0x100000000, 0x10, 0x8, 0xb47, 0x0, 0x8, 0x7ff, 0x2, 0xb2be, 0x8, 0xfffffffffffffff8, 0xffff, 0x100000001, 0x5, 0x9, 0x18b, 0x3, 0x7ff, 0x5, 0x6, 0xbc, 0x9, 0x80, 0x7fffffff, 0x3, 0x5, 0x9, 0x7, 0xffffffffffffffff, 0x1, 0x5, 0x2, 0xfe00000000000000, 0x81, 0x2, 0x9, 0x7, 0x1, 0xdd5, 0x100, 0x6, 0x6, 0x0, 0xf2fb, 0x7, 0x7, 0x8, 0x2, 0x10001, 0x200, 0x2, 0xa, 0x4677, 0x8, 0x3, 0x9, 0xc6e, 0x81, 0x5, 0x0, 0x4, 0x4, 0xffff, 0x80000000, 0x5, 0x7fffffff, 0x7f, 0x9, 0x7, 0x15e8, 0x6, 0x810, 0x388, 0x1ff, 0x4, 0x7, 0x9, 0x1, 0x7f, 0x5, 0x8000000000000000, 0x10, 0x8001, 0xffffffffffffffff, 0x0, 0xd7a0, 0x7fffffffffffffff, 0xd83, 0x0, 0xffffffffcbebddf5, 0x2, 0x768d, 0xffffffffffffff5e, 0x8, 0x9, 0x5, 0x8000, 0x8, 0x6, 0x2, 0xc, 0x9, 0x3, 0xdf2e259, 0x2, 0x6, 0x100000000, 0x0, 0x4, 0x2, 0x7]}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x621, @void, @value}, 0x94) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) 303.856851ms ago: executing program 6 (id=1253): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002064070000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) pivot_root(0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01041800000000000000240000000000000000000700000000000000000203000000020000000000001200000000040000000000"], 0x0, 0x42, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) pipe2(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x880) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@local, @in6=@ipv4={""/10, ""/2, @loopback}}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r2, &(0x7f0000000500)=[{&(0x7f0000000280)='\f7', 0x2}], 0x1) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) 303.066521ms ago: executing program 5 (id=1254): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x200, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="180000000000000000000000000000009500160000000000e2bac15d3b6641a215f099e26603a050337b2ccc70a9f928ba3c529bb6e7365e7e246317380f5884d79663e7fcaa89795d7b10e88378c33265a7af06040e3d0bbc6a5864dfa023c6ac1da574242785bbb4ece12b11da52496875e1e384042aad63a3094bf3bc0e40a79960f9f1610940e67e30611d9873d1e6cb9c4cce44c999c49ff52a6400192fd021d7158438d7686a6f66778022c93c544189b684754e7e0f77a4f498609e53104c8aa70632fcc58c757bbc06f6472622dce2729d7296959ce003ec84acd015e352484c42fc29e5aea62fb7977813f7254fd6f62fec638abf292e6c33925b29"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) close(r3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000001c0)='sched_process_wait\x00', r5}, 0x10) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r7, r4, 0x0, r7}, 0x10) 244.06222ms ago: executing program 6 (id=1255): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = socket$qrtr(0x2a, 0x2, 0x0) recvmmsg(r2, &(0x7f0000002580)=[{{&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/131, 0x83}, {&(0x7f00000003c0)=""/82, 0x52}], 0x2}, 0x8}, {{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000740)=""/215, 0xd7}, {&(0x7f0000000500)=""/46, 0x2e}], 0x2}, 0x8000}, {{&(0x7f0000000640)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, &(0x7f00000010c0)=[{&(0x7f0000000840)=""/149, 0x95}, {&(0x7f0000000900)=""/117, 0x75}, {&(0x7f0000000e00)=""/104, 0x68}, {&(0x7f0000000e80)=""/254, 0xfe}, {&(0x7f0000000f80)=""/116, 0x74}, {&(0x7f0000001000)=""/190, 0xbe}, {&(0x7f0000000580)=""/28, 0x1c}], 0x7, &(0x7f00000006c0)=""/32, 0x20}, 0x7}, {{&(0x7f0000001140)=@in6={0xa, 0x0, 0x0, @private1}, 0x80, &(0x7f0000001400)=[{&(0x7f00000011c0)=""/150, 0x96}, {&(0x7f0000000980)}, {&(0x7f0000001280)=""/67, 0x43}, {&(0x7f0000001300)=""/254, 0xfe}], 0x4}, 0x8001}, {{&(0x7f0000001440)=@phonet, 0x80, &(0x7f00000024c0)=[{&(0x7f00000014c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002500)=""/114, 0x72}}], 0x5, 0x40010162, &(0x7f00000026c0)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a40)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0x0, 0x270, 0x0, 0xffffffff, 0xffffffff, 0x270, 0x270, 0x270, 0xffffffff, 0x4, &(0x7f0000000040), {[{{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [0xffffffff, 0xff, 0xff000000, 0xffffff00], [0xffff00, 0xff000000, 0xfffe01, 0xff000000], 'syz_tun\x00', 'wg0\x00', {}, {0xff}, 0x1, 0x10, 0x2, 0x8}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r3 = socket(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000004640)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r6, 0x4b67, &(0x7f0000000040)={0x3ffffffffffffe96, &(0x7f0000000000)=[{0x2, 0x5}]}) 211.181991ms ago: executing program 5 (id=1256): r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x99, 0xd, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = shmget$private(0x0, 0x1000, 0x800, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r3, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000100)={[], [], 0x3d}, 0x1, 0x522, &(0x7f00000007c0)="$eJzs3UFsI1cZAOB/HHu72U2bFDhAJUqhRdkVrJ00tI16KEVCcKoElPsSEieK4sRR7LSbqIKsOHBEQgiQOJULFyROnJBQJS4cEVIlOIMAgRBs4YAEdCrb43Q3GSfZjWNn4++TJvPmeeb97zma8byZp5kARtZTEfFyRLybpun1iJjM8gvZFHudqbXeO3feWGxNSaTpq/9IIsnyumWlbY/E1WyzyxHxlS9GfD05HLexs7u2UKtVt7LlSnN9s9LY2b2xur6wUl2pbszNzT4//8L8c/MzfWnnRES89Pm/fP87P/nCS7/89Ot/vPm3a99Isvw40I77VDzqw07TS+3v4u4Nth4w2HlUbLcwM563xtihnNtnXCcAAHr7QER8IiKux2SMHX06CwAAADyE0s9OxP+S7r27Qy71yAcAAAAeIoX2GNikUM7G+05EoVAuR3sM74fiSqFWbzQ/tVzf3ljqjJWdilJhebVWncnGCk9FKWktz7bT7y8/e2B5LiIej4jvTY63l8uL9drSsC9+AAAAwIi4eqD//+/JTv8fAAAAuGCmhl0BAAAA4Mzp/wMAAMDFp/8PAAAAF9qXXnmlNaXd918vvbazvVZ/7cZStbFWXt9eLC/WtzbLK/X6SvuZfevHlVer1zc/ExvbtyrNaqNZaezs3lyvb280b67e8wpsAAAAYIAe/9hbv08iYu/F8fbUculkm55wNeC8Ku6nkmyes1v/4bHO/M8DqhQwEGPDrgAwNMVhVwAYmtKwKwAMXXLM5z0H7/wmm3+8v/UBAAD6b/oj+ff/j78uuFcYQPWAM+T+H4wu+z+MrvZ5/klH8jrjhwul5AwARt6p7/8fK03vq0IAAEDfTbSnpFDOLu9NRKFQLkc82n4tQClZXq1VZyLisYj43WTpkdbybHvL5Ng+AwAAAAAAAAAAAAAAAAAAAAAAAADQkaZJpAAAAMCFFlH4a/KrzrP8pyefmTh4feBS8p/JyF4R+vqPXv3BrYVmc2u2lf/P/fzmD7P8Z4dxBQMAAABGQvF+Vu7207v9eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADop3fuvLHYnQYZ9++fi4ipvPjFuNyeX45SRFz5VxLFu7ZLImKsD/HHW38+nBc/aVVrP2Re/PE3Tx9/7/aR8WMq+xby4l89fXgYaW+1jj8v5+1/hXiqPc/f/4oR9yw/qN7Hv9g//o312P8fPWGMJ97+WaVn/NsRTxTzjz/d+EmP+E/nFfjzbx/K+tpXd3d7xU/fjJjO/f1J7olVaa5vVho7uzdW1xdWqivVjbm52efnX5h/bn6msrxaq2Z/c2N896O/ePeo9l/pEX/qmPY/k1PepZy8/799684HO8lSXvxrT+fE//WPszUOxy9kv32fzNKtz6e76b1O+m5P/vS3Tx7V/qUe7T/u/3+tV6EHXP/yt/50wlUBgAFo7OyuLdRq1a3zkXgx+l5yq4c/9HY9fIn/pueiGmeb+GZfC0zTNG3tU6coJ4nBfQnJ0VUd9pEJAADot/dP+oddEwAAAAAAAAAAAAAAAAAAABhdg3jS2MGYe/uppB+P0AYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6Iv3AgAA//8ZWuAG") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000600)={0x3c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x7, 0x0, 0x4}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xf10}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_TIME_WAIT={0x8, 0x7, 0x1, 0x0, 0x9}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44000}, 0x20000000) syz_io_uring_setup(0x4e81, 0x0, 0x0, &(0x7f0000000140)) 196.84117ms ago: executing program 6 (id=1257): socket$can_raw(0x1d, 0x3, 0x1) socket$kcm(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)) memfd_create(&(0x7f0000000880)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc9\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\xa4(V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J\x80\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93i|\xc0\x00\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xaf\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') preadv(r3, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0xc002a0, 0x0) 84.06501ms ago: executing program 5 (id=1260): syz_mount_image$msdos(&(0x7f0000000440), &(0x7f0000000200)='./file0\x00', 0x2104d6, &(0x7f0000000640)=ANY=[], 0x1, 0x20e, &(0x7f0000000d00)="$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") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1}, 0x6e) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt(r2, 0x200000000114, 0x20002711, 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1}, 0x6e) connect$unix(r1, &(0x7f0000000080)=@file={0x1}, 0x6e) 83.76587ms ago: executing program 0 (id=1261): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xc000, &(0x7f00000006c0), 0x2, 0x246, &(0x7f0000000ac0)="$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") mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='autogroup\x00') sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, 0x0, 0x4012) listxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x18) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {&(0x7f00000001c0)=""/172, 0xac}], 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) 63.19463ms ago: executing program 0 (id=1262): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'vcan0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00'}, 0x10) r0 = socket$inet_smc(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0xe501, 0x3, 0x208, 0xb8, 0xa, 0x1000000, 0x0, 0x0, 0x170, 0x230, 0x230, 0x170, 0x223, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x3b9, 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x3c0, 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x268) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) 45.56673ms ago: executing program 0 (id=1263): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x1, 0x7fe2, 0x1, 0x12, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xe, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010008000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32, @ANYBLOB="0000000000000000b708000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002c00000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 0s ago: executing program 0 (id=1264): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r3, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r3, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) close(r3) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) kernel console output (not intermixed with test programs): 80.950436][ T3378] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 80.964179][ T3378] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.03 Device [syz0] on syz0 [ 80.989151][ T5736] syz.4.793[5736] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.989254][ T5736] syz.4.793[5736] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.013042][ T5736] syz.4.793[5736] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.078532][ T5741] loop7: detected capacity change from 0 to 16384 [ 81.148392][ T5741] I/O error, dev loop7, sector 15872 op 0x0:(READ) flags 0x80700 phys_seg 3 prio class 0 [ 81.159039][ T5741] I/O error, dev loop7, sector 16128 op 0x0:(READ) flags 0x80700 phys_seg 3 prio class 0 [ 81.169135][ T5741] I/O error, dev loop7, sector 15872 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 81.178721][ T5741] buffer_io_error: 1207 callbacks suppressed [ 81.178740][ T5741] Buffer I/O error on dev loop7, logical block 1984, async page read [ 81.230880][ T5741] I/O error, dev loop7, sector 0 op 0x1:(WRITE) flags 0x4800 phys_seg 128 prio class 0 [ 81.240687][ T5741] Buffer I/O error on dev loop7, logical block 0, lost async page write [ 81.249054][ T5741] Buffer I/O error on dev loop7, logical block 1, lost async page write [ 81.257400][ T5741] Buffer I/O error on dev loop7, logical block 2, lost async page write [ 81.265813][ T5741] Buffer I/O error on dev loop7, logical block 3, lost async page write [ 81.274226][ T5741] Buffer I/O error on dev loop7, logical block 4, lost async page write [ 81.282665][ T5741] Buffer I/O error on dev loop7, logical block 5, lost async page write [ 81.291145][ T5741] Buffer I/O error on dev loop7, logical block 6, lost async page write [ 81.299493][ T5741] Buffer I/O error on dev loop7, logical block 7, lost async page write [ 81.307882][ T5741] Buffer I/O error on dev loop7, logical block 8, lost async page write [ 81.318510][ T5741] I/O error, dev loop7, sector 1024 op 0x1:(WRITE) flags 0x4800 phys_seg 128 prio class 0 [ 81.331092][ T5741] I/O error, dev loop7, sector 2048 op 0x1:(WRITE) flags 0x4800 phys_seg 128 prio class 0 [ 81.343440][ T5741] I/O error, dev loop7, sector 3072 op 0x1:(WRITE) flags 0x4800 phys_seg 128 prio class 0 [ 81.355665][ T5741] I/O error, dev loop7, sector 4096 op 0x1:(WRITE) flags 0x4800 phys_seg 128 prio class 0 [ 81.368002][ T5741] I/O error, dev loop7, sector 5120 op 0x1:(WRITE) flags 0x4800 phys_seg 128 prio class 0 [ 81.380659][ T5741] I/O error, dev loop7, sector 6144 op 0x1:(WRITE) flags 0x4800 phys_seg 128 prio class 0 [ 81.599639][ T29] kauditd_printk_skb: 226 callbacks suppressed [ 81.599653][ T29] audit: type=1400 audit(1734736631.416:54915): avc: denied { listen } for pid=5750 comm="syz.0.801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 81.625917][ T29] audit: type=1400 audit(1734736631.416:54916): avc: denied { accept } for pid=5750 comm="syz.0.801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 81.822550][ T29] audit: type=1400 audit(1734736631.636:54917): avc: denied { connect } for pid=5754 comm="syz.4.