last executing test programs: 3.720836819s ago: executing program 1 (id=2357): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x60, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r3, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0xea, 0x0, 0xfffd, 0x0, 0x9, 0x5}, {0x12, 0x2, 0x0, 0x401, 0x8001, 0x1400}, 0xa5, 0x5, 0x10000000}}, @TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x60}}, 0x44080) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000ac0)=@newqdisc={0x70, 0x24, 0xd0f, 0x70bd2a, 0x25dfdbfb, {0x60, 0x0, 0x0, r3, {}, {0xffe0, 0xa}, {0x1, 0x3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x44, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x80, 0x0, 0x7, 0x7, 0x2}, {0x8, 0x1, 0x3, 0x5, 0xe595, 0x671}, 0x10, 0xae35, 0x169}}, @TCA_TBF_PRATE64={0xc, 0x5, 0x908b43c158034cdb}, @TCA_TBF_RATE64={0xc, 0x4, 0x3cb8956c9a0790f9}]}}]}, 0x70}, 0x1, 0x0, 0x0, 0x55}, 0xc010) close(0x3) 2.872088858s ago: executing program 1 (id=2364): sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2042, 0x0) ioctl$AUTOFS_IOC_FAIL(r3, 0x4c80, 0x7000000) 1.932012871s ago: executing program 1 (id=2373): set_mempolicy(0x6005, &(0x7f00000001c0)=0x1003, 0x4) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = syz_io_uring_setup(0x10d3, &(0x7f0000000000)={0x0, 0x7f36, 0x0, 0x1, 0x34f}, &(0x7f00000000c0)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x1, &(0x7f0000000200)=[{0x32, 0x0, 0x0, 0x4}]}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8}) io_uring_enter(r1, 0x47bc, 0x0, 0x0, 0x0, 0x0) 1.861754254s ago: executing program 1 (id=2375): r0 = msgget$private(0x0, 0x7fc) msgrcv(r0, 0xffffffffffffffff, 0x0, 0x0, 0x1000) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="04"], 0x8, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x3000) msgrcv(0x0, 0x0, 0x0, 0x2, 0x1000) getpid() msgctl$IPC_SET(r0, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000440)={0x1}, 0x8, 0x0) 1.339991494s ago: executing program 4 (id=2384): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x28) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x26, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9805, 0x0, 0x7fc, 0x6}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) creat(&(0x7f0000000000)='./file0\x00', 0x62b266a4c604c0ba) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x102) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wakeup_count', 0x161242, 0x8) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x200000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 1.264784159s ago: executing program 4 (id=2385): syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x34, 0x3, 0xffffffffffffffff, 0x0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0, 0x40000000}) r0 = syz_io_uring_setup(0x371d, &(0x7f0000000100)={0x0, 0xc9bd, 0x8, 0x3, 0x801ef}, &(0x7f0000000280)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/201, 0xc9}], 0x1) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x30, 0x4, 0x0, 0x2}]}, 0xffffffffffffff0e) rt_sigtimedwait(&(0x7f0000000240)={[0xffffffffffffffff]}, 0x0, 0x0, 0x8) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x0, 0x0, 0xffffffffffffffff, 0x0, r0}) io_uring_enter(r0, 0x749d, 0x4, 0x0, 0x0, 0x0) 1.049416111s ago: executing program 3 (id=2387): socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) r1 = syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000001c0)=r1, 0x12) 1.005484583s ago: executing program 1 (id=2388): r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x601c2, 0x0) socket(0x400000000010, 0x3, 0x0) ftruncate(r0, 0x8800000) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x4c27e, 0x53) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x2f) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='westwood', 0x8) recvfrom$inet(r2, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) sendfile(r1, r0, 0x0, 0x578410ed) 959.970906ms ago: executing program 3 (id=2389): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) setns(r2, 0x24020000) r3 = syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_pidfd_open(r3, 0x0) setns(r4, 0x24020000) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x800000, 0x0) 950.484667ms ago: executing program 3 (id=2390): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7b, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, 0x0, 0x0) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) sendto$inet(r0, &(0x7f0000000700)="0c268a927f1f6588b967481241ba78600a34f65ac618ded8974895abeaf4b4834ff959bcecc7a95425a3a07e758044ab4ea6f7c555d88fecf90b037511bf746bec66ba", 0x994b6e03113064ae, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0xa, &(0x7f0000002200)=[{&(0x7f0000000780)=""/4108, 0x437aba2}], 0x1, 0x0, 0xfffffdee, 0x407006}, 0x104) 857.773712ms ago: executing program 0 (id=2391): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x26, 0x6, 0x0, 0x0, 0x0, 0x9, 0x8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x6}, 0x10, 0x32, 0x43a1bd76, 0x8, 0x3, 0xfff7fe01, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xfffffffffffffffb, 0x48b01) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000fed000/0x13000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000fe9000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r1 = io_uring_setup(0x4fee, &(0x7f0000000040)={0x0, 0xc89f, 0xc000, 0xa, 0x20002f7}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}, {0xe, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x48080}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000280)=@urb_type_control={0x2, {}, 0x2, 0x81, &(0x7f0000000000)={0x4b5a9da54893e123, 0x1, 0x100f}, 0x8, 0x20400000, 0xc, 0x0, 0x2, 0x20000, 0x0}) 799.949495ms ago: executing program 0 (id=2392): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000240)={0x2, 0x0, @local}, 0x6f) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x300) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000000000)=0xa, 0x4) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 698.81795ms ago: executing program 0 (id=2393): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000140)=0x40, 0x4) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000300)=0x1, 0x4) bind$xdp(r1, &(0x7f0000000100)={0x2c, 0x0, r3}, 0x10) bind$xdp(r0, &(0x7f0000000240)={0x2c, 0x1, r3, 0x0, r1}, 0x10) 674.842582ms ago: executing program 0 (id=2394): r0 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x205, 0x2) close_range(r0, r0, 0x2) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x800000001ff, 0x2) r2 = dup(r1) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_setup(0x1eb0, &(0x7f0000000040)={0x0, 0x71, 0x8000, 0x1, 0x166, 0x0, r2}, 0x0, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd_index=0x9, 0x100, 0x0, 0xbab, 0x4, 0x0, {0x0, r3}}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x53a1bd79, 0x7, 0x9, 0x86, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000280)={0x23, 0x3, 0x18, 0x4008, 0x0, 0x3, 0x0}) 607.829156ms ago: executing program 0 (id=2395): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001c80)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x2, [{0x9, 0x2}, {0xd, 0x2}]}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}]}}, &(0x7f0000000600)=""/227, 0x42, 0xe3, 0x1}, 0x28) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}, 0x104046}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x480283, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7606, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x1}]}]}, {0x0, [0x30, 0x2e, 0x61, 0x61, 0x5f]}}, &(0x7f0000000340)=""/176, 0x33, 0xb0, 0x1}, 0x28) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.swap.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4020940d, &(0x7f00000005c0)=0x80000000000004) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000140)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000180000000000000000000000711207000000000095"], &(0x7f0000001200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r2, @cgroup_sock_addr=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 607.478386ms ago: executing program 0 (id=2396): set_mempolicy(0x6005, &(0x7f00000001c0)=0x1003, 0x4) socket$inet_sctp(0x2, 0x1, 0x84) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x129c81, 0x0) ppoll(&(0x7f0000000280)=[{r1, 0x6200}], 0x1, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@ipv6_newrule={0x24, 0x20, 0x2d2c6d60ea1da725, 0x70bd2b, 0x25dfdbf9, {0xa, 0x0, 0x20, 0xcd, 0xff, 0x0, 0x0, 0x1, 0x10002}, [@FIB_RULE_POLICY=@FRA_PRIORITY={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x845}, 0x4000000) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x7f, 0x6, 0x1, "42341f9b1000007e4f00"}) r2 = syz_open_pts(r1, 0x40000) dup3(r2, r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x7ffff000, 0x0) 431.622666ms ago: executing program 2 (id=2402): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) syz_open_procfs(0x0, 0x0) mq_open(0x0, 0x6e93ebbbcc0884f2, 0x196, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x11000, 0x0, 0x2, 0x80000011, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 428.200457ms ago: executing program 2 (id=2403): r0 = socket$inet_sctp(0x2, 0x1, 0x84) listen(r0, 0xda90) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) epoll_create1(0x0) socket(0x1d, 0x2, 0x6) socket$packet(0x11, 0x3, 0x300) unshare(0x8040480) socket$caif_seqpacket(0x25, 0x5, 0x2) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x2, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f0000000240)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) 410.061787ms ago: executing program 2 (id=2404): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xe, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r1, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 407.234388ms ago: executing program 4 (id=2405): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000100000000000000000000850000007500000095"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 276.426964ms ago: executing program 2 (id=2406): pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='wi', 0x2}], 0x1, 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f00000001c0)=@gcm_256={{0x303}, "3095b90b396cd8ec", "3499a517a1df1c71496cffeebaabfe5eb548502ce0f59ce4a4af09f0438ece31", "4277dea9", "0cf02f56bec1eb9e"}, 0x38) sendto$inet6(r2, &(0x7f0000000340)="d1", 0x1, 0x8000, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x78) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0xfffd, 0x0) 248.797506ms ago: executing program 2 (id=2407): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1d459d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xa}, 0x2, 0xc005, 0x9, 0x0, 0x1, 0xfffffffd, 0xf, 0x0, 0x0, 0x0, 0x1e00000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0xa00, 0x11b) open(0x0, 0x4c0242, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() timer_create(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000540)='./bus\x00', 0x8800, &(0x7f00000006c0)={[{@errors_remount}, {@sysvgroups}, {@minixdf}]}, 0x1, 0x50c, &(0x7f0000001000)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0xc4042, 