[ 29.154249][ T3175] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.164600][ T3175] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller syzkaller login: [ 39.761504][ T27] kauditd_printk_skb: 37 callbacks suppressed [ 39.761515][ T27] audit: type=1400 audit(1651341358.789:73): avc: denied { transition } for pid=3404 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 39.795319][ T27] audit: type=1400 audit(1651341358.819:74): avc: denied { write } for pid=3404 comm="sh" path="pipe:[27393]" dev="pipefs" ino=27393 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.0.22' (ECDSA) to the list of known hosts. 2022/04/30 17:56:08 fuzzer started 2022/04/30 17:56:08 dialing manager at 10.128.0.169:42499 [ 49.799654][ T27] audit: type=1400 audit(1651341368.829:75): avc: denied { mounton } for pid=3595 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 49.806472][ T3595] cgroup: Unknown subsys name 'net' [ 49.827938][ T27] audit: type=1400 audit(1651341368.829:76): avc: denied { mount } for pid=3595 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 49.851452][ T27] audit: type=1400 audit(1651341368.859:77): avc: denied { unmount } for pid=3595 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 49.969287][ T3595] cgroup: Unknown subsys name 'rlimit' [ 50.085538][ T27] audit: type=1400 audit(1651341369.109:78): avc: denied { mounton } for pid=3595 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 50.111675][ T27] audit: type=1400 audit(1651341369.139:79): avc: denied { mount } for pid=3595 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2022/04/30 17:56:09 syscalls: 3655 2022/04/30 17:56:09 code coverage: enabled 2022/04/30 17:56:09 comparison tracing: enabled 2022/04/30 17:56:09 extra coverage: enabled 2022/04/30 17:56:09 delay kcov mmap: enabled 2022/04/30 17:56:09 setuid sandbox: enabled 2022/04/30 17:56:09 namespace sandbox: enabled 2022/04/30 17:56:09 Android sandbox: enabled 2022/04/30 17:56:09 fault injection: enabled 2022/04/30 17:56:09 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2022/04/30 17:56:09 net packet injection: enabled 2022/04/30 17:56:09 net device setup: enabled 2022/04/30 17:56:09 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/04/30 17:56:09 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/04/30 17:56:09 USB emulation: enabled 2022/04/30 17:56:09 hci packet injection: enabled 2022/04/30 17:56:09 wifi device emulation: enabled 2022/04/30 17:56:09 802.15.4 emulation: enabled 2022/04/30 17:56:09 fetching corpus: 0, signal 0/2000 (executing program) [ 50.135918][ T27] audit: type=1400 audit(1651341369.139:80): avc: denied { setattr } for pid=3595 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 50.165443][ T27] audit: type=1400 audit(1651341369.139:81): avc: denied { create } for pid=3595 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.185991][ T27] audit: type=1400 audit(1651341369.139:82): avc: denied { write } for pid=3595 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.206404][ T27] audit: type=1400 audit(1651341369.139:83): avc: denied { read } for pid=3595 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2022/04/30 17:56:09 fetching corpus: 48, signal 37536/40051 (executing program) 2022/04/30 17:56:09 fetching corpus: 95, signal 60505/62807 (executing program) 2022/04/30 17:56:09 fetching corpus: 144, signal 72878/75011 (executing program) 2022/04/30 17:56:09 fetching corpus: 191, signal 85415/86816 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94188/94805 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94245/94975 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94245/95090 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94245/95201 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94245/95321 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94245/95505 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94245/95634 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94245/95737 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94245/95863 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94245/95992 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94245/96130 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/96257 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/96389 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/96519 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/96641 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/96777 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/96899 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/97015 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/97136 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/97271 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/97391 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/97506 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/97625 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/97749 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/97875 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/97985 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/98095 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94248/98208 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94255/98318 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94255/98440 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94255/98548 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94255/98683 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94255/98798 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94255/98919 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94255/99038 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94255/99151 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94255/99280 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94255/99387 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94267/99516 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94267/99641 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94267/99749 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94267/99866 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94267/99979 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94267/100123 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94267/100233 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94356/100250 (executing program) 2022/04/30 17:56:10 fetching corpus: 237, signal 94356/100250 (executing program) 2022/04/30 17:56:12 starting 6 fuzzer processes 17:56:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x4, 0x3000000}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, 0xffffffffffffffff, 0x9, 0xb1, 0x2}, 0x20) 17:56:12 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) unshare(0x80) 17:56:12 executing program 1: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) io_submit(r0, 0x1, &(0x7f00000003c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 17:56:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast2, 0x0, 0x32}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'sha512-arm\x00'}}}]}, 0x138}}, 0x0) 17:56:12 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80, 0x100800) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000540)={&(0x7f0000000440)=@deltaction={0xc4, 0x31, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x4}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb416}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb0b}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@deltaction={0x28, 0x32, 0xf01, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f00000000c0)=""/99, &(0x7f0000000140)=0x63) syz_emit_ethernet(0x4e, &(0x7f00000006c0)={@multicast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "238639", 0x18, 0x3a, 0x0, @dev, @mcast2, {[], @mld={0x83, 0x0, 0x0, 0x0, 0x0, @private0}}}}}}, 0x0) 17:56:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000640), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 53.606705][ T27] audit: type=1400 audit(1651341372.629:84): avc: denied { execmem } for pid=3598 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 54.966235][ T27] kauditd_printk_skb: 5 callbacks suppressed [ 54.966258][ T27] audit: type=1400 audit(1651341373.989:90): avc: denied { ioctl } for pid=3605 comm="syz-executor.0" path="socket:[27566]" dev="sockfs" ino=27566 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 54.969479][ T3611] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 55.005699][ T3611] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 55.013252][ T3614] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 55.020850][ T3614] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 55.028146][ T3614] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 55.035447][ T3614] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 55.077415][ T3626] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 55.083545][ T3627] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 55.084992][ T3626] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 55.092562][ T3627] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 55.100334][ T3626] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 55.106500][ T46] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 55.113384][ T3628] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 55.120878][ T46] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 55.127556][ T3628] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 55.134935][ T46] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 55.140743][ T3628] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 55.147705][ T46] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 55.158576][ T27] audit: type=1400 audit(1651341374.179:91): avc: denied { read } for pid=3605 comm="syz-executor.0" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 55.165703][ T46] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 55.191129][ T3629] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 55.191528][ T46] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 55.206005][ T3629] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 55.206129][ T3626] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 55.220330][ T3629] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 55.220586][ T3626] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 55.234294][ T27] audit: type=1400 audit(1651341374.209:92): avc: denied { open } for pid=3605 comm="syz-executor.0" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 55.234751][ T3626] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 55.259160][ T3629] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 55.265264][ T46] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 55.272672][ T3629] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 55.278800][ T3626] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 55.285924][ T3629] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 55.292786][ T46] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 55.310893][ T46] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 55.319061][ T46] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 55.326561][ T46] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 55.333953][ T3626] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 55.390117][ T27] audit: type=1400 audit(1651341374.209:93): avc: denied { mounton } for pid=3605 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 55.679350][ T3605] chnl_net:caif_netlink_parms(): no params data found [ 55.792177][ T3608] chnl_net:caif_netlink_parms(): no params data found [ 55.803557][ T3607] chnl_net:caif_netlink_parms(): no params data found [ 55.863054][ T3610] chnl_net:caif_netlink_parms(): no params data found [ 55.877502][ T3609] chnl_net:caif_netlink_parms(): no params data found [ 55.910337][ T3606] chnl_net:caif_netlink_parms(): no params data found [ 55.982514][ T3605] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.990795][ T3605] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.998601][ T3605] device bridge_slave_0 entered promiscuous mode [ 56.036331][ T3605] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.043599][ T3605] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.051789][ T3605] device bridge_slave_1 entered promiscuous mode [ 56.143796][ T3608] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.150999][ T3608] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.158640][ T3608] device bridge_slave_0 entered promiscuous mode [ 56.181149][ T3605] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.214954][ T3608] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.222274][ T3608] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.231018][ T3608] device bridge_slave_1 entered promiscuous mode [ 56.238074][ T3607] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.245905][ T3607] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.254149][ T3607] device bridge_slave_0 entered promiscuous mode [ 56.262607][ T3606] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.270012][ T3606] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.277761][ T3606] device bridge_slave_0 entered promiscuous mode [ 56.287759][ T3605] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.304693][ T3610] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.311827][ T3610] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.320117][ T3610] device bridge_slave_0 entered promiscuous mode [ 56.338907][ T3607] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.345962][ T3607] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.354502][ T3607] device bridge_slave_1 entered promiscuous mode [ 56.370834][ T3606] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.377881][ T3606] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.385966][ T3606] device bridge_slave_1 entered promiscuous mode [ 56.402153][ T3609] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.409354][ T3609] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.417050][ T3609] device bridge_slave_0 entered promiscuous mode [ 56.424935][ T3610] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.432119][ T3610] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.440855][ T3610] device bridge_slave_1 entered promiscuous mode [ 56.481614][ T3609] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.488987][ T3609] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.496666][ T3609] device bridge_slave_1 entered promiscuous mode [ 56.515558][ T3608] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.526762][ T3607] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.547418][ T3605] team0: Port device team_slave_0 added [ 56.580538][ T3608] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.591747][ T3607] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.603237][ T3606] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.614007][ T3605] team0: Port device team_slave_1 added [ 56.628569][ T3610] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.654577][ T3606] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.672173][ T3609] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.683502][ T3610] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.711437][ T3608] team0: Port device team_slave_0 added [ 56.732660][ T3609] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.751037][ T3607] team0: Port device team_slave_0 added [ 56.758341][ T3608] team0: Port device team_slave_1 added [ 56.785399][ T3605] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 56.792401][ T3605] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 56.819311][ T3605] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 56.844769][ T3607] team0: Port device team_slave_1 added [ 56.863083][ T3606] team0: Port device team_slave_0 added [ 56.871631][ T3606] team0: Port device team_slave_1 added [ 56.877632][ T3605] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 56.884840][ T3605] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 56.910829][ T3605] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 56.933971][ T3610] team0: Port device team_slave_0 added [ 56.946763][ T3608] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 56.954274][ T3608] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 56.980757][ T3608] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 57.012862][ T3609] team0: Port device team_slave_0 added [ 57.020810][ T3610] team0: Port device team_slave_1 added [ 57.032339][ T3608] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 57.039890][ T3608] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 57.066126][ T3608] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 57.088212][ T3606] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 57.095260][ T3606] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 57.121469][ T3606] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 57.134562][ T3609] team0: Port device team_slave_1 added [ 57.149728][ T3607] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 57.156763][ T3607] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 57.182725][ T3607] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 57.196193][ T3607] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 57.204089][ T26] Bluetooth: hci0: command 0x0409 tx timeout [ 57.211150][ T3607] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 57.237143][ T3607] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 57.256936][ T3606] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 57.264340][ T3606] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 57.291057][ T3606] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 57.332254][ T3605] device hsr_slave_0 entered promiscuous mode [ 57.339139][ T3605] device hsr_slave_1 entered promiscuous mode [ 57.358760][ T14] Bluetooth: hci4: command 0x0409 tx timeout [ 57.366115][ T3610] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 57.373246][ T26] Bluetooth: hci3: command 0x0409 tx timeout [ 57.377668][ T3610] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 57.379290][ T26] Bluetooth: hci1: command 0x0409 tx timeout [ 57.379379][ T26] Bluetooth: hci5: command 0x0409 tx timeout [ 57.413733][ T3610] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 57.444408][ T14] Bluetooth: hci2: command 0x0409 tx timeout [ 57.467930][ T3609] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 57.474972][ T3609] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 57.501309][ T3609] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 57.513438][ T3610] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 57.521096][ T3610] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 57.547338][ T3610] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 57.573164][ T3608] device hsr_slave_0 entered promiscuous mode [ 57.580281][ T3608] device hsr_slave_1 entered promiscuous mode [ 57.586805][ T3608] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 57.594660][ T3608] Cannot create hsr debugfs directory [ 57.608213][ T3606] device hsr_slave_0 entered promiscuous mode [ 57.615047][ T3606] device hsr_slave_1 entered promiscuous mode [ 57.622061][ T3606] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 57.629662][ T3606] Cannot create hsr debugfs directory [ 57.635439][ T3609] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 57.642479][ T3609] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 57.668464][ T3609] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 57.693205][ T3607] device hsr_slave_0 entered promiscuous mode [ 57.700143][ T3607] device hsr_slave_1 entered promiscuous mode [ 57.706676][ T3607] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 57.714371][ T3607] Cannot create hsr debugfs directory [ 57.788392][ T3610] device hsr_slave_0 entered promiscuous mode [ 57.796161][ T3610] device hsr_slave_1 entered promiscuous mode [ 57.802792][ T3610] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 57.810529][ T3610] Cannot create hsr debugfs directory [ 57.875583][ T3609] device hsr_slave_0 entered promiscuous mode [ 57.882843][ T3609] device hsr_slave_1 entered promiscuous mode [ 57.889769][ T3609] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 57.897323][ T3609] Cannot create hsr debugfs directory [ 58.263099][ T3605] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 58.313053][ T3605] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 58.326394][ T3605] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 58.341845][ T3605] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 58.381765][ T3607] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 58.400868][ T3607] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 58.415537][ T3607] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 58.424214][ T3607] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 58.463419][ T3609] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 58.492303][ T3609] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 58.509118][ T3609] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 58.523724][ T3609] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 58.613876][ T3608] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 58.622820][ T3608] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 58.633054][ T3608] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 58.656703][ T3605] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.671041][ T3608] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 58.714021][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.724646][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.742096][ T3605] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.768947][ T3607] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.801909][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.811847][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.821502][ T3659] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.828960][ T3659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.837184][ T3606] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 58.851113][ T3606] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 58.864614][ T3606] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 58.877598][ T3606] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 58.892485][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.901321][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.910253][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.918715][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.925805][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.950644][ T3660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.959975][ T3660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.974192][ T3607] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.005401][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.013627][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.022354][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.031299][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.040163][ T3657] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.047227][ T3657] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.055013][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.063781][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.073184][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.081826][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.092187][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.100457][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 59.144258][ T3660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.153483][ T3660] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.162484][ T3660] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.169606][ T3660] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.177557][ T3660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.186370][ T3660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.194779][ T3660] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.227083][ T3610] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 59.240579][ T3610] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 59.252592][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 59.261219][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.271473][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.284963][ T3609] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.289365][ T3660] Bluetooth: hci0: command 0x041b tx timeout [ 59.300712][ T3610] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 59.311149][ T3610] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 59.335636][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.349939][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.358291][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.367505][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.384986][ T3607] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 59.397886][ T3607] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 59.413318][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.427675][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 59.438438][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 59.447508][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.449545][ T3655] Bluetooth: hci1: command 0x041b tx timeout [ 59.456276][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 59.469358][ T3655] Bluetooth: hci3: command 0x041b tx timeout [ 59.475637][ T3655] Bluetooth: hci4: command 0x041b tx timeout [ 59.476535][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.490576][ T3659] Bluetooth: hci5: command 0x041b tx timeout [ 59.497970][ T3609] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.519447][ T3661] Bluetooth: hci2: command 0x041b tx timeout [ 59.530180][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.537776][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.545984][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.554251][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.564158][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.573416][ T3659] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.580578][ T3659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.590155][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.624745][ T3608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.637460][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.651017][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.662968][ T3656] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.670092][ T3656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.679326][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 59.686785][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 59.737288][ T3608] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.744742][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.759609][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.767265][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.793335][ T3606] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.802278][ T3607] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 59.836010][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 59.849262][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 59.856689][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.866448][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.875290][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.884059][ T3656] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.891165][ T3656] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.899001][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.907514][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.915981][ T3656] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.923086][ T3656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.933605][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.942299][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.952652][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.962420][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 59.975827][ T3605] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.018488][ T3610] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.025304][ T27] audit: type=1400 audit(1651341379.039:94): avc: denied { module_request } for pid=3607 comm="syz-executor.1" kmod="netdev-xfrm0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 60.058167][ T3606] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.079476][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.086888][ T27] audit: type=1400 audit(1651341379.079:95): avc: denied { sys_module } for pid=3607 comm="syz-executor.1" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 60.090929][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.117957][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.126882][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 60.135967][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.144788][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.153437][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.162969][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.170978][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.178612][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.187630][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.196896][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.216490][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.256636][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 60.266826][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.276311][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.285591][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.295875][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.305280][ T3659] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.312416][ T3659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.321237][ T3659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.337609][ T3608] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 60.348096][ T3608] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 60.371687][ T3610] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.396916][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 60.406530][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.426671][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.437402][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.462434][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.476052][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.487654][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.496958][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.505867][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.513054][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.521511][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.531156][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.540023][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.548562][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.557281][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.564365][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.609693][ T3609] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.618634][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.627087][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.635649][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.646380][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.657492][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 60.665301][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 60.673011][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.689458][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.697964][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.705120][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.713324][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 60.721909][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 60.729588][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.738130][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.747148][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 60.759743][ T3608] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.837333][ T3610] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 60.848951][ T3610] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 60.866977][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.890225][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.904558][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 60.913173][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 60.922451][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.931164][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.939749][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 60.947989][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.956432][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.965119][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.973901][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 60.984192][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 60.993006][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.002070][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.010754][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.019260][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.027574][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.036020][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.046840][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.054993][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.104049][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 61.112664][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 61.134166][ T3605] device veth0_vlan entered promiscuous mode [ 61.178051][ T3607] device veth0_vlan entered promiscuous mode [ 61.204735][ T3610] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.218019][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 61.237854][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 61.246787][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 61.263427][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 61.277314][ T3605] device veth1_vlan entered promiscuous mode [ 61.308564][ T3606] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.327128][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 61.349769][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.357734][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 61.366804][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 61.390440][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.398422][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 61.426963][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 61.449785][ T141] Bluetooth: hci0: command 0x040f tx timeout [ 61.469234][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 61.477649][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 61.505685][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 61.518836][ T3661] Bluetooth: hci5: command 0x040f tx timeout [ 61.524889][ T3661] Bluetooth: hci3: command 0x040f tx timeout [ 61.531612][ T3661] Bluetooth: hci1: command 0x040f tx timeout [ 61.540909][ T3607] device veth1_vlan entered promiscuous mode [ 61.559040][ T3656] Bluetooth: hci4: command 0x040f tx timeout [ 61.599264][ T3656] Bluetooth: hci2: command 0x040f tx timeout [ 61.618092][ T3609] device veth0_vlan entered promiscuous mode [ 61.641762][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 61.654662][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 61.680028][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 61.689097][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 61.697784][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 61.737934][ T3605] device veth0_macvtap entered promiscuous mode [ 61.750544][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 61.759680][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 61.767576][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.776334][ T3656] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 61.793513][ T3609] device veth1_vlan entered promiscuous mode [ 61.812524][ T3605] device veth1_macvtap entered promiscuous mode [ 61.825700][ T3607] device veth0_macvtap entered promiscuous mode [ 61.852665][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 61.861786][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 61.871239][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 61.889468][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 61.919795][ T3605] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 61.929827][ T3607] device veth1_macvtap entered promiscuous mode [ 61.939961][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 61.948409][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 61.969923][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 61.978045][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 61.987880][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 62.004443][ T3609] device veth0_macvtap entered promiscuous mode [ 62.031928][ T3605] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 62.061895][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 62.071495][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 62.080612][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 62.089719][ T3661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 62.113819][ T3609] device veth1_macvtap entered promiscuous mode [ 62.134112][ T3607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 62.153958][ T3607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 62.194131][ T3607] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 62.214198][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 62.223205][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 62.232104][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 62.242324][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 62.251018][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 62.259967][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 62.268511][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 62.284434][ T3608] device veth0_vlan entered promiscuous mode [ 62.294123][ T3605] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.304596][ T3605] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.313798][ T3605] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.323480][ T3605] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.337573][ T3607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 62.348408][ T3607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 62.360292][ T3607] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 62.375212][ T3607] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.384441][ T3607] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.393523][ T3607] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.405614][ T3607] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.417833][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 62.426168][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.434564][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 62.443536][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 62.452850][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 62.461514][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.475874][ T3608] device veth1_vlan entered promiscuous mode [ 62.491914][ T3606] device veth0_vlan entered promiscuous mode [ 62.498619][ T3609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 62.509763][ T3609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 62.519792][ T3609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 62.530704][ T3609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 62.541986][ T3609] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 62.561803][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.570123][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 62.577984][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 62.586339][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.594133][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 62.602418][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 62.611048][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 62.620030][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 62.628563][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 62.655367][ T3606] device veth1_vlan entered promiscuous mode [ 62.680289][ T3609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 62.691489][ T3609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 62.702041][ T3609] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 62.712916][ T3609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 62.724854][ T3609] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 62.748338][ T3608] device veth0_macvtap entered promiscuous mode [ 62.769125][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 62.777144][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 62.786642][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 62.795600][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 62.804658][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 62.813864][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 62.823029][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 62.834562][ T3609] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.843513][ T3609] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.855016][ T3609] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.864201][ T3609] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 62.919776][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 62.927820][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 62.937260][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.973657][ T3606] device veth0_macvtap entered promiscuous mode [ 62.986052][ T3608] device veth1_macvtap entered promiscuous mode [ 63.004897][ T3610] device veth0_vlan entered promiscuous mode [ 63.014604][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 63.023732][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 63.032236][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 63.040812][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 63.049927][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 63.073761][ T3606] device veth1_macvtap entered promiscuous mode [ 63.108604][ T3608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 63.121657][ T3608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 63.141755][ T3608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 63.152357][ T3608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 63.162509][ T3608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 63.173302][ T3608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 63.187605][ T3608] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 63.196972][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 63.205811][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 63.214392][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 63.223110][ T3632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 63.265754][ T3698] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 63.266502][ T3610] device veth1_vlan entered promiscuous mode [ 63.277140][ T3698] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 63.284449][ T3608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 63.300814][ T3608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 63.312273][ T3608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 63.322980][ T3608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 63.333109][ T3608] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 63.343990][ T3608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 63.355143][ T3608] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 63.366781][ T3608] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.376153][ T3608] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.384943][ T3608] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.393731][ T3608] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.413619][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 63.428764][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 63.437773][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 63.466533][ T3606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 63.477218][ T3606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 63.487765][ T3606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 63.499806][ T3606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 63.509825][ T3606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 63.520806][ T3606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 63.531507][ T3606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 63.538687][ T3632] Bluetooth: hci0: command 0x0419 tx timeout [ 63.542344][ T3606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 63.559897][ T3606] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 63.590336][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 63.598430][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 63.606858][ T3656] Bluetooth: hci4: command 0x0419 tx timeout [ 63.616768][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 63.624307][ T3656] Bluetooth: hci1: command 0x0419 tx timeout [ 63.627986][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 63.631582][ T3656] Bluetooth: hci3: command 0x0419 tx timeout [ 63.646219][ T3656] Bluetooth: hci5: command 0x0419 tx timeout [ 63.652609][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 63.677615][ T569] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 63.686275][ T3632] Bluetooth: hci2: command 0x0419 tx timeout [ 63.698367][ T569] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 63.706195][ T3606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 63.717571][ T3606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 63.727624][ T3606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 63.738290][ T3606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 63.748252][ T3606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 63.760726][ T3606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 63.771676][ T3606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 63.782582][ T3606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 63.799155][ T3606] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 63.815284][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 63.823475][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 63.832396][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 63.841488][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 63.850194][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 63.864856][ T3610] device veth0_macvtap entered promiscuous mode [ 63.892823][ T3606] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.903921][ T3606] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.913043][ T3606] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.923929][ T3606] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.937121][ T3610] device veth1_macvtap entered promiscuous mode [ 63.947151][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 63.965812][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 63.997885][ T3610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 64.014077][ T3610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.024190][ T3610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 64.035178][ T3610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.045223][ T3610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 64.055832][ T3610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.066028][ T3610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 64.076977][ T3610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.087726][ T3610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 64.098477][ T3610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.113592][ T3610] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 64.141330][ T3678] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 64.150295][ T3678] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 64.158230][ T3678] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 64.167332][ T3678] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 64.176316][ T3678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 64.188230][ T3610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 64.200212][ T3610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.210166][ T3610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 64.222010][ T3610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.231866][ T3610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 64.243089][ T3610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.252966][ T3610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 64.263447][ T3610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.273363][ T3610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 64.283828][ T3610] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 64.295100][ T3610] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 64.308870][ T27] audit: type=1400 audit(1651341383.329:96): avc: denied { mounton } for pid=3605 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=2313 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 64.340649][ T569] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.349259][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 64.358011][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 64.377448][ T569] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 64.377451][ T27] audit: type=1400 audit(1651341383.349:97): avc: denied { mount } for pid=3605 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 64.416139][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 64.437731][ T3610] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.449508][ T3610] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.458223][ T3610] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.467364][ T3610] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.498908][ T3698] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.506900][ T3698] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 64.529405][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 17:56:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x4, 0x3000000}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, 0xffffffffffffffff, 0x9, 0xb1, 0x2}, 0x20) [ 64.537455][ T27] audit: type=1400 audit(1651341383.559:98): avc: denied { read write } for pid=3605 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 64.570228][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:56:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x4, 0x3000000}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, 0xffffffffffffffff, 0x9, 0xb1, 0x2}, 0x20) [ 64.586663][ T27] audit: type=1400 audit(1651341383.559:99): avc: denied { open } for pid=3605 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 64.625972][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 64.654568][ T27] audit: type=1400 audit(1651341383.559:100): avc: denied { ioctl } for pid=3605 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=644 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 64.665207][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 17:56:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x4, 0x3000000}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, 0xffffffffffffffff, 0x9, 0xb1, 0x2}, 0x20) [ 64.692937][ T27] audit: type=1400 audit(1651341383.559:101): avc: denied { bpf } for pid=3715 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 17:56:23 executing program 0: r0 = openat$damon_mk_contexts(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1502, 