last executing test programs: 5.544727871s ago: executing program 4 (id=1522): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) 5.523818363s ago: executing program 4 (id=1523): syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, &(0x7f0000000180), 0x1, 0x520, &(0x7f0000000900)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x88, 0x8b}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x14, 0x42) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000300)={0x2, 0xc, 0x7, 0x7ff, 0xa0, 0x40, &(0x7f0000000580)="cb3fff99885cd03a6ae476a9671c248bf45a9a5eb2ae7697f123826d97989da54f6556d04e53a4e86d3d62719e1d8b95dafef291d9494f2462c0e34afdcac137a34d85c3adec82f9343ff91f86533c20bd7d51ade7c86c9bc85a7600159b511a2e9e843c87b8d444c76e280848b5bd7355e5248ce9ec4db2a160a9971455a3918b1fcd32c8d8ab9ce96fe99313cf19eaa28e591b81a45bd5c48621f46d861cdb"}) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'syz_tun\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_emit_ethernet(0x36, &(0x7f0000000a40)={@local, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "89d884", 0x0, 0x0, 0x0, @remote, @empty}}}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) 4.378015566s ago: executing program 2 (id=1530): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000002304e800000000000000ea850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000004c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYRES64=r2], 0x3c}}, 0x0) r3 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x8, 0x3, 0x3d0, 0x0, 0x1000000, 0xffffffff, 0x268, 0xffffffff, 0x338, 0xffffffff, 0xffffffff, 0x338, 0xffffffff, 0x3, 0x0, {[{{@ip={@private, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'bond_slave_1\x00', 'geneve1\x00'}, 0x0, 0x208, 0x268, 0x0, {0x0, 0x1c8}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_batadv\x00', {0xffffffffffffffff, 0x0, 0x39, 0x0, 0xd27c, 0x80000000, 0x3}}}, @common=@set={{0x40}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@ip={@remote, @empty, 0x0, 0x0, 'veth0_vlan\x00', 'netpci0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x64}}}}, 0x430) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x3, 0x1004, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r7, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000e8000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) mremap(&(0x7f000087f000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffb000/0x2000)=nil) syz_emit_ethernet(0xaf, &(0x7f0000000580)={@random="1f35309de1cc", @local, @val={@void}, {@ipv4={0x800, @tipc={{0x20, 0x4, 0x2, 0x5, 0x9d, 0x65, 0x0, 0x8, 0x6, 0x0, @multicast1, @loopback, {[@generic={0x83, 0x9, "6ccf075ae9254b"}, @timestamp_addr={0x44, 0x2c, 0x22, 0x1, 0x6, [{@local, 0xd}, {@multicast1}, {@remote, 0xfccb}, {@broadcast, 0x4ed7}, {@broadcast, 0x3}]}, @timestamp_addr={0x44, 0x34, 0xb0, 0x1, 0x6, [{@multicast1}, {@multicast2, 0x81}, {@multicast1, 0x5fd}, {@dev={0xac, 0x14, 0x14, 0x15}, 0x1}, {@rand_addr=0x64010101, 0x9}, {@private=0xa010102, 0x8}]}]}}, @payload_conn={{{0x1d, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x2, 0xf1, 0x0, 0x0, 0x7, 0x7, 0x0, 0xb8a, 0xdbb, 0x2, 0x4e21, 0x4e21}}, [0x0, 0x0, 0x0, 0x0, 0x0]}}}}}, 0x0) 3.47008051s ago: executing program 1 (id=1537): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454da, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454da, &(0x7f0000000140)={'bond0\x00'}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 3.46930028s ago: executing program 2 (id=1538): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r0, 0x6, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r2, &(0x7f0000001340)=[{&(0x7f0000000580)=""/148, 0x94}], 0x1) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12013f00000000407f04ffff00000000000109022400"], 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x441, 0x0) fallocate(r3, 0x0, 0x0, 0x8000) openat(0xffffffffffffff9c, 0x0, 0x441, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 3.468622311s ago: executing program 4 (id=1539): bpf$MAP_CREATE(0x0, 0x0, 0x48) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[], 0x0, 0x9a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)={0x14, r5, 0x1, 0x2}, 0x14}, 0x1, 0x0, 0x0, 0x44008}, 0x0) 3.351507954s ago: executing program 0 (id=1540): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsmount(r5, 0x0, 0x0) 2.42501364s ago: executing program 0 (id=1541): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0}, 0x10) r1 = add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x4, r1, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x4, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c}}]}, 0x4c}}, 0x0) 2.336277691s ago: executing program 0 (id=1542): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000100000000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7b, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b037511bf746bec66ba", 0x2acf, 0x11, 0x0, 0x27) 2.335745991s ago: executing program 0 (id=1543): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x10040, &(0x7f0000000200)={[{@journal_dev}, {@nouid32}]}, 0xfe, 0x269, &(0x7f0000000780)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000d40)={0x0, 0x2904c, 0x3fffffffffffe52, 0x10003, '\x00', [{}, {0xffffffff}]}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f00000004c0), 0x75, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x18) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4003, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 2.331852672s ago: executing program 1 (id=1544): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) fchown(r0, 0x0, 0x0) 2.281731717s ago: executing program 1 (id=1545): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x8, 0x0, 0x7ffc1ffb}]}) futimesat(0xffffffffffffffff, 0x0, 0x0) 2.211317085s ago: executing program 1 (id=1546): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) 2.079474441s ago: executing program 1 (id=1547): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000040000000000000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) mprotect(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x5) 2.012359578s ago: executing program 1 (id=1548): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x1, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0xfffffffffffffe02, &(0x7f00000002c0)=0x2) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r5}, 0x18) add_key$fscrypt_v1(0x0, &(0x7f0000004e40)={'fscrypt:', @desc3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, &(0x7f0000004f80)={'enc=', 'pkcs1', ' hash=', {'cbcmac-aes-neon\x00'}}, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x6, 0xd0, 0x40, 0x40, 0x357d, 0x7788, 0x362f, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x4, [{{0x9, 0x4, 0x95, 0x8c, 0x0, 0x8, 0x42, 0x57, 0x9}}]}}]}}, 0x0) 1.73600216s ago: executing program 4 (id=1549): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@raw={'raw\x00', 0x8, 0x3, 0x528, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x458, 0xffffffff, 0xffffffff, 0x458, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x62}, 0x0, 0x358, 0x388, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_hsr\x00', {0x4, 0x8, 0x20, 0x5e1b2d47, 0xf91, 0x5, 0x4, 0x9f7, 0x18}, {0x8}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x588) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x953a, &(0x7f0000000100)=[{&(0x7f0000000000)="2b10", 0xffbd}], 0x1, 0x0, 0x0, 0x2c}, 0x4) 1.457323423s ago: executing program 0 (id=1550): syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c756e695f786c6174653d312c73686f72746e616d653d6c6f7765722c73686f72746e616d653d6c6f7765722c756e695f786c6174e53d302c757466383d302c73686f72746e616d653d6d697865642c726f6469722c73686f72746e616d653d6d697865642c636865636b3d7374726963742c73686f72746e616d653d77696e6e742c756e695f786c6174653d302c726f646972303030303030303030303030303030373335312c6572726f72733d72656d6f756e742d726f2c736d61636b6673666c6f6f723d756e695f789afd74653d312c00"/251], 0x1, 0x2d0, &(0x7f00000003c0)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000340)={'\x00', 0x8, 0x1, 0xc0b8}) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000740)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10000, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r8, @ANYBLOB="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"], 0x1c8}}, 0x0) 804.083668ms ago: executing program 4 (id=1551): sched_setscheduler(0x0, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_type(r1, &(0x7f00000001c0), 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000c80)=@nat={'nat\x00', 0x1b, 0x5, 0x4b8, 0x0, 0x0, 0xffffffff, 0x1e0, 0x2f8, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, &(0x7f0000000300), {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x4, @ipv6=@local, @ipv4=@dev={0xac, 0x14, 0x14, 0x28}, @gre_key=0x5, @port=0x4e21}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x2, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @gre_key=0x2, @gre_key=0x6}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2, [0xffffffff, 0x0, 0x0, 0xff], [0xff, 0xffffffff, 0xffffff00, 0xff000000], 'geneve1\x00', 'veth1_to_team\x00', {0xff}, {}, 0xc, 0x8, 0x7, 0x1}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@eui64={{0x28}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x1, @ipv4=@multicast1, @ipv4=@multicast2, @gre_key=0x7f, @icmp_id=0x67}}}, {{@ipv6={@mcast2, @ipv4={'\x00', '\xff\xff', @multicast2}, [0xffffffff, 0xff000000, 0xffffffff, 0xffffffff], [0x0, 0xff, 0xffffffff, 0xffffff], 'macvtap0\x00', 'bond0\x00', {}, {0xff}, 0x5e, 0x88, 0x5, 0x20}, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x6, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv6=@dev={0xfe, 0x80, '\x00', 0x19}, @gre_key=0x6, @gre_key=0x7}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) write$cgroup_type(r2, &(0x7f0000000280), 0x9) r3 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000c40), 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000110020850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0xfc, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="24000000680007f900000000000000000a000000000000000800010002000000040004"], 0x24}}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x0) syz_clone(0x1025000, &(0x7f0000000340), 0x0, &(0x7f0000000080), 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x1, 0x12) 578.566364ms ago: executing program 0 (id=1552): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000d00)='sched_switch\x00', r0}, 0x10) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r5, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r6, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_TOKEN={0x8}]}, 0x1c}}, 0x0) 331.732272ms ago: executing program 2 (id=1553): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000100000000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7b, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b037511bf746bec66ba", 0x2acf, 0x11, 0x0, 0x27) 253.179291ms ago: executing program 2 (id=1554): bpf$ENABLE_STATS(0x20, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x80, 0x0) write$binfmt_aout(r1, &(0x7f0000000140)=ANY=[], 0x20) 251.251001ms ago: executing program 3 (id=1555): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='percpu_alloc_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x18, 0x7, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 230.960124ms ago: executing program 3 (id=1556): bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) lremovexattr(&(0x7f0000000740)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00', {}, 0x40}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r2, 0x8983, &(0x7f0000000040)) 202.224677ms ago: executing program 3 (id=1557): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0xc008, &(0x7f0000000540)=ANY=[@ANYRES8=0x0, @ANYRESHEX, @ANYRESDEC, @ANYRES16, @ANYBLOB="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"], 0x41, 0x2f5, &(0x7f0000000b40)="$eJzs3E1rE10UwPGTNG3SlDZZPDygIr3oRjdDG/dCkBbEgFIb8QWEaTPRkDEJmVCJiI0rt34NQ5fdSEHrB+jGnSs34qYbwU1BaySZiZ20kzaNttOS/w/KPZ17T+blTsKZgZnNu6+f5LOWltUrEowoCYrUZFsk3owci+MiEpCAtJoRe2HEbmpyeez7p/NKRJKp1MycUrPJ+SsJpdTE5Lunz1curFfG7qxOrIVlI/5w81viy8b/G2c2f80/zlkqZ6lCsaJ0tVD8XNEXTENlclZeU+qWaeiWoXIFyyjb/cWKs1oplapKL2TGo6WyYVlKL1RV3qiqSlFVylWlP9JzBaVpmhqPyuDYmmw1pcPmpetzc3qyz5Uu9pmHf259395yuf3l+dDo7EnXj26bAADASdWu/8Pu+n+rs/4POG3QXf87alJr1v+3792/0UP9vzbSpf4v7qn/nesL6ejPmkXq/35F9i5K14f6r/9xSpRHReorsvONfvlgZaoVUP8DAAAAAAAAAAAAAAAAAAAAAHAabDUasUajEWu2QbHj5l/YeWCk/b/f24mj4Z5/e65DzVln/geE68G9iIj5aim9lLZbuz+ZlZyYYsiUxORn63xw2PHs9dRMQLXE5b257OQvL6WHOvOnJSZx7/xpO1915g9L1J2fkJj8552f8MwfkUsXXfmaxOTjohTFlEzrvN7JfzGt1LWbqV35o5LxeGIOAAAAAIDTSFN/eF6/a1q3fju/l/sDU57X5yE5G/J33wEAAAAAGBRW9VleN02jfGDwxsk4cPBXZ2DPn/y3wfAh9qLX4G0rCHT75MihDt0RBO13Mu87eNQZ1NHl3J5Z9nHj+w0mfVl7qHnSu5ZEuw6eGPI64PsFYeetzM0l241dY66unvvh3wE/1p8hAAAAAMdgp+j3e0sAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABhcx/E6Mb/3EQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgpfgcAAP//06IWPQ==") r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0185879, &(0x7f0000000080)={@desc={0x4100, 0x0, @desc1}}) 201.894097ms ago: executing program 2 (id=1558): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000002d007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 170.785691ms ago: executing program 2 (id=1559): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 147.448484ms ago: executing program 3 (id=1560): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000059c0)='./bus\x00', 0x1400e, &(0x7f0000005a00), 0x1, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000605222327b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 146.879454ms ago: executing program 3 (id=1561): r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001540)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000800)=@newtaction={0xb0, 0x30, 0x301, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x9c, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{}, 0x1, r3}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x7, 0x46ce, 0x8, 0x200, 0x99}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}]}]}, 0xb0}}, 0x0) 88.07835ms ago: executing program 3 (id=1562): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x800714, &(0x7f0000000580)={[{@orlov}, {@minixdf}, {@discard}, {@debug}, {@grpquota}, {@errors_continue}, {@test_dummy_encryption}, {@auto_da_alloc}, {@norecovery}]}, 0xfe, 0x45b, &(0x7f0000000d80)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x7ffff000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0xc0802, 0x0) ioctl$PPPIOCNEWUNIT(r5, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSMAXCID(r5, 