0x1ff) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x800) 214.328779ms ago: executing program 2 (id=2408): r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x601c2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ftruncate(r0, 0x8800000) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x4c27e, 0x53) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x2f) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f00000001c0)=0xa3, 0x4) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x7, 0x0, 0x8001}]}, 0x10) recvfrom$inet(r2, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) sendfile(r1, r0, 0x0, 0x578410ed) 213.341339ms ago: executing program 4 (id=2409): r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710, @local}, 0x10) listen(r0, 0x4) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000640)={0x28, 0x0, 0x2710}, 0x10) r2 = accept(r0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x12, 0x3, 0x4, 0x5}, 0x50) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000300), &(0x7f00000002c0)=@tcp6=r2}, 0x47) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0x5dd93000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r3, &(0x7f00000001c0)="71cc94", &(0x7f00000003c0)=""/253}, 0x20) 185.61817ms ago: executing program 4 (id=2410): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r0 = socket(0x400000000010, 0x3, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r2) ioctl$SIOCSIFHWADDR(r2, 0x8914, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$kcm(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$kcm(r4, &(0x7f00000000c0)={&(0x7f0000000380)=@xdp={0x2c, 0x7, r5, 0x3e}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1}, 0x48011) 123.950423ms ago: executing program 4 (id=2411): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1d459d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x6025, 0x4005, 0xb, 0x0, 0x1, 0x3000, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) prctl$PR_MCE_KILL(0x23, 0xa, 0x7fffffffeffe) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000140)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010028bd70000000000008000000180001801400020073797a5f74756e0000000000000000001c00028018000380100001800800010009000000040003"], 0x48}}, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) pselect6(0x0, 0x0, 0x0, &(0x7f0000000400)={0x1f, 0x0, 0x800000000000, 0x0, 0x1000000000, 0x0, 0xfffffffffffffffe}, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) 123.750404ms ago: executing program 1 (id=2412): r0 = syz_clone(0x22020100, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x80b0, 0x4d, 0x800020, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000600)={0x9, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) sendfile(r1, r2, 0x0, 0x7fffffffffffffff) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r2, &(0x7f0000001040)={r2, 0xffffffffffffffff, 0x4}) 83.524755ms ago: executing program 3 (id=2413): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x41, 0x0, 0x0, 0x0, 0x7}, 0x94) close(0xffffffffffffffff) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)=r0, 0x4) socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, 0x0, 0x0) sendmsg$IPSET_CMD_TEST(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)={0x38, 0xb, 0x6, 0x3, 0x0, 0x0, {0x1, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_NAME={0x9, 0x12, 'syz1\x00'}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x44080}, 0x4000002) 62.971696ms ago: executing program 3 (id=2414): r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, &(0x7f0000000280), &(0x7f00000002c0)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2e, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000080)="630b008646dc3f0adf33c9f7b986", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) 0s ago: executing program 3 (id=2415): quotactl$Q_SETQUOTA(0xffffffff80000801, 0x0, 0x0, 0x0) r0 = syz_io_uring_setup(0x2f8d, &(0x7f0000010400)={0x0, 0x86e5, 0x1, 0x8}, &(0x7f0000010080), &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}], 0x2) getpgrp(0x0) request_key(0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) socketpair$unix(0x1, 0x2, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') read$msr(r1, &(0x7f0000000180)=""/174, 0xae) kernel console output (not intermixed with test programs): [ 19.696158][ T28] audit: type=1400 audit(1770865977.751:62): avc: denied { search } for pid=3190 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.718137][ T28] audit: type=1400 audit(1770865977.751:63): avc: denied { search } for pid=3190 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.740836][ T28] audit: type=1400 audit(1770865977.751:64): avc: denied { search } for pid=3190 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.763849][ T28] audit: type=1400 audit(1770865977.751:65): avc: denied { search } for pid=3190 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.786828][ T28] audit: type=1400 audit(1770865977.751:66): avc: denied { read open } for pid=3191 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.0.209' (ED25519) to the list of known hosts. [ 26.388519][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 26.388536][ T28] audit: type=1400 audit(1770865984.441:70): avc: denied { mounton } for pid=3296 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.417484][ T28] audit: type=1400 audit(1770865984.471:71): avc: denied { mount } for pid=3296 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.418153][ T3296] cgroup: Unknown subsys name 'net' [ 26.445220][ T28] audit: type=1400 audit(1770865984.501:72): avc: denied { unmount } for pid=3296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.592277][ T3296] cgroup: Unknown subsys name 'cpuset' [ 26.598474][ T3296] cgroup: Unknown subsys name 'rlimit' [ 26.728257][ T28] audit: type=1400 audit(1770865984.781:73): avc: denied { setattr } for pid=3296 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.751563][ T28] audit: type=1400 audit(1770865984.781:74): avc: denied { create } for pid=3296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.772065][ T28] audit: type=1400 audit(1770865984.781:75): avc: denied { write } for pid=3296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.792484][ T28] audit: type=1400 audit(1770865984.781:76): avc: denied { read } for pid=3296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.799790][ T3299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.813003][ T28] audit: type=1400 audit(1770865984.791:77): avc: denied { mounton } for pid=3296 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.846212][ T28] audit: type=1400 audit(1770865984.791:78): avc: denied { mount } for pid=3296 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.869453][ T28] audit: type=1400 audit(1770865984.801:79): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 26.905138][ T3296] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.653441][ T3308] chnl_net:caif_netlink_parms(): no params data found [ 28.724500][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 28.744013][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 28.776584][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 28.785485][ T3308] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.792635][ T3308] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.799715][ T3308] bridge_slave_0: entered allmulticast mode [ 28.806224][ T3308] bridge_slave_0: entered promiscuous mode [ 28.814740][ T3308] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.822226][ T3308] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.829383][ T3308] bridge_slave_1: entered allmulticast mode [ 28.835984][ T3308] bridge_slave_1: entered promiscuous mode [ 28.866704][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 28.909134][ T3308] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.926533][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.933712][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.940890][ T3310] bridge_slave_0: entered allmulticast mode [ 28.947443][ T3310] bridge_slave_0: entered promiscuous mode [ 28.954876][ T3308] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.987728][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.994834][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.001965][ T3310] bridge_slave_1: entered allmulticast mode [ 29.008375][ T3310] bridge_slave_1: entered promiscuous mode [ 29.015438][ T3308] team0: Port device team_slave_0 added [ 29.038285][ T3308] team0: Port device team_slave_1 added [ 29.056529][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.063785][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.070906][ T3313] bridge_slave_0: entered allmulticast mode [ 29.077353][ T3313] bridge_slave_0: entered promiscuous mode [ 29.088225][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.095368][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.102534][ T3313] bridge_slave_1: entered allmulticast mode [ 29.108953][ T3313] bridge_slave_1: entered promiscuous mode [ 29.116296][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.133515][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.140699][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.147929][ T3317] bridge_slave_0: entered allmulticast mode [ 29.154322][ T3317] bridge_slave_0: entered promiscuous mode [ 29.165627][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.175070][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.182124][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.208059][ T3308] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.218891][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.226105][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.233260][ T3312] bridge_slave_0: entered allmulticast mode [ 29.239824][ T3312] bridge_slave_0: entered promiscuous mode [ 29.246500][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.253821][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.260901][ T3317] bridge_slave_1: entered allmulticast mode [ 29.267526][ T3317] bridge_slave_1: entered promiscuous mode [ 29.286537][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.293543][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.319630][ T3308] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.330643][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.337718][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.344916][ T3312] bridge_slave_1: entered allmulticast mode [ 29.351185][ T3312] bridge_slave_1: entered promiscuous mode [ 29.363020][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.377450][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.398032][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.408552][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.422764][ T3310] team0: Port device team_slave_0 added [ 29.434633][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.444890][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.458474][ T3310] team0: Port device team_slave_1 added [ 29.464844][ T3313] team0: Port device