last executing test programs: 4.972171947s ago: executing program 2 (id=2836): r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x65, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r6}]}, 0x3c}}, 0x8000) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)='%-010d \x00'}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) execveat$binfmt(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r8 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x1c5042, 0x12) write(r9, &(0x7f0000004200)='t', 0x1) sendfile(r9, r8, 0x0, 0x3ffff) sendfile(r9, r8, 0x0, 0x7ffff000) 4.079099744s ago: executing program 2 (id=2849): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb904, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000040000000160a03000000000000000000010000000900010073797a30000000000900020073797a300000000014000380080001400000000008000240000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f68737200000000140001007465616d30"], 0xe4}}, 0x0) 3.942870557s ago: executing program 2 (id=2852): perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0xa}, 0x45ff5eb5c5b446aa, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x77, 0x101301) ioctl$USBDEVFS_CONNECTINFO(r0, 0x8004550f, 0x0) 3.888871128s ago: executing program 2 (id=2854): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1600000000000000040000000500000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYBLOB], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) r6 = getgid() close(0xffffffffffffffff) lchown(&(0x7f0000000300)='./file0\x00', 0x0, r6) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0), 0x1, 0x4fa, &(0x7f00000005c0)="$eJzs3c9vG1kdAPCvnThx0uwmu+wBEOyW3YWCqjqJuxut9gDLCSFUCdEjSG1I3CiKHUexU5rQQ3rmikQlTnDkD+DcE3cuCG5cygGJHxGoQeLg1YwnqZvaTdQkdhR/PtJo3ps39fe9pvNe/U3iF8DQuhoRuxExFhF3I2I6u57LjvisfST3Pdt7uLS/93ApF63W7X/l0vbkWnT8mcSV7DWLEfGj70X8NPdy3Mb2ztpitVrZzOqzzdrGbGN758ZqbXGlslJZL5cX5hfmPrn5cfnMxvpebSwrffXpH3e/9fOkW1PZlc5xnKX20AuHcRKjEfGD8wg2ACPZeMYG3RFeSz4i3o6I99PnfzpG0q8mAHCZtVrT0ZrurAMAl10+zYHl8qUsFzAV+Xyp1M7hvROT+Wq90bx+r761vtzOlc1EIX9vtVqZy3KFM1HIJfX5tPy8Xj5SvxkRb0XEL8cn0nppqV5dHuR/fABgiF05sv7/d7y9/gMAl1xx0B0AAPrO+g8Aw8f6DwDDx/oPAMOnvf5PDLobAEAfef8PAMPH+g8AQ+WHt24lR2s/+/zr5fvbW2v1+zeWK421Um1rqbRU39wordTrK+ln9tSOe71qvb4x/1FsPZj59kajOdvY3rlTq2+tN++kn+t9p1JI79rtw8gAgF7eeu/JX3LJivzpRHpEx14OhYH2DDhv+UF3ABiYkUF3ABgYu33B8DrFe3zpAbgkumzR+4Jit18QarVarfPrEnDOrn1J/h+GVUf+308Bw5CR/4fhJf8Pw6vVyp10z/846Y0AwMUmxw/0+P7/29n5d9k3B36yfPSOx+fZKwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALjYDvb/LWV7gU9FPl8qRbwRETNRyN1brVbmIuLNiPjzeGE8qc8PuM8AwGnl/57L9v+6Nv3h1AtN7145LI5FxM9+fftXDxabzc0/RYzl/j1+cL35OLte7n/vAYDjHazT6bnjjfyzvYdLB0c/+/OP70ZEsR1/f28s9g/jj8Zoei5GISIm/5PL6m25jtzFaew+iogvdht/LqbSHEh759Oj8ZPYb/Q1fv6F+Pm0rX1O/i6+cAZ9gWHzJJl/Puv2/OXjanru/vwX0xnq9LL5L3mppf10Dnwe/2D+G+kx/109aYyP/vD9dmni5bZHEV8ejTiIvd8x/xzEz/WI/+EJ4//1K+++36ut9ZuIa9E9fmes2WZtY7axvXNjtba4UlmprJfLC/MLc5/c/Lg8m+aoZ3uvBv/89PqbvdqS8U/2iF88ZvxfP+H4f/v/uz/+2ivif/ODbvHz8c4r4idr4jdOGH9x8vfFXm1J/OUe4z/u63/9hPGf/m3npW3DAYDBaWzvrC1Wq5VNBYWLX0j+yV6AbnQtfKdfscaie9MvPmg/00eaWq3XitVrxjiLrBtwERw+9BHxv0F3BgAAAAAAAAAAAAAA6Kofv7E06DECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABweX0eAAD//19xzyM=") io_setup(0x7f, 0x0) io_submit(0x0, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24040004}, 0x40044) rt_sigqueueinfo(r0, 0x17, &(0x7f0000000340)={0x33, 0x1, 0xfffffff7}) syz_open_procfs(0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 1.239426567s ago: executing program 1 (id=2938): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x1, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x30, 0x2, 0x0, 0xbffff00c}, {0x6}]}, 0x10) syz_emit_ethernet(0x8b, &(0x7f0000000380)=ANY=[], 0x0) 1.156305239s ago: executing program 1 (id=2942): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sys_enter\x00', r1}, 0x10) sysinfo(&(0x7f0000000540)=""/79) 1.107884959s ago: executing program 0 (id=2945): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x1, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) mq_notify(0xffffffffffffffff, 0x0) 1.10723317s ago: executing program 1 (id=2946): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000380), 0x1, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f000001a240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r1, @ANYBLOB="00000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000aedbe0ba0500000004000000000000000000000000000000000000003e578f4067038b44d885d4ac006dd008d48b98954d6e0740bb564a2109171fae9138fcb92bcac3c126f0f0fc29e007c60c91f6b3e70924bca2e5af4ba3fe1149920858207a85b35369c03a0dbd999a7bd4d632b454203a5394908ec60f2a1dee277068243edeffa847a5e081f908c0ded2edefed5217fc6ea22e3814f122538d704908cfc8f4db"], 0x50) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r3, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') ioctl$RTC_WIE_OFF(r3, 0x7010) pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r2, 0x20, &(0x7f0000000680)={&(0x7f0000000580)=""/128, 0x80, 0x0, &(0x7f0000000600)=""/100, 0x64}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x14, 0xd, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000200000000000000fcffffff18110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000ff5f030006000000d95af0ffffffffff18110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70200000000000085000000861000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @lirc_mode2=0x10, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0x6, 0x4, 0x3}, 0x10, r5, r2, 0x1, &(0x7f0000000a80)=[r4, r1, r3], &(0x7f0000000140)=[{0x3, 0x5, 0x9, 0x2}], 0x10, 0x8, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x300000c, 0x51031, 0xffffffffffffffff, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_NAME(0xf, &(0x7f0000000680)='+}[@\x00[$oB\xfa=\xee\xc4F\xba\xed\x97') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) io_pgetevents(0x0, 0x3, 0x0, &(0x7f00000002c0), &(0x7f00000004c0)={0x77359400}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x520, 0x340, 0x25, 0x148, 0x0, 0x60, 0x488, 0x2a8, 0x2a8, 0x488, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x0, 0x0, 0x9, 0x0, 0x80ffffff, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@set={{0x40}}, @common=@unspec=@statistic={{0x38}}]}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x580) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0xe, 0x9f, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, 0xffffffffffffffff, 0xaac8c000) 579.97073ms ago: executing program 0 (id=2956): r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='kfree\x00', r1, 0x0, 0x2000000001}, 0x18) write$selinux_validatetrans(r0, &(0x7f0000000340)={'system_u:object_r:iptables_conf_t:s0', 0x20, 'system_u:object_r:shell_exec_t:s0', 0x20, 0x8, 0x20, 'unconfined\x00'}, 0x67) 525.000951ms ago: executing program 0 (id=2958): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x28, 0x8, 0x0, 0xfffff034}, {0x80000006, 0x0, 0x9, 0x3ff}]}, 0x10) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000080)="b1", 0x1, 0x400c0d4, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) 504.693641ms ago: executing program 4 (id=2960): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000026cb0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 440.281032ms ago: executing program 4 (id=2961): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x4, @perf_config_ext={0xf60, 0x40ffffffff}, 0x1100, 0x5, 0x3a63, 0x5, 0x0, 0x5, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) timer_settime(0x0, 0x1, 0x0, 0x0) futex_waitv(&(0x7f0000001080)=[{0x3, 0x0, 0x82}], 0x1, 0x0, 0x0, 0x1) 439.853822ms ago: executing program 0 (id=2962): r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x7c42273793ca46ce) getdents(r0, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, 0x0, 0xf00) 439.620172ms ago: executing program 0 (id=2963): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sys_enter\x00', r1}, 0x10) nanosleep(&(0x7f0000000000)={0x0, 0x3938700}, 0x0) 438.188692ms ago: executing program 4 (id=2964): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000280)=@IORING_OP_SHUTDOWN={0x22, 0x13, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x4d48, 0x0, 0x0, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="b4050000200080066110000000000000c6000000000000009500d800000000009f33ef60916e55893f1eeb0b2ae13d922e6235592ce847e2566c43d72918a897323fd0723043c47c896ce0bce66a245ad9d6817fd98cd824498949714ffaac8a6f77ef0000ca5d82054d54d53cd2b6db714e75d9bdae214fa68a0557eb2c5ca683a4b6fcfcff0bffffffffffd47042eaebfa6fa26fa7a347c7faa8e700458c60897d4a6148a1c11428427c40de60beacf871ab5c2ff88a02084e5b5271e45f00003826fb8579c1fb01d2c5553d2ccb5fc5b51fe6b174ebd9907dcff414ed55b0c20cdbe7009a6fe7cc78762f1d4dcdbca64920db9a50f86c21632f7a4bd344e0bd74ff05d37ef68e3b9db863c758ffffffffabe90ac5d08dd9d4e0359c41cf3626e1230bc1cd4c02c460ceb44276e9bd94d1c2e6d17dc5c2edf332a62f5fe68fbbbbfcfd00000000000fbf940e6652d357474ed5f816f66ac3027460ae66317f83cdd7a7eb2a7003d1a6cf5478533584961c329fcf5a43e05c92bfef0dcd28000000003f2915a3039c9a78f63b8ec7e60a0000fed7d67c440e23d130e51eea1e085bebabe7059de9cbfc5117c024185a062acb6b8eec31c21b3af8b9eedb4660ed2deb7acf2a33a376a5cb7d4266d5b0be14488d14b473502486ad8dd600000000000000000000c7766ea7c581782c0d90f42a85303835fc291c25d29e6bead5d7360f2e1929d7736ebc8558c4506407d3046022bdf25485bd5442169e9b4c1278343581b7a06f65e8ea6b042c4fd08381e5000000000000006398d6480000001a723b91030000006480304c66b217aea0156ce9eef911fe5b7370f79987303ecb3aabc53c60014a0101ab766754f596b41da9534d12b8306a1b36cf3b03f0d790879f523eabfbee83d8bd472ef69660cf6ec897106c51e54a17497f384c4956b41f3843e7c878b1e11316d8ddae1c6c3b85aaf7a9fcaf8f5d6186c42542d68ba72682c938d3c0a2e6e10eed71b1d31c9f300b41745329bf34495c63e43fb896e4903fb0fae54a8f0fe3b48a5b29d279070647e65097c8ecf32a15080000000000000001007ba4a70a084bd994ac5e00000000000000000000000000351a30cd97f83d72631d0fe92efa974a53f4dc1eb9a86df632a6d463688123f64d42a919bcfc44a90ffd680200000091f842a91c977f6075d07e39e669b0713af0498a99bf5261cb3269d499a5202d7a08b33ade7b38829b9bd39619688d5e9af22170ef83e5b92cbb32b655c45de1c154aad81bf64351668a3f76d5afa958aff76249e0ffdf8e45155536a1a44bfcbfbfd232af000052f9002a"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB="05"], 