0x40047451, &(0x7f0000000300)=0x3) pwritev(r5, &(0x7f0000000080)=[{&(0x7f00000004c0)="00214717a70700000000030600710a5e31163ceb9d0471200000000500000000000000ffff03425d4d50e7182ce0ab6d000041a15be2d9d13cd1cb0c238e61cfd6a5d7cd0eaa50e027db032ddbfe85e53b87eb950a45", 0x56}], 0x1, 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) 0s ago: executing program 4 (id=1563): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000400)={[{@noblock_validity}, {}, {@nobh}, {@norecovery}, {@discard}, {@orlov}, {@oldalloc}, {@noauto_da_alloc}, {@norecovery}]}, 0x1, 0x56a, &(0x7f00000015c0)="$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") r0 = open(&(0x7f0000000380)='./file1\x00', 0x8042, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$char_usb(r2, &(0x7f0000000000)=""/38, 0x26) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) rt_sigaction(0x8, &(0x7f0000000080)={&(0x7f0000000340)="2437460f1c2bc4a2f99c9022000000c4a2f10027460f38e741c44240f29a3b470000a5c43b3be5c436fe0d094e486ff5f5bb559a00000f75bed5370b1c2665d2950e000000dbf5", 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000300)) fallocate(r0, 0x0, 0x0, 0x7000000) kernel console output (not intermixed with test programs): syzkaller syzkaller login: [ 14.058807][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 14.058822][ T29] audit: type=1400 audit(1730087591.678:76): avc: denied { transition } for pid=3191 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.062575][ T29] audit: type=1400 audit(1730087591.678:77): avc: denied { noatsecure } for pid=3191 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.065075][ T29] audit: type=1400 audit(1730087591.678:78): avc: denied { write } for pid=3191 comm="sh" path="pipe:[374]" dev="pipefs" ino=374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 14.068015][ T29] audit: type=1400 audit(1730087591.678:79): avc: denied { rlimitinh } for pid=3191 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.070480][ T29] audit: type=1400 audit(1730087591.678:80): avc: denied { siginh } for pid=3191 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.463984][ T29] audit: type=1400 audit(1730087596.078:81): avc: denied { read } for pid=2998 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.0.40' (ED25519) to the list of known hosts. [ 21.282431][ T29] audit: type=1400 audit(1730087598.898:82): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.305201][ T29] audit: type=1400 audit(1730087598.898:83): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.305737][ T3299] cgroup: Unknown subsys name 'net' [ 21.332780][ T29] audit: type=1400 audit(1730087598.948:84): avc: denied { unmount } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.426481][ T3299] cgroup: Unknown subsys name 'cpuset' [ 21.432471][ T3299] cgroup: Unknown subsys name 'rlimit' [ 21.539093][ T29] audit: type=1400 audit(1730087599.158:85): avc: denied { setattr } for pid=3299 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.562344][ T29] audit: type=1400 audit(1730087599.158:86): avc: denied { create } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.582872][ T29] audit: type=1400 audit(1730087599.158:87): avc: denied { write } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.590514][ T3304] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.603324][ T29] audit: type=1400 audit(1730087599.158:88): avc: denied { read } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.632170][ T29] audit: type=1400 audit(1730087599.158:89): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.657005][ T29] audit: type=1400 audit(1730087599.158:90): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.680407][ T29] audit: type=1400 audit(1730087599.228:91): avc: denied { relabelto } for pid=3304 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.709427][ T3299] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.704316][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 22.787651][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.794787][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.801908][ T3313] bridge_slave_0: entered allmulticast mode [ 22.808371][ T3313] bridge_slave_0: entered promiscuous mode [ 22.818592][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.825755][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.832937][ T3313] bridge_slave_1: entered allmulticast mode [ 22.839348][ T3313] bridge_slave_1: entered promiscuous mode [ 22.857554][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 22.866307][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 22.885473][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 22.907259][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 22.920275][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 22.956242][ T3313] team0: Port device team_slave_0 added [ 22.975928][ T3313] team0: Port device team_slave_1 added [ 22.986138][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.993193][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.000543][ T3312] bridge_slave_0: entered allmulticast mode [ 23.006892][ T3312] bridge_slave_0: entered promiscuous mode [ 23.025176][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.032308][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.039503][ T3312] bridge_slave_1: entered allmulticast mode [ 23.045954][ T3312] bridge_slave_1: entered promiscuous mode [ 23.064143][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 23.071137][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 23.097099][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 23.116428][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 23.129570][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.136680][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.143846][ T3319] bridge_slave_0: entered allmulticast mode [ 23.150313][ T3319] bridge_slave_0: entered promiscuous mode [ 23.157024][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 23.164008][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 23.189960][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 23.209922][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.216979][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.224079][ T3317] bridge_slave_0: entered allmulticast mode [ 23.230492][ T3317] bridge_slave_0: entered promiscuous mode [ 23.236892][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.243956][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.251094][ T3319] bridge_slave_1: entered allmulticast mode [ 23.257536][ T3319] bridge_slave_1: entered promiscuous mode [ 23.269435][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 23.281482][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 23.290605][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.297813][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.305078][ T3317] bridge_slave_1: entered allmulticast mode [ 23.311591][ T3317] bridge_slave_1: entered promiscuous mode [ 23.322655][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 23.349357][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 23.368383][ T3312] team0: Port device team_slave_0 added [ 23.379029][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 23.399999][ T3312] team0: Port device team_slave_1 added [ 23.410894][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 23.420450][ T3319] team0: Port device team_slave_0 added [ 23.426943][ T3319] team0: Port device team_slave_1 added [ 23.434161][ T3313] hsr_slave_0: entered promiscuous mode [ 23.440242][ T3313] hsr_slave_1: entered promiscuous mode [ 23.456340][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 23.463300][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 23.489262][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 23.517564][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.524611][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.531771][ T3321] bridge_slave_0: entered allmulticast mode [ 23.538304][ T3321] bridge_slave_0: entered promiscuous mode [ 23.544950][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 23.551941][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 23.577875][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 23.597186][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 23.604137][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 23.630048][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 23.640934][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.648001][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.655138][ T3321] bridge_slave_1: entered allmulticast mode [ 23.661423][ T3321] bridge_slave_1: entered promiscuous mode [ 23.674790][ T3317] team0: Port device team_slave_0 added [ 23.681302][ T3317] team0: Port device team_slave_1 added [ 23.691067][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 23.698039][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 23.723981][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 23.763835][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 23.779757][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 23.786783][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 23.812663][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 23.823904][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 23.830896][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 23.856867][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 23.876340][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 23.887375][ T3312] hsr_slave_0: entered promiscuous mode [ 23.893311][ T3312] hsr_slave_1: entered promiscuous mode [ 23.899248][ T3312] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 23.906816][ T3312] Cannot create hsr debugfs directory [ 23.919036][ T3319] hsr_slave_0: entered promiscuous mode [ 23.924881][ T3319] hsr_slave_1: entered promiscuous mode [ 23.930716][ T3319] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 23.938275][ T3319] Cannot create hsr debugfs directory [ 23.959699][ T3321] team0: Port device team_slave_0 added [ 23.966279][ T3321] team0: Port device team_slave_1 added [ 23.983382][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 23.990395][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.016352][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.038267][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.045329][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.071331][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.112459][ T3317] hsr_slave_0: entered promiscuous mode [ 24.118563][ T3317] hsr_slave_1: entered promiscuous mode [ 24.124294][ T3317] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 24.132050][ T3317] Cannot create hsr debugfs directory [ 24.190614][ T3321] hsr_slave_0: entered promiscuous mode [ 24.196627][ T3321] hsr_slave_1: entered promiscuous mode [ 24.202471][ T3321] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 24.210034][ T3321] Cannot create hsr debugfs directory [ 24.250979][ T3313] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 24.262916][ T3313] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 24.277316][ T3313] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 24.296467][ T3313] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 24.323858][ T3312] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 24.340665][ T3312] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 24.353824][ T3312] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 24.364812][ T3312] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 24.388548][ T3319] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 24.397224][ T3319] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 24.412353][ T3319] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 24.421313][ T3319] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 24.446588][ T3317] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 24.457395][ T3317] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 24.466371][ T3317] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 24.479675][ T3317] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 24.506595][ T3321] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 24.521558][ T3321] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 24.537820][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 24.545947][ T3321] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 24.562684][ T3321] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 24.579650][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 24.605808][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.612948][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.621503][ T40] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.628603][ T40] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.640150][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 24.667471][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 24.681018][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 24.699364][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.706456][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.732509][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.739680][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.751344][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 24.765743][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 24.777327][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.784403][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.801549][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 24.811017][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.818119][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.833098][ T3319] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 24.843522][ T3319] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 24.867870][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 24.875939][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 24.886795][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.893875][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.903099][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.910200][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.949401][ T3317] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 24.974155][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 24.998511][ T3337] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.005624][ T3337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.021460][ T3337] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.028535][ T3337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.052942][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 