team_slave_0 added [ 29.471642][ T3313] team0: Port device team_slave_1 added [ 29.495301][ T3317] team0: Port device team_slave_0 added [ 29.518425][ T3317] team0: Port device team_slave_1 added [ 29.535160][ T3308] hsr_slave_0: entered promiscuous mode [ 29.541160][ T3308] hsr_slave_1: entered promiscuous mode [ 29.547918][ T3312] team0: Port device team_slave_0 added [ 29.553845][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.560974][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.586960][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.597896][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.605070][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.631137][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.646542][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.653516][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.679575][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.690852][ T3312] team0: Port device team_slave_1 added [ 29.696787][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.703835][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.730396][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.741427][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.748420][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.774540][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.794515][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.801472][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.827484][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.869041][ T3310] hsr_slave_0: entered promiscuous mode [ 29.875048][ T3310] hsr_slave_1: entered promiscuous mode [ 29.880833][ T3310] debugfs: 'hsr0' already exists in 'hsr' [ 29.886634][ T3310] Cannot create hsr debugfs directory [ 29.908837][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.915832][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.941920][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.963156][ T3313] hsr_slave_0: entered promiscuous mode [ 29.969140][ T3313] hsr_slave_1: entered promiscuous mode [ 29.975008][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 29.980728][ T3313] Cannot create hsr debugfs directory [ 29.989249][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.996633][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.022567][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.056585][ T3317] hsr_slave_0: entered promiscuous mode [ 30.062902][ T3317] hsr_slave_1: entered promiscuous mode [ 30.068777][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 30.074580][ T3317] Cannot create hsr debugfs directory [ 30.117290][ T3312] hsr_slave_0: entered promiscuous mode [ 30.123292][ T3312] hsr_slave_1: entered promiscuous mode [ 30.129042][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 30.134784][ T3312] Cannot create hsr debugfs directory [ 30.283696][ T3308] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 30.293083][ T3308] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 30.303768][ T3308] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 30.314619][ T3308] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 30.336923][ T3313] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 30.346737][ T3313] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 30.355559][ T3313] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 30.365355][ T3313] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 30.399514][ T3310] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 30.408346][ T3310] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 30.428461][ T3310] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 30.438160][ T3310] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 30.459448][ T3308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.474239][ T3312] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 30.486370][ T3308] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.498253][ T3312] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 30.512363][ T3312] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 30.521032][ T3312] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 30.534415][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.541499][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.550364][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.557586][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.595337][ T3317] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 30.604949][ T3317] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 30.622885][ T3317] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 30.636984][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.648588][ T3317] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 30.669471][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.692887][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.702483][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.715395][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.722474][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.745789][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.754696][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.761815][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.770746][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.777805][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.790251][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.797319][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.849190][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.870234][ T1757] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.877390][ T1757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.889867][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.896954][ T319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.913433][ T3308] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.952568][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.973142][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.993329][ T1883] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.000434][ T1883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.039092][ T1883] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.046259][ T1883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.063008][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.086660][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.116867][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.142683][ T3308] veth0_vlan: entered promiscuous mode [ 31.173727][ T3308] veth1_vlan: entered promiscuous mode [ 31.203214][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.225794][ T3308] veth0_macvtap: entered promiscuous mode [ 31.252256][ T3308] veth1_macvtap: entered promiscuous mode [ 31.266162][ T3310] veth0_vlan: entered promiscuous mode [ 31.299196][ T3313] veth0_vlan: entered promiscuous mode [ 31.306496][ T3310] veth1_vlan: entered promiscuous mode [ 31.314114][ T3312] veth0_vlan: entered promiscuous mode [ 31.329163][ T3313] veth1_vlan: entered promiscuous mode [ 31.336447][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.350587][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.363167][ T3312] veth1_vlan: entered promiscuous mode [ 31.371078][ T3310] veth0_macvtap: entered promiscuous mode [ 31.384223][ T319] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.408166][ T3310] veth1_macvtap: entered promiscuous mode [ 31.414783][ T319] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.424116][ T319] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.438325][ T319] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.454168][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.462299][ T3313] veth0_macvtap: entered promiscuous mode [ 31.471249][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 31.471265][ T28] audit: type=1400 audit(1770865989.521:90): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/root/syzkaller.SYZSU9/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 31.506176][ T3312] veth0_macvtap: entered promiscuous mode [ 31.513675][ T3312] veth1_macvtap: entered promiscuous mode [ 31.527768][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.535087][ T28] audit: type=1400 audit(1770865989.521:91): avc: denied { mount } for pid=3308 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 31.558862][ T3308] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 31.559799][ T3313] veth1_macvtap: entered promiscuous mode [ 31.574857][ T28] audit: type=1400 audit(1770865989.521:92): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/root/syzkaller.SYZSU9/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 31.583191][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.612251][ T28] audit: type=1400 audit(1770865989.521:93): avc: denied { mount } for pid=3308 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 31.624062][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.641821][ T28] audit: type=1400 audit(1770865989.521:94): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/root/syzkaller.SYZSU9/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 31.676190][ T28] audit: type=1400 audit(1770865989.521:95): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/root/syzkaller.SYZSU9/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 31.709987][ T28] audit: type=1400 audit(1770865989.531:96): avc: denied { unmount } for pid=3308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 31.719722][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.745561][ C1] hrtimer: interrupt took 35890 ns [ 31.751676][ T12] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.766297][ T28] audit: type=1400 audit(1770865989.561:97): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 31.790528][ T12] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.799423][ T3317] veth0_vlan: entered promiscuous mode [ 31.807929][ T3317] veth1_vlan: entered promiscuous mode [ 31.814735][ T28] audit: type=1400 audit(1770865989.561:98): avc: denied { mount } for pid=3308 comm="syz-executor" name="/" dev="gadgetfs" ino=3648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 31.822730][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.844491][ T28] audit: type=1400 audit(1770865989.761:99): avc: denied { read write } for pid=3308 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 31.868694][ T12] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.880942][ T12] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.900410][ T12] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.909578][ T12] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.920516][ T12] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.945235][ T12] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.959205][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.973247][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.984132][ T3480] loop0: detected capacity change from 0 to 2048 [ 31.991473][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.001082][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.020485][ T3317] veth0_macvtap: entered promiscuous mode [ 32.032119][ T3480] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 32.058934][ T3317] veth1_macvtap: entered promiscuous mode [ 32.096607][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.107708][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.121952][ T40] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.150190][ T40] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.159388][ T40] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.312863][ T40] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.317111][ T3498] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz.0.6: bg 0: block 234: padding at end of block bitmap is not set [ 32.345430][ T3498] EXT4-fs (loop0): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 2048 with error 28 [ 32.359318][ T3498] EXT4-fs (loop0): This should not happen!! Data will be lost [ 32.359318][ T3498] [ 32.388341][ T3498] EXT4-fs (loop0): Total free blocks count 0 [ 32.388399][ T3498] EXT4-fs (loop0): Free/Dirty block details [ 32.388422][ T3498] EXT4-fs (loop0): free_blocks=0 [ 32.388444][ T3498] EXT4-fs (loop0): dirty_blocks=3184 [ 32.388457][ T3498] EXT4-fs (loop0): Block reservation details [ 32.388538][ T3498] EXT4-fs (loop0): i_reserved_data_blocks=199 [ 32.500370][ T3492] EXT4-fs (loop0): Delayed block allocation failed for inode 18 at logical offset 2050 with max blocks 1122 with error 28 [ 32.938636][ T3509] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 33.002310][ T3509] netlink: 'syz.0.8': attribute type 39 has an invalid length. [ 33.015416][ T3511] syzkaller0: entered promiscuous mode [ 33.020907][ T3511] syzkaller0: entered allmulticast mode [ 33.032583][ T3509] hsr_slave_1 (unregistering): left promiscuous mode [ 34.021618][ T43] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 34.027984][ T3485] Bluetooth: hci0: command 0x1003 tx timeout [ 34.077025][ T3530] netlink: 68 bytes leftover after parsing attributes in process `syz.3.17'. [ 34.135500][ T3535] netlink: 24 bytes leftover after parsing attributes in process `syz.3.19'. [ 34.335897][ T3549] mmap: syz.4.25 (3549) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 34.382743][ T3547] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 34.450724][ T3547] syzkaller0: entered promiscuous mode [ 34.457669][ T3547] syzkaller0: entered allmulticast mode [ 34.681207][ T3558] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.688474][ T3558] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.697080][ T3559] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=none:owns=io+mem [ 34.729716][ T3558] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 34.739464][ T3558] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 34.770852][ T50] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 34.780770][ T50] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 34.790275][ T50] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 34.801800][ T50] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 34.831072][ T3563] tipc: Started in network mode [ 34.836041][ T3563] tipc: Node identity , cluster identity 4711 [ 34.842252][ T3563] tipc: Failed to obtain node identity [ 34.847754][ T3563] tipc: Enabling of bearer rejected, failed to enable media [ 34.857442][ T3563] netlink: 3 bytes leftover after parsing attributes in process `syz.3.29'. [ 34.866350][ T3563] 0ªX¹¦À: renamed from caif0 [ 34.872603][ T3563] 0ªX¹¦À: entered allmulticast mode [ 34.877883][ T3563] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 34.945134][ T3569] raw_sendmsg: syz.0.32 forgot to set AF_INET. Fix it! [ 34.975885][ T3384] IPVS: starting estimator thread 0... [ 35.029845][ T3577] kernel profiling enabled (shift: 0) [ 35.035590][ T3579] loop3: detected capacity change from 0 to 1024 [ 35.042752][ T3579] EXT4-fs: Ignoring removed nomblk_io_submit option [ 35.061742][ T3572] IPVS: using max 2736 ests per chain, 136800 per kthread [ 35.079951][ T3579] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 35.181412][ T3310] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.350764][ T3596] netlink: 8 bytes leftover after parsing attributes in process `syz.4.40'. [ 35.455625][ T3599] loop0: detected capacity change from 0 to 512 [ 35.481272][ T3607] loop2: detected capacity change from 0 to 2048 [ 35.488341][ T3599] ======================================================= [ 35.488341][ T3599] WARNING: The mand mount option has been deprecated and [ 35.488341][ T3599] and is ignored by this kernel. Remove the mand [ 35.488341][ T3599] option from the mount to silence this warning. [ 35.488341][ T3599] ======================================================= [ 35.539365][ T3608] loop1: detected capacity change from 0 to 512 [ 35.555500][ T3603] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.562710][ T3603] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.570745][ T3599] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 35.584700][ T3607] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 35.591634][ T3599] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 35.627455][ T3599] EXT4-fs error (device loop0): ext4_init_orphan_info:583: inode #15: comm syz.0.43: iget: bad extra_isize 63 (inode size 256) [ 35.628389][ T3608] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.649455][ T3599] loop0: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 35.654586][ T3599] EXT4-fs (loop0): Remounting filesystem read-only [ 35.663243][ T3608] ext4 filesystem being mounted at /7/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 35.680753][ T3599] EXT4-fs (loop0): get orphan inode failed [ 35.688137][ T3603] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 35.691693][ T3599] EXT4-fs (loop0): mount failed [ 35.718717][ T3603] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 35.773549][ T3609] bridge_slave_0: left allmulticast mode [ 35.779299][ T3609] bridge_slave_0: left promiscuous mode [ 35.785606][ T3609] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.799372][ T3609] bridge_slave_1: left allmulticast mode [ 35.805387][ T3609] bridge_slave_1: left promiscuous mode [ 35.811067][ T3609] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.820689][ T3609] bond0: (slave bond_slave_0): Releasing backup interface [ 35.830911][ T3609] bond0: (slave bond_slave_1): Releasing backup interface [ 35.843150][ T3609] team0: Port device team_slave_0 removed [ 35.863385][ T3609] team0: Port device team_slave_1 removed [ 35.870172][ T3609] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 35.878399][ T3313] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.878448][ T3609] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 35.896763][ T3609] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 35.906981][ T3619] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 35.918069][ T3609] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 35.928748][ T3312] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.929534][ T3609] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 35.956307][ T3613] team0: Mode changed to "loadbalance" [ 35.969328][ T50] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 35.978681][ T50] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 35.996222][ T50] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 36.005910][ T50] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 36.023616][ T3621] loop2: detected capacity change from 0 to 512 [ 36.033845][ T3621] EXT4-fs: Ignoring removed nobh option [ 36.082394][ T3621] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.098546][ T3621] ext4 filesystem being mounted at /10/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 36.123989][ T3312] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.133193][ T3627] loop1: detected capacity change from 0 to 512 [ 36.159249][ T3629] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3629 comm=syz.0.53 [ 36.176507][ T3627] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.190109][ T3627] ext4 filesystem being mounted at /9/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 36.202563][ T3633] netlink: 'syz.2.52': attribute type 1 has an invalid length. [ 36.220149][ T3313] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.355378][ T3639] syzkaller0: entered promiscuous mode [ 36.370150][ T3644] netlink: 8 bytes leftover after parsing attributes in process `syz.3.57'. [ 36.486703][ T3649] loop3: detected capacity change from 0 to 2048 [ 36.515455][ T28] kauditd_printk_skb: 93 callbacks suppressed [ 36.515471][ T28] audit: type=1400 audit(1770865994.571:193): avc: denied { create } for pid=3650 comm="syz.0.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 36.616833][ T28] audit: type=1400 audit(1770865994.581:194): avc: denied { connect } for pid=3650 comm="syz.0.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 36.637505][ T3649] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 36.644445][ T3661] loop4: detected capacity change from 0 to 512 [ 36.656056][ T28] audit: type=1400 audit(1770865994.581:195): avc: denied { write } for pid=3650 comm="syz.0.60" path="socket:[5363]" dev="sockfs" ino=5363 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 36.656267][ T3661] EXT4-fs: Ignoring removed nobh option [ 36.700901][ T28] audit: type=1400 audit(1770865994.651:196): avc: denied { create } for pid=3652 comm="syz.2.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 36.720267][ T28] audit: type=1400 audit(1770865994.651:197): avc: denied { read write } for pid=3652 comm="syz.2.61" name="rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 36.744664][ T28] audit: type=1400 audit(1770865994.651:198): avc: denied { open } for pid=3652 comm="syz.2.61" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 36.773059][ T3661] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.773876][ T28] audit: type=1400 audit(1770865994.831:199): avc: denied { mount } for pid=3665 comm="syz.1.64" name="/" dev="autofs" ino=4001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 36.816700][ T3661] ext4 filesystem being mounted at /8/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 36.871283][ T3317] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.924502][ T28] audit: type=1400 audit(1770865994.981:200): avc: denied { mount } for pid=3668 comm="syz.4.65" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 36.960601][ T3310] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.252899][ T3678] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3678 comm=syz.3.66 [ 37.792032][ T3685] syz.2.70 uses obsolete (PF_INET,SOCK_PACKET) [ 37.971657][ T28] audit: type=1400 audit(1770865996.021:201): avc: denied { create } for pid=3686 comm="syz.3.