0x10) close(r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r11, 0x0, 0x10000000006}, 0x18) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 349.503424ms ago: executing program 0 (id=2966): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x65, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, 0x0, 0x8000) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)='%-010d \x00'}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x10) execveat$binfmt(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x1c5042, 0x12) write(r8, &(0x7f0000004200)='t', 0x1) sendfile(r8, r7, 0x0, 0x3ffff) sendfile(r8, r7, 0x0, 0x7ffff000) 276.313135ms ago: executing program 3 (id=2967): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000c5000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000fbb703000000e31f008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000c00)='sys_enter\x00', r1}, 0x10) modify_ldt$write(0x1, 0x0, 0x0) 241.248516ms ago: executing program 3 (id=2968): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'netpci0\x00', 0x2}) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="e3b0c923"]) 237.659126ms ago: executing program 1 (id=2969): r0 = socket$kcm(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000200)={'wg1\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000001540)={@mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, 0x5, 0x5, 0x3, 0x500, 0x4, 0x80050102, r2}) 135.272178ms ago: executing program 4 (id=2970): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)=@newtaction={0x2c4, 0x30, 0x300, 0x71bd2a, 0x25dfdbff, {}, [{0x2b0, 0x1, [@m_gact={0x280, 0x110, 0x0, 0x0, {{0x9}, {0x4}, {0x251, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}, @m_bpf={0x2c, 0xa, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}]}]}, 0x2c4}}, 0x20040800) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x334}, {&(0x7f00000007c0)=""/154, 0x2c}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 134.301278ms ago: executing program 1 (id=2971): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d80)={&(0x7f0000000180)='kfree\x00', r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) 133.560348ms ago: executing program 3 (id=2972): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000086d7c0d6c878f0", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c"], 0x48}}, 0x0) 110.524008ms ago: executing program 2 (id=2973): r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000008000000000000000000004850000006d00000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x128000, 0x800}, 0x20) 101.376648ms ago: executing program 4 (id=2974): r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bind$packet(r0, &(0x7f0000000080)={0x11, 0x9, 0x0, 0x1, 0x6, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) 36.32592ms ago: executing program 3 (id=2975): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_user(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='system_u:object_r:auth_cache_t '], 0x27) 35.94992ms ago: executing program 2 (id=2976): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x48, 0x8, 0xfe, 0x9}, {0x6, 0x0, 0x0, 0x8eb6}]}) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000700)="38bf", 0x2}], 0x1) 35.00283ms ago: executing program 4 (id=2977): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0xfffffffffffffdd0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000200)="df33c9f7b9a60000000000000000", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 28.18246ms ago: executing program 3 (id=2978): iopl(0x3) unshare(0x2c020400) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) flistxattr(r0, 0x0, 0x0) 18.83855ms ago: executing program 1 (id=2979): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x1, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) getrlimit(0x4, 0x0) 0s ago: executing program 3 (id=2980): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) unshare(0x24060400) r2 = syz_io_uring_setup(0x1725, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400002, 0x3a6}, &(0x7f0000000040)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x9381, 0x80, 0x7ffff, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000280)=@IORING_OP_SHUTDOWN={0x22, 0x13, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x4d48, 0x0, 0x0, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB="05"], 0x10) close(r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r8}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x0, &(0x7f0000000200)=0x1, 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000480)='mm_page_alloc\x00', r11, 0x0, 0x10000000006}, 0x18) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) close_range(r10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="89000000120081ae08060cdc016b3f087f03e3520000000000e2ffca1b1f000000000cc00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120800030004010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) kernel console output (not intermixed with test programs): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 105.014674][ T5821] ext4 filesystem being mounted at /73/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 105.571436][ T5864] netlink: 24 bytes leftover after parsing attributes in process `syz.2.372'. [ 105.583451][ T5864] netlink: 'syz.2.372': attribute type 13 has an invalid length. [ 105.772962][ T5870] syzkaller0: entered allmulticast mode [ 105.793796][ T5870] syzkaller0: entered promiscuous mode [ 105.804042][ T5870] syzkaller0 (unregistering): left promiscuous mode [ 105.810775][ T5870] syzkaller0 (unregistering): left allmulticast mode [ 105.988676][ T5874] loop0: detected capacity change from 0 to 512 [ 106.003272][ T5874] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 106.059589][ T5874] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 106.079606][ T5876] netlink: 12 bytes leftover after parsing attributes in process `syz.4.377'. [ 106.100824][ T5876] netlink: 36 bytes leftover after parsing attributes in process `syz.4.377'. [ 106.124137][ T5874] ext4 filesystem being mounted at /63/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 106.171298][ T5874] netlink: 24 bytes leftover after parsing attributes in process `syz.0.376'. [ 106.226042][ T5874] netlink: 'syz.0.376': attribute type 13 has an invalid length. [ 106.330111][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 106.485709][ T5888] loop0: detected capacity change from 0 to 1024 [ 106.517582][ T5888] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 106.542426][ T5888] ext4 filesystem being mounted at /64/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 106.627992][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 106.658617][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 106.711168][ T5904] loop0: detected capacity change from 0 to 512 [ 106.715083][ T5903] loop3: detected capacity change from 0 to 512 [ 106.727444][ T5904] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 106.757017][ T5903] EXT4-fs (loop3): orphan cleanup on readonly fs [ 106.788418][ T5903] EXT4-fs error (device loop3): ext4_orphan_get:1417: comm syz.3.383: bad orphan inode 13 [ 106.802089][ T5904] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 106.826294][ T5903] ext4_test_bit(bit=12, block=18) = 1 [ 106.832152][ T5903] is_bad_inode(inode)=0 [ 106.836466][ T5903] NEXT_ORPHAN(inode)=2130706432 [ 106.841674][ T5903] max_ino=32 [ 106.844891][ T5903] i_nlink=1 [ 106.856549][ T5904] ext4 filesystem being mounted at /65/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 106.872629][ T5904] netlink: 24 bytes leftover after parsing attributes in process `syz.0.384'. [ 106.879646][ T5903] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 106.907725][ T5904] netlink: 'syz.0.384': attribute type 13 has an invalid length. [ 106.988368][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 107.018202][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 107.041461][ T5914] syzkaller0: entered allmulticast mode [ 107.049187][ T5914] syzkaller0: entered promiscuous mode [ 107.057023][ T5914] syzkaller0 (unregistering): left promiscuous mode [ 107.063959][ T5914] syzkaller0 (unregistering): left allmulticast mode [ 107.133028][ T29] kauditd_printk_skb: 311 callbacks suppressed [ 107.133048][ T29] audit: type=1400 audit(1747172858.396:4166): avc: denied { create } for pid=5915 comm="syz.0.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 107.264482][ T29] audit: type=1400 audit(1747172858.426:4167): avc: denied { read } for pid=5915 comm="syz.0.386" dev="nsfs" ino=4026532678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 107.288427][ T29] audit: type=1400 audit(1747172858.426:4168): avc: denied { open } for pid=5915 comm="syz.0.386" path="net:[4026532678]" dev="nsfs" ino=4026532678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 107.313575][ T29] audit: type=1400 audit(1747172858.426:4169): avc: denied { create } for pid=5915 comm="syz.0.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 107.327635][ T5924] netlink: 24 bytes leftover after parsing attributes in process `syz.2.390'. [ 107.336196][ T29] audit: type=1400 audit(1747172858.426:4170): avc: denied { execmem } for pid=5917 comm="syz.4.