25.062089][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 25.123379][ T3313] veth0_vlan: entered promiscuous mode [ 25.137379][ T3313] veth1_vlan: entered promiscuous mode [ 25.145377][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 25.163907][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 25.193725][ T3313] veth0_macvtap: entered promiscuous mode [ 25.223135][ T3313] veth1_macvtap: entered promiscuous mode [ 25.250634][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 25.274380][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 25.298230][ T3319] veth0_vlan: entered promiscuous mode [ 25.313528][ T3312] veth0_vlan: entered promiscuous mode [ 25.321368][ T3321] veth0_vlan: entered promiscuous mode [ 25.329592][ T3319] veth1_vlan: entered promiscuous mode [ 25.336294][ T3313] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.345036][ T3313] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.353774][ T3313] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.362541][ T3313] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.380309][ T3312] veth1_vlan: entered promiscuous mode [ 25.390346][ T3321] veth1_vlan: entered promiscuous mode [ 25.408053][ T3317] veth0_vlan: entered promiscuous mode [ 25.420425][ T3319] veth0_macvtap: entered promiscuous mode [ 25.433440][ T3321] veth0_macvtap: entered promiscuous mode [ 25.444797][ T3319] veth1_macvtap: entered promiscuous mode [ 25.453018][ T3321] veth1_macvtap: entered promiscuous mode [ 25.459081][ T3313] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 25.463892][ T3317] veth1_vlan: entered promiscuous mode [ 25.492582][ T3317] veth0_macvtap: entered promiscuous mode [ 25.499833][ T3317] veth1_macvtap: entered promiscuous mode [ 25.509568][ T3317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 25.520191][ T3317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.530804][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 25.539914][ T3319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 25.550458][ T3319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.560432][ T3319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 25.570921][ T3319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.581593][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 25.593729][ T3312] veth0_macvtap: entered promiscuous mode [ 25.601213][ T3312] veth1_macvtap: entered promiscuous mode [ 25.607518][ T3317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 25.618045][ T3317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.628671][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 25.636516][ T3319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 25.646955][ T3319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.656824][ T3319] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 25.667256][ T3319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.677771][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 25.687191][ T3321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 25.697643][ T3321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.707464][ T3321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 25.717876][ T3321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.727718][ T3321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 25.738170][ T3321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.749269][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 25.761794][ T3317] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.770638][ T3317] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.779399][ T3317] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.788182][ T3317] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.800238][ T3321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 25.810729][ T3321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.820565][ T3321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 25.831035][ T3321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.840864][ T3321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 25.851364][ T3321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.862160][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 25.872455][ T3321] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.881305][ T3321] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.890064][ T3321] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.898793][ T3321] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.909101][ T3319] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.917911][ T3319] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.926645][ T3319] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.935322][ T3319] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.952793][ T3312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 25.963245][ T3312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.973087][ T3312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 25.983517][ T3312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.993328][ T3312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 26.003778][ T3312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.013637][ T3312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 26.024070][ T3312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.034712][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.042976][ T3312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 26.053474][ T3312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.063316][ T3312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 26.073906][ T3312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.083750][ T3312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 26.094237][ T3312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.104039][ T3312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 26.114570][ T3312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.125076][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 26.145471][ T3312] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.154225][ T3312] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.163098][ T3312] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.171892][ T3312] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.470820][ T3458] 9pnet_fd: Insufficient options for proto=fd [ 26.574859][ T29] kauditd_printk_skb: 35 callbacks suppressed [ 26.574922][ T29] audit: type=1326 audit(1730087604.188:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3475 comm="syz.0.9" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff80a7de719 code=0x7ffc0000 [ 26.625210][ T29] audit: type=1326 audit(1730087604.188:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3475 comm="syz.0.9" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff80a7de719 code=0x7ffc0000 [ 26.648483][ T29] audit: type=1326 audit(1730087604.188:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3475 comm="syz.0.9" exe="/root/syz-executor" sig=0 arch=c000003e syscall=109 compat=0 ip=0x7ff80a7de719 code=0x7ffc0000 [ 26.671763][ T29] audit: type=1326 audit(1730087604.188:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3475 comm="syz.0.9" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff80a7de719 code=0x7ffc0000 [ 26.694925][ T29] audit: type=1326 audit(1730087604.198:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3475 comm="syz.0.9" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff80a7de719 code=0x7ffc0000 [ 26.727122][ T3482] serio: Serial port ptm0 [ 26.887410][ T3486] loop0: detected capacity change from 0 to 1024 [ 26.894289][ T3486] EXT4-fs: Ignoring removed orlov option [ 26.900102][ T3486] EXT4-fs: Ignoring removed nomblk_io_submit option [ 26.911734][ T29] audit: type=1326 audit(1730087604.528:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3477 comm="syz.4.10" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fc0d740e719 code=0x0 [ 26.949939][ T3486] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 27.262701][ T29] audit: type=1400 audit(1730087604.578:133): avc: denied { mount } for pid=3484 comm="syz.0.12" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 27.518875][ T29] audit: type=1400 audit(1730087604.928:134): avc: denied { read } for pid=3484 comm="syz.0.12" name="file1" dev="loop0" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 27.540815][ T29] audit: type=1400 audit(1730087604.928:135): avc: denied { open } for pid=3484 comm="syz.0.12" path="/4/file1/file1" dev="loop0" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 27.645720][ T29] audit: type=1400 audit(1730087605.188:136): avc: denied { create } for pid=3498 comm="syz.2.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 27.764489][ T3313] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 28.749424][ T3543] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 28.760611][ T3543] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 28.780413][ T3543] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 28.799948][ T3543] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 29.453274][ T3563] loop3: detected capacity change from 0 to 128 [ 29.482553][ T3563] FAT-fs (loop3): Invalid FSINFO signature: 0x41615252, 0x00067272 (sector = 1) [ 29.559086][ T3571] netlink: 'syz.0.38': attribute type 1 has an invalid length. [ 29.568602][ T3571] netlink: 8 bytes leftover after parsing attributes in process `syz.0.38'. [ 29.577374][ T3571] netlink: 4 bytes leftover after parsing attributes in process `syz.0.38'. [ 30.734632][ T3607] loop3: detected capacity change from 0 to 128 [ 30.763461][ T3607] FAT-fs (loop3): Invalid FSINFO signature: 0x41615252, 0x00067272 (sector = 1) [ 30.839867][ T3610] loop3: detected capacity change from 0 to 512 [ 30.854050][ T3610] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 30.867188][ T3610] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 30.891907][ T3610] EXT4-fs (loop3): 1 truncate cleaned up [ 30.915121][ T3610] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 31.110035][ T3616] netlink: 'syz.4.53': attribute type 1 has an invalid length. [ 31.121398][ T3616] netlink: 8 bytes leftover after parsing attributes in process `syz.4.53'. [ 31.130181][ T3616] netlink: 4 bytes leftover after parsing attributes in process `syz.4.53'. [ 31.359320][ T3622] netlink: 8 bytes leftover after parsing attributes in process `syz.2.54'. [ 31.591800][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 31.591814][ T29] audit: type=1400 audit(1730087609.208:170): avc: denied { create } for pid=3629 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 31.623104][ T29] audit: type=1400 audit(1730087609.238:171): avc: denied { sqpoll } for pid=3629 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 31.657335][ T29] audit: type=1400 audit(1730087609.268:172): avc: denied { write } for pid=3624 comm="syz.2.56" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 31.747628][ T29] audit: type=1400 audit(1730087609.368:173): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 31.897950][ T3319] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 31.944989][ T29] audit: type=1400 audit(1730087609.498:174): avc: denied { setopt } for pid=3634 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 31.965208][ T29] audit: type=1400 audit(1730087609.528:175): avc: denied { ioctl } for pid=3634 comm="syz.1.59" path="socket:[4851]" dev="sockfs" ino=4851 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 31.990039][ T29] audit: type=1400 audit(1730087609.548:176): avc: denied { write } for pid=3634 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 32.037285][ T3638] loop1: detected capacity change from 0 to 128 [ 32.101202][ T3638] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x00067272 (sector = 1) [ 32.237915][ T3647] loop3: detected capacity change from 0 to 128 [ 32.245123][ T3647] ======================================================= [ 32.245123][ T3647] WARNING: The mand mount option has been deprecated and [ 32.245123][ T3647] and is ignored by this kernel. Remove the mand [ 32.245123][ T3647] option from the mount to silence this warning. [ 32.245123][ T3647] ======================================================= [ 32.341921][ T3645] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 32.389071][ T29] audit: type=1400 audit(1730087609.858:177): avc: denied { mounton } for pid=3639 comm="syz.3.58" path="/syzcgroup/unified/file0" dev="cgroup2" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 32.396247][ T3650] loop2: detected capacity change from 0 to 1024 [ 32.468945][ T3650] EXT4-fs: Ignoring removed nobh option [ 32.474544][ T3650] EXT4-fs: Ignoring removed orlov option [ 32.480272][ T3650] EXT4-fs: Ignoring removed oldalloc option [ 32.538217][ T3650] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 32.551892][ T29] audit: type=1400 audit(1730087610.168:178): avc: denied { write } for pid=3649 comm="syz.2.64" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 32.578063][ T29] audit: type=1400 audit(1730087610.198:179): avc: denied { add_name } for pid=3649 comm="syz.2.64" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 32.655402][ T3645] netlink: 104 bytes leftover after parsing attributes in process `syz.0.63'. [ 32.661153][ T3661] netlink: 'syz.1.66': attribute type 1 has an invalid length. [ 32.673326][ T3661] netlink: 8 bytes leftover after parsing attributes in process `syz.1.66'. [ 32.682083][ T3661] netlink: 4 bytes leftover after parsing attributes in process `syz.1.66'. [ 32.694401][ T3661] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 32.707002][ T3661] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 32.826345][ T3663] netlink: 4 bytes leftover after parsing attributes in process `syz.1.67'. [ 32.875770][ T3666] loop1: detected capacity change from 0 to 512 [ 32.884378][ T3666] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 32.932443][ T3666] EXT4-fs (loop1): 1 truncate cleaned up [ 32.938512][ T3666] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 33.157607][ T3685] process 'syz.3.70' launched './file0' with NULL argv: empty string added [ 33.241059][ T3317] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 33.750825][ T3321] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.289140][ T3716] loop2: detected capacity change from 0 to 512 [ 34.307058][ T3716] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 34.321302][ T3716] ext4 filesystem being mounted at /15/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 34.374034][ T3723] loop4: detected capacity change from 0 to 512 [ 34.388363][ T3723] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 34.399866][ T3723] EXT4-fs (loop4): 1 truncate cleaned up [ 34.406268][ T3723] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 35.263626][ T3729] } (3729) used greatest stack depth: 10728 bytes left [ 35.286084][ T3312] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.350569][ T3317] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.488534][ T3743] netlink: 8 bytes leftover after parsing attributes in process `syz.0.90'. [ 36.762579][ T3773] loop2: detected capacity change from 0 to 512 [ 36.773147][ T3773] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 36.789138][ T3773] EXT4-fs error (device loop2): ext4_orphan_get:1388: inode #15: comm syz.2.101: iget: bad i_size value: -67835469387268086 [ 36.802379][ T3773] EXT4-fs error (device loop2): ext4_orphan_get:1393: comm syz.2.101: couldn't read orphan inode 15 (err -117) [ 36.817215][ T3773] EXT4-fs (loop2): mounted filesystem f7ff0000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 36.830604][ T3773] ext2 filesystem being mounted at /19/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 37.003215][ T3778] netlink: 'syz.0.102': attribute type 1 has an invalid length. [ 37.020895][ T3779] EXT4-fs error (device loop2): ext4_add_entry:2437: inode #2: comm syz.2.101: Directory hole found for htree leaf block 0 [ 37.036713][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 37.036726][ T29] audit: type=1400 audit(1730087614.628:211): avc: denied { create } for pid=3772 comm="syz.2.101" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 37.064800][ T3778] netlink: 16 bytes leftover after parsing attributes in process `syz.0.102'. [ 37.211841][ T29] audit: type=1400 audit(1730087614.828:212): avc: denied { create } for pid=3784 comm="syz.4.