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 81.858240][ T5757] loop4: detected capacity change from 0 to 512 [ 81.869734][ T5757] EXT4-fs error (device loop4): ext4_orphan_get:1389: inode #15: comm syz.4.803: casefold flag without casefold feature [ 81.882622][ T5757] EXT4-fs error (device loop4): ext4_orphan_get:1394: comm syz.4.803: couldn't read orphan inode 15 (err -117) [ 81.895043][ T5757] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 81.914594][ T29] audit: type=1400 audit(1734736631.726:54918): avc: denied { create } for pid=5756 comm="syz.4.803" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 81.955310][ T3297] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 81.975557][ T5764] tipc: Started in network mode [ 81.980546][ T5764] tipc: Node identity fe80000000000000000000000000001, cluster identity 4711 [ 81.993041][ T5764] tipc: Enabled bearer , priority 10 [ 82.018361][ T29] audit: type=1400 audit(1734736631.836:54919): avc: denied { create } for pid=5768 comm="syz.2.807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 82.029018][ T5769] loop2: detected capacity change from 0 to 2048 [ 82.048307][ T5769] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 82.098269][ T29] audit: type=1400 audit(1734736631.916:54920): avc: denied { create } for pid=5775 comm="syz.4.809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 82.117877][ T29] audit: type=1400 audit(1734736631.916:54921): avc: denied { bind } for pid=5775 comm="syz.4.809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 82.137307][ T29] audit: type=1400 audit(1734736631.916:54922): avc: denied { listen } for pid=5775 comm="syz.4.809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 82.157333][ T29] audit: type=1326 audit(1734736631.916:54923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5775 comm="syz.4.809" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1db60f5d29 code=0x7ffc0000 [ 82.180771][ T29] audit: type=1326 audit(1734736631.916:54924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5775 comm="syz.4.809" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f1db60f5d29 code=0x7ffc0000 [ 82.223310][ T3302] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 82.277674][ T5783] loop7: detected capacity change from 0 to 16384 [ 82.392455][ T5612] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.403872][ T5612] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.415982][ T5612] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.451981][ T5612] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.495605][ T5790] __nla_validate_parse: 1 callbacks suppressed [ 82.495622][ T5790] netlink: 8 bytes leftover after parsing attributes in process `syz.3.814'. [ 82.511667][ T5790] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 82.585158][ T5788] loop2: detected capacity change from 0 to 2048 [ 82.636900][ T5788] loop2: p1 < > p4 [ 82.641979][ T5788] loop2: p4 size 8388608 extends beyond EOD, truncated [ 82.689878][ T5803] loop0: detected capacity change from 0 to 1024 [ 82.708257][ T5803] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 82.725853][ T5805] syzkaller0: entered promiscuous mode [ 82.731551][ T5805] syzkaller0: entered allmulticast mode [ 82.731639][ T5803] EXT4-fs error (device loop0): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 4278190105 free clusters [ 82.760557][ T5803] EXT4-fs (loop0): Delayed block allocation failed for inode 18 at logical offset 1023 with max blocks 2 with error 28 [ 82.773052][ T5803] EXT4-fs (loop0): This should not happen!! Data will be lost [ 82.773052][ T5803] [ 82.783016][ T5803] EXT4-fs (loop0): Total free blocks count 0 [ 82.789091][ T5803] EXT4-fs (loop0): Free/Dirty block details [ 82.795109][ T5803] EXT4-fs (loop0): free_blocks=68451041280 [ 82.800947][ T5803] EXT4-fs (loop0): dirty_blocks=32 [ 82.806066][ T5803] EXT4-fs (loop0): Block reservation details [ 82.812176][ T5803] EXT4-fs (loop0): i_reserved_data_blocks=2 [ 82.832734][ T5803] EXT4-fs (loop0): Delayed block allocation failed for inode 18 at logical offset 16384 with max blocks 1 with error 28 [ 82.940600][ T5818] hsr_slave_0 (unregistering): left promiscuous mode [ 82.996602][ T9] tipc: Node number set to 4269801488 [ 83.017291][ T5821] netdevsim netdevsim2 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.025717][ T5821] netdevsim netdevsim2 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.034097][ T5821] netdevsim netdevsim2 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.042516][ T5821] netdevsim netdevsim2 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.052338][ T5821] geneve1: left promiscuous mode [ 83.443585][ T5824] netlink: 8 bytes leftover after parsing attributes in process `syz.4.827'. [ 83.453413][ T5824] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 83.495810][ T5827] netlink: 24 bytes leftover after parsing attributes in process `syz.4.830'. [ 83.504718][ T5827] netlink: 108 bytes leftover after parsing attributes in process `syz.4.830'. [ 83.779359][ T5841] loop0: detected capacity change from 0 to 256 [ 83.836149][ T5845] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 84.740268][ T5869] syz.3.844[5869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.740392][ T5869] syz.3.844[5869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.751931][ T5869] syz.3.844[5869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.784543][ T24] kernel write not supported for file /snd/seq (pid: 24 comm: kworker/1:0) [ 84.816929][ T5874] loop1: detected capacity change from 0 to 2048 [ 84.866770][ T5874] loop1: p1 < > p4 [ 84.871099][ T5874] loop1: p4 size 8388608 extends beyond EOD, truncated [ 84.883358][ T2998] loop1: p1 < > p4 [ 84.895142][ T2998] loop1: p4 size 8388608 extends beyond EOD, truncated [ 84.920437][ T3290] udevd[3290]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 84.935285][ T3287] udevd[3287]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 84.951610][ T3290] udevd[3290]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 84.962725][ T3287] udevd[3287]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 85.025786][ T5884] loop2: detected capacity change from 0 to 1024 [ 85.283349][ T5893] syzkaller0: entered promiscuous mode [ 85.288918][ T5893] syzkaller0: entered allmulticast mode [ 86.296777][ T5919] loop0: detected capacity change from 0 to 512 [ 86.304602][ T5919] EXT4-fs: Ignoring removed bh option [ 86.353929][ T5919] EXT4-fs error (device loop0): __ext4_iget:4984: inode #12: block 2: comm syz.0.864: invalid block [ 86.369011][ T5919] EXT4-fs error (device loop0): ext4_orphan_get:1394: comm syz.0.864: couldn't read orphan inode 12 (err -117) [ 86.381514][ T5919] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 86.398540][ T5919] bridge0: port 3(syz_tun) entered blocking state [ 86.405034][ T5919] bridge0: port 3(syz_tun) entered disabled state [ 86.411672][ T5919] syz_tun: entered allmulticast mode [ 86.417465][ T5919] syz_tun: entered promiscuous mode [ 86.422827][ T5919] bridge0: port 3(syz_tun) entered blocking state [ 86.429375][ T5919] bridge0: port 3(syz_tun) entered forwarding state [ 86.448739][ T3296] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 86.620748][ T5939] loop1: detected capacity change from 0 to 512 [ 86.629702][ T5939] EXT4-fs (loop1): invalid inodes per group: 524320 [ 86.629702][ T5939] [ 86.703884][ T29] kauditd_printk_skb: 428 callbacks suppressed [ 86.703900][ T29] audit: type=1400 audit(1734736892.514:55353): avc: denied { mount } for pid=5942 comm="syz.2.872" name="/" dev="hugetlbfs" ino=11224 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 86.704182][ T5943] SELinux: syz.2.872 (5943) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 86.736114][ T5945] loop1: detected capacity change from 0 to 1024 [ 86.767616][ T5945] EXT4-fs (loop1): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 86.781866][ T5945] EXT4-fs error (device loop1): ext4_read_block_bitmap_nowait:483: comm syz.1.873: Invalid block bitmap block 0 in block_group 0 [ 86.808748][ T5945] Quota error (device loop1): write_blk: dquota write failed [ 86.816168][ T5945] Quota error (device loop1): qtree_write_dquot: Error -117 occurred while creating quota [ 86.827316][ T5945] EXT4-fs error (device loop1): ext4_acquire_dquot:6938: comm syz.1.873: Failed to acquire dquot type 0 [ 86.839574][ T5954] raw_sendmsg: syz.3.877 forgot to set AF_INET. Fix it! [ 86.840067][ T5945] EXT4-fs error (device loop1): ext4_free_blocks:6589: comm syz.1.873: Freeing blocks not in datazone - block = 0, count = 4096 [ 86.847437][ T5954] netlink: 132 bytes leftover after parsing attributes in process `syz.3.877'. [ 86.872918][ T5954] netlink: 'syz.3.877': attribute type 10 has an invalid length. [ 86.880514][ T5945] EXT4-fs error (device loop1): ext4_read_inode_bitmap:139: comm syz.1.873: Invalid inode bitmap blk 0 in block_group 0 [ 86.894991][ T5957] rtc_cmos 00:00: Alarms can be up to one day in the future [ 86.898176][ T5954] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 86.902951][ T5957] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5957 comm=syz.2.878 [ 86.910964][ T11] Quota error (device loop1): do_check_range: Getting block 0 out of range 1-7 [ 86.932194][ T11] EXT4-fs error (device loop1): ext4_release_dquot:6961: comm kworker/u8:0: Failed to release dquot type 0 [ 86.946004][ T5945] EXT4-fs error (device loop1) in ext4_free_inode:361: Corrupt filesystem [ 86.954834][ T5945] EXT4-fs (loop1): 1 orphan inode deleted [ 86.961573][ T5945] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 86.993601][ T29] audit: type=1326 audit(1734736892.804:55354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5944 comm="syz.1.873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0619655d29 code=0x7ffc0000 [ 87.017149][ T29] audit: type=1326 audit(1734736892.804:55355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5944 comm="syz.1.873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0619655d29 code=0x7ffc0000 [ 87.040561][ T29] audit: type=1326 audit(1734736892.804:55356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5944 comm="syz.1.873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f0619655d29 code=0x7ffc0000 [ 87.064050][ T29] audit: type=1326 audit(1734736892.804:55357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5944 comm="syz.1.873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0619655d29 code=0x7ffc0000 [ 87.087445][ T29] audit: type=1326 audit(1734736892.804:55358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5944 comm="syz.1.873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0619655d29 code=0x7ffc0000 [ 87.111023][ T29] audit: type=1326 audit(1734736892.804:55359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5944 comm="syz.1.873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f0619655d29 code=0x7ffc0000 [ 87.170201][ T9] rtc_cmos 00:00: Alarms can be up to one day in the future [ 87.177843][ T9] rtc_cmos 00:00: Alarms can be up to one day in the future [ 87.185390][ T9] rtc_cmos 00:00: Alarms can be up to one day in the future [ 87.192904][ T9] rtc_cmos 00:00: Alarms can be up to one day in the future [ 87.200207][ T9] rtc rtc0: __rtc_set_alarm: err=-22 [ 87.574144][ T3298] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 87.605634][ T5968] loop0: detected capacity change from 0 to 512 [ 87.612366][ T5968] journal_path: Lookup failure for './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa' [ 87.636172][ T5968] EXT4-fs: error: could not find journal device path [ 87.675951][ T5973] loop1: detected capacity change from 0 to 256 [ 87.851707][ T5976] loop4: detected capacity change from 0 to 512 [ 88.062837][ T5984] syz.4.886[5984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.062957][ T5984] syz.4.886[5984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.110063][ T5984] syz.4.886[5984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.517326][ T6009] loop0: detected capacity change from 0 to 128 [ 88.522148][ T6012] netlink: 36 bytes leftover after parsing attributes in process `syz.3.897'. [ 88.543727][ T6012] netlink: 36 bytes leftover after parsing attributes in process `syz.3.897'. [ 88.567977][ T6012] netlink: 36 bytes leftover after parsing attributes in process `syz.3.897'. [ 88.601740][ T6012] netlink: 36 bytes leftover after parsing attributes in process `syz.3.897'. [ 88.610860][ T6012] netlink: 36 bytes leftover after parsing attributes in process `syz.3.897'. [ 88.625753][ T6012] netlink: 36 bytes leftover after parsing attributes in process `syz.3.897'. [ 88.754287][ T6012] netlink: 36 bytes leftover after parsing attributes in process `syz.3.897'. [ 88.763248][ T6012] netlink: 36 bytes leftover after parsing attributes in process `syz.3.897'. [ 88.959740][ T6012] netlink: 36 bytes leftover after parsing attributes in process `syz.3.897'. [ 89.213141][ T6032] loop4: detected capacity change from 0 to 1024 [ 89.278690][ T6034] loop0: detected capacity change from 0 to 2048 [ 89.295672][ T6032] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 89.323859][ T6034] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 89.352678][ T6032] EXT4-fs (loop4): shut down requested (0) [ 89.385830][ T6032] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop4 ino=12 [ 89.415218][ T6032] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop4 ino=12 [ 89.435921][ T3296] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 89.445602][ T6032] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop4 ino=12 [ 89.485963][ T6032] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop4 ino=15 [ 89.506912][ T6032] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop4 ino=12 [ 89.521268][ T6032] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop4 ino=15 [ 89.530174][ T6032] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop4 ino=12 [ 89.578604][ T3297] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 89.768164][ T6044] bond_slave_0: entered promiscuous mode [ 89.773844][ T6044] bond_slave_1: entered promiscuous mode [ 89.780954][ T6044] macvtap1: entered promiscuous mode [ 89.786245][ T6044] bond0: entered promiscuous mode [ 89.799535][ T6044] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 89.819515][ T6044] bond0: left promiscuous mode [ 89.824563][ T6044] bond_slave_0: left promiscuous mode [ 89.830012][ T6044] bond_slave_1: left promiscuous mode [ 89.973703][ T6047] loop0: detected capacity change from 0 to 512 [ 90.001614][ T6049] loop1: detected capacity change from 0 to 128 [ 90.010459][ T6047] EXT4-fs: Ignoring removed orlov option [ 90.030069][ T6049] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 90.043054][ T6047] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 90.062748][ T6049] ext4 filesystem being mounted at /179/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 90.084194][ T6047] EXT4-fs (loop0): 1 truncate cleaned up [ 90.107972][ T6047] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 90.143913][ T6053] loop4: detected capacity change from 0 to 128 [ 90.170327][ T6054] SELinux: Context system_u:object_r:mouse_device_t:s0 is not valid (left unmapped). [ 90.181560][ T3296] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 90.224459][ T3298] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 90.225761][ T6057] loop0: detected capacity change from 0 to 512 [ 90.250025][ T6057] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 90.258831][ T6057] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended [ 90.267922][ T6057] EXT4-fs (loop0): blocks per group (3008) and clusters per group (32768) inconsistent [ 90.289468][ T6053] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.349414][ T6053] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.399654][ T6070] SELinux: Context system_u:object_r:devicekit_power_exec_t:s0 is not valid (left unmapped). [ 90.399777][ T6053] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.506445][ T6053] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.593056][ T6053] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.623726][ T6053] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.636448][ T6053] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.648089][ T6053] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.958593][ T6098] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 91.004330][ T6100] loop1: detected capacity change from 0 to 512 [ 91.025883][ T6100] EXT4-fs (loop1): orphan cleanup on readonly fs [ 91.036312][ T6100] EXT4-fs warning (device loop1): ext4_enable_quotas:7156: Failed to enable quota tracking (type=2, err=-22, ino=15). Please run e2fsck to fix. [ 91.051754][ T6100] EXT4-fs (loop1): Cannot turn on quotas: error -22 [ 91.059195][ T6100] EXT4-fs error (device loop1): ext4_ext_check_inode:524: inode #13: comm syz.1.930: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 91.084235][ T6100] EXT4-fs error (device loop1): ext4_orphan_get:1394: comm syz.1.930: couldn't read orphan inode 13 (err -117) [ 91.096753][ T6100] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 91.121723][ T6100] EXT4-fs (loop1): warning: mounting fs with errors, running e2fsck is recommended [ 91.132378][ T6100] EXT4-fs warning (device loop1): read_mmp_block:115: Error -117 while reading MMP block 2 [ 91.180388][ T6105] loop0: detected capacity change from 0 to 2048 [ 91.187180][ T3298] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 91.220245][ T6105] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 91.349510][ T6114] netlink: 36 bytes leftover after parsing attributes in process `syz.4.931'. [ 91.366344][ T6115] loop1: detected capacity change from 0 to 256 [ 91.376297][ T3296] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 92.033667][ T6155] capability: warning: `syz.2.947' uses deprecated v2 capabilities in a way that may be insecure [ 92.081028][ T6155] usb usb4: usbfs: process 6155 (syz.2.947) did not claim interface 0 before use [ 92.112846][ T3298] FAT-fs (loop1): error, corrupted directory (invalid entries) [ 92.137402][ T3298] FAT-fs (loop1): error, corrupted directory (invalid entries) [ 92.778230][ T29] kauditd_printk_skb: 741 callbacks suppressed [ 92.778243][ T29] audit: type=1400 audit(1734736898.584:56101): avc: denied { mounton } for pid=6165 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 92.949607][ T6165] chnl_net:caif_netlink_parms(): no params data found [ 93.146902][ T6165] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.153984][ T6165] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.175015][ T6165] bridge_slave_0: entered allmulticast mode [ 93.194413][ T6165] bridge_slave_0: entered promiscuous mode [ 93.215839][ T6165] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.223031][ T6165] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.266523][ T6165] bridge_slave_1: entered allmulticast mode [ 93.283102][ T6165] bridge_slave_1: entered promiscuous mode [ 93.433402][ T6165] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 93.457723][ T6165] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 93.491082][ T6165] team0: Port device team_slave_0 added [ 93.497611][ T6165] team0: Port device team_slave_1 added [ 93.513779][ T6165] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 93.520847][ T6165] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 93.546911][ T6165] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 93.558212][ T6165] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 93.565311][ T6165] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 93.591269][ T6165] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 93.613768][ T29] audit: type=1326 audit(1734736899.424:56102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6185 comm="syz.3.954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff414e15d29 code=0x7ffc0000 [ 93.637251][ T29] audit: type=1326 audit(1734736899.424:56103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6185 comm="syz.3.954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff414e15d29 code=0x7ffc0000 [ 93.652689][ T6197] netlink: 'syz.2.966': attribute type 4 has an invalid length. [ 93.660693][ T29] audit: type=1326 audit(1734736899.424:56104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6185 comm="syz.3.954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7ff414e15d29 code=0x7ffc0000 [ 93.691799][ T29] audit: type=1326 audit(1734736899.454:56105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6185 comm="syz.3.954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff414e15d29 code=0x7ffc0000 [ 93.715304][ T29] audit: type=1326 audit(1734736899.454:56106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6185 comm="syz.3.954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff414e15d29 code=0x7ffc0000 [ 93.752899][ T29] audit: type=1326 audit(1734736899.564:56107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6196 comm="syz.0.957" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e8d975d29 code=0x7ffc0000 [ 93.806870][ T6165] hsr_slave_0: entered promiscuous mode [ 93.812578][ T29] audit: type=1326 audit(1734736899.564:56108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6185 comm="syz.3.954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=126 compat=0 ip=0x7ff414e15d29 code=0x7ffc0000 [ 93.836046][ T29] audit: type=1326 audit(1734736899.564:56109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6185 comm="syz.3.954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff414e15d29 code=0x7ffc0000 [ 93.859645][ T2980] audit: audit_backlog=65 > audit_backlog_limit=64 [ 93.867206][ T6165] hsr_slave_1: entered promiscuous mode [ 93.888458][ T6165] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 93.896140][ T6165] Cannot create hsr debugfs directory [ 93.930069][ T6209] netlink: 'syz.4.963': attribute type 322 has an invalid length. [ 93.943467][ T6215] rtc_cmos 00:00: Alarms can be up to one day in the future [ 93.966894][ T6215] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6215 comm=syz.0.965 [ 94.064292][ T6165] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 94.101981][ T6165] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 94.138393][ T6165] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 94.154060][ T6165] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 94.161266][ T9] rtc_cmos 00:00: Alarms can be up to one day in the future [ 94.168870][ T9] rtc_cmos 00:00: Alarms can be up to one day in the future [ 94.176443][ T9] rtc_cmos 00:00: Alarms can be up to one day in the future [ 94.184044][ T9] rtc_cmos 00:00: Alarms can be up to one day in the future [ 94.191369][ T9] rtc rtc0: __rtc_set_alarm: err=-22 [ 94.309251][ T6165] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.341647][ T6165] 8021q: adding VLAN 0 to HW filter on device team0 [ 94.353850][ T6235] __nla_validate_parse: 10 callbacks suppressed [ 94.353863][ T6235] netlink: 4 bytes leftover after parsing attributes in process `syz.3.974'. [ 94.378448][ T6165] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 94.388943][ T6165] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 94.408381][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.415468][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.436130][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.443226][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.616222][ T6165] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 94.718206][ T6253] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 94.767573][ T6253] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 94.801366][ T6262] loop4: detected capacity change from 0 to 256 [ 94.822380][ T6253] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 94.878775][ T6253] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 94.907334][ T6165] veth0_vlan: entered promiscuous mode [ 94.917954][ T6165] veth1_vlan: entered promiscuous mode [ 94.964143][ T6253] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.989478][ T6165] veth0_macvtap: entered promiscuous mode [ 95.007009][ T6165] veth1_macvtap: entered promiscuous mode [ 95.015982][ T6253] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.044614][ T6253] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.077437][ T6165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 95.087984][ T6165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 95.097797][ T6165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 95.108218][ T6165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 95.118123][ T6165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 95.128569][ T6165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 95.175727][ T6165] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 95.193854][ T6253] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.233522][ T6165] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 95.243993][ T6165] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 95.264911][ T6165] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 95.276594][ T6165] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.285385][ T6165] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.294189][ T6165] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.303012][ T6165] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.553451][ T3297] FAT-fs (loop4): error, corrupted directory (invalid entries) [ 95.565068][ T3297] FAT-fs (loop4): error, corrupted directory (invalid entries) [ 95.873977][ T6294] netlink: 4 bytes leftover after parsing attributes in process `syz.3.988'. [ 95.898190][ T28] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 95.978001][ T28] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 96.047524][ T28] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 96.060222][ T6296] chnl_net:caif_netlink_parms(): no params data found [ 96.091855][ T6296] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.098986][ T6296] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.106333][ T6296] bridge_slave_0: entered allmulticast mode [ 96.113004][ T6296] bridge_slave_0: entered promiscuous mode [ 96.125625][ T6296] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.132816][ T6296] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.140460][ T6296] bridge_slave_1: entered allmulticast mode [ 96.148327][ T6296] bridge_slave_1: entered promiscuous mode [ 96.155535][ T28] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 96.181178][ T6296] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 96.191973][ T6296] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 96.213825][ T6296] team0: Port device team_slave_0 added [ 96.237760][ T6296] team0: Port device team_slave_1 added [ 96.461911][ T28] @ (unregistering): (slave bond_slave_0): Releasing backup interface [ 96.475202][ T28] @ (unregistering): (slave bond_slave_1): Releasing backup interface [ 96.484661][ T28] @ (unregistering): Released all slaves [ 96.566086][ T6296] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 96.573158][ T6296] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 96.599185][ T6296] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 96.681474][ T28] tipc: Disabling bearer [ 96.686946][ T28] tipc: Left network mode [ 96.712698][ T28] hsr_slave_0: left promiscuous mode [ 96.720956][ T28] hsr_slave_1: left promiscuous mode [ 96.727009][ T28] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 96.734445][ T28] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 96.742030][ T28] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 96.749540][ T28] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 96.758462][ T28] veth1_macvtap: left promiscuous mode [ 96.763971][ T28] veth0_macvtap: left promiscuous mode [ 96.769492][ T28] veth1_vlan: left promiscuous mode [ 96.774739][ T28] veth0_vlan: left promiscuous mode [ 96.845884][ T6296] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 96.852947][ T6296] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 96.879042][ T6296] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 96.932224][ T6296] hsr_slave_0: entered promiscuous mode [ 96.938150][ T6296] hsr_slave_1: entered promiscuous mode [ 96.938443][ T6296] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 96.938456][ T6296] Cannot create hsr debugfs directory [ 97.094971][ T6296] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 97.120513][ T6359] loop0: detected capacity change from 0 to 512 [ 97.128219][ T6359] EXT4-fs: Ignoring removed mblk_io_submit option [ 97.134709][ T6359] EXT4-fs: quotafile must be on filesystem root [ 97.137309][ T6296] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 97.173785][ T6296] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 97.185068][ T6296] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 97.255260][ T6296] 8021q: adding VLAN 0 to HW filter on device bond0 [ 97.265885][ T6296] 8021q: adding VLAN 0 to HW filter on device team0 [ 97.297427][ T28] IPVS: stop unused estimator thread 0... [ 97.306428][ T1592] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.313575][ T1592] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.343406][ T1592] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.350568][ T1592] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.397412][ T6296] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 97.499460][ T6296] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 97.670344][ T6296] veth0_vlan: entered promiscuous mode [ 97.682307][ T6296] veth1_vlan: entered promiscuous mode [ 97.700995][ T6296] veth0_macvtap: entered promiscuous mode [ 97.708633][ T6296] veth1_macvtap: entered promiscuous mode [ 97.719726][ T6296] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 97.730188][ T6296] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.740201][ T6296] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 97.750633][ T6296] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.760543][ T6296] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 97.770991][ T6296] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.782302][ T6296] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 97.793198][ T6296] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 97.803688][ T6296] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.825432][ T6296] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 97.844192][ T6296] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.852963][ T6296] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.861758][ T6296] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.870489][ T6296] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.123452][ T29] kauditd_printk_skb: 230 callbacks suppressed [ 98.123465][ T29] audit: type=1326 audit(1734736903.934:56323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.5.1004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 98.207447][ T29] audit: type=1326 audit(1734736903.974:56324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.5.1004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 98.231133][ T29] audit: type=1326 audit(1734736903.974:56325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.5.1004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 98.254738][ T29] audit: type=1326 audit(1734736903.974:56326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.5.1004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 98.278290][ T29] audit: type=1326 audit(1734736903.974:56327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.5.1004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 98.301864][ T29] audit: type=1326 audit(1734736903.974:56328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.5.1004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 98.325405][ T29] audit: type=1326 audit(1734736903.974:56329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.5.1004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 98.348981][ T29] audit: type=1326 audit(1734736903.974:56330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.5.1004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 98.372459][ T29] audit: type=1326 audit(1734736903.974:56331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.5.1004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 98.396027][ T29] audit: type=1326 audit(1734736903.974:56332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6448 comm="syz.5.1004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 98.417849][ T6451] syz.2.1005[6451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.435425][ T6451] syz.2.1005[6451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.455058][ T6471] loop6: detected capacity change from 0 to 256 [ 98.485419][ T6475] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1005'. [ 98.495749][ T6451] syz.2.1005[6451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.520874][ T6475] hsr_slave_0: left promiscuous mode [ 98.539567][ T6481] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 98.551481][ T6481] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 98.604347][ T6481] loop0: detected capacity change from 0 to 512 [ 99.055788][ T6516] loop5: detected capacity change from 0 to 128 [ 99.354357][ T6526] netlink: 96 bytes leftover after parsing attributes in process `syz.3.1016'. [ 99.417037][ T6519] loop5: detected capacity change from 0 to 1024 [ 99.427782][ T6519] EXT4-fs: Project quota feature not enabled. Cannot enable project quota enforcement. [ 100.232891][ T6557] netlink: 'syz.5.1024': attribute type 10 has an invalid length. [ 100.247358][ T6557] geneve1: entered promiscuous mode [ 100.256131][ T6557] bond0: (slave geneve1): Enslaving as an active interface with an up link [ 100.922989][ T6568] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1029'. [ 100.957377][ T6566] syz.2.1028[6566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.957457][ T6566] syz.2.1028[6566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.975113][ T6566] syz.2.1028[6566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.152212][ T6590] 9pnet_fd: Insufficient options for proto=fd [ 101.622764][ T6607] loop0: detected capacity change from 0 to 512 [ 101.674494][ T6607] EXT4-fs error (device loop0): ext4_get_journal_inode:5809: inode #32: comm syz.0.1042: iget: special inode unallocated [ 101.692837][ T6607] EXT4-fs (loop0): Remounting filesystem read-only [ 101.699494][ T6607] EXT4-fs (loop0): no journal found [ 101.704832][ T6607] EXT4-fs (loop0): can't get journal size [ 101.726129][ T6607] EXT4-fs (loop0): warning: mounting fs with errors, running e2fsck is recommended [ 101.759454][ T6613] netlink: 132 bytes leftover after parsing attributes in process `syz.6.1044'. [ 101.818608][ T6607] EXT4-fs (loop0): failed to initialize system zone (-117) [ 101.826058][ T6607] EXT4-fs (loop0): mount failed [ 101.966080][ T6619] SELinux: security_context_str_to_sid (u) failed with errno=-22 [ 102.540139][ T6625] loop5: detected capacity change from 0 to 128 [ 102.551253][ T6625] loop5: detected capacity change from 0 to 512 [ 102.557935][ T6625] EXT4-fs: Ignoring removed orlov option [ 102.563989][ T6625] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 102.579005][ T6625] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 102.591817][ T6625] ext4 filesystem being mounted at /13/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 102.731011][ T6625] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm syz.5.1048: bg 0: block 255: padding at end of block bitmap is not set [ 102.750292][ T6625] EXT4-fs (loop5): Remounting filesystem read-only [ 102.769704][ T6625] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop5 ino=12 [ 102.781318][ T6625] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop5 ino=12 [ 102.928193][ T6165] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 103.052754][ T6647] loop5: detected capacity change from 0 to 256 [ 103.083138][ T6648] loop0: detected capacity change from 0 to 128 [ 103.128984][ T29] kauditd_printk_skb: 674 callbacks suppressed [ 103.129000][ T29] audit: type=1326 audit(1734736908.934:57005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6646 comm="syz.5.1051" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 103.322164][ T29] audit: type=1326 audit(1734736908.974:57006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6646 comm="syz.5.1051" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 103.345889][ T29] audit: type=1326 audit(1734736908.974:57007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6646 comm="syz.5.1051" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 103.369563][ T29] audit: type=1326 audit(1734736908.974:57008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6646 comm="syz.5.1051" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 103.393236][ T29] audit: type=1326 audit(1734736908.974:57009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6646 comm="syz.5.1051" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 103.416760][ T29] audit: type=1326 audit(1734736908.974:57010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6646 comm="syz.5.1051" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 103.440334][ T29] audit: type=1326 audit(1734736908.974:57011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6646 comm="syz.5.1051" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 103.464402][ T29] audit: type=1326 audit(1734736908.974:57012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6646 comm="syz.5.1051" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 103.487912][ T29] audit: type=1326 audit(1734736908.984:57013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6646 comm="syz.5.1051" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 103.511405][ T29] audit: type=1326 audit(1734736908.984:57014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6646 comm="syz.5.1051" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb012875d29 code=0x7ffc0000 [ 104.025648][ T6661] loop5: detected capacity change from 0 to 128 [ 104.376328][ T3394] bio_check_eod: 216 callbacks suppressed [ 104.376343][ T3394] kworker/u8:7: attempt to access beyond end of device [ 104.376343][ T3394] loop0: rw=1, sector=145, nr_sectors = 896 limit=128 [ 104.400386][ T6675] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 104.435669][ T6675] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 104.482347][ T6678] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1059'. [ 106.704422][ T6748] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1088'. [ 107.135023][ T6753] loop6: detected capacity change from 0 to 128 [ 107.526530][ T6752] netlink: 2 bytes leftover after parsing attributes in process `syz.5.1081'. [ 107.658552][ T6767] loop5: detected capacity change from 0 to 512 [ 107.667384][ T3309] kworker/u8:6: attempt to access beyond end of device [ 107.667384][ T3309] loop6: rw=1, sector=145, nr_sectors = 896 limit=128 [ 107.705056][ T6767] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 107.718281][ T6767] ext4 filesystem being mounted at /21/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 107.731257][ T6774] xt_hashlimit: size too large, truncated to 1048576 [ 107.764267][ T6165] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 108.156323][ T29] kauditd_printk_skb: 213 callbacks suppressed [ 108.156337][ T29] audit: type=1326 audit(1734736913.964:57228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6789 comm="syz.2.1099" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2f4e035d29 code=0x7ffc0000 [ 108.239576][ T29] audit: type=1326 audit(1734736914.004:57229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6789 comm="syz.2.1099" exe="/root/syz-executor" sig=0 arch=c000003e syscall=13 compat=0 ip=0x7f2f4e035d29 code=0x7ffc0000 [ 108.263650][ T29] audit: type=1326 audit(1734736914.004:57230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6789 comm="syz.2.1099" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2f4e035d29 code=0x7ffc0000 [ 108.287238][ T29] audit: type=1326 audit(1734736914.004:57231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6789 comm="syz.2.1099" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2f4e035d29 code=0x7ffc0000 [ 108.310837][ T29] audit: type=1326 audit(1734736914.004:57232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6789 comm="syz.2.1099" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2f4e035d29 code=0x7ffc0000 [ 108.334427][ T29] audit: type=1326 audit(1734736914.004:57233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6789 comm="syz.2.1099" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2f4e035d29 code=0x7ffc0000 [ 108.357928][ T29] audit: type=1326 audit(1734736914.004:57234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6789 comm="syz.2.1099" exe="/root/syz-executor" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7f2f4e035d29 code=0x7ffc0000 [ 108.381406][ T29] audit: type=1326 audit(1734736914.004:57235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6789 comm="syz.2.1099" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2f4e035d29 code=0x7ffc0000 [ 108.404894][ T29] audit: type=1326 audit(1734736914.004:57236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6789 comm="syz.2.1099" exe="/root/syz-executor" sig=0 arch=c000003e syscall=249 compat=0 ip=0x7f2f4e035d29 code=0x7ffc0000 [ 108.428620][ T29] audit: type=1326 audit(1734736914.004:57237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6789 comm="syz.2.1099" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2f4e035d29 code=0x7ffc0000 [ 108.452858][ T6802] tipc: New replicast peer: 255.255.255.255 [ 108.459000][ T6802] tipc: Enabled bearer , priority 10 [ 108.549521][ T6809] loop5: detected capacity change from 0 to 512 [ 108.577930][ T6809] EXT4-fs (loop5): blocks per group (255) and clusters per group (8192) inconsistent [ 108.621720][ T6809] tipc: Started in network mode [ 108.626695][ T6809] tipc: Node identity ac14140f, cluster identity 4711 [ 108.656581][ T6809] tipc: New replicast peer: 255.255.255.255 [ 108.662722][ T6809] tipc: Enabled bearer , priority 10 [ 108.692994][ T6826] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1107'. [ 108.723582][ T6829] loop0: detected capacity change from 0 to 512 [ 108.868490][ T6829] EXT4-fs (loop0): orphan cleanup on readonly fs [ 108.876222][ T6829] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz.0.1110: bg 0: block 248: padding at end of block bitmap is not set [ 108.894317][ T6829] EXT4-fs error (device loop0): ext4_acquire_dquot:6938: comm syz.0.1110: Failed to acquire dquot type 1 [ 109.157234][ T6829] EXT4-fs (loop0): 1 truncate cleaned up [ 109.167688][ T6829] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 109.385587][ T3296] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 109.775334][ T9] tipc: Node number set to 3087123959 [ 109.811225][ T1029] tipc: Node number set to 2886997007 [ 109.924815][ T6879] Process accounting resumed [ 109.929537][ T6879] kernel write not supported for file /asound/timers (pid: 6879 comm: syz.2.1118) [ 109.973369][ T6880] loop6: detected capacity change from 0 to 1024 [ 110.958801][ T6880] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 111.494877][ T6901] loop0: detected capacity change from 0 to 512 [ 111.534721][ T6901] EXT4-fs (loop0): blocks per group (255) and clusters per group (8192) inconsistent [ 111.535093][ T6906] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1123'. [ 111.588544][ T6296] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 111.605740][ T6903] loop5: detected capacity change from 0 to 4096 [ 111.636845][ T6903] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 111.651717][ T6901] tipc: Enabling of bearer rejected, already enabled [ 111.709236][ T6918] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1124'. [ 111.946599][ T6165] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 112.044593][ T6948] netlink: 'syz.6.1128': attribute type 10 has an invalid length. [ 112.066507][ T6948] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.073775][ T6948] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.091105][ T6948] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.098201][ T6948] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.105575][ T6948] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.112823][ T6948] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.122589][ T6961] netlink: 'syz.5.1129': attribute type 10 has an invalid length. [ 112.158498][ T6948] team0: Port device bridge0 added [ 112.168495][ T6961] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 112.896637][ T7022] loop0: detected capacity change from 0 to 4096 [ 112.905064][ T7024] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1141'. [ 112.919575][ T7024] team0 (unregistering): Port device team_slave_0 removed [ 112.921108][ T7022] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 112.939554][ T7024] team0 (unregistering): Port device team_slave_1 removed [ 113.012978][ T7030] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1144'. [ 113.207436][ T29] kauditd_printk_skb: 180 callbacks suppressed [ 113.207493][ T29] audit: type=1326 audit(1734736918.994:57416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7041 comm="syz.3.1149" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7ff414e0cce7 code=0x7ffc0000 [ 113.237162][ T29] audit: type=1326 audit(1734736918.994:57417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7041 comm="syz.3.1149" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7ff414db1f29 code=0x7ffc0000 [ 113.260615][ T29] audit: type=1326 audit(1734736918.994:57418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7041 comm="syz.3.1149" exe="/root/syz-executor" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7ff414e15d29 code=0x7ffc0000 [ 113.279344][ T3296] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 113.284098][ T29] audit: type=1326 audit(1734736918.994:57419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7041 comm="syz.3.1149" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7ff414e0cce7 code=0x7ffc0000 [ 113.316683][ T29] audit: type=1326 audit(1734736918.994:57420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7041 comm="syz.3.1149" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7ff414db1f29 code=0x7ffc0000 [ 113.340143][ T29] audit: type=1326 audit(1734736918.994:57421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7041 comm="syz.3.1149" exe="/root/syz-executor" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7ff414e15d29 code=0x7ffc0000 [ 113.363684][ T29] audit: type=1326 audit(1734736919.004:57422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7041 comm="syz.3.1149" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7ff414e0cce7 code=0x7ffc0000 [ 113.387100][ T29] audit: type=1326 audit(1734736919.004:57423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7041 comm="syz.3.1149" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7ff414db1f29 code=0x7ffc0000 [ 113.410582][ T29] audit: type=1326 audit(1734736919.004:57424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7041 comm="syz.3.1149" exe="/root/syz-executor" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7ff414e15d29 code=0x7ffc0000 [ 113.434060][ T29] audit: type=1326 audit(1734736919.014:57425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7041 comm="syz.3.1149" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7ff414e0cce7 code=0x7ffc0000 [ 113.480839][ T7052] macvlan1: entered promiscuous mode [ 113.492837][ T7052] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1154'. [ 113.532179][ T7052] macvlan1 (unregistering): left promiscuous mode [ 113.622238][ T7069] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1157'. [ 113.646815][ T7070] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1156'. [ 113.737828][ T7070] team0 (unregistering): Port device team_slave_0 removed [ 113.762088][ T7070] team0 (unregistering): Port device team_slave_1 removed [ 113.770375][ T7085] ref_ctr increment failed for inode: 0x4e4 offset: 0x9 ref_ctr_offset: 0x82 of mm: 0xffff88812f80aa00 [ 113.797114][ T7084] uprobe: syz.0.1160:7084 failed to unregister, leaking uprobe [ 115.065718][ T7113] macvlan1: entered promiscuous mode [ 115.076933][ T7113] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1168'. [ 115.089277][ T7113] macvlan1 (unregistering): left promiscuous mode [ 115.271525][ T7120] netlink: 24 bytes leftover after parsing attributes in process `syz.5.1169'. [ 115.485074][ T7126] netlink: 'syz.3.1171': attribute type 5 has an invalid length. [ 115.492866][ T7126] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1171'. [ 115.945034][ T7139] futex_wake_op: syz.5.1178 tries to shift op by -1; fix this program [ 115.974208][ T7143] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1173'. [ 115.984588][ T7139] netlink: 'syz.5.1178': attribute type 1 has an invalid length. [ 115.997326][ T7142] loop6: detected capacity change from 0 to 164 [ 116.275032][ T7142] rock: corrupted directory entry. extent=41, offset=65536, size=8 [ 116.285929][ T7149] syz.5.1181[7149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.286001][ T7149] syz.5.1181[7149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.303695][ T7150] netlink: 'syz.3.1182': attribute type 3 has an invalid length. [ 116.325133][ T7149] syz.5.1181[7149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.493162][ T7155] loop6: detected capacity change from 0 to 512 [ 116.533495][ T7155] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 116.558947][ T7155] ext4 filesystem being mounted at /30/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 116.623539][ T6296] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 116.812198][ T7174] Cannot find set identified by id 0 to match [ 116.861798][ T7176] sch_tbf: burst 1 is lower than device lo mtu (18) ! [ 116.889109][ T7167] loop0: detected capacity change from 0 to 1024 [ 117.157586][ T7167] EXT4-fs: Project quota feature not enabled. Cannot enable project quota enforcement. [ 117.840501][ T9] IPVS: starting estimator thread 0... [ 117.978873][ T7197] syz.3.1197[7197] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.978958][ T7197] syz.3.1197[7197] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.980393][ T7189] IPVS: using max 2832 ests per chain, 141600 per kthread [ 118.011966][ T7199] __nla_validate_parse: 1 callbacks suppressed [ 118.011981][ T7199] netlink: 12 bytes leftover after parsing attributes in process `syz.6.1198'. [ 118.036450][ T7197] syz.3.1197[7197] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.046766][ T7199] bridge1: port 1(veth3) entered blocking state [ 118.064431][ T7199] bridge1: port 1(veth3) entered disabled state [ 118.075679][ T7199] veth3: entered allmulticast mode [ 118.081386][ T7199] veth3: entered promiscuous mode [ 118.095862][ T7199] bridge1: port 2(veth5) entered blocking state [ 118.102349][ T7199] bridge1: port 2(veth5) entered disabled state [ 118.108953][ T7199] veth5: entered allmulticast mode [ 118.127050][ T7199] veth5: entered promiscuous mode [ 118.257246][ T29] kauditd_printk_skb: 288 callbacks suppressed [ 118.257270][ T29] audit: type=1326 audit(1734736924.074:57714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7213 comm="syz.6.1202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eaa3f5d29 code=0x7ffc0000 [ 118.300993][ T29] audit: type=1326 audit(1734736924.074:57715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7213 comm="syz.6.1202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eaa3f5d29 code=0x7ffc0000 [ 118.324542][ T29] audit: type=1326 audit(1734736924.104:57716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7213 comm="syz.6.1202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0eaa3f5d29 code=0x7ffc0000 [ 118.348468][ T29] audit: type=1326 audit(1734736924.104:57717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7213 comm="syz.6.1202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eaa3f5d29 code=0x7ffc0000 [ 118.372082][ T29] audit: type=1326 audit(1734736924.104:57718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7213 comm="syz.6.1202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eaa3f5d29 code=0x7ffc0000 [ 118.395746][ T29] audit: type=1326 audit(1734736924.104:57719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7213 comm="syz.6.1202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=151 compat=0 ip=0x7f0eaa3f5d29 code=0x7ffc0000 [ 118.452055][ T29] audit: type=1326 audit(1734736924.114:57720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7213 comm="syz.6.1202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eaa3f5d29 code=0x7ffc0000 [ 118.475629][ T29] audit: type=1326 audit(1734736924.114:57721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7213 comm="syz.6.1202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eaa3f5d29 code=0x7ffc0000 [ 118.499513][ T29] audit: type=1326 audit(1734736924.204:57722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7213 comm="syz.6.1202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f0eaa3f5d29 code=0x7ffc0000 [ 118.522971][ T29] audit: type=1326 audit(1734736924.204:57723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7213 comm="syz.6.1202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eaa3f5d29 code=0x7ffc0000 [ 118.556644][ T7220] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1203'. [ 118.602355][ T7224] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1207'. [ 118.617586][ T7224] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1207'. [ 118.628089][ T7220] netlink: 'syz.2.1203': attribute type 1 has an invalid length. [ 118.675027][ T7226] sd 0:0:1:0: device reset [ 118.850830][ T7234] syz.6.1211[7234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.850948][ T7234] syz.6.1211[7234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.867376][ T7234] syz.6.1211[7234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.032912][ T7204] can0: slcan on ttyS3. [ 119.276563][ T7200] can0 (unregistered): slcan off ttyS3. [ 120.796310][ T7266] loop6: detected capacity change from 0 to 1024 [ 120.824819][ T7266] EXT4-fs: Project quota feature not enabled. Cannot enable project quota enforcement. [ 120.837044][ T7285] netlink: 'syz.5.1226': attribute type 4 has an invalid length. [ 120.866159][ T7285] netlink: 'syz.5.1226': attribute type 4 has an invalid length. [ 120.929850][ T7289] netlink: 'syz.0.1229': attribute type 4 has an invalid length. [ 120.934009][ T7293] loop5: detected capacity change from 0 to 512 [ 120.954646][ T7293] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 120.988901][ T7293] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 121.056601][ T7293] EXT4-fs error (device loop5): ext4_do_update_inode:5153: inode #2: comm syz.5.1231: corrupted inode contents [ 121.079754][ T7293] EXT4-fs error (device loop5): ext4_dirty_inode:6041: inode #2: comm syz.5.1231: mark_inode_dirty error [ 121.092177][ T7293] EXT4-fs error (device loop5): ext4_do_update_inode:5153: inode #2: comm syz.5.1231: corrupted inode contents [ 121.142281][ T7309] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 121.154560][ T6165] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 121.236518][ T7317] loop5: detected capacity change from 0 to 512 [ 121.270892][ T7317] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 121.296503][ T7317] ext4 filesystem being mounted at /56/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 121.325625][ T7317] program syz.5.1240 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 121.329314][ T7305] serio: Serial port ttyS3 [ 121.357270][ T6165] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 121.375914][ T7325] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1243'. [ 121.384993][ T7325] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1243'. [ 121.388913][ T7327] loop5: detected capacity change from 0 to 512 [ 121.438515][ T7327] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 121.451221][ T7327] ext4 filesystem being mounted at /57/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 121.499342][ T6165] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 121.537812][ T7335] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.579719][ T7346] netlink: 24 bytes leftover after parsing attributes in process `syz.6.1250'. [ 121.588819][ T7346] netlink: 108 bytes leftover after parsing attributes in process `syz.6.1250'. [ 121.610484][ T7335] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.694631][ T7335] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.777474][ T7335] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.833623][ T7335] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 121.845232][ T7335] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 121.858416][ T7335] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 121.871246][ T7335] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 123.298025][ T29] kauditd_printk_skb: 256 callbacks suppressed [ 123.298035][ T29] audit: type=1400 audit(1734736929.114:57980): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.7 dest=53752 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 123.329927][ T29] audit: type=1400 audit(1734736929.144:57981): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 20 23:22:09 [ 123.352377][ T29] audit: type=1400 audit(1734736929.164:57982): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 123.376047][ T29] audit: type=1400 audit(1734736929.184:57983): avc: denied { recv } for pid=3376 comm="kworker/0:3" saddr=10.128.0.163 src=30030 daddr=10.128.0.7 dest=53752 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 arn kernel: [ 1[ 123.376132][ T29] audit: type=1400 audit(1734736929.184:57984): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 23.298025][ T2[ 123.426837][ T29] audit: type=1400 audit(1734736929.244:57985): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 123.449439][ T29] audit: type=1400 audit(1734736929.244:57986): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 256 callb[ 123.472745][ T29] audit: type=1400 audit(1734736929.244:57987): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 acks suppressed[ 123.496276][ T29] audit: type=1400 audit(1734736929.284:57988): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 20 23:22:09[ 123.519608][ T29] audit: type=1400 audit(1734736929.304:57989): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 123.298035][ T29] audit: type=1400 audit(1734736929.114:57980): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.7 dest=53752 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext Dec 20 23:22:09 syzkaller kern.notice kernel: [ 123.329927][ T29] audit: type=1400 audit(1734736929.144:57981): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:09 syzkaller kern.notice kernel: [ 123.352377][ T29] audit: type=1400 audit(1734736929.164:57982): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:09 syzkaller kern.notice kernel: [ 123.376047][ T29] audit: type=1400 audit(1734736929.184:57983): avc: denied { recv } for pid=3376 comm="kworker/0:3" saddr=10.128.0.163 src=30030 daddr=10.128.0.7 dest=53752 netif=eth0 scontext=root:sysadm_r:sysadm_t tco Dec 20 23:22:09 syzkaller kern.notice kernel: [ 123.376132][ T29] audit: type=1400 audit(1734736929.184:57984): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:09 syzkaller kern.notice kernel: [ 123.426837][ T29] audit: type=1400 audit(1734736929.244:57985): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:09 syzkaller kern.notice kernel: [ 123.449439][ T29] audit: type=1400 audit(1734736929.244:57986): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:09 syzkaller kern.notice kernel: [ 123.472745][ T29] audit: type=1400 audit(1734736929.244:57987): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:09 syzkaller kern.notice kernel: [ 123.496276][ T29] audit: type=1400 audit(1734736929.284:57988): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:09 syzkaller kern.notice kernel: [ 123.519608][ T29] audit: type=1400 audit(1734736929.304:57989): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 128.481777][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 128.481787][ T29] audit: type=1400 audit(1734736934.294:57997): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.7 dest=53752 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 128.512909][ T29] audit: type=1400 audit(1734736934.304:57998): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 20 23:22:14 [ 128.535654][ T29] audit: type=1400 audit(1734736934.354:57999): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 128.558600][ T29] audit: type=1400 audit(1734736934.354:58000): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 128.582454][ T29] audit: type=1400 audit(1734736934.404:58001): avc: denied { recv } for pid=2980 comm="syslogd" saddr=10.128.0.163 src=30030 daddr=10.128.0.7 dest=53752 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 28.481777][ T2[ 128.609008][ T29] audit: type=1400 audit(1734736934.404:58002): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 128.631934][ T29] audit: type=1400 audit(1734736934.424:58003): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 7 callbac[ 128.632008][ T29] audit: type=1400 audit(1734736934.434:58004): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 128.679338][ T29] audit: type=1400 audit(1734736934.494:58005): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 20 23:22:14 s[ 128.702495][ T29] audit: type=1400 audit(1734736934.514:58006): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 128.481787][ T29] audit: type=1400 audit(1734736934.294:57997): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.7 dest=53752 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext Dec 20 23:22:14 syzkaller kern.notice kernel: [ 128.512909][ T29] audit: type=1400 audit(1734736934.304:57998): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:14 syzkaller kern.notice kernel: [ 128.535654][ T29] audit: type=1400 audit(1734736934.354:57999): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:14 syzkaller kern.notice kernel: [ 128.558600][ T29] audit: type=1400 audit(1734736934.354:58000): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:14 syzkaller kern.notice kernel: [ 128.582454][ T29] audit: type=1400 audit(1734736934.404:58001): avc: denied { recv } for pid=2980 comm="syslogd" saddr=10.128.0.163 src=30030 daddr=10.128.0.7 dest=53752 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontex Dec 20 23:22:14 syzkaller kern.notice kernel: [ 128.609008][ T29] audit: type=1400 audit(1734736934.404:58002): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:14 syzkaller kern.notice kernel: [ 128.631934][ T29] audit: type=1400 audit(1734736934.424:58003): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:14 syzkaller kern.notice kernel: [ 128.632008][ T29] audit: type=1400 audit(1734736934.434:58004): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:14 syzkaller kern.notice kernel: [ 128.679338][ T29] audit: type=1400 audit(1734736934.494:58005): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:14 syzkaller kern.notice kernel: [ 128.702495][ T29] audit: type=1400 audit(1734736934.514:58006): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:14 syzkaller daemon.err dhcpcd[3036]: ps_sendpsmmsg: Connection refused Dec 20 23:22:14 syzkaller daemon.err dhcpcd[3036]: ps_root_recvmsgcb: failed to send message to pid 6996: Connection refused Dec 20 23:22:14 syzkaller daemon.err dhcpcd[3036]: ps_sendpsmmsg: Connection refused Dec 20 23:22:14 syzkaller daemon.err dhcpcd[3036]: ps_root_recvmsgcb: failed to send message to pid 6995: Connection refused Dec 20 23:22:14 syzkaller daemon.err dhcpcd[3036]: ps_sendpsmmsg: Connection refused Dec 20 23:22:14 syzkaller daemon.err dhcpcd[3036]: ps_root_recvmsgcb: failed to send message to pid 7013: Connection refused Dec 20 23:22:15 syzkaller daemon.err dhcpcd[3036]: ps_sendpsmmsg: Connection refused Dec 20 23:22:15 syzkaller daemon.err dhcpcd[3036]: ps_root_recvmsgcb: failed to send message to pid 7012: Connection refused Dec 20 23:22:16 syzkaller daemon.err dhcpcd[3036]: ps_sendpsmmsg: Connection refused Dec 20 23:22:16 syzkaller daemon.err dhcpcd[3036]: ps_root_recvmsgcb: failed to send message to pid 5224: Connection refused Dec 20 23:22:17 syzkaller daemon.err dhcpcd[3036]: ps_sendpsmmsg: Connection refused Dec 20 23:22:17 syzkaller daemon.err dhcpcd[3036]: ps_root_recvmsgcb: failed to send message to pid 5230: Connection refused Dec 20 23:22:19 syzkaller daemon.err dhcpcd[3036]: ps_sendpsmmsg: Connection refused Dec 20 23:22:19 syzkaller daemon.err dhcpcd[3036]: ps_root_recvmsgcb: failed to send message to pid 5262: Connection refused [ 134.746805][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 134.746818][ T29] audit: type=1400 audit(1734736940.564:58025): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 20 23:22:20 [ 134.775485][ T29] audit: type=1400 audit(1734736940.594:58026): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller daemon[ 134.798591][ T29] audit: type=1400 audit(1734736940.594:58027): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[3036[ 134.822191][ T29] audit: type=1400 audit(1734736940.634:58028): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_sendpsmmsg[ 134.845959][ T29] audit: type=1400 audit(1734736940.664:58029): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : Connection ref[ 134.869086][ T29] audit: type=1400 audit(1734736940.664:58030): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 used Dec 20 23:[ 134.892830][ T29] audit: type=1400 audit(1734736940.684:58031): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 22:20 syzkaller [ 134.915957][ T29] audit: type=1400 audit(1734736940.714:58032): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 daemon.err dhcpc[ 134.940122][ T29] audit: type=1400 audit(1734736940.754:58033): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d[3036]: ps_root[ 134.962816][ T29] audit: type=1400 audit(1734736940.754:58034): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 _recvmsgcb: failed to send message to pid 5303: Connection refused Dec 20 23:22:20 syzkaller kern.warn kernel: [ 134.746805][ T29] kauditd_printk_skb: 18 callbacks suppressed Dec 20 23:22:20 syzkaller kern.notice kernel: [ 134.746818][ T29] audit: type=1400 audit(1734736940.564:58025): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:20 syzkaller kern.notice kernel: [ 134.775485][ T29] audit: type=1400 audit(1734736940.594:58026): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:20 syzkaller kern.notice kernel: [ 134.798591][ T29] audit: type=1400 audit(1734736940.594:58027): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:20 syzkaller kern.notice kernel: [ 134.822191][ T29] audit: type=1400 audit(1734736940.634:58028): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:20 syzkaller kern.notice kernel: [ 134.845959][ T29] audit: type=1400 audit(1734736940.664:58029): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:20 syzkaller kern.notice kernel: [ 134.869086][ T29] audit: type=1400 audit(1734736940.664:58030): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:20 syzkaller kern.notice kernel: [ 134.892830][ T29] audit: type=1400 audit(1734736940.684:58031): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:20 syzkaller kern.notice kernel: [ 134.915957][ T29] audit: type=1400 audit(1734736940.714:58032): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:20 syzkaller kern.notice kernel: [ 134.940122][ T29] audit: type=1400 audit(1734736940.754:58033): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:20 syzkaller kern.notice kernel: [ 134.962816][ T29] audit: type=1400 audit(1734736940.754:58034): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 146.887331][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 146.887355][ T29] audit: type=1400 audit(1734736952.704:58040): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 146.917165][ T29] audit: type=1400 audit(1734736952.704:58041): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Dec 20 23:22:32 [ 146.941412][ T29] audit: type=1400 audit(1734736952.734:58042): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 146.964512][ T29] audit: type=1400 audit(1734736952.754:58043): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 146.964536][ T29] audit: type=1400 audit(1734736952.754:58044): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 46.887331][ T2[ 146.964558][ T29] audit: type=1400 audit(1734736952.754:58045): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 147.035525][ T29] audit: type=1400 audit(1734736952.854:58046): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 5 callbac[ 147.058190][ T29] audit: type=1400 audit(1734736952.854:58047): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 147.081531][ T29] audit: type=1400 audit(1734736952.854:58048): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 20 23:22:32 s[ 147.105009][ T29] audit: type=1400 audit(1734736952.904:58049): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 146.887355][ T29] audit: type=1400 audit(1734736952.704:58040): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obj Dec 20 23:22:32 syzkaller kern.notice kernel: [ 146.917165][ T29] audit: type=1400 audit(1734736952.704:58041): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obj Dec 20 23:22:32 syzkaller kern.notice kernel: [ 146.941412][ T29] audit: type=1400 audit(1734736952.734:58042): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:32 syzkaller kern.notice kernel: [ 146.964512][ T29] audit: type=1400 audit(1734736952.754:58043): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:32 syzkaller kern.notice kernel: [ 146.964536][ T29] audit: type=1400 audit(1734736952.754:58044): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:32 syzkaller kern.notice kernel: [ 146.964558][ T29] audit: type=1400 audit(1734736952.754:58045): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:32 syzkaller kern.notice kernel: [ 147.035525][ T29] audit: type=1400 audit(1734736952.854:58046): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:32 syzkaller kern.notice kernel: [ 147.058190][ T29] audit: type=1400 audit(1734736952.854:58047): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:32 syzkaller kern.notice kernel: [ 147.081531][ T29] audit: type=1400 audit(1734736952.854:58048): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:32 syzkaller kern.notice kernel: [ 147.105009][ T29] audit: type=1400 audit(1734736952.904:58049): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 152.007787][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 152.007799][ T29] audit: type=1400 audit(1734736957.824:58055): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Dec 20 23:22:37 [ 152.037674][ T29] audit: type=1400 audit(1734736957.854:58056): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 152.061682][ T29] audit: type=1400 audit(1734736957.884:58057): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 