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 107.366007][ T29] audit: type=1400 audit(1747172858.506:4171): avc: denied { allowed } for pid=5919 comm="gtp" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 107.377589][ T5927] netlink: 'syz.2.390': attribute type 13 has an invalid length. [ 107.386797][ T29] audit: type=1400 audit(1747172858.506:4172): avc: denied { create } for pid=5919 comm="gtp" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 107.418719][ T29] audit: type=1400 audit(1747172858.506:4173): avc: denied { map } for pid=5919 comm="gtp" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11309 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 107.444786][ T29] audit: type=1400 audit(1747172858.506:4174): avc: denied { read write } for pid=5919 comm="gtp" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11309 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 107.444837][ T29] audit: type=1400 audit(1747172858.516:4175): avc: denied { create } for pid=5919 comm="gtp" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 107.648651][ T5921] team0 (unregistering): Port device team_slave_0 removed [ 107.679068][ T5921] team0 (unregistering): Port device team_slave_1 removed [ 107.770662][ T5937] loop3: detected capacity change from 0 to 164 [ 107.781411][ T5937] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 107.801327][ T5918] lo speed is unknown, defaulting to 1000 [ 107.838510][ T5918] dummy0 speed is unknown, defaulting to 1000 [ 107.875075][ T5932] pim6reg: entered allmulticast mode [ 107.950619][ T5942] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 107.960239][ T5942] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 107.961698][ T5943] netlink: 'syz.3.393': attribute type 9 has an invalid length. [ 108.005843][ T5917] pim6reg: left allmulticast mode [ 108.078550][ T5945] loop0: detected capacity change from 0 to 512 [ 108.134486][ T5945] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 108.149207][ T5945] ext4 filesystem being mounted at /68/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 109.033599][ T5956] loop3: detected capacity change from 0 to 512 [ 109.041332][ T5956] EXT4-fs: Ignoring removed mblk_io_submit option [ 109.049744][ T5956] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 109.079085][ T5956] EXT4-fs (loop3): 1 truncate cleaned up [ 109.087737][ T5956] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 109.135956][ T5948] IPVS: Error connecting to the multicast addr [ 109.160339][ T5954] lo speed is unknown, defaulting to 1000 [ 109.204311][ T5954] dummy0 speed is unknown, defaulting to 1000 [ 109.702961][ T5963] __nla_validate_parse: 3 callbacks suppressed [ 109.703039][ T5963] netlink: 24 bytes leftover after parsing attributes in process `syz.1.397'. [ 110.410294][ T5963] netlink: 'syz.1.397': attribute type 13 has an invalid length. [ 110.431312][ T5967] lo speed is unknown, defaulting to 1000 [ 110.467411][ T5967] dummy0 speed is unknown, defaulting to 1000 [ 110.587510][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 110.629332][ T5971] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 110.639318][ T5973] syzkaller0: entered allmulticast mode [ 110.645590][ T5973] syzkaller0: entered promiscuous mode [ 110.651617][ T5971] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 110.669897][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 110.680125][ T5973] syzkaller0 (unregistering): left promiscuous mode [ 110.687456][ T5973] syzkaller0 (unregistering): left allmulticast mode [ 110.700162][ T5971] IPVS: set_ctl: invalid protocol: 135 100.1.1.0:20000 [ 110.915898][ T5983] loop3: detected capacity change from 0 to 512 [ 110.942577][ T5983] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 110.982071][ T5985] loop0: detected capacity change from 0 to 128 [ 111.002841][ T5983] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 111.025909][ T5985] FAT-fs (loop0): Directory bread(block 162) failed [ 111.052213][ T5983] ext4 filesystem being mounted at /80/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 111.056525][ T5985] FAT-fs (loop0): Directory bread(block 163) failed [ 111.065629][ T5983] netlink: 24 bytes leftover after parsing attributes in process `syz.3.405'. [ 111.085215][ T5983] netlink: 'syz.3.405': attribute type 13 has an invalid length. [ 111.107443][ T5985] FAT-fs (loop0): Directory bread(block 164) failed [ 111.114107][ T5985] FAT-fs (loop0): Directory bread(block 165) failed [ 111.128680][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 111.141846][ T5985] FAT-fs (loop0): Directory bread(block 166) failed [ 111.148972][ T5985] FAT-fs (loop0): Directory bread(block 167) failed [ 111.156303][ T5985] FAT-fs (loop0): Directory bread(block 168) failed [ 111.162270][ T5990] x_tables: duplicate entry at hook 1 [ 111.164059][ T5985] FAT-fs (loop0): Directory bread(block 169) failed [ 111.177893][ T5992] binfmt_misc: register: failed to install interpreter file ./file2 [ 111.195287][ T5985] FAT-fs (loop0): Directory bread(block 162) failed [ 111.204092][ T5985] FAT-fs (loop0): Directory bread(block 163) failed [ 111.212048][ T5985] bio_check_eod: 15635 callbacks suppressed [ 111.212098][ T5985] syz.0.406: attempt to access beyond end of device [ 111.212098][ T5985] loop0: rw=3, sector=226, nr_sectors = 6 limit=128 [ 111.232943][ T5985] syz.0.406: attempt to access beyond end of device [ 111.232943][ T5985] loop0: rw=2051, sector=232, nr_sectors = 2 limit=128 [ 111.254360][ T5995] syz.0.406: attempt to access beyond end of device [ 111.254360][ T5995] loop0: rw=3, sector=234, nr_sectors = 6 limit=128 [ 111.273752][ T5995] syz.0.406: attempt to access beyond end of device [ 111.273752][ T5995] loop0: rw=2051, sector=240, nr_sectors = 2 limit=128 [ 111.353258][ T6003] netlink: 24 bytes leftover after parsing attributes in process `syz.4.412'. [ 111.375493][ T6001] SELinux: ebitmap start bit (1728054080) is beyond the end of the bitmap (1472) [ 111.386028][ T6001] SELinux: failed to load policy [ 111.440291][ T6003] netlink: 'syz.4.412': attribute type 13 has an invalid length. [ 111.505316][ T6014] syz!: rxe_newlink: already configured on team_slave_0 [ 111.664924][ T6019] syzkaller0: entered allmulticast mode [ 111.700455][ T6019] syzkaller0: entered promiscuous mode [ 111.717624][ T6019] syzkaller0 (unregistering): left promiscuous mode [ 111.724610][ T6019] syzkaller0 (unregistering): left allmulticast mode [ 111.778341][ T6021] syzkaller0: entered allmulticast mode [ 111.784855][ T6022] syzkaller0: entered promiscuous mode [ 111.838043][ T6021] syzkaller0 (unregistering): left promiscuous mode [ 111.845602][ T6021] syzkaller0 (unregistering): left allmulticast mode [ 111.923167][ T6024] loop0: detected capacity change from 0 to 512 [ 111.930863][ T6024] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 111.949073][ T6024] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 111.964097][ T6024] ext4 filesystem being mounted at /73/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 111.984249][ T6024] netlink: 24 bytes leftover after parsing attributes in process `syz.0.419'. [ 112.009497][ T6024] netlink: 'syz.0.419': attribute type 13 has an invalid length. [ 112.055198][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 112.149206][ T29] kauditd_printk_skb: 269 callbacks suppressed [ 112.149225][ T29] audit: type=1400 audit(1747172863.416:4445): avc: denied { create } for pid=6028 comm="syz.4.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 112.181282][ T29] audit: type=1400 audit(1747172863.446:4446): avc: denied { bind } for pid=6028 comm="syz.4.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 112.202022][ T29] audit: type=1400 audit(1747172863.446:4447): avc: denied { write } for pid=6028 comm="syz.4.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 112.305824][ T29] audit: type=1400 audit(1747172863.566:4448): avc: denied { block_suspend } for pid=6028 comm="syz.4.420" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 112.407401][ T29] audit: type=1400 audit(1747172863.676:4449): avc: denied { setopt } for pid=6032 comm="syz.0.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 112.638746][ T29] audit: type=1400 audit(1747172863.896:4450): avc: denied { create } for pid=6035 comm="syz.3.