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 38.231601][ T28] audit: type=1400 audit(1770865996.061:202): avc: denied { sys_admin } for pid=3686 comm="syz.3.72" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 41.188113][ T3740] loop4: detected capacity change from 0 to 128 [ 41.201846][ T3740] vfat: Unknown parameter '' [ 41.215297][ T3739] netlink: 4 bytes leftover after parsing attributes in process `syz.2.88'. [ 41.224166][ T3739] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 41.245765][ T3739] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 41.248463][ T3696] Set syz1 is full, maxelem 65536 reached [ 41.268907][ T3696] syz.3.74 (3696) used greatest stack depth: 9912 bytes left [ 41.283893][ T3744] loop4: detected capacity change from 0 to 512 [ 41.314862][ T3744] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.381454][ T3744] ext4 filesystem being mounted at /17/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 41.404379][ T3749] loop2: detected capacity change from 0 to 2048 [ 41.421211][ T3751] netlink: 'syz.3.90': attribute type 13 has an invalid length. [ 41.492091][ T3297] loop2: p1 < > p3 [ 41.500975][ T3297] loop2: p3 size 134217728 extends beyond EOD, truncated [ 41.526468][ T3749] loop2: p1 < > p3 [ 41.531284][ T3749] loop2: p3 size 134217728 extends beyond EOD, truncated [ 41.548949][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 41.548965][ T28] audit: type=1400 audit(1770865999.601:209): avc: denied { setopt } for pid=3753 comm="syz.3.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 41.682908][ T3758] syzkaller0: entered promiscuous mode [ 41.688420][ T3758] syzkaller0: entered allmulticast mode [ 41.939542][ T28] audit: type=1400 audit(1770865999.991:210): avc: denied { write } for pid=3759 comm="syz.3.94" name="snmp6" dev="proc" ino=4026532584 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 42.063101][ T28] audit: type=1400 audit(1770866000.101:211): avc: denied { read } for pid=3761 comm="syz.0.95" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 42.112531][ T3769] loop1: detected capacity change from 0 to 512 [ 42.113365][ T28] audit: type=1400 audit(1770866000.151:212): avc: denied { open } for pid=3761 comm="syz.0.95" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 42.119127][ T3769] msdos: Unknown parameter 'ts' [ 42.169395][ T3317] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.212276][ T3771] syzkaller0: entered promiscuous mode [ 42.224614][ T3771] syzkaller0: entered allmulticast mode [ 42.227321][ T3769] loop1: detected capacity change from 0 to 2048 [ 42.281890][ T3769] msdos: Bad value for 'time_offset' [ 42.301114][ T3769] Zero length message leads to an empty skb [ 42.358278][ T28] audit: type=1400 audit(1770866000.411:213): avc: denied { bind } for pid=3774 comm="syz.4.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 42.401984][ T3781] loop2: detected capacity change from 0 to 256 [ 42.408486][ T3769] loop1: detected capacity change from 0 to 8192 [ 42.451660][ T28] audit: type=1326 audit(1770866000.451:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3780 comm="syz.2.100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd619b9bf79 code=0x7ffc0000 [ 42.525315][ T28] audit: type=1326 audit(1770866000.451:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3780 comm="syz.2.100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd619b9bf79 code=0x7ffc0000 [ 42.609173][ T3795] loop2: detected capacity change from 0 to 512 [ 42.617516][ T28] audit: type=1326 audit(1770866000.451:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3780 comm="syz.2.100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=282 compat=0 ip=0x7fd619b9bf79 code=0x7ffc0000 [ 42.641969][ T3795] EXT4-fs: Mount option(s) incompatible with ext2 [ 42.757267][ T28] audit: type=1326 audit(1770866000.451:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3780 comm="syz.2.100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd619b9bf79 code=0x7ffc0000 [ 42.817912][ T3804] netlink: 4 bytes leftover after parsing attributes in process `syz.2.108'. [ 42.831580][ T28] audit: type=1326 audit(1770866000.451:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3780 comm="syz.2.100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd619b9bf79 code=0x7ffc0000 [ 42.838218][ T3804] netlink: 'syz.2.108': attribute type 7 has an invalid length. [ 42.908027][ T3802] loop0: detected capacity change from 0 to 8192 [ 42.931613][ T3804] netlink: 'syz.2.108': attribute type 8 has an invalid length. [ 42.945094][ T3804] netlink: 4 bytes leftover after parsing attributes in process `syz.2.108'. [ 42.989764][ T3804] ip6gretap0: entered promiscuous mode [ 43.031289][ T3804] syz_tun: entered promiscuous mode [ 43.062035][ T3804] gretap0: entered promiscuous mode [ 44.308749][ T3819] netlink: 'syz.2.114': attribute type 13 has an invalid length. [ 44.626928][ T3819] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.634140][ T3819] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.037947][ T3819] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 45.160840][ T3822] geneve2: entered promiscuous mode [ 45.235274][ T3836] netlink: 'syz.0.119': attribute type 12 has an invalid length. [ 45.348709][ T3845] netlink: 4 bytes leftover after parsing attributes in process `syz.3.122'. [ 45.508734][ T3863] netlink: 8 bytes leftover after parsing attributes in process `syz.3.128'. [ 45.865841][ T3867] loop2: detected capacity change from 0 to 512 [ 46.464237][ T3867] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 46.533624][ T3867] ext4 filesystem being mounted at /26/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 46.655136][ T28] kauditd_printk_skb: 57 callbacks suppressed [ 46.655154][ T28] audit: type=1400 audit(1770866004.711:276): avc: denied { ioctl } for pid=3882 comm="syz.3.133" path="socket:[6664]" dev="sockfs" ino=6664 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 46.699785][ T3883] loop3: detected capacity change from 0 to 1764 [ 46.746211][ T3867] syz.2.130 (3867) used greatest stack depth: 9352 bytes left [ 46.767634][ T3312] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.986603][ T3901] syzkaller0: entered promiscuous mode [ 46.992646][ T3901] syzkaller0: entered allmulticast mode [ 47.034173][ T28] audit: type=1400 audit(1770866005.091:277): avc: denied { ioctl } for pid=3907 comm="syz.0.141" path="socket:[5729]" dev="sockfs" ino=5729 ioctlcmd=0x7437 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 47.070824][ T3908] netlink: 'syz.0.141': attribute type 13 has an invalid length. [ 47.120957][ T3908] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.128190][ T3908] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.238361][ T3908] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 47.260285][ T3908] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 47.374591][ T1883] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 47.384301][ T1883] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 47.451709][ T1883] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 47.460708][ T1883] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 47.669880][ T28] audit: type=1400 audit(1770866005.581:278): avc: denied { bind } for pid=3914 comm="syz.1.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 48.286507][ T28] audit: type=1400 audit(1770866006.341:279): avc: denied { create } for pid=3930 comm="syz.2.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 48.350874][ T3938] syzkaller0: entered promiscuous mode [ 48.448014][ T3938] syzkaller0: entered allmulticast mode [ 48.453597][ T28] audit: type=1400 audit(1770866006.341:280): avc: denied { write } for pid=3930 comm="syz.2.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 48.453626][ T28] audit: type=1400 audit(1770866006.341:281): avc: denied { bind } for pid=3930 comm="syz.2.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 48.530966][ T28] audit: type=1400 audit(1770866006.581:282): avc: denied { bind } for pid=3932 comm="syz.3.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 48.641702][ T28] audit: type=1400 audit(1770866006.691:283): avc: denied { bind } for pid=3952 comm="syz.0.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 48.663681][ T28] audit: type=1400 audit(1770866006.691:284): avc: denied { name_bind } for pid=3952 comm="syz.0.154" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 48.685320][ T28] audit: type=1400 audit(1770866006.691:285): avc: denied { node_bind } for pid=3952 comm="syz.0.154" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 48.958681][ T3961] loop4: detected capacity change from 0 to 512 [ 49.898654][ T3961] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 49.905147][ T3961] EXT4-fs (loop4): mount failed [ 50.289194][ T3977] loop1: detected capacity change from 0 to 2048 [ 50.333167][ T3977] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 50.384301][ T3365] hid-generic 0103:0004:0000.0001: unknown main item tag 0x0 [ 50.392578][ T3365] hid-generic 0103:0004:0000.0001: unknown main item tag 0x0 [ 50.429130][ T3365] hid-generic 0103:0004:0000.0001: unknown main item tag 0x0 [ 50.452286][ T3365] hid-generic 0103:0004:0000.0001: unknown main item tag 0x0 [ 50.478183][ T3365] hid-generic 0103:0004:0000.0001: unknown main item tag 0x0 [ 50.505438][ T3365] hid-generic 0103:0004:0000.0001: unknown main item tag 0x0 [ 50.517454][ T3365] hid-generic 0103:0004:0000.0001: unknown main item tag 0x0 [ 50.525254][ T3365] hid-generic 0103:0004:0000.0001: unknown main item tag 0x0 [ 50.532892][ T3365] hid-generic 0103:0004:0000.0001: unknown main item tag 0x0 [ 50.540397][ T3365] hid-generic 0103:0004:0000.0001: unknown main item tag 0x0 [ 50.565890][ T3365] hid-generic 0103:0004:0000.0001: hidraw0: HID v0.02 Device [syz0] on syz1 [ 50.606403][ T3313] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 50.649128][ T3995] fido_id[3995]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 50.853820][ T4001] loop2: detected capacity change from 0 to 128 [ 51.156294][ T4010] syzkaller0: entered promiscuous mode [ 51.201698][ T4010] syzkaller0: entered allmulticast mode [ 51.519193][ T4017] syzkaller0: entered promiscuous mode [ 51.542230][ T4017] syzkaller0: entered allmulticast mode [ 51.677889][ T4023] loop3: detected capacity change from 0 to 256 [ 51.717951][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 51.717967][ T28] audit: type=1400 audit(1770866009.771:289): avc: denied { mounton } for pid=4022 comm="syz.3.172" path="/syzcgroup/cpu/syz3/cpuset.cpus" dev="cgroup" ino=297 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 51.840081][ T28] audit: type=1400 audit(1770866009.871:290): avc: denied { create } for pid=4022 comm="syz.3.