0x0) write$damon_contexts(r0, &(0x7f0000000080)=[{' ', './file0'}], 0x1) [ 64.875115][ T3698] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.909190][ T3698] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:56:24 executing program 0: r0 = openat$damon_mk_contexts(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1502, 0x0) write$damon_contexts(r0, &(0x7f0000000080)=[{' ', './file0'}], 0x1) 17:56:24 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80, 0x100800) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000540)={&(0x7f0000000440)=@deltaction={0xc4, 0x31, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x4}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb416}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb0b}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@deltaction={0x28, 0x32, 0xf01, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f00000000c0)=""/99, &(0x7f0000000140)=0x63) syz_emit_ethernet(0x4e, &(0x7f00000006c0)={@multicast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "238639", 0x18, 0x3a, 0x0, @dev, @mcast2, {[], @mld={0x83, 0x0, 0x0, 0x0, 0x0, @private0}}}}}}, 0x0) [ 64.987495][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 65.012655][ T27] audit: type=1400 audit(1651341384.039:102): avc: denied { read } for pid=2946 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 17:56:24 executing program 1: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) io_submit(r0, 0x1, &(0x7f00000003c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) [ 65.076333][ T569] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.139271][ T569] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.183490][ T3698] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.192727][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 65.204914][ T3698] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.232406][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.259084][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.279865][ T3657] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 17:56:24 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) unshare(0x80) 17:56:24 executing program 0: r0 = openat$damon_mk_contexts(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1502, 0x0) write$damon_contexts(r0, &(0x7f0000000080)=[{' ', './file0'}], 0x1) [ 65.311003][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 65.345074][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.378729][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.424183][ T3662] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 65.458831][ T27] audit: type=1400 audit(1651341384.479:103): avc: denied { create } for pid=3745 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 17:56:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast2, 0x0, 0x32}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'sha512-arm\x00'}}}]}, 0x138}}, 0x0) 17:56:24 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80, 0x100800) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000540)={&(0x7f0000000440)=@deltaction={0xc4, 0x31, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x4}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb416}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb0b}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@deltaction={0x28, 0x32, 0xf01, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f00000000c0)=""/99, &(0x7f0000000140)=0x63) syz_emit_ethernet(0x4e, &(0x7f00000006c0)={@multicast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "238639", 0x18, 0x3a, 0x0, @dev, @mcast2, {[], @mld={0x83, 0x0, 0x0, 0x0, 0x0, @private0}}}}}}, 0x0) [ 65.500535][ T27] audit: type=1400 audit(1651341384.499:104): avc: denied { write } for pid=3745 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 65.537483][ T27] audit: type=1400 audit(1651341384.499:105): avc: denied { nlmsg_write } for pid=3745 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 65.631175][ T27] audit: type=1400 audit(1651341384.659:106): avc: denied { mounton } for pid=3751 comm="syz-executor.4" path="/root/syzkaller-testdir1781502820/syzkaller.m3pZ6H/0/file0" dev="sda1" ino=1161 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 17:56:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000640), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 17:56:24 executing program 1: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) io_submit(r0, 0x1, &(0x7f00000003c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 17:56:24 executing program 0: r0 = openat$damon_mk_contexts(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1502, 0x0) write$damon_contexts(r0, &(0x7f0000000080)=[{' ', './file0'}], 0x1) 17:56:24 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) unshare(0x80) 17:56:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast2, 0x0, 0x32}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'sha512-arm\x00'}}}]}, 0x138}}, 0x0) 17:56:24 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80, 0x100800) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000540)={&(0x7f0000000440)=@deltaction={0xc4, 0x31, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x4}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb416}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb0b}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@deltaction={0x28, 0x32, 0xf01, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f00000000c0)=""/99, &(0x7f0000000140)=0x63) syz_emit_ethernet(0x4e, &(0x7f00000006c0)={@multicast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "238639", 0x18, 0x3a, 0x0, @dev, @mcast2, {[], @mld={0x83, 0x0, 0x0, 0x0, 0x0, @private0}}}}}}, 0x0) [ 65.661255][ T27] audit: type=1400 audit(1651341384.659:107): avc: denied { mount } for pid=3751 comm="syz-executor.4" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 17:56:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast2, 0x0, 0x32}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'sha512-arm\x00'}}}]}, 0x138}}, 0x0) 17:56:24 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) unshare(0x80) 17:56:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000640), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 17:56:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000640), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 17:56:24 executing program 1: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) io_submit(r0, 0x1, &(0x7f00000003c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) [ 65.807716][ T27] audit: type=1400 audit(1651341384.659:108): avc: denied { unmount } for pid=3751 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 17:56:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000640), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 17:56:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000640), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 17:56:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000640), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 17:56:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast2, 0x0, 0x32}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'sha512-arm\x00'}}}]}, 0x138}}, 0x0) 17:56:25 executing program 1: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) io_submit(r0, 0x1, &(0x7f00000003c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 17:56:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000640), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 17:56:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000640), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 17:56:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000640), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 17:56:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast2, 0x0, 0x32}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'sha512-arm\x00'}}}]}, 0x138}}, 0x0) 17:56:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000640), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 17:56:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000640), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 17:56:25 executing program 1: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) io_submit(r0, 0x1, &(0x7f00000003c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 17:56:25 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80, 0x100800) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000540)={&(0x7f0000000440)=@deltaction={0xc4, 0x31, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x4}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb416}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb0b}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@deltaction={0x28, 0x32, 0xf01, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f00000000c0)=""/99, &(0x7f0000000140)=0x63) syz_emit_ethernet(0x4e, &(0x7f00000006c0)={@multicast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "238639", 0x18, 0x3a, 0x0, @dev, @mcast2, {[], @mld={0x83, 0x0, 0x0, 0x0, 0x0, @private0}}}}}}, 0x0) 17:56:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@mcast2, 0x0, 0x32}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'sha512-arm\x00'}}}]}, 0x138}}, 0x0) 17:56:25 executing program 0: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80, 0x100800) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000540)={&(0x7f0000000440)=@deltaction={0xc4, 0x31, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x4}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb416}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb0b}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@deltaction={0x28, 0x32, 0xf01, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f00000000c0)=""/99, &(0x7f0000000140)=0x63) syz_emit_ethernet(0x4e, &(0x7f00000006c0)={@multicast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "238639", 0x18, 0x3a, 0x0, @dev, @mcast2, {[], @mld={0x83, 0x0, 0x0, 0x0, 0x0, @private0}}}}}}, 0x0) 17:56:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000640), 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 17:56:25 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80, 0x100800) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000540)={&(0x7f0000000440)=@deltaction={0xc4, 0x31, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x4}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb416}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb0b}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@deltaction={0x28, 0x32, 0xf01, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f00000000c0)=""/99, &(0x7f0000000140)=0x63) syz_emit_ethernet(0x4e, &(0x7f00000006c0)={@multicast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "238639", 0x18, 0x3a, 0x0, @dev, @mcast2, {[], @mld={0x83, 0x0, 0x0, 0x0, 0x0, @private0}}}}}}, 0x0) 17:56:25 executing program 1: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) io_submit(r0, 0x1, &(0x7f00000003c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 17:56:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000b63055482ebc4bf6", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c00020096d8600af18ff7cc0000000000000000fdffffffe80000001800058014000200ffffffff0000000000000000000000000800070001"], 0x6c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000700)="b3a745710b7161e89a2be11a88a8", 0x36, 0x0, 0x0, 0x0) 17:56:25 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80, 0x100800) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000540)={&(0x7f0000000440)=@deltaction={0xc4, 0x31, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x4}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb416}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb0b}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@deltaction={0x28, 0x32, 0xf01, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f00000000c0)=""/99, &(0x7f0000000140)=0x63) syz_emit_ethernet(0x4e, &(0x7f00000006c0)={@multicast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "238639", 0x18, 0x3a, 0x0, @dev, @mcast2, {[], @mld={0x83, 0x0, 0x0, 0x0, 0x0, @private0}}}}}}, 0x0) 17:56:25 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80, 0x100800) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000540)={&(0x7f0000000440)=@deltaction={0xc4, 0x31, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x4}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb416}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb0b}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@deltaction={0x28, 0x32, 0xf01, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f00000000c0)=""/99, &(0x7f0000000140)=0x63) syz_emit_ethernet(0x4e, &(0x7f00000006c0)={@multicast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "238639", 0x18, 0x3a, 0x0, @dev, @mcast2, {[], @mld={0x83, 0x0, 0x0, 0x0, 0x0, @private0}}}}}}, 0x0) 17:56:25 executing program 0: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80, 0x100800) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000540)={&(0x7f0000000440)=@deltaction={0xc4, 