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 112.668487][ T6039] loop0: detected capacity change from 0 to 512 [ 112.700619][ T6039] EXT4-fs (loop0): orphan cleanup on readonly fs [ 112.729172][ T6039] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz.0.422: bad orphan inode 13 [ 112.766840][ T29] audit: type=1400 audit(1747172863.936:4451): avc: denied { name_bind } for pid=6035 comm="syz.3.424" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 112.789843][ T29] audit: type=1400 audit(1747172863.936:4452): avc: denied { node_bind } for pid=6035 comm="syz.3.424" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 112.848367][ T6039] ext4_test_bit(bit=12, block=18) = 1 [ 112.853935][ T6039] is_bad_inode(inode)=0 [ 112.858177][ T6039] NEXT_ORPHAN(inode)=2130706432 [ 112.863186][ T6039] max_ino=32 [ 112.866486][ T6039] i_nlink=1 [ 112.925225][ T6039] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 113.016849][ T29] audit: type=1400 audit(1747172864.276:4453): avc: denied { write } for pid=6038 comm="syz.1.423" name="mcfilter" dev="proc" ino=4026532538 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 113.052204][ T29] audit: type=1400 audit(1747172864.316:4454): avc: denied { execute } for pid=6037 comm="syz.0.422" name="file2" dev="loop0" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 113.119462][ T6040] SELinux: policydb version 0 does not match my version range 15-34 [ 113.140204][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 113.150575][ T6040] SELinux: failed to load policy [ 113.176414][ T6050] netlink: 24 bytes leftover after parsing attributes in process `syz.2.427'. [ 113.186798][ T6048] netlink: 4 bytes leftover after parsing attributes in process `syz.4.426'. [ 113.204667][ T6050] netlink: 'syz.2.427': attribute type 13 has an invalid length. [ 113.258715][ T6055] syzkaller0: entered allmulticast mode [ 113.280449][ T6055] syzkaller0: entered promiscuous mode [ 113.304759][ T6055] syzkaller0 (unregistering): left promiscuous mode [ 113.311733][ T6055] syzkaller0 (unregistering): left allmulticast mode [ 113.446150][ T6067] netlink: 16 bytes leftover after parsing attributes in process `syz.0.432'. [ 113.611813][ T6077] xt_hashlimit: max too large, truncated to 1048576 [ 113.647561][ T6077] Cannot find set identified by id 0 to match [ 113.712181][ T6086] loop0: detected capacity change from 0 to 512 [ 113.722192][ T6086] EXT4-fs: Ignoring removed oldalloc option [ 113.750253][ T6086] EXT4-fs error (device loop0): ext4_xattr_inode_iget:433: comm syz.0.437: Parent and EA inode have the same ino 15 [ 113.750293][ T6088] netlink: 'syz.4.438': attribute type 4 has an invalid length. [ 113.750310][ T6088] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.438'. [ 113.785802][ T6086] EXT4-fs (loop0): Remounting filesystem read-only [ 113.793053][ T6086] EXT4-fs warning (device loop0): ext4_evict_inode:262: couldn't mark inode dirty (err -30) [ 113.812997][ T6092] netlink: 24 bytes leftover after parsing attributes in process `syz.4.438'. [ 113.834616][ T6091] binfmt_misc: register: failed to install interpreter file ./file2 [ 113.843758][ T6086] EXT4-fs (loop0): 1 orphan inode deleted [ 113.851707][ T6086] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 113.865751][ T6086] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 114.027728][ T6094] netlink: 24 bytes leftover after parsing attributes in process `syz.2.440'. [ 114.058488][ T6094] netlink: 'syz.2.440': attribute type 13 has an invalid length. [ 114.151921][ T6096] netlink: 'syz.2.441': attribute type 4 has an invalid length. [ 114.177830][ T6096] netlink: 'syz.2.441': attribute type 4 has an invalid length. [ 114.200333][ T4960] lo speed is unknown, defaulting to 1000 [ 114.206889][ T4960] syz0: Port: 1 Link ACTIVE [ 114.423458][ T6101] loop3: detected capacity change from 0 to 512 [ 114.446852][ T6099] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 114.471863][ T6101] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 114.503239][ T6101] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 114.530831][ T6101] ext4 filesystem being mounted at /87/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 114.583973][ T6101] netlink: 'syz.3.443': attribute type 13 has an invalid length. [ 114.609312][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 114.711969][ T6115] syzkaller0: entered allmulticast mode [ 114.727035][ T6114] __nla_validate_parse: 2 callbacks suppressed [ 114.727052][ T6114] netlink: 24 bytes leftover after parsing attributes in process `syz.2.448'. [ 114.761048][ T6115] syzkaller0: entered promiscuous mode [ 114.778609][ T6115] syzkaller0 (unregistering): left promiscuous mode [ 114.788522][ T6115] syzkaller0 (unregistering): left allmulticast mode [ 114.796792][ T6114] netlink: 'syz.2.448': attribute type 13 has an invalid length. [ 114.876785][ T4960] lo speed is unknown, defaulting to 1000 [ 114.883294][ T4960] syz0: Port: 1 Link DOWN [ 115.075125][ T6128] lo speed is unknown, defaulting to 1000 [ 115.205019][ T6128] dummy0 speed is unknown, defaulting to 1000 [ 115.288381][ T6134] netlink: 8 bytes leftover after parsing attributes in process `syz.3.454'. [ 115.327049][ T6135] xt_hashlimit: max too large, truncated to 1048576 [ 115.439101][ T6139] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 115.475985][ T6139] vhci_hcd: default hub control req: 2314 v0008 i0002 l0 [ 115.492261][ T6134] netlink: 60 bytes leftover after parsing attributes in process `syz.3.454'. [ 115.530607][ T6134] netlink: 60 bytes leftover after parsing attributes in process `syz.3.454'. [ 115.541586][ T6141] netlink: 24 bytes leftover after parsing attributes in process `syz.2.455'. [ 115.569444][ T6141] netlink: 'syz.2.455': attribute type 13 has an invalid length. [ 115.589333][ T6134] netlink: 60 bytes leftover after parsing attributes in process `syz.3.454'. [ 115.618774][ T6134] netlink: 60 bytes leftover after parsing attributes in process `syz.3.454'. [ 115.729217][ T6134] netlink: 60 bytes leftover after parsing attributes in process `syz.3.454'. [ 115.756529][ T6134] netlink: 60 bytes leftover after parsing attributes in process `syz.3.454'. [ 115.912661][ T6135] Cannot find set identified by id 0 to match [ 115.975428][ T6153] netlink: 16 bytes leftover after parsing attributes in process `syz.0.459'. [ 116.099465][ T6165] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 116.177780][ T6169] lo speed is unknown, defaulting to 1000 [ 116.214457][ T6169] dummy0 speed is unknown, defaulting to 1000 [ 116.751400][ T6185] ip6tnl1: entered promiscuous mode [ 117.196045][ T29] kauditd_printk_skb: 395 callbacks suppressed [ 117.196064][ T29] audit: type=1400 audit(1747172868.456:4850): avc: denied { map_create } for pid=6190 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 117.224456][ T29] audit: type=1400 audit(1747172868.456:4851): avc: denied { prog_load } for pid=6190 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 117.245822][ T29] audit: type=1400 audit(1747172868.456:4852): avc: denied { sys_module } for pid=6190 comm="syz.1.473" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 117.268336][ T29] audit: type=1400 audit(1747172868.456:4853): avc: denied { module_request } for pid=6190 comm="syz.1.473" kmod="tty-ldisc-5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 117.268369][ T29] audit: type=1400 audit(1747172868.456:4854): avc: denied { prog_load } for pid=6190 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 117.268459][ T29] audit: type=1400 audit(1747172868.456:4855): avc: denied { prog_load } for pid=6190 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 117.293989][ T29] audit: type=1400 audit(1747172868.516:4856): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop0" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 117.315872][ T29] audit: type=1400 audit(1747172868.566:4857): avc: denied { create } for pid=6190 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=0 [ 117.315908][ T29] audit: type=1400 audit(1747172868.566:4858): avc: denied { prog_load } for pid=6190 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 117.316060][ T29] audit: type=1400 audit(1747172868.566:4859): avc: denied { prog_load } for pid=6190 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 117.494289][ T6198] validate_nla: 2 callbacks suppressed [ 117.494308][ T6198] netlink: 'syz.4.476': attribute type 13 has an invalid length. [ 118.519693][ T6233] netlink: 'syz.3.488': attribute type 13 has an invalid length. [ 119.788819][ T6272] netlink: 'syz.3.501': attribute type 13 has an invalid length. [ 119.901004][ T6285] __nla_validate_parse: 1 callbacks suppressed [ 119.901020][ T6285] netlink: 12 bytes leftover after parsing attributes in process `syz.1.507'. [ 120.276880][ T6303] netlink: 4 bytes leftover after parsing attributes in process `syz.2.513'. [ 120.429877][ T6308] netlink: 'syz.4.515': attribute type 13 has an invalid length. [ 120.729285][ T6328] netlink: 132 bytes leftover after parsing attributes in process `syz.4.524'. [ 120.742368][ T6328] netlink: 3 bytes leftover after parsing attributes in process `syz.4.524'. [ 120.762062][ T6328] batadv1: entered allmulticast mode [ 120.877576][ T6333] netlink: 'syz.3.526': attribute type 13 has an invalid length. [ 120.936845][ T6338] netlink: 'syz.3.528': attribute type 13 has an invalid length. [ 121.068010][ T6355] netlink: 8 bytes leftover after parsing attributes in process `syz.4.536'. [ 121.121319][ T6359] netlink: 'syz.3.538': attribute type 13 has an invalid length. [ 121.171169][ T6362] xt_connbytes: Forcing CT accounting to be enabled [ 121.186715][ T6362] Cannot find set identified by id 0 to match [ 121.208174][ T6362] netlink: 4 bytes leftover after parsing attributes in process `syz.3.539'. [ 121.214445][ T6364] netlink: 'syz.4.540': attribute type 13 has an invalid length. [ 121.818507][ T6385] netlink: 'syz.2.549': attribute type 13 has an invalid length. [ 121.857928][ T6387] netlink: 8 bytes leftover after parsing attributes in process `syz.2.550'. [ 121.983134][ T6389] netlink: 'syz.2.551': attribute type 13 has an invalid length. [ 122.196513][ T29] kauditd_printk_skb: 955 callbacks suppressed [ 122.196531][ T29] audit: type=1400 audit(1747172873.456:5815): avc: denied { map_create } for pid=6406 comm="syz.3.558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 122.274763][ T29] audit: type=1400 audit(1747172873.466:5816): avc: denied { prog_load } for pid=6404 comm="syz.4.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 122.296744][ T29] audit: type=1400 audit(1747172873.466:5817): avc: denied { map_create } for pid=6404 comm="syz.4.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 122.317771][ T29] audit: type=1400 audit(1747172873.466:5818): avc: denied { prog_load } for pid=6404 comm="syz.4.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 122.337251][ T29] audit: type=1400 audit(1747172873.496:5819): avc: denied { prog_load } for pid=6406 comm="syz.3.558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 122.357222][ T29] audit: type=1400 audit(1747172873.496:5820): avc: denied { create } for pid=6404 comm="syz.4.