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 51.865039][ T28] audit: type=1400 audit(1770866009.891:291): avc: denied { read write } for pid=4030 comm="syz.4.176" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 51.865073][ T28] audit: type=1400 audit(1770866009.891:292): avc: denied { open } for pid=4030 comm="syz.4.176" path="/dev/virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 51.865096][ T28] audit: type=1400 audit(1770866009.921:293): avc: denied { ioctl } for pid=4030 comm="syz.4.176" path="/dev/virtual_nci" dev="devtmpfs" ino=132 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.136573][ T4048] netlink: 12 bytes leftover after parsing attributes in process `syz.3.179'. [ 52.156991][ T4048] vlan2: entered allmulticast mode [ 52.162253][ T4048] bridge0: entered allmulticast mode [ 52.167818][ T4048] bridge1: port 1(vlan2) entered blocking state [ 52.174599][ T4048] bridge1: port 1(vlan2) entered disabled state [ 52.181991][ T4048] vlan2: entered promiscuous mode [ 52.187115][ T4048] bridge0: entered promiscuous mode [ 52.218022][ T4050] loop3: detected capacity change from 0 to 512 [ 52.344130][ T28] audit: type=1400 audit(1770866010.401:294): avc: denied { setopt } for pid=4051 comm="syz.0.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 52.953908][ T4061] syzkaller0: entered promiscuous mode [ 52.959481][ T4061] syzkaller0: entered allmulticast mode [ 53.126830][ T4064] syzkaller0: entered promiscuous mode [ 53.132553][ T4064] syzkaller0: entered allmulticast mode [ 53.307660][ T28] audit: type=1400 audit(1770866011.361:295): avc: denied { create } for pid=4067 comm="syz.1.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 53.780243][ T4075] loop3: detected capacity change from 0 to 1024 [ 53.789557][ T4075] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=e040c01c, mo2=0002] [ 53.798098][ T4075] System zones: 0-1, 3-36 [ 53.803590][ T4075] EXT4-fs error (device loop3): ext4_orphan_get:1417: comm syz.3.188: bad orphan inode 134217728 [ 53.814350][ T4075] loop3: lost filesystem error report for type 5 error -117 [ 53.814781][ T4075] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 53.837767][ T4075] netlink: 'syz.3.188': attribute type 1 has an invalid length. [ 53.850598][ T4075] 8021q: adding VLAN 0 to HW filter on device bond1 [ 53.862226][ T4075] vlan3: entered promiscuous mode [ 53.867425][ T4075] bond1: entered promiscuous mode [ 53.878158][ T4075] bond1: (slave geneve0): making interface the new active one [ 53.885674][ T4075] geneve0: entered promiscuous mode [ 53.892379][ T4075] bond1: (slave geneve0): Enslaving as an active interface with an up link [ 53.902845][ T1883] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 53.911753][ T1883] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 53.920548][ T1883] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 53.929598][ T1883] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 53.939295][ T3310] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 53.967701][ T4080] syzkaller0: entered promiscuous mode [ 53.969527][ T28] audit: type=1400 audit(1770866012.021:296): avc: denied { ioctl } for pid=4079 comm="syz.3.189" path="socket:[7531]" dev="sockfs" ino=7531 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 53.973339][ T4080] syzkaller0: entered allmulticast mode [ 54.192375][ T4084] loop3: detected capacity change from 0 to 2048 [ 54.231824][ T3297] loop3: p3 < > p4 < > [ 54.236000][ T3297] loop3: partition table partially beyond EOD, truncated [ 54.243338][ T3297] loop3: p3 start 4284289 is beyond EOD, truncated [ 54.251914][ T4084] loop3: p3 < > p4 < > [ 54.256123][ T4084] loop3: partition table partially beyond EOD, truncated [ 54.263361][ T4084] loop3: p3 start 4284289 is beyond EOD, truncated [ 54.839183][ T4032] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 54.912055][ T28] audit: type=1400 audit(1770866012.961:297): avc: denied { module_request } for pid=4091 comm="syz.4.196" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 54.983450][ T4100] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4100 comm=syz.3.197 [ 55.062297][ T4105] syzkaller0: entered promiscuous mode [ 55.093813][ T4105] syzkaller0: entered allmulticast mode [ 55.099516][ T28] audit: type=1400 audit(1770866013.121:298): avc: denied { read write } for pid=4096 comm="syz.3.197" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 55.246966][ T4111] loop3: detected capacity change from 0 to 1024 [ 55.262826][ T4111] EXT4-fs: Ignoring removed nomblk_io_submit option [ 55.305549][ T4111] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 55.333545][ T4117] netlink: 92 bytes leftover after parsing attributes in process `syz.2.201'. [ 55.350279][ T4116] loop4: detected capacity change from 0 to 512 [ 55.358773][ T4117] netlink: 24 bytes leftover after parsing attributes in process `syz.2.201'. [ 55.367799][ T4117] netlink: 24 bytes leftover after parsing attributes in process `syz.2.201'. [ 55.372142][ T4116] EXT4-fs: Ignoring removed oldalloc option [ 55.383383][ T4111] netlink: 32 bytes leftover after parsing attributes in process `syz.3.199'. [ 55.416563][ T4111] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 55.435328][ T4111] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 55.452267][ T4116] EXT4-fs error (device loop4): ext4_xattr_inode_iget:437: comm syz.4.200: Parent and EA inode have the same ino 15 [ 55.471725][ T4116] loop4: lost filesystem error report for type 5 error -117 [ 55.494711][ T4116] EXT4-fs warning (device loop4): ext4_expand_extra_isize_ea:2858: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 55.518595][ T4116] EXT4-fs error (device loop4): ext4_xattr_inode_iget:437: comm syz.4.200: Parent and EA inode have the same ino 15 [ 55.531180][ T4116] loop4: lost filesystem error report for type 5 error -117 [ 55.550138][ T4116] EXT4-fs (loop4): 1 orphan inode deleted [ 55.570458][ T4116] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 55.609220][ T4116] Cannot find set identified by id 0 to match [ 55.632844][ T3310] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 55.642537][ T4116] EXT4-fs error (device loop4): ext4_lookup:1789: inode #2: comm syz.4.200: deleted inode referenced: 15 [ 55.699853][ T3317] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 55.726219][ T4128] syzkaller0: entered promiscuous mode [ 55.751651][ T4128] syzkaller0: entered allmulticast mode [ 56.026911][ T4136] syzkaller0: entered promiscuous mode [ 56.034153][ T4136] syzkaller0: entered allmulticast mode [ 56.047411][ T4141] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=4141 comm=syz.3.209 [ 56.299648][ T4159] syzkaller0: entered promiscuous mode [ 56.305498][ T4159] syzkaller0: entered allmulticast mode [ 56.952823][ T28] kauditd_printk_skb: 64 callbacks suppressed [ 56.952841][ T28] audit: type=1400 audit(1770866015.001:363): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.100531][ T28] audit: type=1400 audit(1770866015.151:364): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.164195][ T28] audit: type=1400 audit(1770866015.201:365): avc: denied { allowed } for pid=4183 comm="syz.1.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 57.221684][ T28] audit: type=1400 audit(1770866015.201:366): avc: denied { execute } for pid=4183 comm="syz.1.224" path="/41/pids.events" dev="tmpfs" ino=234 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 57.278691][ T28] audit: type=1400 audit(1770866015.221:367): avc: denied { create } for pid=4179 comm="syz.3.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 57.310845][ T28] audit: type=1400 audit(1770866015.221:368): avc: denied { write } for pid=4179 comm="syz.3.223" name="event2" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 57.341689][ T28] audit: type=1400 audit(1770866015.261:369): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.381629][ T28] audit: type=1400 audit(1770866015.281:370): avc: denied { open } for pid=4185 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 57.406666][ T28] audit: type=1400 audit(1770866015.281:371): avc: denied { prog_load } for pid=4185 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 57.444674][ T28] audit: type=1400 audit(1770866015.281:372): avc: denied { mount } for pid=4185 comm="syz.1.226" name="/" dev="autofs" ino=7768 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=0 [ 57.512225][ T4204] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=4204 comm=syz.2.233 [ 57.764791][ T4175] Process accounting resumed [ 58.520357][ T4234] netlink: 'syz.2.245': attribute type 1 has an invalid length. [ 58.556492][ T4199] Process accounting resumed [ 58.602846][ T4236] gretap1: entered promiscuous mode [ 58.610121][ T4236] bond1: (slave gretap1): making interface the new active one [ 58.636808][ T4236] bond1: (slave gretap1): Enslaving as an active interface with an up link [ 58.975101][ T4247] syzkaller0: entered promiscuous mode [ 58.991735][ T4247] syzkaller0: entered allmulticast mode [ 59.012862][ T4251] syzkaller0: entered promiscuous mode [ 59.020748][ T4251] syzkaller0: entered allmulticast mode [ 59.073033][ T4256] capability: warning: `syz.0.254' uses deprecated v2 capabilities in a way that may be insecure [ 59.213203][ T4254] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 59.348948][ T4270] netlink: 'syz.4.258': attribute type 13 has an invalid length. [ 59.688601][ T30] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 59.701620][ T30] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 59.730927][ T30] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 59.751105][ T30] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 61.306239][ T4316] can0: slcan on ttyS3. [ 61.334849][ T4315] can0 (unregistered): slcan off ttyS3. [ 61.379055][ T4320] netlink: 'syz.2.275': attribute type 39 has an invalid length. [ 61.588225][ T4332] netlink: 24 bytes leftover after parsing attributes in process `syz.3.279'. [ 61.648255][ T4332] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=4332 comm=syz.3.279 [ 62.078670][ T28] kauditd_printk_skb: 1439 callbacks suppressed [ 62.078688][ T28] audit: type=1400 audit(1770866020.131:1813): avc: denied { create } for pid=4340 comm="syz.1.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 62.154093][ T28] audit: type=1400 audit(1770866020.131:1814): avc: denied { module_request } for pid=4340 comm="syz.1.282" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 62.240384][ T28] audit: type=1400 audit(1770866020.131:1815): avc: denied { sys_module } for pid=4340 comm="syz.1.282" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 62.327232][ T28] audit: type=1400 audit(1770866020.131:1816): avc: denied { create } for pid=4340 comm="syz.1.