Warning: Permanently added '10.128.0.221' (ED25519) to the list of known hosts. 2024/05/19 12:36:42 fuzzer started 2024/05/19 12:36:42 dialing manager at 10.128.0.163:30002 [ 26.587503][ T24] audit: type=1400 audit(1716122202.600:66): avc: denied { node_bind } for pid=283 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 26.608423][ T24] audit: type=1400 audit(1716122202.600:67): avc: denied { name_bind } for pid=283 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 26.645458][ T24] audit: type=1400 audit(1716122202.660:68): avc: denied { mounton } for pid=292 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.660678][ T292] cgroup: Unknown subsys name 'net' [ 26.674781][ T24] audit: type=1400 audit(1716122202.660:69): avc: denied { mounton } for pid=296 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.680104][ T293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.699948][ T24] audit: type=1400 audit(1716122202.660:70): avc: denied { mount } for pid=296 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.730984][ T292] cgroup: Unknown subsys name 'devices' [ 26.731080][ T24] audit: type=1400 audit(1716122202.660:71): avc: denied { mount } for pid=292 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.758462][ T24] audit: type=1400 audit(1716122202.690:72): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.781621][ T24] audit: type=1400 audit(1716122202.720:73): avc: denied { unmount } for pid=292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.801252][ T24] audit: type=1400 audit(1716122202.720:74): avc: denied { relabelto } for pid=293 comm="mkswap" name="swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.826457][ T24] audit: type=1400 audit(1716122202.720:75): avc: denied { write } for pid=293 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.851998][ T291] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.950324][ T292] cgroup: Unknown subsys name 'hugetlb' [ 26.955854][ T292] cgroup: Unknown subsys name 'rlimit' 2024/05/19 12:36:43 starting 5 executor processes [ 27.544211][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.551244][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.558850][ T303] device bridge_slave_0 entered promiscuous mode [ 27.566725][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.573740][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.581010][ T303] device bridge_slave_1 entered promiscuous mode [ 27.601465][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.608348][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.615551][ T304] device bridge_slave_0 entered promiscuous mode [ 27.624296][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.631359][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.638623][ T304] device bridge_slave_1 entered promiscuous mode [ 27.703336][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.710201][ T303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.717312][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.724095][ T303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.733545][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.740419][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.747463][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.754294][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.782926][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.790395][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.797452][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.804772][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.812100][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.819483][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.827745][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.838520][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.846492][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.853346][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.860796][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.868814][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.875627][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.882825][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.890813][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.897628][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.907013][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.915064][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.921922][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.936536][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.947219][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.955133][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.968931][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.981143][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.993840][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.003311][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.011871][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.019395][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.027794][ T303] device veth0_vlan entered promiscuous mode [ 28.036939][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.045211][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.052760][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.060902][ T304] device veth0_vlan entered promiscuous mode [ 28.071591][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.081089][ T303] device veth1_macvtap entered promiscuous mode [ 28.091469][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.102055][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.110889][ T304] device veth1_macvtap entered promiscuous mode [ 28.120437][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.139869][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000840), 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000001300)=0x2, 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getegid() openat$urandom(0xffffffffffffff9c, &(0x7f0000002900), 0x200000, 0x0) getgid() openat$vsock(0xffffffffffffff9c, &(0x7f0000000d00), 0x109001, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f0000000340)=0xfffffff9, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x19, &(0x7f0000000440)=0x82, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f0000002180), 