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 122.377549][ T29] audit: type=1400 audit(1747172873.496:5821): avc: denied { create } for pid=6404 comm="syz.4.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 122.398865][ T29] audit: type=1400 audit(1747172873.496:5822): avc: denied { create } for pid=6404 comm="syz.4.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 122.420292][ T29] audit: type=1400 audit(1747172873.496:5823): avc: denied { create } for pid=6404 comm="syz.4.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 122.440346][ T29] audit: type=1400 audit(1747172873.496:5824): avc: denied { create } for pid=6406 comm="syz.3.558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 122.638319][ T6416] netlink: 8 bytes leftover after parsing attributes in process `syz.3.561'. [ 122.770395][ T6418] netlink: 'syz.3.562': attribute type 13 has an invalid length. [ 123.417564][ T6423] netlink: 'syz.4.564': attribute type 13 has an invalid length. [ 123.977817][ T6441] netlink: 8 bytes leftover after parsing attributes in process `syz.3.572'. [ 124.084952][ T6443] netlink: 'syz.3.573': attribute type 13 has an invalid length. [ 124.447419][ T6448] netlink: 'syz.4.575': attribute type 13 has an invalid length. [ 124.542981][ T6452] netlink: 'syz.4.577': attribute type 13 has an invalid length. [ 124.658292][ T6465] netlink: 8 bytes leftover after parsing attributes in process `syz.1.583'. [ 124.787242][ T6467] netlink: 'syz.1.584': attribute type 13 has an invalid length. [ 125.025978][ T6471] netlink: 4 bytes leftover after parsing attributes in process `syz.3.585'. [ 125.064070][ T6476] syz.1.588: attempt to access beyond end of device [ 125.064070][ T6476] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 125.097932][ T6481] netlink: 'syz.3.590': attribute type 13 has an invalid length. [ 125.127738][ T6483] netlink: 'syz.3.591': attribute type 13 has an invalid length. [ 126.170588][ T6513] netlink: 'syz.1.604': attribute type 13 has an invalid length. [ 126.313074][ T6517] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=6517 comm=syz.1.606 [ 126.763484][ T6529] netlink: 'syz.3.611': attribute type 13 has an invalid length. [ 127.695861][ T29] kauditd_printk_skb: 425 callbacks suppressed [ 127.695886][ T29] audit: type=1400 audit(1747172878.956:6250): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 127.759729][ T29] audit: type=1400 audit(1747172879.006:6251): avc: denied { prog_load } for pid=6534 comm="syz.3.613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 127.781442][ T29] audit: type=1400 audit(1747172879.006:6252): avc: denied { map_create } for pid=6534 comm="syz.3.613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 127.803173][ T29] audit: type=1400 audit(1747172879.006:6253): avc: denied { prog_load } for pid=6534 comm="syz.3.613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 127.829957][ T29] audit: type=1400 audit(1747172879.006:6254): avc: denied { prog_load } for pid=6534 comm="syz.3.613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 127.851715][ T29] audit: type=1400 audit(1747172879.006:6255): avc: denied { prog_load } for pid=6534 comm="syz.3.613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 127.872466][ T29] audit: type=1400 audit(1747172879.006:6256): avc: denied { write } for pid=6534 comm="syz.3.613" name="001" dev="devtmpfs" ino=168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 127.897499][ T29] audit: type=1400 audit(1747172879.006:6257): avc: denied { create } for pid=6534 comm="syz.3.613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 127.920776][ T29] audit: type=1400 audit(1747172879.006:6258): avc: denied { map_create } for pid=6534 comm="syz.3.613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 127.926066][ T6539] netlink: 'syz.3.615': attribute type 13 has an invalid length. [ 127.946561][ T29] audit: type=1400 audit(1747172879.006:6259): avc: denied { create } for pid=6534 comm="syz.3.613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 128.290143][ T6554] netlink: 'syz.3.622': attribute type 13 has an invalid length. [ 129.396885][ T6601] netlink: 'syz.4.643': attribute type 13 has an invalid length. [ 130.109526][ T6625] netlink: 'syz.2.653': attribute type 13 has an invalid length. [ 130.311878][ T6634] netlink: 'syz.2.657': attribute type 13 has an invalid length. [ 130.485877][ T6643] netlink: 'syz.2.662': attribute type 13 has an invalid length. [ 130.501701][ T6646] x_tables: duplicate underflow at hook 3 [ 130.662622][ T6671] netlink: 'syz.1.676': attribute type 13 has an invalid length. [ 130.687685][ T6670] netlink: 'syz.4.675': attribute type 13 has an invalid length. [ 130.937678][ T6697] netlink: 'syz.4.687': attribute type 13 has an invalid length. [ 131.070125][ T6707] netlink: 8 bytes leftover after parsing attributes in process `syz.0.692'. [ 131.296411][ T6725] netlink: 148 bytes leftover after parsing attributes in process `syz.4.701'. [ 131.327856][ T6723] netlink: 'syz.0.700': attribute type 13 has an invalid length. [ 131.502382][ T6734] netlink: 164 bytes leftover after parsing attributes in process `syz.4.705'. [ 132.346826][ T6797] x_tables: ip_tables: osf match: only valid for protocol 6 [ 132.738300][ T29] kauditd_printk_skb: 504 callbacks suppressed [ 132.738338][ T29] audit: type=1400 audit(1747172884.006:6764): avc: denied { prog_load } for pid=6812 comm="syz.2.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 132.842256][ T29] audit: type=1400 audit(1747172884.046:6765): avc: denied { load_policy } for pid=6812 comm="syz.2.743" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=0 [ 132.864527][ T29] audit: type=1400 audit(1747172884.046:6766): avc: denied { map_create } for pid=6812 comm="syz.2.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 132.885279][ T29] audit: type=1400 audit(1747172884.046:6767): avc: denied { prog_load } for pid=6812 comm="syz.2.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 132.907421][ T29] audit: type=1400 audit(1747172884.046:6768): avc: denied { prog_load } for pid=6812 comm="syz.2.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 132.927763][ T29] audit: type=1400 audit(1747172884.046:6769): avc: denied { open } for pid=6812 comm="syz.2.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 132.948793][ T29] audit: type=1400 audit(1747172884.046:6770): avc: denied { create } for pid=6812 comm="syz.2.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 132.971862][ T29] audit: type=1400 audit(1747172884.046:6771): avc: denied { prog_load } for pid=6812 comm="syz.2.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 132.994095][ T29] audit: type=1400 audit(1747172884.046:6772): avc: denied { map_create } for pid=6812 comm="syz.2.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 133.015703][ T29] audit: type=1400 audit(1747172884.046:6773): avc: denied { prog_load } for pid=6812 comm="syz.2.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 133.160189][ T6823] binfmt_misc: register: failed to install interpreter file ./file2 [ 133.719305][ T6839] $Hÿ: renamed from bond0 [ 133.735980][ T6839] $Hÿ: entered promiscuous mode [ 133.741460][ T6839] bond_slave_0: entered promiscuous mode [ 133.747835][ T6839] bond_slave_1: entered promiscuous mode [ 134.166156][ T6861] netlink: 12 bytes leftover after parsing attributes in process `syz.3.764'. [ 134.972305][ T6892] validate_nla: 5 callbacks suppressed [ 134.972321][ T6892] netlink: 'syz.0.778': attribute type 13 has an invalid length. [ 135.096739][ T6899] netlink: 'syz.0.781': attribute type 13 has an invalid length. [ 135.363095][ T6916] netlink: 8 bytes leftover after parsing attributes in process `syz.2.788'. [ 135.424834][ T6922] netlink: 'syz.3.791': attribute type 13 has an invalid length. [ 135.488640][ T6928] netlink: 148 bytes leftover after parsing attributes in process `syz.2.794'. [ 136.148734][ T6956] netlink: 148 bytes leftover after parsing attributes in process `syz.4.806'. [ 136.158482][ T6954] netlink: 'syz.0.805': attribute type 13 has an invalid length. [ 136.312759][ T6960] IPVS: set_ctl: invalid protocol: 135 100.1.1.0:20000 [ 136.340489][ T6962] syz.4.809: attempt to access beyond end of device [ 136.340489][ T6962] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 137.446731][ T6987] netlink: 148 bytes leftover after parsing attributes in process `syz.1.819'. [ 137.776954][ T29] kauditd_printk_skb: 675 callbacks suppressed [ 137.776970][ T29] audit: type=1400 audit(1747172889.046:7449): avc: denied { read } for pid=7000 comm="syz.4.824" dev="nsfs" ino=4026532477 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 137.848290][ T29] audit: type=1400 audit(1747172889.046:7450): avc: denied { prog_load } for pid=7000 comm="syz.4.824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 137.869558][ T29] audit: type=1400 audit(1747172889.046:7451): avc: denied { block_suspend } for pid=6991 comm="syz.1.821" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 137.892899][ T29] audit: type=1400 audit(1747172889.096:7452): avc: denied { prog_load } for pid=7000 comm="syz.4.824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 137.912367][ T29] audit: type=1400 audit(1747172889.096:7453): avc: denied { load_policy } for pid=7000 comm="syz.4.824" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=0 [ 137.935488][ T29] audit: type=1400 audit(1747172889.096:7454): avc: denied { map_create } for pid=7000 comm="syz.4.824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 137.956982][ T29] audit: type=1400 audit(1747172889.096:7455): avc: denied { open } for pid=7000 comm="syz.4.824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 137.978494][ T29] audit: type=1400 audit(1747172889.096:7456): avc: denied { prog_load } for pid=7000 comm="syz.4.824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 137.998274][ T29] audit: type=1400 audit(1747172889.096:7457): avc: denied { prog_load } for pid=7000 comm="syz.4.824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 138.019186][ T29] audit: type=1400 audit(1747172889.096:7458): avc: denied { create } for pid=7000 comm="syz.4.824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 138.062083][ T7006] netlink: 'syz.0.826': attribute type 13 has an invalid length. [ 139.024551][ T7031] netlink: 148 bytes leftover after parsing attributes in process `syz.0.832'. [ 140.549011][ T7053] netlink: 'syz.3.838': attribute type 13 has an invalid length. [ 142.562271][ T7087] netlink: 'syz.1.854': attribute type 13 has an invalid length. [ 142.781223][ T7095] netlink: 4 bytes leftover after parsing attributes in process `syz.1.858'. [ 142.786493][ T29] kauditd_printk_skb: 337 callbacks suppressed [ 142.786513][ T29] audit: type=1326 audit(1747172894.046:7796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7099 comm="syz.0.861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f600531e969 code=0x7ffc0000 [ 142.823197][ T29] audit: type=1400 audit(1747172894.046:7797): avc: denied { map_create } for pid=7099 comm="syz.0.861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 142.852539][ T7101] netlink: 12 bytes leftover after parsing attributes in process `syz.4.860'. [ 142.863027][ T29] audit: type=1400 audit(1747172894.116:7798): avc: denied { map_create } for pid=7094 comm="syz.1.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 142.882735][ T29] audit: type=1400 audit(1747172894.116:7799): avc: denied { map_create } for pid=7094 comm="syz.1.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 142.902340][ T29] audit: type=1400 audit(1747172894.116:7800): avc: denied { prog_load } for pid=7094 comm="syz.1.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 142.925253][ T29] audit: type=1400 audit(1747172894.116:7801): avc: denied { map_create } for pid=7098 comm="syz.4.860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 142.945166][ T29] audit: type=1400 audit(1747172894.116:7802): avc: denied { prog_load } for pid=7098 comm="syz.4.860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 142.965628][ T29] audit: type=1400 audit(1747172894.116:7803): avc: denied { prog_load } for pid=7098 comm="syz.4.860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 142.985318][ T29] audit: type=1326 audit(1747172894.116:7804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7099 comm="syz.0.861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f600531e969 code=0x7ffc0000 [ 142.985354][ T29] audit: type=1326 audit(1747172894.116:7805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7099 comm="syz.0.861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f600531e969 code=0x7ffc0000 [ 143.037469][ T7106] netlink: 'syz.2.862': attribute type 13 has an invalid length. [ 143.119202][ T7111] netlink: 'syz.0.864': attribute type 13 has an invalid length. [ 143.138518][ T7116] netlink: 'syz.2.866': attribute type 13 has an invalid length. [ 143.830174][ T7138] netlink: 'syz.4.875': attribute type 13 has an invalid length. [ 143.845757][ T7140] netlink: 132 bytes leftover after parsing attributes in process `syz.3.874'. [ 143.888271][ T7140] netlink: 3 bytes leftover after parsing attributes in process `syz.3.874'. [ 143.922986][ T7140] batadv0: entered allmulticast mode [ 144.089504][ T7149] netlink: 'syz.3.878': attribute type 13 has an invalid length. [ 144.153549][ T7151] netlink: 'syz.3.879': attribute type 13 has an invalid length. [ 144.416048][ T7168] netlink: 12 bytes leftover after parsing attributes in process `syz.3.886'. [ 145.131467][ T7173] netlink: 'syz.2.887': attribute type 13 has an invalid length. [ 146.104107][ T7185] netlink: 'syz.2.891': attribute type 13 has an invalid length. [ 146.257991][ T7190] ip6tnl1: entered promiscuous mode [ 146.528322][ T7201] netlink: 'syz.1.898': attribute type 13 has an invalid length. [ 147.035001][ T7209] netlink: 'syz.4.901': attribute type 13 has an invalid length. [ 147.066239][ T7211] netlink: 'syz.2.902': attribute type 13 has an invalid length. [ 147.800839][ T29] kauditd_printk_skb: 411 callbacks suppressed [ 147.800855][ T29] audit: type=1400 audit(1747172899.066:8217): avc: denied { map_create } for pid=7232 comm="syz.1.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 147.907172][ T29] audit: type=1400 audit(1747172899.066:8218): avc: denied { prog_load } for pid=7232 comm="syz.1.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 147.927703][ T29] audit: type=1400 audit(1747172899.066:8219): avc: denied { prog_load } for pid=7232 comm="syz.1.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 147.947460][ T29] audit: type=1400 audit(1747172899.066:8220): avc: denied { prog_load } for pid=7232 comm="syz.1.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 147.967101][ T29] audit: type=1400 audit(1747172899.066:8221): avc: denied { prog_load } for pid=7232 comm="syz.1.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 147.986267][ T29] audit: type=1400 audit(1747172899.076:8222): avc: denied { bpf } for pid=7232 comm="syz.1.910" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 148.007799][ T29] audit: type=1400 audit(1747172899.116:8223): avc: denied { create } for pid=7235 comm="syz.0.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 148.027924][ T29] audit: type=1400 audit(1747172899.116:8224): avc: denied { prog_load } for pid=7235 comm="syz.0.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.047395][ T29] audit: type=1400 audit(1747172899.116:8225): avc: denied { read } for pid=7235 comm="syz.0.911" dev="nsfs" ino=4026532678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 148.069463][ T29] audit: type=1400 audit(1747172899.126:8226): avc: denied { map_create } for pid=7235 comm="syz.0.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.559953][ T7256] netlink: 'syz.4.920': attribute type 13 has an invalid length. [ 148.707537][ T7258] netlink: 'syz.4.921': attribute type 13 has an invalid length. [ 150.327722][ T7282] netlink: 'syz.0.931': attribute type 13 has an invalid length. [ 150.419607][ T7284] netlink: 'syz.0.932': attribute type 13 has an invalid length. [ 151.011624][ T7305] netlink: 'syz.4.942': attribute type 13 has an invalid length. [ 151.489593][ T7332] netlink: 'syz.0.954': attribute type 13 has an invalid length. [ 152.192189][ T7363] netlink: 'syz.4.967': attribute type 13 has an invalid length. [ 152.412656][ T7373] netlink: 'syz.4.972': attribute type 13 has an invalid length. [ 152.867206][ T29] kauditd_printk_skb: 393 callbacks suppressed [ 152.867224][ T29] audit: type=1400 audit(1747172904.136:8620): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop0" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 152.943133][ T29] audit: type=1400 audit(1747172904.176:8621): avc: denied { prog_load } for pid=7383 comm="syz.0.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 152.962573][ T29] audit: type=1400 audit(1747172904.176:8622): avc: denied { prog_load } for pid=7383 comm="syz.0.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 152.981719][ T29] audit: type=1400 audit(1747172904.176:8623): avc: denied { create } for pid=7383 comm="syz.0.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 153.001502][ T29] audit: type=1400 audit(1747172904.206:8624): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop0" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 153.189661][ T29] audit: type=1400 audit(1747172904.276:8625): avc: denied { prog_load } for pid=7385 comm="syz.0.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 153.208949][ T29] audit: type=1400 audit(1747172904.276:8626): avc: denied { allowed } for pid=7385 comm="syz.0.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 153.228367][ T29] audit: type=1400 audit(1747172904.276:8627): avc: denied { open } for pid=7385 comm="syz.0.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 153.247704][ T29] audit: type=1400 audit(1747172904.276:8628): avc: denied { prog_load } for pid=7385 comm="syz.0.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 153.266601][ T7392] netlink: 'syz.0.979': attribute type 13 has an invalid length. [ 153.267006][ T29] audit: type=1400 audit(1747172904.276:8629): avc: denied { map_create } for pid=7385 comm="syz.0.