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 62.375165][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 62.380927][ T3313] audit: audit_backlog=65 > audit_backlog_limit=64 [ 62.382831][ T3036] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 62.391609][ T3313] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 62.420482][ T3036] audit: backlog limit exceeded [ 62.427993][ T28] audit: type=1400 audit(1770866020.131:1817): avc: denied { module_request } for pid=4340 comm="syz.1.282" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 64.569677][ T4369] netlink: 8 bytes leftover after parsing attributes in process `syz.1.291'. [ 64.651034][ T4375] netlink: 'syz.3.293': attribute type 16 has an invalid length. [ 64.724170][ T4375] netlink: 8 bytes leftover after parsing attributes in process `syz.3.293'. [ 64.777264][ T4375] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.213214][ T4386] bridge_slave_0: left allmulticast mode [ 65.218949][ T4386] bridge_slave_0: left promiscuous mode [ 65.224953][ T4386] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.298409][ T4389] netlink: 'syz.3.298': attribute type 39 has an invalid length. [ 65.434706][ T4386] bridge_slave_1: left allmulticast mode [ 65.572167][ T4386] bridge_slave_1: left promiscuous mode [ 65.595893][ T4386] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.829511][ T4386] bond0: (slave bond_slave_0): Releasing backup interface [ 65.869287][ T4386] bond0: (slave bond_slave_1): Releasing backup interface [ 65.893529][ T4386] team0: Port device team_slave_0 removed [ 65.971927][ T4386] team0: Port device team_slave_1 removed [ 65.977796][ T4386] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 66.085937][ T4386] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 66.142065][ T4386] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 66.272543][ T4389] hsr_slave_1 (unregistering): left promiscuous mode [ 66.786013][ T23] Process accounting resumed [ 67.081636][ T3036] audit_log_start: 21500 callbacks suppressed [ 67.081655][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 67.121530][ T3036] audit: audit_lost=4285 audit_rate_limit=0 audit_backlog_limit=64 [ 67.151545][ T3036] audit: backlog limit exceeded [ 67.191580][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 67.198128][ T3036] audit: audit_lost=4286 audit_rate_limit=0 audit_backlog_limit=64 [ 67.231595][ T3036] audit: backlog limit exceeded [ 67.246750][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 67.271573][ T3036] audit: audit_lost=4287 audit_rate_limit=0 audit_backlog_limit=64 [ 67.279531][ T28] audit: type=1400 audit(1770866024.991:10470): avc: denied { map_create } for pid=4432 comm="syz.0.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 67.311551][ T3036] audit: backlog limit exceeded [ 70.041861][ T4657] capability: warning: `syz.3.419' uses 32-bit capabilities (legacy support in use) [ 70.454423][ T4737] netlink: 'syz.3.459': attribute type 10 has an invalid length. [ 70.486135][ T4737] bond0: (slave netdevsim1): Enslaving as an active interface with an up link [ 70.574684][ T4759] netlink: 24 bytes leftover after parsing attributes in process `syz.2.468'. [ 70.586889][ T4759] netlink: 24 bytes leftover after parsing attributes in process `syz.2.468'. [ 70.598219][ T4759] dummy0: entered promiscuous mode [ 70.621577][ T4759] dummy0: entered allmulticast mode [ 71.736688][ T4738] Process accounting resumed [ 71.767093][ T4855] netlink: 24 bytes leftover after parsing attributes in process `syz.3.512'. [ 71.801601][ T4855] netlink: 24 bytes leftover after parsing attributes in process `syz.3.512'. [ 71.821787][ T4855] dummy0: entered promiscuous mode [ 71.834058][ T4855] dummy0: entered allmulticast mode [ 72.092023][ T28] kauditd_printk_skb: 22738 callbacks suppressed [ 72.092076][ T28] audit: type=1400 audit(1770866030.151:30263): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 72.129479][ T28] audit: type=1400 audit(1770866030.171:30264): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 72.153023][ T28] audit: type=1400 audit(1770866030.171:30265): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 72.191358][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 72.198157][ T3036] audit: audit_lost=5270 audit_rate_limit=0 audit_backlog_limit=64 [ 72.209728][ T3036] audit: backlog limit exceeded [ 72.212819][ T4905] audit: audit_backlog=65 > audit_backlog_limit=64 [ 72.214932][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 72.227925][ T3036] audit: audit_lost=5271 audit_rate_limit=0 audit_backlog_limit=64 [ 72.231929][ T4905] audit: audit_lost=5272 audit_rate_limit=0 audit_backlog_limit=64 [ 72.513946][ T4933] netlink: 'syz.0.549': attribute type 10 has an invalid length. [ 72.533085][ T4933] bond0: (slave netdevsim1): Enslaving as an active interface with an up link [ 73.168539][ T3397] Process accounting resumed [ 73.619736][ T4971] Process accounting resumed [ 75.470280][ T5343] netlink: 'syz.1.746': attribute type 30 has an invalid length. [ 76.532442][ T5537] netlink: 20 bytes leftover after parsing attributes in process `syz.1.843'. [ 76.648973][ T5559] netlink: 16186 bytes leftover after parsing attributes in process `syz.4.851'. [ 76.920473][ T5611] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2048 sclass=netlink_route_socket pid=5611 comm=syz.0.880 [ 77.101557][ T28] kauditd_printk_skb: 20918 callbacks suppressed [ 77.101574][ T28] audit: type=1400 audit(1770866035.151:51182): avc: denied { prog_load } for pid=5640 comm="syz.1.894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 77.158544][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 77.177460][ T5653] audit: audit_backlog=65 > audit_backlog_limit=64 [ 77.184010][ T28] audit: type=1400 audit(1770866035.151:51183): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 77.184042][ T28] audit: type=1400 audit(1770866035.151:51184): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 77.184147][ T28] audit: type=1400 audit(1770866035.151:51185): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 77.184169][ T28] audit: type=1400 audit(1770866035.151:51186): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 77.205323][ T3036] audit: audit_lost=5273 audit_rate_limit=0 audit_backlog_limit=64 [ 77.282908][ T5653] audit: audit_lost=5274 audit_rate_limit=0 audit_backlog_limit=64 [ 77.290981][ T5653] audit: backlog limit exceeded [ 77.853592][ T5753] netlink: 6048 bytes leftover after parsing attributes in process `syz.3.947'. [ 77.980687][ T5767] netlink: 4 bytes leftover after parsing attributes in process `syz.0.954'. [ 78.093716][ T5784] netlink: 32 bytes leftover after parsing attributes in process `syz.3.962'. [ 78.377203][ T5680] Process accounting resumed [ 78.540121][ T5852] bridge1: entered promiscuous mode [ 78.556334][ T5852] bridge1: entered allmulticast mode [ 78.720555][ T5878] bond1: option fail_over_mac: invalid value (127) [ 78.737315][ T5878] bond1 (unregistering): Released all slaves [ 79.952214][ T6125] netlink: 830 bytes leftover after parsing attributes in process `syz.0.1132'. [ 81.314548][ T6314] bridge: RTM_NEWNEIGH with unconfigured vlan 4 on bridge_slave_0 [ 81.657921][ T6358] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1245'. [ 81.707361][ T6358] netlink: 196 bytes leftover after parsing attributes in process `syz.3.1245'. [ 81.747957][ T6358] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1245'. [ 81.776113][ T6358] netlink: 196 bytes leftover after parsing attributes in process `syz.3.1245'. [ 82.113279][ T28] kauditd_printk_skb: 17422 callbacks suppressed [ 82.113298][ T28] audit: type=1400 audit(1770866040.171:67895): avc: denied { create } for pid=6431 comm="syz.1.1282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 82.145194][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 82.152288][ T28] audit: type=1400 audit(1770866040.151:67893): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 82.173890][ T3036] audit: audit_lost=5513 audit_rate_limit=0 audit_backlog_limit=64 [ 82.182460][ T3310] audit: audit_backlog=65 > audit_backlog_limit=64 [ 82.188989][ T3310] audit: audit_lost=5514 audit_rate_limit=0 audit_backlog_limit=64 [ 82.192058][ T3036] audit: backlog limit exceeded [ 82.201604][ T6436] audit: audit_backlog=65 > audit_backlog_limit=64 [ 82.203601][ T6438] audit: audit_backlog=65 > audit_backlog_limit=64 [ 82.208244][ T6436] audit: audit_lost=5515 audit_rate_limit=0 audit_backlog_limit=64 [ 82.512674][ T6486] netlink: 27 bytes leftover after parsing attributes in process `syz.3.1310'. [ 82.852414][ T6540] netlink: 'syz.3.1336': attribute type 3 has an invalid length. [ 82.886916][ T6540] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1336'. [ 82.888483][ T6546] netlink: 71 bytes leftover after parsing attributes in process `syz.1.1339'. [ 83.017048][ T6568] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1350'. [ 83.339516][ T6626] netlink: 'syz.0.1377': attribute type 21 has an invalid length. [ 83.583875][ T6673] netlink: 156 bytes leftover after parsing attributes in process `syz.4.1400'. [ 83.699541][ T6693] bridge_slave_0: default FDB implementation only supports local addresses [ 83.860290][ T6723] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1424'. [ 83.996808][ T6746] xt_hashlimit: size too large, truncated to 1048576 [ 84.129060][ T6767] netlink: 'syz.4.1446': attribute type 29 has an invalid length. [ 84.175125][ T6767] netlink: 'syz.4.1446': attribute type 29 has an invalid length. [ 84.479174][ T6804] xt_hashlimit: size too large, truncated to 1048576 [ 85.009698][ T1883] netdevsim netdevsim0 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 85.029394][ T1883] netdevsim netdevsim0 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 85.042163][ T1883] netdevsim netdevsim0 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 85.051461][ T1883] netdevsim netdevsim0 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 86.638351][ T7100] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 87.121586][ T28] kauditd_printk_skb: 20897 callbacks suppressed [ 87.121603][ T28] audit: type=1400 audit(1770866045.171:87451): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.153176][ T28] audit: type=1400 audit(1770866045.201:87452): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.178669][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.185383][ T7164] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.191972][ T3036] audit: audit_lost=5963 audit_rate_limit=0 audit_backlog_limit=64 [ 87.205474][ T7166] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.211723][ T7164] audit: audit_lost=5964 audit_rate_limit=0 audit_backlog_limit=64 [ 87.212101][ T3036] audit: backlog limit exceeded [ 87.224987][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.225640][ T7168] audit: audit_backlog=65 > audit_backlog_limit=64 [ 91.441473][ T7656] __nla_validate_parse: 7 callbacks suppressed [ 91.459272][ T7656] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1873'. [ 92.131652][ T28] kauditd_printk_skb: 21195 callbacks suppressed [ 92.131671][ T28] audit: type=1400 audit(1770866051.176:108641): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.166689][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.173603][ T3036] audit: audit_lost=5968 audit_rate_limit=0 audit_backlog_limit=64 [ 92.181090][ T7763] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.182141][ T28] audit: type=1400 audit(1770866051.176:108642): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.196008][ T7763] audit: audit_lost=5969 audit_rate_limit=0 audit_backlog_limit=64 [ 92.209486][ T3036] audit: backlog limit exceeded [ 92.217739][ T7763] audit: backlog limit exceeded [ 92.229075][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.235845][ T3036] audit: audit_lost=5970 audit_rate_limit=0 audit_backlog_limit=64 [ 92.514048][ T7788] netlink: 268 bytes leftover after parsing attributes in process `syz.2.1939'. [ 93.043078][ T7846] netlink: 64 bytes leftover after parsing attributes in process `syz.2.1965'. [ 93.286883][ T319] Bluetooth: hci0: Frame reassembly failed (-84) [ 93.993981][ T7906] netlink: 'syz.0.1992': attribute type 4 has an invalid length. [ 94.355249][ T3484] Bluetooth: hci1: sending frame failed (-49) [ 94.361410][ T43] Bluetooth: hci1: Opcode 0x1003 failed: -49 [ 95.037203][ T7960] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2016'. [ 95.064681][ T7960] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2016'. [ 95.311543][ T3485] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 95.317763][ T43] Bluetooth: hci0: command 0x1003 tx timeout [ 96.007373][ T8035] netlink: 27 bytes leftover after parsing attributes in process `syz.2.2051'. [ 96.156203][ T8046] netlink: 20 bytes leftover after parsing attributes in process `syz.4.2056'. [ 97.142547][ T28] kauditd_printk_skb: 29209 callbacks suppressed [ 97.142601][ T28] audit: type=1400 audit(1770866065.202:136427): avc: denied { prog_load } for pid=8109 comm="syz.2.