152.084718][ T29] audit: type=1400 audit(1734736957.884:58058): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 52.007787][ T2[ 152.108787][ T29] audit: type=1400 audit(1734736957.924:58059): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 152.131450][ T29] audit: type=1400 audit(1734736957.924:58060): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 5 callbac[ 152.155650][ T29] audit: type=1400 audit(1734736957.974:58061): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 152.178534][ T29] audit: type=1400 audit(1734736957.974:58062): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 20 23:22:37 s[ 152.202353][ T29] audit: type=1400 audit(1734736958.024:58063): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 152.225311][ T29] audit: type=1400 audit(1734736958.024:58064): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 152.007799][ T29] audit: type=1400 audit(1734736957.824:58055): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obj Dec 20 23:22:37 syzkaller kern.notice kernel: [ 152.037674][ T29] audit: type=1400 audit(1734736957.854:58056): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:37 syzkaller kern.notice kernel: [ 152.061682][ T29] audit: type=1400 audit(1734736957.884:58057): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:37 syzkaller kern.notice kernel: [ 152.084718][ T29] audit: type=1400 audit(1734736957.884:58058): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:37 syzkaller kern.notice kernel: [ 152.108787][ T29] audit: type=1400 audit(1734736957.924:58059): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:37 syzkaller kern.notice kernel: [ 152.131450][ T29] audit: type=1400 audit(1734736957.924:58060): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:38 syzkaller kern.notice kernel: [ 152.155650][ T29] audit: type=1400 audit(1734736957.974:58061): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:38 syzkaller kern.notice kernel: [ 152.178534][ T29] audit: type=1400 audit(1734736957.974:58062): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:38 syzkaller kern.notice kernel: [ 152.202353][ T29] audit: type=1400 audit(1734736958.024:58063): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:38 syzkaller kern.notice kernel: [ 152.225311][ T29] audit: type=1400 audit(1734736958.024:58064): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 160.437632][ T29] kauditd_printk_skb: 4 callbacks suppressed Dec 20 23:22:46 [ 160.437646][ T29] audit: type=1400 audit(1734736966.254:58069): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller daemon[ 160.467611][ T29] audit: type=1400 audit(1734736966.254:58070): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[7378[ 160.490756][ T29] audit: type=1400 audit(1734736966.284:58071): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_bpf_start_[ 160.514338][ T29] audit: type=1400 audit(1734736966.334:58072): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 bpf: bpf_open: I[ 160.537967][ T29] audit: type=1400 audit(1734736966.354:58073): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 nvalid argument[ 160.561000][ T29] audit: type=1400 audit(1734736966.354:58074): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 20 23:22:46[ 160.584504][ T29] audit: type=1400 audit(1734736966.354:58075): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller daemo[ 160.608480][ T29] audit: type=1400 audit(1734736966.424:58076): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 n.err dhcpcd[737[ 160.631253][ T29] audit: type=1400 audit(1734736966.424:58077): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 8]: ps_root_recv[ 160.654820][ T29] audit: type=1400 audit(1734736966.424:58078): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 msg: Invalid argument Dec 20 23:22:46 syzkaller kern.warn kernel: [ 160.437632][ T29] kauditd_printk_skb: 4 callbacks suppressed Dec 20 23:22:46 syzkaller kern.notice kernel: [ 160.437646][ T29] audit: type=1400 audit(1734736966.254:58069): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:46 syzkaller kern.notice kernel: [ 160.467611][ T29] audit: type=1400 audit(1734736966.254:58070): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:46 syzkaller kern.notice kernel: [ 160.490756][ T29] audit: type=1400 audit(1734736966.284:58071): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:46 syzkaller kern.notice kernel: [ 160.514338][ T29] audit: type=1400 audit(1734736966.334:58072): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:46 syzkaller kern.notice kernel: [ 160.537967][ T29] audit: type=1400 audit(1734736966.354:58073): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:46 syzkaller kern.notice kernel: [ 160.561000][ T29] audit: type=1400 audit(1734736966.354:58074): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:46 syzkaller kern.notice kernel: [ 160.584504][ T29] audit: type=1400 audit(1734736966.354:58075): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:46 syzkaller kern.notice kernel: [ 160.608480][ T29] audit: type=1400 audit(1734736966.424:58076): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:46 syzkaller kern.notice kernel: [ 160.631253][ T29] audit: type=1400 audit(1734736966.424:58077): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:46 syzkaller kern.notice kernel: [ 160.654820][ T29] audit: type=1400 audit(1734736966.424:58078): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:46 syzkaller daemon.err dhcpcd[7379]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 20 23:22:46 syzkaller daemon.err dhcpcd[7379]: ps_root_recvmsg: Invalid argument Dec 20 23:22:46 syzkaller daemon.err dhcpcd[7380]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 20 23:22:46 syzkaller daemon.err dhcpcd[7380]: ps_root_recvmsg: Invalid argument Dec 20 23:22:47 syzkaller daemon.err dhcpcd[7381]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 20 23:22:47 syzkaller daemon.err dhcpcd[7381]: ps_root_recvmsg: Invalid argument [ 167.367550][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 167.367564][ T29] audit: type=1400 audit(1734736973.184:58089): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 167.397327][ T29] audit: type=1400 audit(1734736973.184:58090): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 167.420981][ T29] audit: type=1400 audit(1734736973.214:58091): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 20 23:22:53 [ 167.444084][ T29] audit: type=1400 audit(1734736973.264:58092): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 167.466849][ T29] audit: type=1400 audit(1734736973.264:58093): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 167.490225][ T29] audit: type=1400 audit(1734736973.264:58094): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 67.367550][ T2[ 167.513640][ T29] audit: type=1400 audit(1734736973.304:58095): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 167.537279][ T29] audit: type=1400 audit(1734736973.354:58096): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 10 callba[ 167.560849][ T29] audit: type=1400 audit(1734736973.354:58097): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 cks suppressed [ 167.583935][ T29] audit: type=1400 audit(1734736973.374:58098): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 20 23:22:53 syzkaller kern.notice kernel: [ 167.367564][ T29] audit: type=1400 audit(1734736973.184:58089): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obj Dec 20 23:22:53 syzkaller kern.notice kernel: [ 167.397327][ T29] audit: type=1400 audit(1734736973.184:58090): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obj Dec 20 23:22:53 syzkaller kern.notice kernel: [ 167.420981][ T29] audit: type=1400 audit(1734736973.214:58091): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:53 syzkaller kern.notice kernel: [ 167.444084][ T29] audit: type=1400 audit(1734736973.264:58092): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:53 syzkaller kern.notice kernel: [ 167.466849][ T29] audit: type=1400 audit(1734736973.264:58093): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:53 syzkaller kern.notice kernel: [ 167.490225][ T29] audit: type=1400 audit(1734736973.264:58094): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:53 syzkaller kern.notice kernel: [ 167.513640][ T29] audit: type=1400 audit(1734736973.304:58095): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:53 syzkaller kern.notice kernel: [ 167.537279][ T29] audit: type=1400 audit(1734736973.354:58096): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:53 syzkaller kern.notice kernel: [ 167.560849][ T29] audit: type=1400 audit(1734736973.354:58097): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:22:53 syzkaller kern.notice kernel: [ 167.583935][ T29] audit: type=1400 audit(1734736973.374:58098): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 176.861727][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 176.861738][ T29] audit: type=1400 audit(1734736982.674:58102): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.7 dest=53752 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 176.892998][ T29] audit: type=1400 audit(1734736982.684:58103): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 20 23:23:02 [ 176.915524][ T29] audit: type=1400 audit(1734736982.734:58104): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 176.939207][ T29] audit: type=1400 audit(1734736982.734:58105): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 176.962819][ T29] audit: type=1400 audit(1734736982.774:58106): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 76.861727][ T2[ 176.986297][ T29] audit: type=1400 audit(1734736982.804:58107): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 177.009517][ T29] audit: type=1400 audit(1734736982.804:58108): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 3 callbac[ 177.009590][ T29] audit: type=1400 audit(1734736982.824:58109): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.7 dest=53752 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 ks suppressed D[ 177.059644][ T29] audit: type=1400 audit(1734736982.874:58110): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 20 23:23:02 s[ 177.082849][ T29] audit: type=1400 audit(1734736982.874:58111): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 176.861738][ T29] audit: type=1400 audit(1734736982.674:58102): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.7 dest=53752 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext Dec 20 23:23:02 syzkaller kern.notice kernel: [ 176.892998][ T29] audit: type=1400 audit(1734736982.684:58103): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:02 syzkaller kern.notice kernel: [ 176.915524][ T29] audit: type=1400 audit(1734736982.734:58104): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:02 syzkaller kern.notice kernel: [ 176.939207][ T29] audit: type=1400 audit(1734736982.734:58105): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:02 syzkaller kern.notice kernel: [ 176.962819][ T29] audit: type=1400 audit(1734736982.774:58106): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:02 syzkaller kern.notice kernel: [ 176.986297][ T29] audit: type=1400 audit(1734736982.804:58107): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:02 syzkaller kern.notice kernel: [ 177.009517][ T29] audit: type=1400 audit(1734736982.804:58108): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:02 syzkaller kern.notice kernel: [ 177.009590][ T29] audit: type=1400 audit(1734736982.824:58109): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.7 dest=53752 netif=eth0 scontext=root:sysadm_r:sysadm_t tcont Dec 20 23:23:02 syzkaller kern.notice kernel: [ 177.059644][ T29] audit: type=1400 audit(1734736982.874:58110): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:02 syzkaller kern.notice kernel: [ 177.082849][ T29] audit: type=1400 audit(1734736982.874:58111): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:20 [ 195.134645][ T29] kauditd_printk_skb: 3 callbacks suppressed syzkaller daemon[ 195.134674][ T29] audit: type=1400 audit(1734737000.944:58115): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[7382[ 195.165815][ T29] audit: type=1400 audit(1734737000.944:58116): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_bpf_start_[ 195.165846][ T29] audit: type=1400 audit(1734737000.964:58117): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 bpf: bpf_open: I[ 195.212789][ T29] audit: type=1400 audit(1734737001.034:58118): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 nvalid argument[ 195.236633][ T29] audit: type=1400 audit(1734737001.054:58119): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 20 23:23:20[ 195.259475][ T29] audit: type=1400 audit(1734737001.054:58120): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller daemo[ 195.282946][ T29] audit: type=1400 audit(1734737001.054:58121): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 n.err dhcpcd[7382]: ps_root_recv[ 195.308215][ T29] audit: type=1400 audit(1734737001.124:58122): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 msg: Invalid arg[ 195.331118][ T29] audit: type=1400 audit(1734737001.124:58123): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ument Dec 20 23[ 195.331141][ T29] audit: type=1400 audit(1734737001.124:58124): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :23:20 syzkaller kern.warn kernel: [ 195.134645][ T29] kauditd_printk_skb: 3 callbacks suppressed Dec 20 23:23:20 syzkaller kern.notice kernel: [ 195.134674][ T29] audit: type=1400 audit(1734737000.944:58115): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:21 syzkaller kern.notice kernel: [ 195.165815][ T29] audit: type=1400 audit(1734737000.944:58116): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:21 syzkaller kern.notice kernel: [ 195.165846][ T29] audit: type=1400 audit(1734737000.964:58117): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:21 syzkaller kern.notice kernel: [ 195.212789][ T29] audit: type=1400 audit(1734737001.034:58118): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:21 