0x4) sendto$inet(r2, &(0x7f0000000480)="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", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) recvmsg(r2, &(0x7f00000033c0)={&(0x7f00000003c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002040)=[{&(0x7f0000000080)=""/49, 0x31}, {&(0x7f0000000f80)=""/4096, 0xffffffe1}, {0x0}, {&(0x7f0000000100)=""/102, 0x66}, {&(0x7f00000021c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001f80)=""/178, 0xb2}, 0x120) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast1, @empty}, &(0x7f0000000080)=0xc) [ 28.148471][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.157043][ T304] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 28.880176][ T324] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.887141][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.894454][ T324] device bridge_slave_0 entered promiscuous mode [ 28.901710][ T324] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.908628][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.915879][ T324] device bridge_slave_1 entered promiscuous mode [ 28.954961][ T324] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.962074][ T324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.969321][ T324] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.976150][ T324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.995757][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.003747][ T299] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.011381][ T299] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.039270][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.047358][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.054397][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.061747][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.069782][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.076623][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.084640][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.093401][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.118678][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.131442][ T324] device veth0_vlan entered promiscuous mode [ 29.139162][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.147219][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.155977][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000000)={0x18}, 0x18) [ 29.169641][ T324] device veth1_macvtap entered promiscuous mode [ 29.179455][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.193067][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.202047][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 1: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x99) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x11, &(0x7f0000000440)={[{@nombcache}, {@grpid}, {@init_itable_val={'init_itable', 0x3d, 0x7}}, {@data_journal}, {@nombcache}]}, 0x8, 0x5fa, &(0x7f00000004c0)="$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") mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001095, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000840)='./file0\x00', 0x10a1b4, &(0x7f0000000e00)={[{@nouid32}, {@nodiscard}, {@data_err_abort}, {@noauto_da_alloc}, {@abort}, {@noquota}, {@usrquota}, {@errors_continue}, {@data_err_ignore}, {@nobarrier}, {@dioread_nolock}, {@jqfmt_vfsold}]}, 0x11, 0x472, &(0x7f0000000240)="$eJzs3E9sFNUfAPDvTFv4/fjXioqCoFU0Nv5paUHl4EWjCQdNTPSAx9oWghRqaEmEEKnG4NGQeDceTbx586QXox6MiVc9a0iINiZFvayZ2ZmyXbv95y5bup9PMvDezNt979uZN/P2vewG0LH6s3+SiB0R8VNE9Fazpct5gf5quRtzl8b+nLs0lkSl8upvSV5ufu7SWFm4+rq/K9uLzEAakb6fFJUs6C7+Pz06OTlxrsgMzZx5a2j6wsUnT50ZPTlxcuLsyNGjRw4PP/P0yFMrhTC/mjizuOb3vTO1f++x16++PHb86hvffpa1d8+B4k1q4miW/izw3yu5+mOPNLuyNttZk066b6Yvt6MxrFpX0SF78v7fG11x8+T1xovvtbVxQEtlz6atjQ/PVoBNLIl2twBoj/JBn33+LbdbNPTYEK4/V/0AlMV9o9iqR7ojLcr0tLD+/og4PvvXx9kWLZqHAACo9WU2/nli0fjv++qRNPbUlNtVrKH0RcQdEbE7Iu6MiLsi4u6IvOw9EXHvGuvvr8vPz/3y+eI96bV1BbZK2fjv2WJta/H4rxz9RV9XkduZx9+TnDg1OXGo+JsMRM/WLD+8TB1fvfDjh42O1Y7/si2rvxwLFu241l03QTc+OjParEHp9Xcj9nUvFX+ysBKQRMTeiNi3trfeVSZOPfbp/kaFVo5/Gd1ra9BSKp9EPFo9/7NRF38pWX59cuh/MTlxaKi8Kv7tux+uvNKo/v8UfxNk53/b4uu/rkTvH1n80xcuVtdrp9dex5WfP2j4mWa91/+W5LV8zXpLse/t0ZmZc8MRW5KX8vyi/SM3X1vmy/JZ/AMHl+7/u4vXZPHfFxHZRXwgIu6PiAeKtj8YEQ9FxMFl4v/m+YffXH/8rZXFP77k/W/h+u+rOf+VYm92ISxcESsluk5//UWj+ld3/o/kqYFiT37/W8FqG7juPxwAAADcRtKI2BFJOriQTtPBwYjt+dzutnRyanrm8RNT58+OV78j0Bc9aTnT1VszHzqczBbvWM2PFHPF5fHDxbzxR13/z/ODY1OT422OHTrd9gb9P/NrV7tbB7RcE9bRgNtUff9P29QO4Nbz/IfOpf9D59L/oXMt1f/rf7jJWgBsTp7/0Ln0f+hcK/d/dwjYrOp6dyt/7wrYOFb/LX6JJRPHzm+IZtz6RKStr6v8FY8NEnJHJdp8YwIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGiSfwIAAP//BtXsXQ==") [ 29.515170][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.523772][ T335] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 29.537236][ T339] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.544790][ T335] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (62631!=20869) [ 29.555175][ T335] EXT4-fs (loop1): barriers disabled [ 29.560831][ T339] device bridge_slave_0 entered promiscuous mode [ 29.567309][ T335] JBD2: no valid journal superblock found [ 29.582608][ T335] EXT4-fs (loop1): error loading journal [ 29.601082][ T339] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.608011][ T339] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.615975][ T339] device bridge_slave_1 entered promiscuous mode [ 29.628906][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.635875][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.643736][ T341] device bridge_slave_0 entered promiscuous mode [ 29.650986][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.657881][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.665620][ T341] device bridge_slave_1 entered promiscuous mode [ 29.754000][ T335] EXT4-fs error (device sda1): ext4_remount:5878: Abort forced by user [ 29.765706][ T335] Aborting journal on device sda1-8. [ 29.790092][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.796968][ T341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.804084][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.810865][ T341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.818890][ T335] EXT4-fs (sda1): Remounting filesystem read-only [ 29.845223][ T330] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.852796][ T330] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.861221][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.877095][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.886306][ T304] EXT4-fs error (device sda1): ext4_journal_check_start:83: Detected aborted journal [ 29.908604][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.916349][ T304] EXT4-fs (sda1): Remounting filesystem read-only [ 29.924152][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.932669][ T330] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.939546][ T330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.947173][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.955514][ T330] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.962579][ T330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.989779][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.997953][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.006735][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.015008][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.021887][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.029685][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000800000095000000000000009500a5050000000077d8f3b423cdac8d8000000000000020e16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f68a7d06d10bfe150a7487535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d46b7c57d77578f4c35235138d5521f9453559c3421eed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983c044c03bf3ff03fe3e26e7a23129d6606fd28a7f9105f82317874b33d96b39fa4e045469989d552af6200000003a00000000000000abecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f1623ed38ae89d24e14b40234756ddcebfba2f87925bfacba83109753f543ad027edd68149ee99eebc6f7d6dd4aed4afe1f44ccb19e810879b70a70900000000000000000000d7900a820b6327944e9a217b9800e02a92895614cd50cbf83a1ed25268816b004519c9c5cff097d8000000000009d27d753a30a147b24a48435bd8a568669596e9e08679b3ce48e90defb6670c3d6209000000c773713a66b223fa8b148871c8d31d24000025449f106b99893ed20fa7a050fbbef90327e827e513e9606800000000e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e69ee52b59d13182e1f24ed208ada12f7a1525320e71666f472a972d5eb1affb87ba55b2d72078e9f40b4ae7dc3b2aeb0d11cd22c35d32940f19dff00ffffffff080000ff003853e59de7621e348955735264f34b1046a1813668297a7edad187ef106ae7fcbb25090f17d0baadeb8ae190a1fb5a315f8347fb0379659500000000000000000000000000000000000000002fdf0193ec79c90ed210ebc2fbed6d4216770c1b0dec886b388d138c2b69c6aacb714e7264093061c660a5100b7cc165889eb94c8d7c77b6fa06f1a4f8e4a6b6cb37e319c5c22f276b03cae853f42b07ca0b03b1eb32a6b1a81cd511fd0b59d57a11c6a3ebf9731464ad21f07f618efc31023ac60007426162b57e803519954d7c956fda392fa84be38e937d36af1c35138e05a9e8d6dc0272de72c41500000000304402e22af23437126f330f8eb4075daaeae3134ece35cd86d95bd9836bd186c4b6565e967a4e3e86f299b7400994ba136b4eccf3b0f001a266c0d160b3ce1182001d64b52a5ce7f506295d59eea6903b84ffbabf5a5b91c1d6ecce8728a224aec66c610e3becd60a35e848c224f8251947eed20e2b612cb099bfe8924d33ba7f0691fed04a43e9c64b7a1e3165e86cdb9871c678a6bbb14821f441c6c14d1bd78d8ffdfea12c19ea04264335d60b6b7a7da6fb83f33101db32f6ab137d943dd3c1e8db9f3e1263573dc721ae82fe0bc63598751a5092c9f7dbfc39d564834e3703492c2a651643d8ce5c36d97a4812cf73fc8ea0d68d7489cfcb0176"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeef, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f000019e000/0x4000)=nil, 0x200000, 0x9) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x0, 0x7ff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x99) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x11, &(0x7f0000000440)={[{@nombcache}, {@grpid}, {@init_itable_val={'init_itable', 0x3d, 0x7}}, {@data_journal}, {@nombcache}]}, 0x8, 0x5fa, &(0x7f00000004c0)="$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") syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000840)='./file0\x00', 0x10a1b4, &(0x7f0000000e00)={[{@nouid32}, {@nodiscard}, {@data_err_abort}, {@noauto_da_alloc}, {@abort}, {@noquota}, {@usrquota}, {@errors_continue}, {@data_err_ignore}, {@nobarrier}, {@dioread_nolock}, {@jqfmt_vfsold}]}, 0x11, 0x472, &(0x7f0000000240)="$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") [ 30.038017][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.047315][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.054215][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.073950][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) [ 30.096156][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.111279][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.140984][ T341] device veth0_vlan entered promiscuous mode [ 30.163171][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.171466][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.190771][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.198057][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.206778][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.224211][ T341] device veth1_macvtap entered promiscuous mode executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) [ 30.240283][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.248795][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.264414][ T339] device veth0_vlan entered promiscuous mode [ 30.278265][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.302917][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.311522][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.318974][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.334694][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000003280)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700000000000000f9000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x88, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() ioctl$HIDIOCGRDESCSIZE(0xffffffffffffffff, 0x80044801, &(0x7f0000000280)) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) unshare(0x64000600) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) [ 30.351615][ T339] device veth1_macvtap entered promiscuous mode [ 30.358804][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.372374][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.387275][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.788980][ T9] device bridge_slave_1 left promiscuous mode [ 30.795036][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.802555][ T9] device bridge_slave_0 left promiscuous mode [ 30.808626][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.816444][ T9] device veth1_macvtap left promiscuous mode [ 30.822521][ T9] device veth0_vlan left promiscuous mode 2024/05/19 12:36:47 SYZFATAL: executor 1 failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir996674: read-only file system