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 37.256000][ T29] audit: type=1400 audit(1730087614.858:213): avc: denied { bind } for pid=3784 comm="syz.4.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 37.275788][ T29] audit: type=1400 audit(1730087614.858:214): avc: denied { ioctl } for pid=3784 comm="syz.4.105" path="socket:[4082]" dev="sockfs" ino=4082 ioctlcmd=0x48dc scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 38.044713][ T29] audit: type=1326 audit(1730087615.658:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.1.112" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 38.070896][ T3804] loop1: detected capacity change from 0 to 128 [ 38.081378][ T29] audit: type=1326 audit(1730087615.688:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.1.112" exe="/root/syz-executor" sig=0 arch=c000003e syscall=135 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 38.104700][ T29] audit: type=1326 audit(1730087615.688:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.1.112" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 38.127980][ T29] audit: type=1326 audit(1730087615.688:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.1.112" exe="/root/syz-executor" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 38.151213][ T29] audit: type=1326 audit(1730087615.688:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.1.112" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 38.158544][ T3804] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x00067272 (sector = 1) [ 38.174445][ T29] audit: type=1326 audit(1730087615.688:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.1.112" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 38.347232][ T3317] EXT4-fs (loop2): unmounting filesystem f7ff0000-0000-0000-0000-000000000000. [ 39.293009][ T3821] syzkaller0: entered promiscuous mode [ 39.298533][ T3821] syzkaller0: entered allmulticast mode [ 39.374232][ T3827] loop4: detected capacity change from 0 to 512 [ 39.395036][ T3827] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 39.407812][ T3827] EXT4-fs (loop4): 1 truncate cleaned up [ 39.460093][ T3827] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.302600][ T3312] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.186602][ T3863] loop2: detected capacity change from 0 to 512 [ 41.289628][ T3863] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.314038][ T3863] ext4 filesystem being mounted at /23/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 41.473713][ T3863] ext4: Unknown parameter '00000000000000000000E' [ 41.561802][ T3317] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.983201][ T3879] netlink: 'syz.1.131': attribute type 1 has an invalid length. [ 42.022459][ T3879] netlink: 8 bytes leftover after parsing attributes in process `syz.1.131'. [ 42.048954][ T3879] bond1 (unregistering): Released all slaves [ 42.115518][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 42.115582][ T29] audit: type=1400 audit(1730087619.728:250): avc: denied { create } for pid=3884 comm="syz.1.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 42.140924][ T29] audit: type=1400 audit(1730087619.728:251): avc: denied { bind } for pid=3884 comm="syz.1.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 42.634746][ T3897] loop2: detected capacity change from 0 to 512 [ 42.644235][ T3897] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 42.683956][ T3897] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a00ec019, mo2=0002] [ 42.703259][ T3897] System zones: 1-12 [ 42.715149][ T3897] EXT4-fs warning (device loop2): ext4_expand_extra_isize_ea:2863: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 42.730322][ T3897] EXT4-fs (loop2): 1 truncate cleaned up [ 42.736440][ T3897] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 42.752466][ T29] audit: type=1400 audit(1730087620.368:252): avc: denied { ioctl } for pid=3896 comm="syz.2.137" path="/25/file2/hugetlb.2MB.usage_in_bytes" dev="loop2" ino=18 ioctlcmd=0x660b scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 43.026617][ T3904] netlink: 8 bytes leftover after parsing attributes in process `syz.2.137'. [ 43.267300][ T29] audit: type=1400 audit(1730087620.858:253): avc: denied { getopt } for pid=3905 comm="syz.0.139" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 43.287676][ T29] audit: type=1400 audit(1730087620.878:254): avc: denied { write } for pid=3901 comm="syz.3.138" name="001" dev="devtmpfs" ino=168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 43.571148][ T3317] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.806722][ T3930] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 43.822823][ T29] audit: type=1400 audit(1730087621.438:255): avc: denied { bind } for pid=3929 comm="syz.2.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 43.854318][ T3932] loop4: detected capacity change from 0 to 2048 [ 43.868984][ T29] audit: type=1400 audit(1730087621.438:256): avc: denied { name_bind } for pid=3929 comm="syz.2.148" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 43.889799][ T29] audit: type=1400 audit(1730087621.438:257): avc: denied { node_bind } for pid=3929 comm="syz.2.148" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 43.911832][ T29] audit: type=1400 audit(1730087621.438:258): avc: denied { setopt } for pid=3929 comm="syz.2.148" laddr=ff02::1 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 43.919923][ T3932] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 43.954047][ T3936] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 43.968027][ T3936] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 43.979129][ T3932] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 44.021114][ T3312] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.069635][ T3936] loop2: detected capacity change from 0 to 8192 [ 44.255212][ T29] audit: type=1400 audit(1730087621.868:259): avc: denied { ioctl } for pid=3939 comm="syz.4.151" path="socket:[6328]" dev="sockfs" ino=6328 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.537302][ T3956] usb usb8: usbfs: process 3956 (syz.0.155) did not claim interface 0 before use [ 45.533533][ T3977] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 45.542612][ T3977] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 47.226010][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 47.226025][ T29] audit: type=1400 audit(1730087624.838:266): avc: denied { name_bind } for pid=4009 comm="syz.2.172" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 47.253591][ T29] audit: type=1400 audit(1730087624.838:267): avc: denied { node_bind } for pid=4009 comm="syz.2.172" saddr=::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 48.692143][ T4037] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 48.705678][ T4037] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 49.794792][ T29] audit: type=1400 audit(1730087627.108:268): avc: denied { read write } for pid=4048 comm="syz.4.183" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 49.818530][ T29] audit: type=1400 audit(1730087627.108:269): avc: denied { open } for pid=4048 comm="syz.4.183" path="/dev/snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 49.892058][ T29] audit: type=1400 audit(1730087627.508:270): avc: denied { create } for pid=4055 comm="syz.1.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 49.918170][ T4056] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 49.933881][ T4056] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 50.671467][ T4076] Zero length message leads to an empty skb [ 50.714948][ T4078] syzkaller0: entered promiscuous mode [ 50.720476][ T4078] syzkaller0: entered allmulticast mode [ 52.006546][ T4120] netlink: 4 bytes leftover after parsing attributes in process `syz.1.207'. [ 52.016207][ T4120] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 53.299722][ T4155] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 53.324111][ T4155] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 53.747965][ T4174] netlink: 12 bytes leftover after parsing attributes in process `syz.2.223'. [ 54.385977][ T4186] netlink: 176 bytes leftover after parsing attributes in process `syz.1.228'. [ 54.395119][ T4186] netlink: 12 bytes leftover after parsing attributes in process `syz.1.228'. [ 54.404079][ T4186] netlink: 40 bytes leftover after parsing attributes in process `syz.1.228'. [ 54.491302][ T29] audit: type=1400 audit(1730087632.008:271): avc: denied { write } for pid=4183 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 54.632867][ T29] audit: type=1400 audit(1730087632.248:272): avc: denied { mount } for pid=4191 comm="syz.2.232" name="/" dev="configfs" ino=2121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 54.674697][ T29] audit: type=1400 audit(1730087632.278:273): avc: denied { read } for pid=4191 comm="syz.2.232" name="/" dev="configfs" ino=2121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 54.696706][ T29] audit: type=1400 audit(1730087632.278:274): avc: denied { open } for pid=4191 comm="syz.2.232" path="/40/file0" dev="configfs" ino=2121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 54.719247][ T29] audit: type=1400 audit(1730087632.278:275): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 54.781828][ T29] audit: type=1400 audit(1730087632.378:276): avc: denied { create } for pid=4197 comm="syz.2.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 54.801095][ T29] audit: type=1400 audit(1730087632.388:277): avc: denied { setopt } for pid=4197 comm="syz.2.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 54.820329][ T29] audit: type=1400 audit(1730087632.388:278): avc: denied { bind } for pid=4197 comm="syz.2.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 54.839389][ T29] audit: type=1326 audit(1730087632.408:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4200 comm="syz.2.235" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ca584e719 code=0x7ffc0000 [ 54.862715][ T29] audit: type=1326 audit(1730087632.408:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4200 comm="syz.2.235" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ca584e719 code=0x7ffc0000 [ 56.220534][ T4232] xt_CT: You must specify a L4 protocol and not use inversions on it [ 56.222246][ T4232] netlink: 8 bytes leftover after parsing attributes in process `syz.0.243'. [ 56.239939][ T4232] netlink: 60 bytes leftover after parsing attributes in process `syz.0.243'. [ 56.396470][ T4227] 9pnet_fd: Insufficient options for proto=fd [ 57.270831][ T4256] usb usb8: usbfs: process 4256 (syz.3.249) did not claim interface 0 before use [ 58.194730][ T4270] netlink: 12 bytes leftover after parsing attributes in process `syz.0.254'. [ 58.335635][ T4276] netlink: 'syz.4.256': attribute type 1 has an invalid length. [ 58.386663][ T4276] netlink: 4 bytes leftover after parsing attributes in process `syz.4.256'. [ 58.483977][ T4276] bond1 (unregistering): Released all slaves [ 59.520511][ T4291] netlink: 8 bytes leftover after parsing attributes in process `syz.0.260'. [ 59.699689][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 59.699703][ T29] audit: type=1400 audit(1730087637.318:295): avc: denied { getopt } for pid=4297 comm="syz.0.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 61.153025][ T4321] netlink: 165 bytes leftover after parsing attributes in process `syz.2.271'. [ 61.237462][ T29] audit: type=1400 audit(1730087638.838:296): avc: denied { connect } for pid=4325 comm="syz.3.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 61.257114][ T29] audit: type=1400 audit(1730087638.838:297): avc: denied { setopt } for pid=4325 comm="syz.3.