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 97.164703][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.179981][ T3036] audit: audit_lost=6446 audit_rate_limit=0 audit_backlog_limit=64 [ 97.190212][ T8110] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.195771][ T3036] audit: backlog limit exceeded [ 97.206903][ T8110] audit: audit_lost=6447 audit_rate_limit=0 audit_backlog_limit=64 [ 97.221615][ T28] audit: type=1400 audit(1770866065.192:136426): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.224897][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.243614][ T8110] audit: backlog limit exceeded [ 97.263871][ T8116] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.400038][ T8123] netlink: 20 bytes leftover after parsing attributes in process `syz.2.2091'. [ 97.419655][ T8123] vxlan0: entered promiscuous mode [ 97.441980][ T1883] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 97.460847][ T1883] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 97.491598][ T1883] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 97.521531][ T1883] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 97.860752][ T8139] netlink: 27 bytes leftover after parsing attributes in process `syz.3.2100'. [ 99.687040][ T8270] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 99.693521][ T8270] syzkaller0: linktype set to 6 [ 99.991927][ T8284] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 99.998476][ T8284] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 100.006937][ T8284] vhci_hcd vhci_hcd.0: Device attached [ 100.014155][ T8285] usbip_core: unknown command [ 100.019249][ T8285] vhci_hcd: unknown pdu 3073360356 [ 100.024738][ T8285] usbip_core: unknown command [ 100.029693][ T1883] vhci_hcd vhci_hcd.3: stop threads [ 100.035180][ T1883] vhci_hcd vhci_hcd.3: release socket [ 100.040751][ T1883] vhci_hcd vhci_hcd.3: disconnect device [ 100.436578][ T8300] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2171'. [ 102.151630][ T28] kauditd_printk_skb: 33070 callbacks suppressed [ 102.151648][ T28] audit: type=1400 audit(2000000004.760:167820): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.161213][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.201562][ T3036] audit: audit_lost=7008 audit_rate_limit=0 audit_backlog_limit=64 [ 102.210847][ T28] audit: type=1400 audit(2000000004.770:167821): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.219692][ T3036] audit: backlog limit exceeded [ 102.243350][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.249967][ T3036] audit: audit_lost=7009 audit_rate_limit=0 audit_backlog_limit=64 [ 102.273799][ T8407] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.274493][ T28] audit: type=1400 audit(2000000004.770:167822): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.280451][ T3036] audit: backlog limit exceeded [ 102.838263][ T8446] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 102.884833][ T8446] syzkaller0: linktype set to 769 [ 102.975083][ T8461] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2241'. [ 103.378947][ T8485] netlink: 'syz.4.2251': attribute type 5 has an invalid length. [ 104.056943][ T8530] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2272'. [ 104.079153][ T8530] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 106.421189][ T8661] netlink: 32 bytes leftover after parsing attributes in process `syz.0.2328'. [ 106.628408][ T8674] netlink: 'syz.2.2335': attribute type 1 has an invalid length. [ 106.631508][ T8675] netlink: 14 bytes leftover after parsing attributes in process `syz.0.2336'. [ 106.643136][ T8674] 8021q: adding VLAN 0 to HW filter on device bond2 [ 106.660050][ T8674] vlan2: entered allmulticast mode [ 106.671564][ T8674] veth0_to_bond: entered allmulticast mode [ 106.679956][ T8674] bond2: (slave vlan2): Opening slave failed [ 106.691778][ T8675] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 106.704787][ T8675] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 106.721339][ T8675] bond0 (unregistering): (slave netdevsim1): Releasing backup interface [ 106.734863][ T8675] bond0 (unregistering): Released all slaves [ 106.823389][ T8680] netlink: 'syz.0.2339': attribute type 39 has an invalid length. [ 107.162233][ T28] kauditd_printk_skb: 19967 callbacks suppressed [ 107.162251][ T28] audit: type=1400 audit(2000000009.780:187023): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 107.176119][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 107.203831][ T8686] audit: audit_backlog=65 > audit_backlog_limit=64 [ 107.210355][ T8686] audit: audit_lost=7266 audit_rate_limit=0 audit_backlog_limit=64 [ 107.217800][ T3036] audit: audit_lost=7267 audit_rate_limit=0 audit_backlog_limit=64 [ 107.228628][ T8686] audit: backlog limit exceeded [ 107.234587][ T3036] audit: backlog limit exceeded [ 107.238890][ T8686] audit: audit_backlog=65 > audit_backlog_limit=64 [ 107.244850][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 107.246031][ T28] audit: type=1400 audit(2000000009.780:187024): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 107.882307][ T8710] binfmt_misc: register: failed to install interpreter file ./file0 [ 108.047354][ T8718] syzkaller0: entered promiscuous mode [ 108.059541][ T8718] syzkaller0: entered allmulticast mode [ 110.327450][ T8788] xt_socket: unknown flags 0x4c [ 110.377435][ T8790] syzkaller0: entered promiscuous mode [ 110.389855][ T8790] syzkaller0: entered allmulticast mode [ 111.438267][ T8838] netlink: 'syz.2.2401': attribute type 4 has an invalid length. [ 111.505257][ T8844] bridge0: entered allmulticast mode [ 111.514876][ T8844] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.523917][ T8844] bridge_slave_0: left allmulticast mode [ 111.529863][ T8844] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.977759][ T3036] ================================================================== [ 111.985882][ T3036] BUG: KCSAN: data-race in audit_log_start / audit_receive [ 111.993106][ T3036] [ 111.995448][ T3036] write to 0xffffffff891614c0 of 8 bytes by task 8863 on cpu 1: [ 112.003096][ T3036] audit_receive+0x77/0x2270 [ 112.007718][ T3036] netlink_unicast+0x5c0/0x690 [ 112.012526][ T3036] netlink_sendmsg+0x5c8/0x6f0 [ 112.017307][ T3036] sock_sendmsg+0x254/0x280 [ 112.021835][ T3036] splice_to_socket+0x6e2/0xa80 [ 112.026711][ T3036] direct_splice_actor+0x156/0x2a0 [ 112.032021][ T3036] splice_direct_to_actor+0x311/0x670 [ 112.037410][ T3036] do_splice_direct+0x119/0x1a0 [ 112.042286][ T3036] do_sendfile+0x382/0x650 [ 112.046733][ T3036] __x64_sys_sendfile64+0x105/0x150 [ 112.051962][ T3036] x64_sys_call+0x2dc4/0x3020 [ 112.056660][ T3036] do_syscall_64+0x12c/0x370 [ 112.061282][ T3036] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 112.067190][ T3036] [ 112.069524][ T3036] read to 0xffffffff891614c0 of 8 bytes by task 3036 on cpu 0: [ 112.077076][ T3036] audit_log_start+0x103/0x730 [ 112.081877][ T3036] common_lsm_audit+0x65/0x230 [ 112.086666][ T3036] slow_avc_audit+0x14c/0x190 [ 112.091358][ T3036] avc_has_perm+0x144/0x190 [ 112.095880][ T3036] selinux_socket_recvmsg+0x192/0x1c0 [ 112.101278][ T3036] security_socket_recvmsg+0x4c/0x90 [ 112.106592][ T3036] sock_recvmsg+0x38/0x160 [ 112.111028][ T3036] ____sys_recvmsg+0xf5/0x280 [ 112.115720][ T3036] ___sys_recvmsg+0x11f/0x3b0 [ 112.120415][ T3036] __x64_sys_recvmsg+0xd1/0x160 [ 112.125275][ T3036] x64_sys_call+0x2b1a/0x3020 [ 112.129960][ T3036] do_syscall_64+0x12c/0x370 [ 112.134562][ T3036] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 112.140460][ T3036] [ 112.142782][ T3036] value changed: 0x0000000000000000 -> 0xffff8881049730c0 [ 112.149886][ T3036] [ 112.152211][ T3036] Reported by Kernel Concurrency Sanitizer on: [ 112.158360][ T3036] CPU: 0 UID: 0 PID: 3036 Comm: dhcpcd Not tainted syzkaller #0 PREEMPT(full) [ 112.167296][ T3036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 112.177351][ T3036] ================================================================== [ 112.196927][ T28] kauditd_printk_skb: 26156 callbacks suppressed [ 112.196941][ T28] audit: type=1400 audit(2000000014.810:210315): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.231458][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 112.233559][ T28] audit: type=1400 audit(2000000014.840:210316): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.238212][ T3036] audit: audit_lost=8224 audit_rate_limit=0 audit_backlog_limit=64 [ 112.267469][ T3036] audit: backlog limit exceeded [ 112.272675][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 112.272880][ T28] audit: type=1400 audit(2000000014.840:210317): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.279359][ T3036] audit: audit_lost=8225 audit_rate_limit=0 audit_backlog_limit=64 [ 112.300583][ T28] audit: type=1400 audit(2000000014.840:210318): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.308629][ T3036] audit: backlog limit exceeded [ 117.201557][ T28] kauditd_printk_skb: 47156 callbacks suppressed [ 117.201575][ T28] audit: type=1400 audit(2000000019.810:257475): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.214873][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 117.229394][ T28] audit: type=1400 audit(2000000019.820:257476): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.235895][ T3036] audit: audit_lost=8226 audit_rate_limit=0 audit_backlog_limit=64 [ 117.257098][ T28] audit: type=1400 audit(2000000019.820:257477): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.265022][ T3036] audit: backlog limit exceeded [ 117.286495][ T28] audit: type=1400 audit(2000000019.820:257478): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.291580][ T3036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 117.312512][ T28] audit: type=1400 audit(2000000019.820:257479): avc: denied { read } for pid=3036 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.318968][ T3036] audit: audit_lost=8227 audit_rate_limit=0 audit_backlog_limit=64