syzkaller kern.notice kernel: [ 195.236633][ T29] audit: type=1400 audit(1734737001.054:58119): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:21 syzkaller kern.notice kernel: [ 195.259475][ T29] audit: type=1400 audit(1734737001.054:58120): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:21 syzkaller kern.notice kernel: [ 195.282946][ T29] audit: type=1400 audit(1734737001.054:58121): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:21 syzkaller kern.notice kernel: [ 195.308215][ T29] audit: type=1400 audit(1734737001.124:58122): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:21 syzkaller daemon.err dhcpcd[7383]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 20 23:23:21 syzkaller daemon.err dhcpcd[7383]: ps_root_recvmsg: Invalid argument Dec 20 23:23:21 syzkaller kern.notice kernel: [ 195.331118][ T29] audit: type=1400 audit(1734737001.124:58123): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:21 syzkaller kern.notice kernel: [ 195.331141][ T29] audit: type=1400 audit(1734737001.124:58124): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:22 syzkaller daemon.err dhcpcd[7384]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 20 23:23:22 syzkaller daemon.err dhcpcd[7384]: ps_root_recvmsg: Invalid argument Dec 20 23:23:25 syzkaller daemon.err dhcpcd[7385]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 20 23:23:25 syzkaller daemon.err dhcpcd[7385]: ps_root_recvmsg: Invalid argument [ 218.567356][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 218.567369][ T29] audit: type=1400 audit(1734737024.384:58134): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 218.597130][ T29] audit: type=1400 audit(1734737024.384:58135): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 218.620746][ T29] audit: type=1400 audit(1734737024.384:58136): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Dec 20 23:23:44 [ 218.644392][ T29] audit: type=1400 audit(1734737024.414:58137): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 218.668404][ T29] audit: type=1400 audit(1734737024.484:58138): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 2[ 218.691275][ T29] audit: type=1400 audit(1734737024.484:58139): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 18.567356][ T2[ 218.691355][ T29] audit: type=1400 audit(1734737024.484:58140): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 218.738455][ T29] audit: type=1400 audit(1734737024.554:58141): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 9 callbac[ 218.761622][ T29] audit: type=1400 audit(1734737024.554:58142): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 218.785956][ T29] audit: type=1400 audit(1734737024.604:58143): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 20 23:23:44 syzkaller kern.notice kernel: [ 218.567369][ T29] audit: type=1400 audit(1734737024.384:58134): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obj Dec 20 23:23:44 syzkaller kern.notice kernel: [ 218.597130][ T29] audit: type=1400 audit(1734737024.384:58135): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obj Dec 20 23:23:44 syzkaller kern.notice kernel: [ 218.620746][ T29] audit: type=1400 audit(1734737024.384:58136): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obj Dec 20 23:23:44 syzkaller kern.notice kernel: [ 218.644392][ T29] audit: type=1400 audit(1734737024.414:58137): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:44 syzkaller kern.notice kernel: [ 218.668404][ T29] audit: type=1400 audit(1734737024.484:58138): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:44 syzkaller kern.notice kernel: [ 218.691275][ T29] audit: type=1400 audit(1734737024.484:58139): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:44 syzkaller kern.notice kernel: [ 218.691355][ T29] audit: type=1400 audit(1734737024.484:58140): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:44 syzkaller kern.notice kernel: [ 218.738455][ T29] audit: type=1400 audit(1734737024.554:58141): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:44 syzkaller kern.notice kernel: [ 218.761622][ T29] audit: type=1400 audit(1734737024.554:58142): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:44 syzkaller kern.notice kernel: [ 218.785956][ T29] audit: type=1400 audit(1734737024.604:58143): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 220.806490][ C1] ================================================================== [ 220.814589][ C1] BUG: KCSAN: data-race in __tmigr_cpu_activate / tmigr_handle_remote [ 220.822723][ C1] [ 220.825023][ C1] write to 0xffff888237c205dc of 1 bytes by task 0 on cpu 0: [ 220.832364][ C1] __tmigr_cpu_activate+0x55/0x200 [ 220.837455][ C1] tmigr_cpu_activate+0x8a/0xc0 [ 220.842284][ C1] timer_clear_idle+0x28/0x100 [ 220.847041][ C1] tick_nohz_restart_sched_tick+0x22/0x110 [ 220.852829][ C1] tick_nohz_idle_exit+0xfe/0x1d0 [ 220.857833][ C1] do_idle+0x1eb/0x230 [ 220.861880][ C1] cpu_startup_entry+0x25/0x30 [ 220.866621][ C1] rest_init+0xef/0xf0 [ 220.870666][ C1] start_kernel+0x586/0x5e0 [ 220.875143][ C1] x86_64_start_reservations+0x2a/0x30 [ 220.880581][ C1] x86_64_start_kernel+0x9a/0xa0 [ 220.885496][ C1] common_startup_64+0x12c/0x137 [ 220.890411][ C1] [ 220.892710][ C1] read to 0xffff888237c205dc of 1 bytes by interrupt on cpu 1: [ 220.900228][ C1] tmigr_handle_remote+0x26e/0x940 [ 220.905443][ C1] run_timer_softirq+0x5f/0x70 [ 220.910284][ C1] handle_softirqs+0xbf/0x280 [ 220.914953][ C1] __irq_exit_rcu+0x3a/0xc0 [ 220.919464][ C1] sysvec_apic_timer_interrupt+0x73/0x80 [ 220.925088][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 220.931045][ C1] acpi_safe_halt+0x21/0x30 [ 220.935528][ C1] acpi_idle_do_entry+0x1d/0x30 [ 220.940358][ C1] acpi_idle_enter+0x96/0xb0 [ 220.944934][ C1] cpuidle_enter_state+0xc5/0x260 [ 220.949941][ C1] cpuidle_enter+0x40/0x70 [ 220.954342][ C1] do_idle+0x192/0x230 [ 220.958414][ C1] cpu_startup_entry+0x25/0x30 [ 220.963169][ C1] start_secondary+0x96/0xa0 [ 220.967737][ C1] common_startup_64+0x12c/0x137 [ 220.972676][ C1] [ 220.974979][ C1] value changed: 0x00 -> 0x01 [ 220.979636][ C1] [ 220.981938][ C1] Reported by Kernel Concurrency Sanitizer on: [ 220.988081][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.13.0-rc3-syzkaller-00193-ge9b8ffafd20a #0 [ 220.998384][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 221.008426][ C1] ================================================================== Dec 20 23:23:46 syzkaller kern.err kernel: [ 220.806490][ C1] ================================================================== Dec 20 23:23:46 syzkaller kern.err kernel: [ 220.814589][ C1] BUG: KCSAN: data-race in __tmigr_cpu_activate / tmigr_handle_remote Dec 20 23:23:46 syzkaller kern.err kernel: [ 220.822723][ C1] Dec 20 23:23:46 syzkaller kern.err kernel: [ 220.825023][ C1] write to 0xffff888237c205dc of 1 bytes by task 0 on cpu 0: Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.832364][ C1] __tmigr_cpu_activate+0x55/0x200 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.837455][ C1] tmigr_cpu_activate+0x8a/0xc0 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.842284][ C1] timer_clear_idle+0x28/0x100 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.847041][ C1] tick_nohz_restart_sched_tick+0x22/0x110 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.852829][ C1] tick_nohz_idle_exit+0xfe/0x1d0 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.857833][ C1] do_idle+0x1eb/0x230 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.861880][ C1] cpu_startup_entry+0x25/0x30 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.866621][ C1] rest_init+0xef/0xf0 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.870666][ C1] start_kernel+0x586/0x5e0 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.875143][ C1] x86_64_start_reservations+0x2a/0x30 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.880581][ C1] x86_64_start_kernel+0x9a/0xa0 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.885496][ C1] common_startup_64+0x12c/0x137 Dec 20 23:23:46 syzkaller kern.err kernel: [ 220.890411][ C1] Dec 20 23:23:46 syzkaller kern.err kernel: [ 220.892710][ C1] read to 0xffff888237c205dc of 1 bytes by interrupt on cpu 1: Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.900228][ C1] tmigr_handle_remote+0x26e/0x940 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.905443][ C1] run_timer_softirq+0x5f/0x70 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.910284][ C1] handle_softirqs+0xbf/0x280 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.914953][ C1] __irq_exit_rcu+0x3a/0xc0 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.919464][ C1] sysvec_apic_timer_interrupt+0x73/0x80 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.925088][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.931045][ C1] acpi_safe_halt+0x21/0x30 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.935528][ C1] acpi_idle_do_entry+0x1d/0x30 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.940358][ C1] acpi_idle_enter+0x96/0xb0 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.944934][ C1] cpuidle_enter_state+0xc5/0x260 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.949941][ C1] cpuidle_enter+0x40/0x70 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.954342][ C1] do_idle+0x192/0x230 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.958414][ C1] cpu_startup_entry+0x25/0x30 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.963169][ C1] start_secondary+0x96/0xa0 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.967737][ C1] common_startup_64+0x12c/0x137 Dec 20 23:23:46 syzkaller kern.err kernel: [ 220.972676][ C1] Dec 20 23:23:46 syzkaller kern.err kernel: [ 220.974979][ C1] value changed: 0x00 -> 0x01 Dec 20 23:23:46 syzkaller kern.err kernel: [ 220.979636][ C1] Dec 20 23:23:46 syzkaller kern.err kernel: [ 220.981938][ C1] Reported by Kernel Concurrency Sanitizer on: Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.988081][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.13.0-rc3-syzkaller-00193-ge9b8ffafd20a #0 Dec 20 23:23:46 syzkaller kern.warn kernel: [ 220.998384][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 Dec 20 23:23:46 syzkaller kern.err kernel: [ 221.008426][ C1] ================================================================== [ 224.768393][ T29] kauditd_printk_skb: 44 callbacks suppressed Dec 20 23:23:50 [ 224.768406][ T29] audit: type=1400 audit(1734737030.584:58188): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller daemon[ 224.799019][ T29] audit: type=1400 audit(1734737030.584:58189): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[3036[ 224.821358][ T29] audit: type=1400 audit(1734737030.614:58190): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_sendpsmmsg[ 224.844838][ T29] audit: type=1400 audit(1734737030.614:58191): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : Connection ref[ 224.868203][ T29] audit: type=1400 audit(1734737030.654:58192): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 used Dec 20 23:[ 224.892650][ T29] audit: type=1400 audit(1734737030.714:58193): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 23:50 syzkaller [ 224.915292][ T29] audit: type=1400 audit(1734737030.714:58194): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 daemon.err dhcpc[ 224.938696][ T29] audit: type=1400 audit(1734737030.714:58195): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d[3036]: ps_root[ 224.962071][ T29] audit: type=1400 audit(1734737030.754:58196): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 _recvmsgcb: fail[ 224.985522][ T29] audit: type=1400 audit(1734737030.784:58197): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ed to send message to pid 7380: Connection refused Dec 20 23:23:50 syzkaller kern.warn kernel: [ 224.768393][ T29] kauditd_printk_skb: 44 callbacks suppressed Dec 20 23:23:50 syzkaller kern.notice kernel: [ 224.768406][ T29] audit: type=1400 audit(1734737030.584:58188): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:50 syzkaller kern.notice kernel: [ 224.799019][ T29] audit: type=1400 audit(1734737030.584:58189): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:50 syzkaller kern.notice kernel: [ 224.821358][ T29] audit: type=1400 audit(1734737030.614:58190): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:50 syzkaller kern.notice kernel: [ 224.844838][ T29] audit: type=1400 audit(1734737030.614:58191): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:50 syzkaller kern.notice kernel: [ 224.868203][ T29] audit: type=1400 audit(1734737030.654:58192): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:50 syzkaller kern.notice kernel: [ 224.892650][ T29] audit: type=1400 audit(1734737030.714:58193): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:50 syzkaller kern.notice kernel: [ 224.915292][ T29] audit: type=1400 audit(1734737030.714:58194): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:50 syzkaller kern.notice kernel: [ 224.938696][ T29] audit: type=1400 audit(1734737030.714:58195): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:50 syzkaller kern.notice kernel: [ 224.962071][ T29] audit: type=1400 audit(1734737030.754:58196): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:50 syzkaller kern.notice kernel: [ 224.985522][ T29] audit: type=1400 audit(1734737030.784:58197): avc: denied { read } for pid=2980 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Dec 20 23:23:51 syzkaller daemon.err dhcpcd[3036]: ps_sendpsmmsg: Connection refused Dec 20 23:23:51 syzkaller daemon.err dhcpcd[3036]: ps_root_recvmsgcb: failed to send message to pid 7378: Connection refused Dec 20 23:23:51 syzkaller daemon.err dhcpcd[3036]: ps_sendpsmmsg: Connection refused Dec 20 23:23:51 syzkaller daemon.err dhcpcd[3036]: ps_root_recvmsgcb: failed to send message to pid 7379: Connection refused Dec 20 23:23:51 syzkaller daemon.err dhcpcd[3036]: ps_sendpsmmsg: Connection refused Dec 20 23:23:51 syzkaller daemon.err dhcpcd[3036]: ps_root_recvmsgcb: failed to send message to pid 7381: Connection refused