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 61.921903][ T4336] syz.4.275 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 62.895702][ T4363] netlink: 9 bytes leftover after parsing attributes in process `syz.2.283'. [ 62.995502][ T4363] gretap0: entered promiscuous mode [ 63.346610][ T4382] netlink: 'syz.1.290': attribute type 1 has an invalid length. [ 63.452105][ T4382] bond1 (unregistering): Released all slaves [ 64.273183][ T29] audit: type=1400 audit(1730087641.808:298): avc: denied { mounton } for pid=4403 comm="syz.0.296" path="/61/bus" dev="tmpfs" ino=331 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 64.770522][ T29] audit: type=1326 audit(1730087642.388:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4424 comm="syz.1.305" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 64.793806][ T29] audit: type=1326 audit(1730087642.388:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4424 comm="syz.1.305" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 64.817158][ T29] audit: type=1326 audit(1730087642.388:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4424 comm="syz.1.305" exe="/root/syz-executor" sig=0 arch=c000003e syscall=227 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 64.840549][ T29] audit: type=1326 audit(2000000000.000:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4424 comm="syz.1.305" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 64.863786][ T29] audit: type=1326 audit(2000000000.000:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4424 comm="syz.1.305" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 66.450734][ T29] audit: type=1400 audit(2000000001.660:304): avc: denied { write } for pid=4451 comm="syz.2.312" name="route" dev="proc" ino=4026532555 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 68.194902][ T29] audit: type=1326 audit(2000000003.410:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4498 comm="syz.3.328" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 68.218281][ T29] audit: type=1326 audit(2000000003.410:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4498 comm="syz.3.328" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 68.241577][ T29] audit: type=1326 audit(2000000003.410:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4498 comm="syz.3.328" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 68.264847][ T29] audit: type=1326 audit(2000000003.410:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4498 comm="syz.3.328" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 69.975488][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 69.975551][ T29] audit: type=1400 audit(2000000005.160:324): avc: denied { map } for pid=4549 comm="syz.3.342" path="socket:[7358]" dev="sockfs" ino=7358 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 70.004455][ T29] audit: type=1400 audit(2000000005.160:325): avc: denied { read accept } for pid=4549 comm="syz.3.342" path="socket:[7358]" dev="sockfs" ino=7358 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 70.061457][ T29] audit: type=1400 audit(2000000005.280:326): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 71.435462][ T29] audit: type=1400 audit(2000000006.630:327): avc: denied { ioctl } for pid=4583 comm="syz.4.354" path="/dev/input/event0" dev="devtmpfs" ino=242 ioctlcmd=0x4593 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 71.464367][ T4587] syz.4.355[4587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.464622][ T4587] syz.4.355[4587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.481218][ T4587] syz.4.355[4587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.147682][ T29] audit: type=1400 audit(2000000007.290:328): avc: denied { search } for pid=4594 comm="syz.4.359" name="/" dev="configfs" ino=2121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 73.321620][ T4620] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 73.341391][ T4620] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 73.554478][ T29] audit: type=1400 audit(2000000008.770:329): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 73.593289][ T29] audit: type=1400 audit(2000000008.810:330): avc: denied { open } for pid=3319 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 73.617520][ T29] audit: type=1400 audit(2000000008.810:331): avc: denied { append } for pid=2998 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 73.672195][ T29] audit: type=1400 audit(2000000008.810:332): avc: denied { prog_load } for pid=4630 comm="syz.3.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 73.691288][ T29] audit: type=1400 audit(2000000008.810:333): avc: denied { bpf } for pid=4630 comm="syz.3.369" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 73.885592][ T4637] syz.3.371[4637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.885687][ T4637] syz.3.371[4637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.913641][ T4637] syz.3.371[4637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.166955][ T4655] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 74.220831][ T4655] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 74.562739][ T4666] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 74.571723][ T4666] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 74.970550][ T4680] netlink: 32 bytes leftover after parsing attributes in process `syz.4.387'. [ 76.150803][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 76.150815][ T29] audit: type=1400 audit(2000000001.990:362): avc: denied { read } for pid=4693 comm="syz.3.392" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 76.180948][ T29] audit: type=1400 audit(2000000001.990:363): avc: denied { open } for pid=4693 comm="syz.3.392" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 76.205448][ T29] audit: type=1400 audit(2000000001.990:364): avc: denied { ioctl } for pid=4693 comm="syz.3.392" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 76.542042][ T29] audit: type=1400 audit(2000000002.370:365): avc: denied { read } for pid=4704 comm="syz.4.394" name="event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 76.565075][ T29] audit: type=1400 audit(2000000002.370:366): avc: denied { open } for pid=4704 comm="syz.4.394" path="/dev/input/event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 76.589045][ T29] audit: type=1400 audit(2000000002.370:367): avc: denied { ioctl } for pid=4704 comm="syz.4.394" path="/dev/input/event0" dev="devtmpfs" ino=242 ioctlcmd=0x4592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 76.857715][ T4722] netlink: 'syz.3.400': attribute type 1 has an invalid length. [ 76.874119][ T4723] netlink: 36 bytes leftover after parsing attributes in process `syz.3.400'. [ 76.887970][ T4719] netlink: 32 bytes leftover after parsing attributes in process `syz.1.398'. [ 77.099215][ T4722] bond1 (unregistering): Released all slaves [ 77.270529][ T29] audit: type=1400 audit(2000000003.110:368): avc: denied { create } for pid=4732 comm="syz.4.402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 77.334899][ T4736] syz.3.403[4736] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.335110][ T4736] syz.3.403[4736] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.384846][ T4736] syz.3.403[4736] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.772565][ T29] audit: type=1400 audit(2000000003.610:369): avc: denied { execute } for pid=4741 comm="syz.2.405" name="file0" dev="tmpfs" ino=410 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 77.839781][ T29] audit: type=1400 audit(2000000003.610:370): avc: denied { execute_no_trans } for pid=4741 comm="syz.2.405" path="/76/file0" dev="tmpfs" ino=410 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 78.278567][ T4753] usb usb8: usbfs: process 4753 (syz.2.406) did not claim interface 0 before use [ 78.776886][ T29] audit: type=1400 audit(2000000004.620:371): avc: denied { create } for pid=4763 comm="syz.4.412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 78.777829][ T4764] netlink: 'syz.4.412': attribute type 1 has an invalid length. [ 78.907979][ T4768] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 78.923654][ T4768] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 81.160420][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 81.160434][ T29] audit: type=1400 audit(2000000007.000:383): avc: denied { write } for pid=4806 comm="syz.1.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 81.506039][ T4816] usb usb8: usbfs: process 4816 (syz.2.425) did not claim interface 0 before use [ 81.996693][ T4828] netlink: 'syz.2.432': attribute type 1 has an invalid length. [ 82.010577][ T4828] netlink: 36 bytes leftover after parsing attributes in process `syz.2.432'. [ 82.044854][ T4828] bond1 (unregistering): Released all slaves [ 82.447201][ T29] audit: type=1400 audit(2000000008.290:384): avc: denied { read } for pid=4838 comm="syz.2.435" dev="nsfs" ino=4026532540 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 82.468221][ T29] audit: type=1400 audit(2000000008.290:385): avc: denied { open } for pid=4838 comm="syz.2.435" path="net:[4026532540]" dev="nsfs" ino=4026532540 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 82.491327][ T29] audit: type=1400 audit(2000000008.290:386): avc: denied { create } for pid=4838 comm="syz.2.435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 82.538479][ T4846] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 82.548610][ T4846] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 82.578175][ T29] audit: type=1400 audit(2000000008.350:387): avc: denied { ioctl } for pid=4838 comm="syz.2.435" path="socket:[8445]" dev="sockfs" ino=8445 ioctlcmd=0x48ca scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 82.603019][ T29] audit: type=1326 audit(2000000008.350:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4838 comm="syz.2.435" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ca584e719 code=0x7ffc0000 [ 82.626318][ T29] audit: type=1326 audit(2000000008.350:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4838 comm="syz.2.435" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ca584e719 code=0x7ffc0000 [ 82.649664][ T29] audit: type=1326 audit(2000000008.350:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4838 comm="syz.2.435" exe="/root/syz-executor" sig=0 arch=c000003e syscall=227 compat=0 ip=0x7f8ca584e719 code=0x7ffc0000 [ 82.672935][ T29] audit: type=1326 audit(2000000000.000:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4838 comm="syz.2.435" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ca584e719 code=0x7ffc0000 [ 82.696143][ T29] audit: type=1326 audit(2000000000.000:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4838 comm="syz.2.435" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ca584e719 code=0x7ffc0000 [ 83.171732][ T4855] netlink: 32 bytes leftover after parsing attributes in process `syz.0.440'. [ 83.579736][ T4876] usb usb8: usbfs: process 4876 (syz.0.443) did not claim interface 0 before use [ 84.927587][ T4895] netlink: 8 bytes leftover after parsing attributes in process `syz.3.452'. [ 84.936424][ T4895] netlink: 4 bytes leftover after parsing attributes in process `syz.3.452'. [ 86.127206][ T4921] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 86.409008][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 86.409021][ T29] audit: type=1400 audit(2000000001.050:409): avc: denied { connect } for pid=4939 comm="syz.2.464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 86.684095][ T29] audit: type=1400 audit(2000000001.320:410): avc: denied { create } for pid=4922 comm="syz.1.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 87.142600][ T4949] netlink: 8 bytes leftover after parsing attributes in process `syz.4.467'. [ 87.151439][ T4949] netlink: 4 bytes leftover after parsing attributes in process `syz.4.467'. [ 88.247773][ T29] audit: type=1326 audit(2000000002.890:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4964 comm="syz.4.471" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc0d740e719 code=0x7ffc0000 [ 88.271192][ T29] audit: type=1326 audit(2000000002.890:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4964 comm="syz.4.471" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc0d740e719 code=0x7ffc0000 [ 88.294465][ T29] audit: type=1326 audit(2000000002.890:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4964 comm="syz.4.471" exe="/root/syz-executor" sig=0 arch=c000003e syscall=227 compat=0 ip=0x7fc0d740e719 code=0x7ffc0000 [ 88.317718][ T29] audit: type=1326 audit(2000000000.000:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4964 comm="syz.4.471" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc0d740e719 code=0x7ffc0000 [ 88.341026][ T29] audit: type=1326 audit(2000000000.000:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4964 comm="syz.4.471" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc0d740e719 code=0x7ffc0000 [ 89.162636][ T4993] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 89.171232][ T4993] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 89.890635][ T5006] netlink: 8 bytes leftover after parsing attributes in process `syz.3.479'. [ 89.899495][ T5006] netlink: 4 bytes leftover after parsing attributes in process `syz.3.479'. [ 90.459751][ T5023] Cannot find add_set index 0 as target [ 90.501917][ T5015] wireguard0: entered promiscuous mode [ 90.504319][ T29] audit: type=1400 audit(2000000002.200:416): avc: denied { setopt } for pid=5014 comm="syz.3.482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 90.507572][ T5015] wireguard0: entered allmulticast mode [ 90.641017][ T5030] usb usb8: usbfs: process 5030 (syz.0.483) did not claim interface 0 before use [ 90.981088][ T29] audit: type=1326 audit(2000000002.720:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5034 comm="syz.1.486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 91.004466][ T29] audit: type=1326 audit(2000000002.720:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5034 comm="syz.1.486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 91.536740][ T5043] netlink: 'syz.3.488': attribute type 1 has an invalid length. [ 91.579518][ T5043] netlink: 36 bytes leftover after parsing attributes in process `syz.3.488'. [ 92.548298][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 92.548312][ T29] audit: type=1400 audit(2000000001.460:422): avc: denied { connect } for pid=5051 comm="syz.2.490" lport=135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 92.826192][ T5077] syz.2.500[5077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.826272][ T5077] syz.2.500[5077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.837702][ T5077] syz.2.500[5077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.999032][ T5081] hub 6-0:1.0: USB hub found [ 93.015130][ T5081] hub 6-0:1.0: 8 ports detected [ 93.221568][ T29] audit: type=1326 audit(2000000002.220:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5083 comm="syz.0.502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff80a7de719 code=0x7ffc0000 [ 93.244884][ T29] audit: type=1326 audit(2000000002.220:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5083 comm="syz.0.502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff80a7de719 code=0x7ffc0000 [ 93.268094][ T29] audit: type=1326 audit(2000000002.220:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5083 comm="syz.0.502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=227 compat=0 ip=0x7ff80a7de719 code=0x7ffc0000 [ 93.291312][ T29] audit: type=1326 audit(2000000000.000:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5083 comm="syz.0.502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff80a7de719 code=0x7ffc0000 [ 93.314835][ T29] audit: type=1326 audit(2000000000.000:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5083 comm="syz.0.502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff80a7de719 code=0x7ffc0000 [ 93.497266][ T5091] netlink: 'syz.1.504': attribute type 1 has an invalid length. [ 93.648568][ T5091] netlink: 36 bytes leftover after parsing attributes in process `syz.1.504'. [ 93.665354][ T5091] bond1 (unregistering): Released all slaves [ 93.796737][ T5103] usb usb8: usbfs: process 5103 (syz.4.503) did not claim interface 0 before use [ 94.696774][ T5114] 9pnet_fd: Insufficient options for proto=fd [ 94.853933][ T29] audit: type=1400 audit(2000000001.630:428): avc: denied { getopt } for pid=5116 comm="syz.3.510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 94.917699][ T29] audit: type=1400 audit(2000000001.660:429): avc: denied { create } for pid=5116 comm="syz.3.510" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 95.121143][ T5119] wireguard0: entered promiscuous mode [ 95.123453][ T5128] syz.1.513[5128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.126653][ T5119] wireguard0: entered allmulticast mode [ 95.145290][ T5128] syz.1.513[5128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.145354][ T5128] syz.1.513[5128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.157531][ T5119] Cannot find add_set index 0 as target [ 96.680716][ T29] audit: type=1326 audit(2000000003.400:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5151 comm="syz.2.518" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ca584e719 code=0x7ffc0000 [ 96.703976][ T29] audit: type=1326 audit(2000000003.400:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5151 comm="syz.2.518" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ca584e719 code=0x7ffc0000 [ 96.766711][ T5156] syz.4.519[5156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.766879][ T5156] syz.4.519[5156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.858308][ T5156] syz.4.519[5156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.896196][ T5179] usb usb8: usbfs: process 5179 (syz.0.525) did not claim interface 0 before use [ 98.018792][ T5183] syz.3.526[5183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.018925][ T5183] syz.3.526[5183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.030631][ T5183] syz.3.526[5183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.493146][ T5193] syz.2.531[5193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.544733][ T5193] syz.2.531[5193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.605289][ T5193] syz.2.531[5193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.710354][ T5196] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 98.813805][ T5196] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 98.841480][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 98.841493][ T29] audit: type=1400 audit(2000000002.210:435): avc: denied { ioctl } for pid=5200 comm="syz.4.534" path="socket:[8865]" dev="sockfs" ino=8865 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 99.070788][ T29] audit: type=1400 audit(2000000002.440:436): avc: denied { read } for pid=5195 comm="syz.2.532" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 99.093345][ T29] audit: type=1400 audit(2000000002.440:437): avc: denied { open } for pid=5195 comm="syz.2.532" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 99.116322][ T29] audit: type=1400 audit(2000000002.440:438): avc: denied { ioctl } for pid=5195 comm="syz.2.532" path="/dev/ppp" dev="devtmpfs" ino=140 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 99.401960][ T29] audit: type=1400 audit(2000000002.770:439): avc: denied { watch_reads } for pid=5202 comm="syz.4.535" path="/103" dev="tmpfs" ino=543 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 100.282159][ T5232] veth0_vlan: left promiscuous mode [ 100.384496][ T5235] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 100.505549][ T29] audit: type=1400 audit(2000000003.750:440): avc: denied { write } for pid=5224 comm="syz.1.540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 100.981913][ T5235] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 101.300953][ T5245] syz.3.544[5245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.301009][ T5245] syz.3.544[5245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.314124][ T5245] syz.3.544[5245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.395325][ T29] audit: type=1400 audit(2000000004.760:441): avc: denied { mount } for pid=5242 comm="syz.4.546" name="/" dev="ramfs" ino=8922 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 101.876144][ T5249] usb usb8: usbfs: process 5249 (syz.2.547) did not claim interface 0 before use [ 104.685084][ T29] audit: type=1400 audit(2000000008.050:442): avc: denied { create } for pid=5315 comm="syz.4.569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 104.704430][ T29] audit: type=1400 audit(2000000008.050:443): avc: denied { ioctl } for pid=5315 comm="syz.4.569" path="socket:[9032]" dev="sockfs" ino=9032 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 105.727513][ T5339] syz.0.575[5339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.727575][ T5339] syz.0.575[5339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.739779][ T5339] syz.0.575[5339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.533347][ T5361] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 106.553387][ T5361] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 107.702356][ T5387] tipc: Started in network mode [ 107.707361][ T5387] tipc: Node identity 52fbc49728a4, cluster identity 4711 [ 107.714545][ T5387] tipc: Enabled bearer , priority 10 [ 107.842507][ T29] audit: type=1400 audit(2000000011.110:444): avc: denied { audit_read } for pid=5381 comm="syz.2.589" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 108.490407][ T5402] bridge0: port 3(vlan2) entered blocking state [ 108.496748][ T5402] bridge0: port 3(vlan2) entered disabled state [ 108.503598][ T5402] vlan2: entered allmulticast mode [ 108.509898][ T5402] vlan2: entered promiscuous mode [ 108.515168][ T5402] bridge0: adding interface vlan2 with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 108.863119][ T35] tipc: Node number set to 2053096599 [ 109.528000][ T5430] netlink: 'syz.1.602': attribute type 10 has an invalid length. [ 109.535786][ T5430] netem: change failed [ 109.582144][ T29] audit: type=1400 audit(2000000012.950:445): avc: denied { name_bind } for pid=5433 comm="syz.4.604" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 110.437813][ T5449] netlink: 'syz.1.608': attribute type 1 has an invalid length. [ 110.480321][ T5449] 8021q: adding VLAN 0 to HW filter on device batadv3 [ 110.488285][ T5449] bond1: (slave batadv3): Enslaving as a backup interface with an up link [ 111.305363][ T5474] veth0_vlan: left promiscuous mode [ 111.792718][ T5484] netlink: 'syz.0.618': attribute type 1 has an invalid length. [ 113.580276][ T29] audit: type=1400 audit(2000000016.950:446): avc: denied { create } for pid=5520 comm="syz.0.630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 113.658556][ T5524] xt_CT: You must specify a L4 protocol and not use inversions on it [ 114.534638][ T29] audit: type=1400 audit(2000000017.900:447): avc: denied { ioctl } for pid=5530 comm="syz.3.633" path="socket:[9743]" dev="sockfs" ino=9743 ioctlcmd=0x8941 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 114.938435][ T29] audit: type=1400 audit(2000000018.310:448): avc: denied { write } for pid=5541 comm="syz.4.636" path="socket:[10334]" dev="sockfs" ino=10334 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 117.071696][ T5599] cgroup: Bad value for 'name' [ 118.594020][ T5639] netlink: 'syz.0.664': attribute type 1 has an invalid length. [ 118.611712][ T5639] 8021q: adding VLAN 0 to HW filter on device batadv3 [ 118.619832][ T5639] bond1: (slave batadv3): Enslaving as a backup interface with an up link [ 119.057043][ T5654] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 119.071453][ T5654] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 119.170107][ T5658] syz.3.668[5658] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.170224][ T5658] syz.3.668[5658] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.181641][ T5658] syz.3.668[5658] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.392890][ T5665] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 119.413043][ T5665] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 119.660135][ T5672] netlink: 'syz.4.675': attribute type 1 has an invalid length. [ 119.677667][ T5672] 8021q: adding VLAN 0 to HW filter on device batadv2 [ 119.685774][ T5672] bond1: (slave batadv2): Enslaving as a backup interface with an up link [ 119.992960][ T5684] syz.2.678[5684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.993082][ T5684] syz.2.678[5684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.015562][ T5684] syz.2.678[5684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.646728][ T5693] netlink: 20 bytes leftover after parsing attributes in process `syz.0.681'. [ 120.666998][ T5693] netlink: 20 bytes leftover after parsing attributes in process `syz.0.681'. [ 120.693792][ T5695] syz.0.682[5695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.693975][ T5695] syz.0.682[5695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.705615][ T5695] syz.0.682[5695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.200340][ T5709] netlink: 'syz.1.686': attribute type 1 has an invalid length. [ 121.233004][ T5709] 8021q: adding VLAN 0 to HW filter on device batadv4 [ 121.243558][ T5709] bond2: (slave batadv4): Enslaving as a backup interface with an up link [ 122.291060][ T29] audit: type=1400 audit(2000000025.660:449): avc: denied { mounton } for pid=5728 comm="syz.0.692" path="/135/bus" dev="tmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 122.904524][ T5746] netlink: 'syz.2.697': attribute type 1 has an invalid length. [ 123.052932][ T5747] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 123.065918][ T5747] bond1: (slave batadv1): Enslaving as a backup interface with an up link [ 123.101655][ T5751] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 123.119987][ T5751] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 123.238373][ T29] audit: type=1400 audit(2000000026.610:450): avc: denied { compute_member } for pid=5752 comm="syz.3.699" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 125.469951][ T5785] netlink: 'syz.1.708': attribute type 1 has an invalid length. [ 125.477987][ T29] audit: type=1326 audit(2000000028.850:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5786 comm="syz.0.709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff80a7de719 code=0x7ffc0000 [ 125.501911][ T29] audit: type=1326 audit(2000000028.850:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5786 comm="syz.0.709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff80a7de719 code=0x7ffc0000 [ 125.525255][ T29] audit: type=1326 audit(2000000028.850:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5786 comm="syz.0.709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=227 compat=0 ip=0x7ff80a7de719 code=0x7ffc0000 [ 125.548670][ T29] audit: type=1326 audit(2000000000.000:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5786 comm="syz.0.709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff80a7de719 code=0x7ffc0000 [ 125.580050][ T5785] 8021q: adding VLAN 0 to HW filter on device batadv5 [ 125.588049][ T5785] bond3: (slave batadv5): Enslaving as a backup interface with an up link [ 125.656738][ T5798] syz.3.713[5798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.656920][ T5798] syz.3.713[5798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.668504][ T5798] syz.3.713[5798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.562769][ T29] audit: type=1326 audit(2000000001.070:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5819 comm="syz.3.720" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 126.662601][ T5824] netlink: 'syz.0.721': attribute type 1 has an invalid length. [ 126.740269][ T29] audit: type=1326 audit(2000000001.120:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5819 comm="syz.3.720" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 126.763595][ T29] audit: type=1326 audit(2000000001.250:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5819 comm="syz.3.720" exe="/root/syz-executor" sig=0 arch=c000003e syscall=227 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 126.786794][ T29] audit: type=1326 audit(2000000000.000:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5819 comm="syz.3.720" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 126.812146][ T5824] 8021q: adding VLAN 0 to HW filter on device batadv4 [ 126.828626][ T5824] bond2: (slave batadv4): Enslaving as a backup interface with an up link [ 126.976616][ T5832] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 126.995486][ T5832] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 128.122745][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 128.122761][ T29] audit: type=1400 audit(2000000001.340:460): avc: denied { connect } for pid=5847 comm="syz.4.727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 128.148728][ T29] audit: type=1400 audit(2000000001.340:461): avc: denied { setopt } for pid=5847 comm="syz.4.727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 128.271953][ T29] audit: type=1326 audit(2000000001.520:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5868 comm="syz.1.732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 128.421903][ T5871] syz.1.733[5871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.422092][ T5871] syz.1.733[5871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.470079][ T29] audit: type=1326 audit(2000000001.560:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5868 comm="syz.1.732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 128.476485][ T5871] syz.1.733[5871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.481509][ T29] audit: type=1326 audit(2000000001.560:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5868 comm="syz.1.732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=227 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 128.539221][ T29] audit: type=1326 audit(2000000000.000:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5868 comm="syz.1.732" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 128.629481][ T5873] netlink: 'syz.2.734': attribute type 1 has an invalid length. [ 128.687931][ T5873] 8021q: adding VLAN 0 to HW filter on device batadv2 [ 128.712788][ T5873] bond2: (slave batadv2): Enslaving as a backup interface with an up link [ 128.781186][ T5881] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 128.928456][ T5881] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 129.562908][ T29] audit: type=1400 audit(2000000001.240:466): avc: denied { create } for pid=5892 comm="syz.1.741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 129.582245][ T29] audit: type=1400 audit(2000000001.240:467): avc: denied { write } for pid=5892 comm="syz.1.741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 131.062363][ T5993] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 131.088536][ T5993] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 131.559778][ T29] audit: type=1400 audit(2000000001.110:468): avc: denied { write } for pid=6019 comm="syz.2.748" name="event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 133.408799][ T6160] netlink: 32 bytes leftover after parsing attributes in process `syz.2.760'. [ 133.838422][ T29] audit: type=1400 audit(2000000001.190:469): avc: denied { bind } for pid=6168 comm="syz.3.