0x31, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x4}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb416}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb0b}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@deltaction={0x28, 0x32, 0xf01, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f00000000c0)=""/99, &(0x7f0000000140)=0x63) syz_emit_ethernet(0x4e, &(0x7f00000006c0)={@multicast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "238639", 0x18, 0x3a, 0x0, @dev, @mcast2, {[], @mld={0x83, 0x0, 0x0, 0x0, 0x0, @private0}}}}}}, 0x0) 17:56:25 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000240)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_DEVKEY={0x24, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}]}]}, 0x44}}, 0x0) [ 66.528602][ T27] audit: type=1400 audit(1651341385.549:109): avc: denied { create } for pid=3810 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 66.534007][ T3814] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 17:56:25 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80, 0x100800) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000540)={&(0x7f0000000440)=@deltaction={0xc4, 0x31, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x4}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb416}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb0b}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@deltaction={0x28, 0x32, 0xf01, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f00000000c0)=""/99, &(0x7f0000000140)=0x63) syz_emit_ethernet(0x4e, &(0x7f00000006c0)={@multicast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "238639", 0x18, 0x3a, 0x0, @dev, @mcast2, {[], @mld={0x83, 0x0, 0x0, 0x0, 0x0, @private0}}}}}}, 0x0) 17:56:25 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80, 0x100800) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000540)={&(0x7f0000000440)=@deltaction={0xc4, 0x31, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x4}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb416}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb0b}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@deltaction={0x28, 0x32, 0xf01, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f00000000c0)=""/99, &(0x7f0000000140)=0x63) syz_emit_ethernet(0x4e, &(0x7f00000006c0)={@multicast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "238639", 0x18, 0x3a, 0x0, @dev, @mcast2, {[], @mld={0x83, 0x0, 0x0, 0x0, 0x0, @private0}}}}}}, 0x0) [ 66.661761][ T27] audit: type=1400 audit(1651341385.689:110): avc: denied { bind } for pid=3810 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 17:56:25 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000240)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_DEVKEY={0x24, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}]}]}, 0x44}}, 0x0) 17:56:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000b63055482ebc4bf6", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c00020096d8600af18ff7cc0000000000000000fdffffffe80000001800058014000200ffffffff0000000000000000000000000800070001"], 0x6c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000700)="b3a745710b7161e89a2be11a88a8", 0x36, 0x0, 0x0, 0x0) 17:56:25 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000b63055482ebc4bf6", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c00020096d8600af18ff7cc0000000000000000fdffffffe80000001800058014000200ffffffff0000000000000000000000000800070001"], 0x6c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000700)="b3a745710b7161e89a2be11a88a8", 0x36, 0x0, 0x0, 0x0) 17:56:25 executing program 0: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80, 0x100800) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={&(0x7f0000000400), 0xc, &(0x7f0000000540)={&(0x7f0000000440)=@deltaction={0xc4, 0x31, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x4}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb416}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0x14, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xb0b}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@deltaction={0x28, 0x32, 0xf01, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f00000000c0)=""/99, &(0x7f0000000140)=0x63) syz_emit_ethernet(0x4e, &(0x7f00000006c0)={@multicast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "238639", 0x18, 0x3a, 0x0, @dev, @mcast2, {[], @mld={0x83, 0x0, 0x0, 0x0, 0x0, @private0}}}}}}, 0x0) [ 66.778943][ T27] audit: type=1400 audit(1651341385.739:111): avc: denied { write } for pid=3810 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 17:56:25 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000b63055482ebc4bf6", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c00020096d8600af18ff7cc0000000000000000fdffffffe80000001800058014000200ffffffff0000000000000000000000000800070001"], 0x6c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000700)="b3a745710b7161e89a2be11a88a8", 0x36, 0x0, 0x0, 0x0) 17:56:25 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000240)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_DEVKEY={0x24, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}]}]}, 0x44}}, 0x0) 17:56:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000b63055482ebc4bf6", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c00020096d8600af18ff7cc0000000000000000fdffffffe80000001800058014000200ffffffff0000000000000000000000000800070001"], 0x6c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000700)="b3a745710b7161e89a2be11a88a8", 0x36, 0x0, 0x0, 0x0) [ 66.823443][ T3830] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 66.859109][ T3829] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 17:56:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000b63055482ebc4bf6", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c00020096d8600af18ff7cc0000000000000000fdffffffe80000001800058014000200ffffffff0000000000000000000000000800070001"], 0x6c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000700)="b3a745710b7161e89a2be11a88a8", 0x36, 0x0, 0x0, 0x0) 17:56:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000b63055482ebc4bf6", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c00020096d8600af18ff7cc0000000000000000fdffffffe80000001800058014000200ffffffff0000000000000000000000000800070001"], 0x6c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000700)="b3a745710b7161e89a2be11a88a8", 0x36, 0x0, 0x0, 0x0) 17:56:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000b63055482ebc4bf6", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c00020096d8600af18ff7cc0000000000000000fdffffffe80000001800058014000200ffffffff0000000000000000000000000800070001"], 0x6c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000700)="b3a745710b7161e89a2be11a88a8", 0x36, 0x0, 0x0, 0x0) [ 66.953879][ T3839] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 17:56:26 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000240)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_DEVKEY={0x24, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}]}]}, 0x44}}, 0x0) [ 66.994789][ T3841] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 67.012765][ T3844] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 67.035562][ T3843] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 17:56:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000b63055482ebc4bf6", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c00020096d8600af18ff7cc0000000000000000fdffffffe80000001800058014000200ffffffff0000000000000000000000000800070001"], 0x6c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000700)="b3a745710b7161e89a2be11a88a8", 0x36, 0x0, 0x0, 0x0) 17:56:26 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000240)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_DEVKEY={0x24, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}]}]}, 0x44}}, 0x0) [ 67.058469][ T3847] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 17:56:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000b63055482ebc4bf6", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c00020096d8600af18ff7cc0000000000000000fdffffffe80000001800058014000200ffffffff0000000000000000000000000800070001"], 0x6c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000700)="b3a745710b7161e89a2be11a88a8", 0x36, 0x0, 0x0, 0x0) 17:56:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000b63055482ebc4bf6", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c00020096d8600af18ff7cc0000000000000000fdffffffe80000001800058014000200ffffffff0000000000000000000000000800070001"], 0x6c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000700)="b3a745710b7161e89a2be11a88a8", 0x36, 0x0, 0x0, 0x0) 17:56:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000b63055482ebc4bf6", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c00020096d8600af18ff7cc0000000000000000fdffffffe80000001800058014000200ffffffff0000000000000000000000000800070001"], 0x6c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000700)="b3a745710b7161e89a2be11a88a8", 0x36, 0x0, 0x0, 0x0) 17:56:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000b63055482ebc4bf6", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c00020096d8600af18ff7cc0000000000000000fdffffffe80000001800058014000200ffffffff0000000000000000000000000800070001"], 0x6c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000700)="b3a745710b7161e89a2be11a88a8", 0x36, 0x0, 0x0, 0x0) 17:56:26 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000240)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_DEVKEY={0x24, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}]}]}, 0x44}}, 0x0) 17:56:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000b63055482ebc4bf6", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c00020096d8600af18ff7cc0000000000000000fdffffffe80000001800058014000200ffffffff0000000000000000000000000800070001"], 0x6c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000700)="b3a745710b7161e89a2be11a88a8", 0x36, 0x0, 0x0, 0x0) [ 67.220327][ T3859] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 67.251439][ T3856] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 17:56:26 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000000840)=0x2, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000009c0)={'batadv_slave_1\x00'}) 17:56:26 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) connect(r0, &(0x7f0000000000)=@un=@abs, 0x80) 17:56:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000b63055482ebc4bf6", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c00020096d8600af18ff7cc0000000000000000fdffffffe80000001800058014000200ffffffff0000000000000000000000000800070001"], 0x6c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000700)="b3a745710b7161e89a2be11a88a8", 0x36, 0x0, 0x0, 0x0) 17:56:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000b63055482ebc4bf6", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c00020096d8600af18ff7cc0000000000000000fdffffffe80000001800058014000200ffffffff0000000000000000000000000800070001"], 0x6c}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000700)="b3a745710b7161e89a2be11a88a8", 0x36, 0x0, 0x0, 0x0) 17:56:26 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000240)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_DEVKEY={0x24, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}]}]}, 0x44}}, 0x0) 17:56:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000240)={0x0, @remote, @dev}, &(0x7f0000000200)=0xffffffffffffff15) [ 67.394713][ T27] audit: type=1400 audit(1651341386.419:112): avc: denied { create } for pid=3867 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 17:56:26 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) connect(r0, &(0x7f0000000000)=@un=@abs, 0x80) 17:56:26 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000000840)=0x2, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000009c0)={'batadv_slave_1\x00'}) 17:56:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000000840)=0x2, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000009c0)={'batadv_slave_1\x00'}) 17:56:26 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) connect(r0, &(0x7f0000000000)=@un=@abs, 0x80) 17:56:26 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) connect(r0, &(0x7f0000000000)=@un=@abs, 0x80) 17:56:26 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000000840)=0x2, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000009c0)={'batadv_slave_1\x00'}) 17:56:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000240)={0x0, @remote, @dev}, &(0x7f0000000200)=0xffffffffffffff15) 17:56:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000000840)=0x2, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000009c0)={'batadv_slave_1\x00'}) 17:56:26 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) connect(r0, &(0x7f0000000000)=@un=@abs, 0x80) 17:56:26 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) connect(r0, &(0x7f0000000000)=@un=@abs, 0x80) 17:56:26 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) connect(r0, &(0x7f0000000000)=@un=@abs, 