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 134.255062][ T6181] syz.0.767[6181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.255126][ T6181] syz.0.767[6181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.306906][ T6181] syz.0.767[6181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.773591][ T6212] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 136.123628][ T6212] syz.2.775 (6212) used greatest stack depth: 10328 bytes left [ 138.582789][ T6274] xt_CT: You must specify a L4 protocol and not use inversions on it [ 139.293118][ T29] audit: type=1400 audit(2000000005.070:470): avc: denied { read } for pid=3001 comm="acpid" name="mouse6" dev="devtmpfs" ino=551 scontext=system_u:system_r:acpid_t tcontext=root:object_r:device_t tclass=file permissive=1 [ 139.314889][ T29] audit: type=1400 audit(2000000005.070:471): avc: denied { open } for pid=3001 comm="acpid" path="/dev/input/mouse6" dev="devtmpfs" ino=551 scontext=system_u:system_r:acpid_t tcontext=root:object_r:device_t tclass=file permissive=1 [ 139.337495][ T29] audit: type=1400 audit(2000000005.070:472): avc: denied { ioctl } for pid=3001 comm="acpid" path="/dev/input/mouse6" dev="devtmpfs" ino=551 ioctlcmd=0x4520 scontext=system_u:system_r:acpid_t tcontext=root:object_r:device_t tclass=file permissive=1 [ 140.657436][ T6314] usb usb8: usbfs: process 6314 (syz.3.803) did not claim interface 0 before use [ 141.266916][ T6322] syz.0.806[6322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.266969][ T6322] syz.0.806[6322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.278447][ T6322] syz.0.806[6322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.492029][ T6332] netlink: 16 bytes leftover after parsing attributes in process `syz.2.810'. [ 142.755746][ T29] audit: type=1400 audit(2000000000.420:473): avc: denied { mount } for pid=6372 comm="syz.4.825" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 142.777942][ T29] audit: type=1400 audit(2000000000.430:474): avc: denied { remount } for pid=6372 comm="syz.4.825" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 143.414172][ T29] audit: type=1400 audit(2000000001.080:475): avc: denied { unmount } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 143.480618][ T6393] netlink: 'syz.1.830': attribute type 1 has an invalid length. [ 143.506872][ T6393] 8021q: adding VLAN 0 to HW filter on device batadv6 [ 143.514767][ T6393] bond4: (slave batadv6): Enslaving as a backup interface with an up link [ 143.862062][ T6411] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 143.870542][ T6411] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 145.141500][ T6434] netlink: 'syz.2.842': attribute type 1 has an invalid length. [ 145.178937][ T6434] 8021q: adding VLAN 0 to HW filter on device batadv3 [ 145.214250][ T6434] bond3: (slave batadv3): Enslaving as a backup interface with an up link [ 145.872317][ T29] audit: type=1400 audit(2000000002.090:476): avc: denied { connect } for pid=6446 comm="syz.3.845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 146.107180][ T29] audit: type=1400 audit(2000000002.280:477): avc: denied { read } for pid=6446 comm="syz.3.845" path="socket:[11736]" dev="sockfs" ino=11736 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 146.827692][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 147.324847][ T6472] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 147.333836][ T6472] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 147.392287][ T6480] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 147.415345][ T6480] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 147.660344][ T6483] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 147.690855][ T29] audit: type=1326 audit(2000000003.900:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6488 comm="syz.1.858" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 147.714165][ T29] audit: type=1326 audit(2000000003.900:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6488 comm="syz.1.858" exe="/root/syz-executor" sig=0 arch=c000003e syscall=227 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 147.737562][ T29] audit: type=1326 audit(2000000003.900:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6488 comm="syz.1.858" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 147.760833][ T29] audit: type=1326 audit(2000000003.900:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6488 comm="syz.1.858" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 147.784303][ T6483] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 147.821267][ T6491] syz.1.859[6491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.821348][ T6491] syz.1.859[6491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.845462][ T6491] syz.1.859[6491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.229060][ T6500] capability: warning: `syz.0.862' uses 32-bit capabilities (legacy support in use) [ 148.262604][ T29] audit: type=1401 audit(2000000004.480:482): op=setxattr invalid_context=8CA9BF03DF58D521186E7A75BC6AF58B07381BF529C49D4CF134921F3B150E538BC1CCC55DDA695EFE188ADA453BCFAB54C0B2B21B154BE4701E80C5202A709635D42BB63C3D4EA37DD96F77CE2B00C854427236CC8389EDB58BCD36703DC461EFCDEF2E6B354D333DD9EC8CDC14E5575B73C81BBBABA7CB3B058127A8492936EF8FA52C84C94463010BD03CF9C91C7E6DEC69389BB686E5303135FB48C0A66755FF41A6534CF060D205B63BF00C62502B3A92C5A5BDB1DDF66D11CDBB368542C858B4E38CBFC7661D2CB539D610E19BC51E563D0D0000000000000000000000 [ 148.531325][ T29] audit: type=1400 audit(2000000004.750:483): avc: denied { map } for pid=6501 comm="syz.3.863" path="/dev/bus/usb/002/001" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 148.555336][ T29] audit: type=1400 audit(2000000004.750:484): avc: denied { execute } for pid=6501 comm="syz.3.863" path="/dev/bus/usb/002/001" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 148.995053][ T6520] netlink: 'syz.1.867': attribute type 1 has an invalid length. [ 149.076948][ T29] audit: type=1400 audit(2000000005.180:485): avc: denied { relabelfrom } for pid=6511 comm="syz.4.865" name="" dev="pipefs" ino=11844 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 149.259716][ T6521] 8021q: adding VLAN 0 to HW filter on device batadv7 [ 149.268878][ T6521] bond5: (slave batadv7): Enslaving as a backup interface with an up link [ 149.479501][ T6531] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 149.626251][ T6531] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 149.649605][ T6542] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 149.661609][ T6542] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 150.262907][ T6570] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 150.277423][ T6570] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 150.394590][ T6574] xt_CT: You must specify a L4 protocol and not use inversions on it [ 151.235771][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 151.235800][ T29] audit: type=1400 audit(2000000007.460:494): avc: denied { getattr } for pid=6585 comm="syz.2.891" name="/" dev="pidfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 151.539498][ T29] audit: type=1400 audit(2000000007.760:495): avc: denied { write } for pid=6588 comm="syz.2.892" path="socket:[11980]" dev="sockfs" ino=11980 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 151.949026][ T6599] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 151.958493][ T6599] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 154.980672][ T6661] syz.4.913[6661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.980768][ T6661] syz.4.913[6661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.995868][ T6661] syz.4.913[6661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.396788][ T6674] xt_CT: You must specify a L4 protocol and not use inversions on it [ 156.036825][ T6681] syz.2.919[6681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.036903][ T6681] syz.2.919[6681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.048600][ T6681] syz.2.919[6681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.791658][ T6726] xt_CT: You must specify a L4 protocol and not use inversions on it [ 158.304636][ T6735] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 158.410086][ T6735] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 161.030138][ T6799] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 161.053155][ T6799] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 162.435235][ T29] audit: type=1400 audit(2000000018.650:496): avc: denied { append } for pid=6830 comm="syz.0.967" name="001" dev="devtmpfs" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 162.458086][ T29] audit: type=1400 audit(2000000018.650:497): avc: denied { bind } for pid=6830 comm="syz.0.967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 162.477418][ T29] audit: type=1400 audit(2000000018.650:498): avc: denied { name_bind } for pid=6830 comm="syz.0.967" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 162.498265][ T29] audit: type=1400 audit(2000000018.650:499): avc: denied { node_bind } for pid=6830 comm="syz.0.967" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 163.089257][ T6841] xt_CT: You must specify a L4 protocol and not use inversions on it [ 165.232544][ T29] audit: type=1400 audit(2000000021.450:500): avc: denied { mount } for pid=6970 comm="syz.0.980" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 165.741355][ T29] audit: type=1400 audit(2000000021.960:501): avc: denied { name_bind } for pid=6987 comm="syz.1.984" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 165.770309][ T29] audit: type=1400 audit(2000000021.960:502): avc: denied { node_bind } for pid=6987 comm="syz.1.984" saddr=::1 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 166.490475][ T7002] wireguard0: entered promiscuous mode [ 166.496052][ T7002] wireguard0: entered allmulticast mode [ 166.510513][ T7002] Cannot find add_set index 0 as target [ 166.815260][ T7011] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 166.829163][ T7011] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 167.160424][ T7024] xt_SECMARK: invalid mode: 0 [ 167.263142][ T29] audit: type=1400 audit(2000000023.480:503): avc: denied { mac_admin } for pid=7025 comm="syz.0.995" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 167.285098][ T7027] SELinux: Context #! ./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 167.576732][ T7033] xt_CT: You must specify a L4 protocol and not use inversions on it [ 167.933534][ T7040] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 167.944463][ T7040] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 168.258039][ T7047] serio: Serial port ptm0 [ 170.479146][ T7112] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 170.507403][ T7112] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 170.559093][ T29] audit: type=1326 audit(2000000026.780:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7118 comm="syz.4.1023" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fc0d740e719 code=0x0 [ 170.594310][ T7115] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 170.607289][ T7115] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 171.396974][ T29] audit: type=1400 audit(2000000027.620:505): avc: denied { unmount } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 172.611609][ T7161] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 173.053998][ T7164] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 173.062563][ T7164] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 173.252199][ T7177] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 173.268979][ T7177] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 175.628739][ T7208] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 176.147148][ T7208] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 176.601588][ T7217] xt_hashlimit: size too large, truncated to 1048576 [ 176.635652][ T29] audit: type=1400 audit(2000000032.850:506): avc: denied { read } for pid=7218 comm="syz.1.1054" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 176.658681][ T29] audit: type=1400 audit(2000000032.850:507): avc: denied { open } for pid=7218 comm="syz.1.1054" path="/dev/snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 176.952944][ T7230] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1057'. [ 180.776048][ T29] audit: type=1400 audit(2000000036.740:508): avc: denied { map } for pid=7305 comm="syz.1.1082" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13924 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 180.800328][ T29] audit: type=1400 audit(2000000036.740:509): avc: denied { read write } for pid=7305 comm="syz.1.1082" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13924 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 184.251703][ T29] audit: type=1400 audit(2000000040.080:510): avc: denied { read } for pid=7443 comm="syz.2.1098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 186.150679][ T7483] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1108'. [ 186.768838][ T7509] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 186.782836][ T7509] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 187.783482][ T29] audit: type=1326 audit(2000000044.000:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7615 comm="syz.1.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 187.895722][ T29] audit: type=1326 audit(2000000044.030:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7615 comm="syz.1.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 187.919249][ T29] audit: type=1326 audit(2000000044.030:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7615 comm="syz.1.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=228 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 187.942561][ T29] audit: type=1326 audit(2000000044.030:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7615 comm="syz.1.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 187.965977][ T29] audit: type=1326 audit(2000000044.030:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7615 comm="syz.1.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 187.989351][ T29] audit: type=1326 audit(2000000044.030:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7615 comm="syz.1.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 188.012785][ T29] audit: type=1326 audit(2000000044.030:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7615 comm="syz.1.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 188.036120][ T29] audit: type=1326 audit(2000000044.030:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7615 comm="syz.1.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 188.059639][ T29] audit: type=1326 audit(2000000044.030:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7615 comm="syz.1.1116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 189.303948][ T7696] hub 6-0:1.0: USB hub found [ 189.308913][ T7696] hub 6-0:1.0: 8 ports detected [ 190.599915][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 190.599932][ T29] audit: type=1400 audit(2000000046.460:547): avc: denied { write } for pid=7726 comm="syz.4.1131" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 192.020343][ T29] audit: type=1400 audit(2000000048.240:548): avc: denied { setopt } for pid=7819 comm="syz.1.1141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 192.040299][ T29] audit: type=1400 audit(2000000048.240:549): avc: denied { listen } for pid=7819 comm="syz.1.1141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 192.060182][ T29] audit: type=1400 audit(2000000048.240:550): avc: denied { connect } for pid=7819 comm="syz.1.1141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 192.214972][ T7827] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 192.223898][ T7827] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 194.442639][ T29] audit: type=1326 audit(2000000050.660:551): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7956 comm="syz.0.1154" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff80a7de719 code=0x0 [ 194.546370][ T7960] capability: warning: `syz.0.1154' uses deprecated v2 capabilities in a way that may be insecure [ 194.650812][ T29] audit: type=1400 audit(2000000050.870:552): avc: denied { create } for pid=7956 comm="syz.0.1154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 195.847685][ T29] audit: type=1400 audit(2000000052.070:553): avc: denied { bind } for pid=7991 comm="syz.2.1166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 201.595045][ T8125] xt_CT: You must specify a L4 protocol and not use inversions on it [ 202.092796][ T8134] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 202.106724][ T8134] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 205.017753][ T8300] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 205.037223][ T8300] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 207.470377][ T8346] xt_CT: You must specify a L4 protocol and not use inversions on it [ 207.486249][ T8338] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 207.494824][ T8338] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 207.687824][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 208.285563][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 208.732317][ T8375] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 208.741166][ T8375] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 210.115057][ T8398] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 210.173830][ T8398] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 210.219625][ T8400] usb usb6: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 210.230538][ T8400] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 210.958588][ T8414] Illegal XDP return value 4294967274 on prog (id 719) dev N/A, expect packet loss! [ 211.322763][ T8428] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 211.704036][ T8448] xt_CT: You must specify a L4 protocol and not use inversions on it [ 211.986526][ T8468] usb usb6: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 211.993902][ T8468] vhci_hcd: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 212.304042][ T8485] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1282'. [ 213.180444][ T8545] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1286'. [ 214.057569][ T8560] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 214.070509][ T8560] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 216.438736][ T8687] xt_CT: You must specify a L4 protocol and not use inversions on it [ 216.894238][ T8708] syz.2.1309[8708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.894431][ T8708] syz.2.1309[8708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.906092][ T8708] syz.2.1309[8708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.355156][ T8747] Cannot find set identified by id 0 to match [ 218.398824][ T8748] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 219.226435][ T8766] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 219.255539][ T8766] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 219.380247][ T8769] xt_CT: You must specify a L4 protocol and not use inversions on it [ 219.530182][ T29] audit: type=1400 audit(2000000075.690:554): avc: denied { lock } for pid=8765 comm="syz.2.1325" path="socket:[16192]" dev="sockfs" ino=16192 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 222.874551][ T29] audit: type=1400 audit(2000000079.060:555): avc: denied { write } for pid=8814 comm="syz.2.1339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 224.928760][ T8869] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 224.943694][ T8869] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 224.959816][ T8869] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1355'. [ 224.984472][ T8869] hsr_slave_1 (unregistering): left promiscuous mode [ 226.455419][ T29] audit: type=1400 audit(2000000082.630:556): avc: denied { create } for pid=8899 comm="syz.3.1366" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_generic_socket permissive=1 [ 226.476435][ T29] audit: type=1400 audit(2000000082.630:557): avc: denied { write } for pid=8899 comm="syz.3.1366" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_generic_socket permissive=1 [ 226.497344][ T29] audit: type=1400 audit(2000000082.630:558): avc: denied { read } for pid=8899 comm="syz.3.1366" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_generic_socket permissive=1 [ 227.818963][ T8940] syz.4.1377[8940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.821977][ T8940] syz.4.1377[8940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.839733][ T8940] syz.4.1377[8940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.897971][ T8940] serio: Serial port ptm0 [ 229.608284][ T8986] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 229.623079][ T8986] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 229.655039][ T8986] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1389'. [ 229.734524][ T8986] hsr_slave_1 (unregistering): left promiscuous mode [ 231.118266][ T9081] xt_CT: You must specify a L4 protocol and not use inversions on it [ 232.299171][ T9120] Cannot find set identified by id 0 to match [ 234.286017][ T9151] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 234.446851][ T9163] syz.2.1432[9163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.446910][ T9163] syz.2.1432[9163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.106595][ T9163] syz.2.1432[9163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.504970][ T9183] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 235.863485][ T9183] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 237.329636][ T9223] xt_CT: You must specify a L4 protocol and not use inversions on it [ 239.870388][ T9270] xt_CT: You must specify a L4 protocol and not use inversions on it [ 241.016863][ T9298] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 241.039052][ T9298] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 241.108652][ T9301] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1475'. [ 241.228208][ T29] audit: type=1326 audit(2000000097.450:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9302 comm="syz.3.1476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 241.251613][ T29] audit: type=1326 audit(2000000097.450:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9302 comm="syz.3.1476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 241.276364][ T29] audit: type=1326 audit(2000000097.490:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9302 comm="syz.3.1476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 241.299737][ T29] audit: type=1326 audit(2000000097.490:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9302 comm="syz.3.1476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 241.323176][ T29] audit: type=1326 audit(2000000097.490:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9302 comm="syz.3.1476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 243.099042][ T9341] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 243.107893][ T9341] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 243.604433][ T9347] syz.2.1490[9347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.604639][ T9347] syz.2.1490[9347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.631045][ T9347] syz.2.1490[9347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.803859][ T9356] Cannot find set identified by id 0 to match [ 245.226692][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 245.479943][ T9386] syz.1.1502[9386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.479995][ T9386] syz.1.1502[9386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.491664][ T9386] syz.1.1502[9386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.840296][ T9393] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 245.866161][ T9393] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 246.013465][ T9396] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 246.027340][ T9396] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 246.185561][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 249.444470][ T9471] Cannot find set identified by id 0 to match [ 249.828424][ T29] audit: type=1326 audit(2000000106.050:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9475 comm="syz.3.1531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 249.988834][ T29] audit: type=1326 audit(2000000106.110:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9475 comm="syz.3.1531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 250.012279][ T29] audit: type=1326 audit(2000000106.110:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9475 comm="syz.3.1531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 250.035840][ T29] audit: type=1326 audit(2000000106.110:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9475 comm="syz.3.1531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 250.059228][ T29] audit: type=1326 audit(2000000106.110:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9475 comm="syz.3.1531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b3b81e719 code=0x7ffc0000 [ 250.498115][ T9500] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 250.524734][ T9500] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 251.499472][ T29] audit: type=1326 audit(2000000107.720:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9518 comm="syz.1.1545" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 251.577508][ T29] audit: type=1326 audit(2000000107.750:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9518 comm="syz.1.1545" exe="/root/syz-executor" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 251.600934][ T29] audit: type=1326 audit(2000000107.750:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9518 comm="syz.1.1545" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789da6e719 code=0x7ffc0000 [ 252.013480][ T9529] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 252.044346][ T9531] xt_hashlimit: size too large, truncated to 1048576 [ 252.138693][ T9529] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 254.224730][ T9575] ================================================================== [ 254.232841][ T9575] BUG: KCSAN: data-race in __percpu_counter_limited_add / percpu_counter_add_batch [ 254.242157][ T9575] [ 254.244469][ T9575] read-write to 0xffff888114dba490 of 8 bytes by task 9541 on cpu 1: [ 254.252528][ T9575] percpu_counter_add_batch+0x120/0x140 [ 254.258087][ T9575] shmem_recalc_inode+0x130/0x1b0 [ 254.263112][ T9575] shmem_undo_range+0xa3d/0xa70 [ 254.267974][ T9575] shmem_evict_inode+0x14d/0x530 [ 254.272919][ T9575] evict+0x2f0/0x580 [ 254.276819][ T9575] iput+0x42a/0x5b0 [ 254.280629][ T9575] dentry_unlink_inode+0x24f/0x260 [ 254.285759][ T9575] __dentry_kill+0x18b/0x4c0 [ 254.290342][ T9575] dput+0x5c/0xd0 [ 254.293975][ T9575] __fput+0x3fb/0x6d0 [ 254.297956][ T9575] ____fput+0x1c/0x30 [ 254.301947][ T9575] task_work_run+0x13a/0x1a0 [ 254.306543][ T9575] do_exit+0x5dd/0x17f0 [ 254.310702][ T9575] do_group_exit+0x102/0x150 [ 254.315297][ T9575] get_signal+0xf2a/0x1070 [ 254.319723][ T9575] arch_do_signal_or_restart+0x95/0x4b0 [ 254.325266][ T9575] irqentry_exit_to_user_mode+0x9a/0x130 [ 254.330911][ T9575] irqentry_exit+0x12/0x50 [ 254.335343][ T9575] asm_exc_page_fault+0x26/0x30 [ 254.340213][ T9575] [ 254.342525][ T9575] read to 0xffff888114dba490 of 8 bytes by task 9575 on cpu 0: [ 254.350059][ T9575] __percpu_counter_limited_add+0xfa/0x450 [ 254.355877][ T9575] shmem_inode_acct_blocks+0xf5/0x230 [ 254.361260][ T9575] shmem_get_folio_gfp+0x5be/0xd90 [ 254.366393][ T9575] shmem_fallocate+0x593/0x860 [ 254.371167][ T9575] vfs_fallocate+0x368/0x3b0 [ 254.375855][ T9575] __x64_sys_fallocate+0x79/0xc0 [ 254.380801][ T9575] x64_sys_call+0x2783/0x2d60 [ 254.385483][ T9575] do_syscall_64+0xc9/0x1c0 [ 254.389992][ T9575] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 254.395908][ T9575] [ 254.398219][ T9575] value changed: 0x0000000000005756 -> 0x0000000000001e25 [ 254.405316][ T9575] [ 254.407644][ T9575] Reported by Kernel Concurrency Sanitizer on: [ 254.413795][ T9575] CPU: 0 UID: 0 PID: 9575 Comm: syz.4.1563 Not tainted 6.12.0-rc4-syzkaller-00281-g284a2f899676 #0 [ 254.424464][ T9575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 254.434516][ T9575] ==================================================================