0x80) 17:56:26 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000000840)=0x2, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000009c0)={'batadv_slave_1\x00'}) 17:56:26 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) connect(r0, &(0x7f0000000000)=@un=@abs, 0x80) 17:56:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000000840)=0x2, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000009c0)={'batadv_slave_1\x00'}) 17:56:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000240)={0x0, @remote, @dev}, &(0x7f0000000200)=0xffffffffffffff15) 17:56:26 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) connect(r0, &(0x7f0000000000)=@un=@abs, 0x80) 17:56:26 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) connect(r0, &(0x7f0000000000)=@un=@abs, 0x80) 17:56:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, r1, 0x433, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}]}, 0x4c}}, 0x0) 17:56:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000240)={0x0, @remote, @dev}, &(0x7f0000000200)=0xffffffffffffff15) 17:56:26 executing program 0: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) 17:56:26 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000001c0)={0x2, @pix_mp={0x0, 0x0, 0x52424752}}) 17:56:26 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="0040000068020000973d00001200000000000000843d00000001000073564d38e10000001e000000000000000010ec030200010052654973457233467300000001000000020001000000853d0100000003000000000000000000000000000000000000000000000000000000000000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00"/1984, 0x7c0, 0x11000}, {&(0x7f0000010900)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x800, 0x11800}, {&(0x7f0000011100)="0000000000000000000000001200000000000000843d00000001000073564d38e10000001e00"/64, 0x40, 0x3d96000}, {&(0x7f0000011200)="01000200750f0000000000000000000000000000000000000100000002000000000000000000000000002000e00f0000010000000200000001000000f401000002002300bd0f00"/96, 0x60, 0x3d97000}, {&(0x7f0000011300)="000000000000000000000000000000000000000000000000000000000001000000010000000200000022000400020000000000000001000000200004002e2e2eed4103005cf9535f230000003bc1655f3bc1655f3bc1655f01000000ffffffff", 0x60, 0x3d97fa0}], 0x0, &(0x7f0000011400)) 17:56:26 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000100)={@null, 0x0, 'ip6gre0\x00'}) 17:56:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, r1, 0x433, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}]}, 0x4c}}, 0x0) 17:56:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, r1, 0x433, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}]}, 0x4c}}, 0x0) 17:56:27 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000001c0)={0x2, @pix_mp={0x0, 0x0, 0x52424752}}) [ 68.002203][ T3924] loop1: detected capacity change from 0 to 252287 17:56:27 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000100)={@null, 0x0, 'ip6gre0\x00'}) [ 68.053647][ T3924] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 17:56:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, r1, 0x433, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}]}, 0x4c}}, 0x0) 17:56:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, r1, 0x433, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}]}, 0x4c}}, 0x0) 17:56:27 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000001c0)={0x2, @pix_mp={0x0, 0x0, 0x52424752}}) [ 68.170384][ T3923] EXT4-fs (sda1): pa ffff8880531672a0: logic 0, phys. 98464, len 32 [ 68.179057][ T3923] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4809: group 3, free 16, pa_free 15 [ 68.198819][ T3924] REISERFS (device loop1): found reiserfs format "3.5" with non-standard journal 17:56:27 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000100)={@null, 0x0, 'ip6gre0\x00'}) [ 68.256830][ T3924] REISERFS (device loop1): using ordered data mode [ 68.290779][ T3924] reiserfs: using flush barriers 17:56:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, r1, 0x433, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}]}, 0x4c}}, 0x0) 17:56:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, r1, 0x433, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}]}, 0x4c}}, 0x0) [ 68.322458][ T3924] REISERFS (device loop1): journal params: device loop1, size 15748, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 [ 68.398315][ T3924] REISERFS (device loop1): checking transaction log (loop1) [ 71.003923][ T3924] REISERFS warning: reiserfs-5093 is_leaf: item entry count seems wrong *3.5*[1 2 0(1) DIR], item_len 35, item_location 4029, free_space(entry_count) 2 [ 71.019646][ T3924] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 15767. Fsck? [ 71.033392][ T3924] REISERFS (device loop1): Remounting filesystem read-only [ 71.042294][ T3924] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 71.045196][ T1224] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.056173][ T3924] REISERFS warning (device loop1): reiserfs_fill_super: corrupt root inode, run fsck [ 71.063931][ T1224] ieee802154 phy1 wpan1: encryption failed: -22 17:56:30 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="0040000068020000973d00001200000000000000843d00000001000073564d38e10000001e000000000000000010ec030200010052654973457233467300000001000000020001000000853d0100000003000000000000000000000000000000000000000000000000000000000000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00"/1984, 0x7c0, 0x11000}, {&(0x7f0000010900)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x800, 0x11800}, {&(0x7f0000011100)="0000000000000000000000001200000000000000843d00000001000073564d38e10000001e00"/64, 0x40, 0x3d96000}, {&(0x7f0000011200)="01000200750f0000000000000000000000000000000000000100000002000000000000000000000000002000e00f0000010000000200000001000000f401000002002300bd0f00"/96, 0x60, 0x3d97000}, {&(0x7f0000011300)="000000000000000000000000000000000000000000000000000000000001000000010000000200000022000400020000000000000001000000200004002e2e2eed4103005cf9535f230000003bc1655f3bc1655f3bc1655f01000000ffffffff", 0x60, 0x3d97fa0}], 0x0, &(0x7f0000011400)) 17:56:30 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000001c0)={0x2, @pix_mp={0x0, 0x0, 0x52424752}}) 17:56:30 executing program 4: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) 17:56:30 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000100)={@null, 0x0, 'ip6gre0\x00'}) 17:56:30 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) 17:56:30 executing program 0: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) 17:56:30 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) 17:56:30 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) [ 71.476162][ T2927] EXT4-fs error (device sda1): mb_free_blocks:1822: group 3, block 98464:freeing already freed block (bit 160); block bitmap corrupt. [ 71.599017][ T3964] loop1: detected capacity change from 0 to 252287 [ 71.651387][ T3953] EXT4-fs (sda1): pa ffff8880533ce0e0: logic 0, phys. 65568, len 32 [ 71.659475][ T3953] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4809: group 2, free 16, pa_free 15 [ 71.671059][ T3964] REISERFS warning: read_super_block: reiserfs filesystem is deprecated and scheduled to be removed from the kernel in 2025 [ 71.692313][ T3964] REISERFS (device loop1): found reiserfs format "3.5" with non-standard journal [ 71.704318][ T3964] REISERFS (device loop1): using ordered data mode [ 71.712551][ T3964] reiserfs: using flush barriers [ 71.728244][ T2927] EXT4-fs error (device sda1): mb_free_blocks:1822: group 2, block 65568:freeing already freed block (bit 32); block bitmap corrupt. 17:56:30 executing program 4: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) 17:56:30 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) [ 71.778191][ T3964] REISERFS (device loop1): journal params: device loop1, size 15748, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 17:56:30 executing program 0: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) [ 71.907275][ T3969] EXT4-fs (sda1): pa ffff888051c0fe00: logic 0, phys. 161792, len 32 [ 71.915640][ T3969] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4809: group 4, free 16, pa_free 15 [ 71.926218][ T2927] EXT4-fs error (device sda1): mb_free_blocks:1822: group 4, block 161792:freeing already freed block (bit 30720); block bitmap corrupt. [ 71.972274][ T3964] REISERFS (device loop1): checking transaction log (loop1) [ 72.044175][ T3967] EXT4-fs (sda1): pa ffff88804e687e00: logic 0, phys. 229536, len 32 [ 72.052499][ T3967] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4809: group 7, free 16, pa_free 15 [ 72.062615][ T2927] EXT4-fs error (device sda1): mb_free_blocks:1822: group 7, block 229536:freeing already freed block (bit 160); block bitmap corrupt. 17:56:31 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) [ 72.096332][ T3975] EXT4-fs (sda1): pa ffff88804e687d20: logic 0, phys. 164000, len 32 [ 72.104724][ T3975] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4809: group 5, free 16, pa_free 15 [ 72.346345][ T3978] EXT4-fs (sda1): pa ffff88804e691e00: logic 0, phys. 59680, len 32 [ 72.354671][ T3978] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4809: group 1, free 16, pa_free 15 [ 72.443054][ T3982] EXT4-fs (sda1): pa ffff88806cded8c0: logic 0, phys. 200640, len 32 [ 74.107754][ T3964] REISERFS warning: reiserfs-5093 is_leaf: item entry count seems wrong *3.5*[1 2 0(1) DIR], item_len 35, item_location 4029, free_space(entry_count) 2 [ 74.123665][ T3964] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 15767. Fsck? [ 74.134789][ T3964] REISERFS (device loop1): Remounting filesystem read-only [ 74.142365][ T3964] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 74.157349][ T3964] REISERFS warning (device loop1): reiserfs_fill_super: corrupt root inode, run fsck 17:56:33 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="0040000068020000973d00001200000000000000843d00000001000073564d38e10000001e000000000000000010ec030200010052654973457233467300000001000000020001000000853d0100000003000000000000000000000000000000000000000000000000000000000000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00"/1984, 0x7c0, 0x11000}, {&(0x7f0000010900)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x800, 0x11800}, {&(0x7f0000011100)="0000000000000000000000001200000000000000843d00000001000073564d38e10000001e00"/64, 0x40, 0x3d96000}, {&(0x7f0000011200)="01000200750f0000000000000000000000000000000000000100000002000000000000000000000000002000e00f0000010000000200000001000000f401000002002300bd0f00"/96, 0x60, 0x3d97000}, {&(0x7f0000011300)="000000000000000000000000000000000000000000000000000000000001000000010000000200000022000400020000000000000001000000200004002e2e2eed4103005cf9535f230000003bc1655f3bc1655f3bc1655f01000000ffffffff", 0x60, 0x3d97fa0}], 0x0, &(0x7f0000011400)) 17:56:33 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) 17:56:33 executing program 4: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) 17:56:33 executing program 0: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="018000001febfca197ead7c7c3f8a793567abc7352ac752399c11859f806600ee44a433f3d5992402a7137d9fd1073ba66344007e7ab68ed023f4bdc98032bcfaa0d718b8276c3b6776a6374b49a7a4e7ed612db64a9872f94e1c6d112720d25ca0c300be9bc3e897fb8144845e65c8180ff6bbee93b799a38831e820200000000000000c2771bfea692621dfe48aa636a57fc5312c4c2f5652d88557f3a44faa031d5a326a40a2d1a8eca4f2ef2bfeee1cfec444719b3f394155dbc270801f18b6e7731c25fca7ba5411007776370270743bf649988a0470a7db4e4ef1add200c66477018520d3a21e639acddc1855608c875ca4a7b2d441e834e9347ab5fc9cb40ae78cb57810f11d0896b1f48538cd3e1b978fd6861c50b87669c7a7e8657ed889e2cef6428c5fd86ba95bf387a16be6023e576", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) 17:56:33 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) 17:56:33 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) [ 74.595373][ T2927] EXT4-fs error: 3 callbacks suppressed [ 74.595390][ T2927] EXT4-fs error (device sda1): mb_free_blocks:1822: group 6, block 200640:freeing already freed block (bit 4032); block bitmap corrupt. [ 74.640343][ T3698] EXT4-fs (sda1): Delayed block allocation failed for inode 1135 at logical offset 0 with max blocks 476 with error 28 [ 74.654778][ T3698] EXT4-fs (sda1): This should not happen!! Data will be lost [ 74.654778][ T3698] [ 74.665759][ T3698] EXT4-fs (sda1): Total free blocks count 0 [ 74.682395][ T3698] EXT4-fs (sda1): Free/Dirty block details [ 74.691821][ T3698] EXT4-fs (sda1): free_blocks=57360 [ 74.697298][ T3698] EXT4-fs (sda1): dirty_blocks=488 [ 74.705371][ T3698] EXT4-fs (sda1): Block reservation details [ 74.712032][ T3698] EXT4-fs (sda1): i_reserved_data_blocks=476 [ 74.728030][ T3999] EXT4-fs (sda1): Delayed block allocation failed for inode 1157 at logical offset 0 with max blocks 1 with error 28 [ 74.743676][ T3998] EXT4-fs (sda1): Delayed block allocation failed for inode 1154 at logical offset 0 with max blocks 11 with error 28 [ 75.247981][ T3610] syz-executor.4 (3610) used greatest stack depth: 22440 bytes left [ 75.362529][ T11] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 75.563107][ T11] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 75.699534][ T11] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 75.804781][ T11] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 76.053540][ T27] kauditd_printk_skb: 8 callbacks suppressed [ 76.053556][ T27] audit: type=1400 audit(1651341395.079:121): avc: denied { read } for pid=3175 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 76.164176][ T919] cfg80211: failed to load regulatory.db 17:56:35 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="0040000068020000973d00001200000000000000843d00000001000073564d38e10000001e000000000000000010ec030200010052654973457233467300000001000000020001000000853d0100000003000000000000000000000000000000000000000000000000000000000000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00"/1984, 0x7c0, 0x11000}, {&(0x7f0000010900)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x800, 0x11800}, {&(0x7f0000011100)="0000000000000000000000001200000000000000843d00000001000073564d38e10000001e00"/64, 0x40, 0x3d96000}, {&(0x7f0000011200)="01000200750f0000000000000000000000000000000000000100000002000000000000000000000000002000e00f0000010000000200000001000000f401000002002300bd0f00"/96, 0x60, 0x3d97000}, {&(0x7f0000011300)="000000000000000000000000000000000000000000000000000000000001000000010000000200000022000400020000000000000001000000200004002e2e2eed4103005cf9535f230000003bc1655f3bc1655f3bc1655f01000000ffffffff", 0x60, 0x3d97fa0}], 0x0, &(0x7f0000011400)) 17:56:36 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="018000001febfca197ead7c7c3f8a793567abc7352ac752399c11859f806600ee44a433f3d5992402a7137d9fd1073ba66344007e7ab68ed023f4bdc98032bcfaa0d718b8276c3b6776a6374b49a7a4e7ed612db64a9872f94e1c6d112720d25ca0c300be9bc3e897fb8144845e65c8180ff6bbee93b799a38831e820200000000000000c2771bfea692621dfe48aa636a57fc5312c4c2f5652d88557f3a44faa031d5a326a40a2d1a8eca4f2ef2bfeee1cfec444719b3f394155dbc270801f18b6e7731c25fca7ba5411007776370270743bf649988a0470a7db4e4ef1add200c66477018520d3a21e639acddc1855608c875ca4a7b2d441e834e9347ab5fc9cb40ae78cb57810f11d0896b1f48538cd3e1b978fd6861c50b87669c7a7e8657ed889e2cef6428c5fd86ba95bf387a16be6023e576", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) 17:56:36 executing program 4: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="018000001febfca197ead7c7c3f8a793567abc7352ac752399c11859f806600ee44a433f3d5992402a7137d9fd1073ba66344007e7ab68ed023f4bdc98032bcfaa0d718b8276c3b6776a6374b49a7a4e7ed612db64a9872f94e1c6d112720d25ca0c300be9bc3e897fb8144845e65c8180ff6bbee93b799a38831e820200000000000000c2771bfea692621dfe48aa636a57fc5312c4c2f5652d88557f3a44faa031d5a326a40a2d1a8eca4f2ef2bfeee1cfec444719b3f394155dbc270801f18b6e7731c25fca7ba5411007776370270743bf649988a0470a7db4e4ef1add200c66477018520d3a21e639acddc1855608c875ca4a7b2d441e834e9347ab5fc9cb40ae78cb57810f11d0896b1f48538cd3e1b978fd6861c50b87669c7a7e8657ed889e2cef6428c5fd86ba95bf387a16be6023e576", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) 17:56:36 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) 17:56:36 executing program 0: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) 17:56:36 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000ffdbdf2541000020080000007063690011000200303030000d0087006c325f64726f707300000000450a01006e657464657673696d0040000f0002006e657464657673696d0900000d0096006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000066a6dd2622651e953a6d955b63251368ca1f11ec153716c8920ea1ab28ce"], 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x27, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x80, 0x0, 0x3}, 0x7}}, 0x18) timerfd_gettime(0xffffffffffffffff, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x50) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x10d) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x480880, 0x0) flock(r4, 0xe) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x8028, 0x0, 0x0, 0x4}) creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x20, 0xffff, 0x7fff) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002080)={0x0, [], 0x0, "a59f7995f969f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049640)={0x0, [], 0x0, "a9eae26e5591e4"}) [ 78.255505][ T11] device hsr_slave_0 left promiscuous mode [ 78.269906][ T11] device hsr_slave_1 left promiscuous mode [ 78.277739][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 78.295025][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 78.308479][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 78.326912][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 78.338129][ T11] device bridge_slave_1 left promiscuous mode [ 78.353697][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.388287][ T11] device bridge_slave_0 left promiscuous mode [ 78.398700][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.445599][ T11] device veth1_macvtap left promiscuous mode [ 78.459060][ T11] device veth0_macvtap left promiscuous mode [ 78.466433][ T11] device veth1_vlan left promiscuous mode [ 78.486561][ T11] device veth0_vlan left promiscuous mode [ 78.692629][ T11] team0 (unregistering): Port device team_slave_1 removed [ 78.705010][ T11] team0 (unregistering): Port device team_slave_0 removed [ 78.723616][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 78.744386][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 78.827956][ T11] bond0 (unregistering): Released all slaves [ 79.340372][ T11] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 79.416899][ T11] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 79.487351][ T11] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 79.546337][ T11] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 79.706814][ T11] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 79.752419][ T11] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 79.838512][ T11] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 79.933218][ T11] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.170357][ T11] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.255040][ T11] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.328280][ T11] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.384588][ T11] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.645388][ T11] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.702505][ T11] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.766572][ T11] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.825151][ T11] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 81.065829][ T11] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 81.117684][ T11] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 81.158429][ T11] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 81.227385][ T11] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 83.436686][ T11] device hsr_slave_0 left promiscuous mode [ 83.445681][ T11] device hsr_slave_1 left promiscuous mode [ 83.459408][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 83.466827][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 83.483983][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 83.496721][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 83.509144][ T11] device bridge_slave_1 left promiscuous mode [ 83.515388][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.532940][ T11] device bridge_slave_0 left promiscuous mode [ 83.543794][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.564365][ T11] device hsr_slave_0 left promiscuous mode [ 83.596915][ T11] device hsr_slave_1 left promiscuous mode [ 83.615229][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 83.622785][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 83.639220][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 83.646641][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 83.663475][ T11] device bridge_slave_1 left promiscuous mode [ 83.673974][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.692675][ T11] device bridge_slave_0 left promiscuous mode [ 83.699156][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.711045][ T11] device hsr_slave_0 left promiscuous mode [ 83.717345][ T11] device hsr_slave_1 left promiscuous mode [ 83.724438][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 83.732234][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 83.741854][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 83.749489][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 83.757926][ T11] device bridge_slave_1 left promiscuous mode [ 83.764570][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.776994][ T11] device bridge_slave_0 left promiscuous mode [ 83.783397][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.797714][ T11] device hsr_slave_0 left promiscuous mode [ 83.804128][ T11] device hsr_slave_1 left promiscuous mode [ 83.810772][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 83.818185][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 83.830556][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 83.838051][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 83.849582][ T11] device bridge_slave_1 left promiscuous mode [ 83.855876][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.865065][ T11] device bridge_slave_0 left promiscuous mode [ 83.876586][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.890157][ T11] device hsr_slave_0 left promiscuous mode [ 83.896840][ T11] device hsr_slave_1 left promiscuous mode [ 83.903957][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 83.911843][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 83.921954][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 83.929599][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 83.937949][ T11] device bridge_slave_1 left promiscuous mode [ 83.944274][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.957381][ T11] device bridge_slave_0 left promiscuous mode [ 83.963902][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.984803][ T11] device veth1_macvtap left promiscuous mode [ 83.994770][ T11] device veth0_macvtap left promiscuous mode [ 84.001201][ T11] device veth1_vlan left promiscuous mode [ 84.007200][ T11] device veth0_vlan left promiscuous mode [ 84.019536][ T11] device veth1_macvtap left promiscuous mode [ 84.025595][ T11] device veth0_macvtap left promiscuous mode [ 84.037761][ T11] device veth1_vlan left promiscuous mode [ 84.043952][ T11] device veth0_vlan left promiscuous mode [ 84.052387][ T11] device veth1_macvtap left promiscuous mode [ 84.060419][ T11] device veth0_macvtap left promiscuous mode [ 84.066652][ T11] device veth1_vlan left promiscuous mode [ 84.072553][ T11] device veth0_vlan left promiscuous mode [ 84.080384][ T11] device veth1_macvtap left promiscuous mode [ 84.086432][ T11] device veth0_macvtap left promiscuous mode [ 84.096382][ T11] device veth1_vlan left promiscuous mode [ 84.105407][ T11] device veth0_vlan left promiscuous mode [ 84.124907][ T11] device veth1_macvtap left promiscuous mode [ 84.131375][ T11] device veth0_macvtap left promiscuous mode [ 84.137496][ T11] device veth1_vlan left promiscuous mode [ 84.143830][ T11] device veth0_vlan left promiscuous mode [ 84.707930][ T11] team0 (unregistering): Port device team_slave_1 removed [ 84.723350][ T11] team0 (unregistering): Port device team_slave_0 removed [ 84.735608][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 84.752414][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 84.814284][ T11] bond0 (unregistering): Released all slaves [ 84.980951][ T11] team0 (unregistering): Port device team_slave_1 removed [ 84.996539][ T11] team0 (unregistering): Port device team_slave_0 removed [ 85.008070][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 85.024094][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 85.083977][ T11] bond0 (unregistering): Released all slaves [ 85.228288][ T11] team0 (unregistering): Port device team_slave_1 removed [ 85.244136][ T11] team0 (unregistering): Port device team_slave_0 removed [ 85.255250][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 85.270477][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 85.373252][ T11] bond0 (unregistering): Released all slaves [ 85.536029][ T11] team0 (unregistering): Port device team_slave_1 removed [ 85.548418][ T11] team0 (unregistering): Port device team_slave_0 removed [ 85.564618][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 85.578798][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 85.638394][ T11] bond0 (unregistering): Released all slaves [ 85.769132][ T11] team0 (unregistering): Port device team_slave_1 removed [ 85.782952][ T11] team0 (unregistering): Port device team_slave_0 removed [ 85.793994][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 85.808043][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 85.872088][ T11] bond0 (unregistering): Released all slaves 2022/04/30 17:56:49 SYZFATAL: executor 3 failed 11 times: failed to start executor binary: fork/exec /root/syz-executor.3: exec format error