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 153.465338][ T7402] netlink: 'syz.0.985': attribute type 13 has an invalid length. [ 153.527588][ T7410] netlink: 'syz.4.987': attribute type 10 has an invalid length. [ 153.547903][ T7410] $Hÿ: left promiscuous mode [ 153.552851][ T7410] bond_slave_0: left promiscuous mode [ 153.558341][ T7410] bond_slave_1: left promiscuous mode [ 153.576347][ T7410] 8021q: adding VLAN 0 to HW filter on device $Hÿ [ 153.607885][ T7410] team0: Port device $Hÿ added [ 153.707491][ T7420] netlink: 'syz.3.992': attribute type 13 has an invalid length. [ 154.536233][ T7433] netlink: 'syz.3.998': attribute type 13 has an invalid length. [ 154.631130][ T7445] netlink: 'syz.0.1004': attribute type 13 has an invalid length. [ 154.639525][ T7445] netlink: 'syz.0.1004': attribute type 27 has an invalid length. [ 156.542484][ T7571] validate_nla: 11 callbacks suppressed [ 156.542499][ T7571] netlink: 'syz.3.1062': attribute type 13 has an invalid length. [ 156.673228][ T7581] netlink: 'syz.0.1068': attribute type 13 has an invalid length. [ 156.744206][ T7589] netlink: 'syz.3.1072': attribute type 13 has an invalid length. [ 157.889048][ T29] kauditd_printk_skb: 576 callbacks suppressed [ 157.889075][ T29] audit: type=1400 audit(1747172909.156:9206): avc: denied { create } for pid=7604 comm="syz.0.1090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 157.924588][ T7605] netlink: 'syz.0.1090': attribute type 13 has an invalid length. [ 157.966674][ T29] audit: type=1400 audit(1747172909.166:9207): avc: denied { map_create } for pid=7607 comm="syz.3.1079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 157.985958][ T29] audit: type=1400 audit(1747172909.166:9208): avc: denied { prog_load } for pid=7607 comm="syz.3.1079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.005074][ T29] audit: type=1400 audit(1747172909.166:9209): avc: denied { prog_load } for pid=7607 comm="syz.3.1079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.024181][ T29] audit: type=1400 audit(1747172909.166:9210): avc: denied { map_create } for pid=7607 comm="syz.3.1079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.043583][ T29] audit: type=1400 audit(1747172909.166:9211): avc: denied { prog_load } for pid=7607 comm="syz.3.1079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.062739][ T29] audit: type=1400 audit(1747172909.166:9212): avc: denied { prog_load } for pid=7607 comm="syz.3.1079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.081960][ T29] audit: type=1400 audit(1747172909.166:9213): avc: denied { prog_load } for pid=7607 comm="syz.3.1079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.101088][ T29] audit: type=1400 audit(1747172909.176:9214): avc: denied { prog_load } for pid=7606 comm="syz.1.1080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.120298][ T29] audit: type=1400 audit(1747172909.176:9215): avc: denied { prog_load } for pid=7604 comm="syz.0.1090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.171807][ T7624] netlink: 'syz.1.1085': attribute type 13 has an invalid length. [ 158.267036][ T7642] x_tables: duplicate underflow at hook 3 [ 158.372110][ T7650] netlink: 'syz.0.1100': attribute type 13 has an invalid length. [ 158.796270][ T7663] netlink: 'syz.0.1105': attribute type 13 has an invalid length. [ 159.019289][ T7677] netlink: 'syz.0.1111': attribute type 13 has an invalid length. [ 159.088930][ T7681] netlink: 'syz.0.1114': attribute type 13 has an invalid length. [ 159.187840][ T7688] netlink: 'syz.1.1118': attribute type 13 has an invalid length. [ 161.652748][ T7832] validate_nla: 15 callbacks suppressed [ 161.652767][ T7832] netlink: 'syz.0.1186': attribute type 13 has an invalid length. [ 161.668751][ T7831] netlink: 'syz.1.1185': attribute type 13 has an invalid length. [ 161.753025][ T7836] netlink: 'syz.1.1189': attribute type 13 has an invalid length. [ 161.812092][ T7841] netlink: 'syz.1.1190': attribute type 13 has an invalid length. [ 162.180528][ T7860] netlink: 'syz.0.1199': attribute type 13 has an invalid length. [ 162.249580][ T7862] netlink: 'syz.0.1200': attribute type 13 has an invalid length. [ 162.379770][ T7870] netlink: 'syz.2.1203': attribute type 13 has an invalid length. [ 162.438290][ T7876] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=7876 comm=syz.0.1206 [ 162.527697][ T7883] netlink: 'syz.3.1210': attribute type 13 has an invalid length. [ 162.571859][ T7889] netlink: 'syz.4.1213': attribute type 13 has an invalid length. [ 162.660969][ T7902] $Hÿ: renamed from bond0 [ 162.672457][ T7902] $Hÿ: entered promiscuous mode [ 162.677658][ T7902] bond_slave_1: entered promiscuous mode [ 162.700020][ T7904] netlink: 'syz.4.1220': attribute type 13 has an invalid length. [ 162.902596][ T29] kauditd_printk_skb: 744 callbacks suppressed [ 162.902614][ T29] audit: type=1400 audit(1747172914.166:9960): avc: denied { create } for pid=7919 comm="syz.1.1227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 163.004459][ T29] audit: type=1400 audit(1747172914.166:9961): avc: denied { prog_load } for pid=7919 comm="syz.1.1227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.023797][ T29] audit: type=1400 audit(1747172914.166:9962): avc: denied { create } for pid=7919 comm="syz.1.1227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 163.043753][ T29] audit: type=1400 audit(1747172914.176:9963): avc: denied { map_create } for pid=7910 comm="syz.3.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.063651][ T29] audit: type=1400 audit(1747172914.176:9964): avc: denied { prog_load } for pid=7910 comm="syz.3.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.082789][ T29] audit: type=1400 audit(1747172914.176:9965): avc: denied { prog_load } for pid=7910 comm="syz.3.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.102079][ T29] audit: type=1400 audit(1747172914.176:9966): avc: denied { prog_load } for pid=7910 comm="syz.3.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.121366][ T29] audit: type=1400 audit(1747172914.176:9967): avc: denied { prog_load } for pid=7910 comm="syz.3.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.140657][ T29] audit: type=1400 audit(1747172914.186:9968): avc: denied { map_create } for pid=7919 comm="syz.1.1227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.160079][ T29] audit: type=1400 audit(1747172914.186:9969): avc: denied { prog_load } for pid=7919 comm="syz.1.1227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 166.736575][ T8054] validate_nla: 13 callbacks suppressed [ 166.736596][ T8054] netlink: 'syz.2.1289': attribute type 13 has an invalid length. [ 166.799048][ T8059] netlink: 'syz.4.1291': attribute type 13 has an invalid length. [ 166.870786][ T8067] netlink: 'syz.2.1295': attribute type 13 has an invalid length. [ 167.792359][ T8090] netlink: 'syz.4.1305': attribute type 13 has an invalid length. [ 167.921362][ T29] kauditd_printk_skb: 361 callbacks suppressed [ 167.921379][ T29] audit: type=1400 audit(1747172919.186:10331): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 167.994573][ T29] audit: type=1400 audit(1747172919.186:10332): avc: denied { read } for pid=8093 comm="syz.4.1307" dev="nsfs" ino=4026532477 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 168.016205][ T29] audit: type=1400 audit(1747172919.236:10333): avc: denied { create } for pid=8095 comm="syz.3.1308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 168.037076][ T29] audit: type=1400 audit(1747172919.246:10334): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 168.061562][ T29] audit: type=1400 audit(1747172919.256:10335): avc: denied { prog_load } for pid=8097 comm="syz.3.1309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 168.080798][ T29] audit: type=1400 audit(1747172919.256:10336): avc: denied { map_create } for pid=8097 comm="syz.3.1309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 168.101516][ T29] audit: type=1400 audit(1747172919.366:10337): avc: denied { prog_load } for pid=8099 comm="syz.4.1310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 168.120771][ T29] audit: type=1400 audit(1747172919.366:10338): avc: denied { prog_load } for pid=8097 comm="syz.3.1309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 168.140044][ T29] audit: type=1400 audit(1747172919.366:10339): avc: denied { prog_load } for pid=8097 comm="syz.3.1309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 168.173200][ T29] audit: type=1400 audit(1747172919.426:10340): avc: denied { create } for pid=8097 comm="syz.3.1309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 168.320603][ T8112] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 170.321412][ T8139] netlink: 'syz.0.1326': attribute type 13 has an invalid length. [ 170.861356][ T8156] netlink: 'syz.1.1333': attribute type 13 has an invalid length. [ 170.944979][ T8161] netlink: 'syz.2.1336': attribute type 13 has an invalid length. [ 171.086052][ T8168] netlink: 'syz.1.1339': attribute type 13 has an invalid length. [ 172.483666][ T8193] netlink: 'syz.3.1348': attribute type 13 has an invalid length. [ 172.845748][ T8205] netlink: 'syz.3.1354': attribute type 13 has an invalid length. [ 172.926582][ T29] kauditd_printk_skb: 187 callbacks suppressed [ 172.926601][ T29] audit: type=1400 audit(1747172924.186:10528): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 172.992035][ T29] audit: type=1400 audit(1747172924.246:10529): avc: denied { create } for pid=8208 comm="syz.3.1356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 173.061660][ T29] audit: type=1400 audit(1747172924.296:10530): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 173.152669][ T29] audit: type=1326 audit(1747172924.346:10531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8210 comm="syz.3.1357" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f545666e969 code=0x7ffc0000 [ 173.176219][ T29] audit: type=1326 audit(1747172924.346:10532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8210 comm="syz.3.1357" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f545666e969 code=0x7ffc0000 [ 173.199812][ T29] audit: type=1326 audit(1747172924.346:10533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8210 comm="syz.3.1357" exe="/root/syz-executor" sig=0 arch=c000003e syscall=115 compat=0 ip=0x7f545666e969 code=0x7ffc0000 [ 173.223347][ T29] audit: type=1326 audit(1747172924.346:10534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8210 comm="syz.3.1357" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f545666e969 code=0x7ffc0000 [ 173.246870][ T29] audit: type=1326 audit(1747172924.346:10535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8210 comm="syz.3.1357" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f545666e969 code=0x7ffc0000 [ 173.270390][ T29] audit: type=1400 audit(1747172924.356:10536): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 173.294740][ T29] audit: type=1400 audit(1747172924.376:10537): avc: denied { create } for pid=8212 comm="syz.3.1358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 173.349845][ T8215] netlink: 'syz.3.1359': attribute type 13 has an invalid length. [ 173.536996][ T8227] netlink: 'syz.3.1365': attribute type 13 has an invalid length. [ 173.628399][ T8231] netlink: 'syz.3.1377': attribute type 13 has an invalid length. [ 173.728553][ T8241] netlink: 'syz.3.1371': attribute type 13 has an invalid length. [ 174.596297][ T8265] netlink: 'syz.3.1382': attribute type 13 has an invalid length. [ 174.626995][ T8268] netlink: 'syz.4.1383': attribute type 13 has an invalid length. [ 175.008047][ T8303] netlink: 'syz.1.1399': attribute type 13 has an invalid length. [ 175.792391][ T8329] netlink: 'syz.4.1421': attribute type 13 has an invalid length. [ 178.199066][ T29] kauditd_printk_skb: 385 callbacks suppressed [ 178.199083][ T29] audit: type=1400 audit(1747172929.466:10923): avc: denied { create } for pid=8393 comm="syz.2.1440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 178.242262][ T8394] validate_nla: 4 callbacks suppressed [ 178.242277][ T8394] netlink: 'syz.2.1440': attribute type 13 has an invalid length. [ 178.267175][ T29] audit: type=1400 audit(1747172929.506:10924): avc: denied { prog_load } for pid=8393 comm="syz.2.1440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 178.286489][ T29] audit: type=1400 audit(1747172929.506:10925): avc: denied { create } for pid=8393 comm="syz.2.1440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 178.306501][ T29] audit: type=1400 audit(1747172929.506:10926): avc: denied { map_create } for pid=8393 comm="syz.2.1440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 178.325742][ T29] audit: type=1400 audit(1747172929.506:10927): avc: denied { prog_load } for pid=8393 comm="syz.2.1440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 178.345998][ T29] audit: type=1400 audit(1747172929.506:10928): avc: denied { create } for pid=8393 comm="syz.2.1440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 178.366889][ T29] audit: type=1400 audit(1747172929.506:10929): avc: denied { prog_load } for pid=8393 comm="syz.2.1440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 178.490430][ T29] audit: type=1400 audit(1747172929.736:10930): avc: denied { create } for pid=8395 comm="syz.2.1441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 178.546730][ T29] audit: type=1400 audit(1747172929.806:10931): avc: denied { prog_load } for pid=8397 comm="syz.4.1442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 178.565948][ T29] audit: type=1400 audit(1747172929.806:10932): avc: denied { prog_load } for pid=8399 comm="syz.2.1443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 178.636807][ T8404] netlink: 'syz.4.1445': attribute type 13 has an invalid length. [ 178.831310][ T8420] netlink: 'syz.4.1453': attribute type 13 has an invalid length. [ 178.979972][ T8432] netlink: 'syz.4.1458': attribute type 13 has an invalid length. [ 179.129691][ T8446] netlink: 'syz.4.1464': attribute type 13 has an invalid length. [ 179.251154][ T8460] netlink: 'syz.4.1472': attribute type 13 has an invalid length. [ 179.786921][ T8481] netlink: 'syz.2.1478': attribute type 13 has an invalid length. [ 181.400439][ T8495] netlink: 'syz.0.1496': attribute type 13 has an invalid length. [ 181.557286][ T8517] netlink: 'syz.1.1494': attribute type 13 has an invalid length. [ 181.632358][ T8533] netlink: 'syz.1.1505': attribute type 13 has an invalid length. [ 181.690294][ T8538] ip6t_rpfilter: unknown options [ 183.278432][ T29] kauditd_printk_skb: 300 callbacks suppressed [ 183.278448][ T29] audit: type=1400 audit(1747172934.546:11233): avc: denied { map_create } for pid=8574 comm="syz.1.1535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 183.320098][ T29] audit: type=1400 audit(1747172934.566:11234): avc: denied { write } for pid=8578 comm="syz.3.1524" name="event2" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 183.343704][ T29] audit: type=1400 audit(1747172934.566:11235): avc: denied { map_create } for pid=8574 comm="syz.1.1535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 183.363108][ T29] audit: type=1400 audit(1747172934.576:11236): avc: denied { prog_load } for pid=8574 comm="syz.1.1535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 183.367552][ T8577] validate_nla: 3 callbacks suppressed [ 183.367572][ T8577] netlink: 'syz.4.1525': attribute type 13 has an invalid length. [ 183.382313][ T29] audit: type=1400 audit(1747172934.576:11237): avc: denied { create } for pid=8580 comm="syz.2.1523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 183.382382][ T29] audit: type=1400 audit(1747172934.576:11238): avc: denied { map_create } for pid=8574 comm="syz.1.1535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 183.382407][ T29] audit: type=1400 audit(1747172934.576:11239): avc: denied { create } for pid=8575 comm="syz.4.1525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 183.455723][ T29] audit: type=1400 audit(1747172934.586:11240): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 183.480031][ T29] audit: type=1400 audit(1747172934.586:11241): avc: denied { prog_load } for pid=8575 comm="syz.4.1525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 183.577542][ T29] audit: type=1400 audit(1747172934.626:11242): avc: denied { create } for pid=8575 comm="syz.4.1525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 183.583746][ T8591] netlink: 'syz.2.1531': attribute type 13 has an invalid length. [ 183.708780][ T8603] netlink: 'syz.3.1534': attribute type 10 has an invalid length. [ 183.719054][ T8603] $Hÿ: left promiscuous mode [ 183.719099][ T8605] netlink: 'syz.4.1538': attribute type 21 has an invalid length. [ 183.723929][ T8603] bond_slave_1: left promiscuous mode [ 183.852364][ T8613] netlink: 'syz.4.1541': attribute type 13 has an invalid length. [ 184.228646][ T8629] netlink: 'syz.1.1547': attribute type 13 has an invalid length. [ 184.397968][ T8645] netlink: 'syz.3.1556': attribute type 13 has an invalid length. [ 184.747136][ T8660] netlink: 'syz.3.1562': attribute type 13 has an invalid length. [ 185.046131][ T8662] netlink: 'syz.3.1564': attribute type 5 has an invalid length. [ 185.134312][ T8668] netlink: 'syz.3.1566': attribute type 13 has an invalid length. [ 185.268891][ T8674] lo speed is unknown, defaulting to 1000 [ 185.374229][ T8674] dummy0 speed is unknown, defaulting to 1000 [ 186.271464][ T8703] ip6t_rpfilter: unknown options [ 188.458265][ T29] kauditd_printk_skb: 520 callbacks suppressed [ 188.458285][ T29] audit: type=1400 audit(1747172939.726:11763): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop0" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 188.537313][ T29] audit: type=1400 audit(1747172939.796:11764): avc: denied { write } for pid=8778 comm="syz.0.1615" name="tcp6" dev="proc" ino=4026532772 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 188.622383][ T29] audit: type=1400 audit(1747172939.826:11765): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 188.647220][ T29] audit: type=1400 audit(1747172939.866:11766): avc: denied { create } for pid=8780 comm="syz.3.1616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 188.667408][ T29] audit: type=1400 audit(1747172939.876:11767): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop0" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 188.692315][ T29] audit: type=1400 audit(1747172939.886:11768): avc: denied { create } for pid=8780 comm="syz.3.1616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 188.712994][ T29] audit: type=1400 audit(1747172939.886:11769): avc: denied { create } for pid=8780 comm="syz.3.1616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 188.733904][ T29] audit: type=1400 audit(1747172939.886:11770): avc: denied { create } for pid=8780 comm="syz.3.1616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 188.755075][ T29] audit: type=1400 audit(1747172939.886:11771): avc: denied { prog_load } for pid=8780 comm="syz.3.1616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 188.776792][ T29] audit: type=1400 audit(1747172939.886:11772): avc: denied { prog_load } for pid=8780 comm="syz.3.1616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 188.868968][ T8789] validate_nla: 8 callbacks suppressed [ 188.869064][ T8789] netlink: 'syz.3.1621': attribute type 13 has an invalid length. [ 188.925883][ T8796] netlink: 'syz.1.1623': attribute type 13 has an invalid length. [ 189.047394][ T8805] netlink: 'syz.1.1634': attribute type 13 has an invalid length. [ 192.136103][ T8893] netlink: 'syz.1.1665': attribute type 13 has an invalid length. [ 194.596081][ T29] kauditd_printk_skb: 395 callbacks suppressed [ 194.596098][ T29] audit: type=1400 audit(1747172945.856:12168): avc: denied { read } for pid=8939 comm="syz.1.1696" dev="nsfs" ino=4026532518 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 194.623788][ T29] audit: type=1400 audit(1747172945.856:12169): avc: denied { create } for pid=8939 comm="syz.1.1696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 194.665912][ T29] audit: type=1400 audit(1747172945.926:12170): avc: denied { create } for pid=8942 comm="syz.4.1685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 194.706317][ T29] audit: type=1326 audit(1747172945.956:12171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8945 comm="syz.4.1686" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a2751e969 code=0x7ffc0000 [ 194.730778][ T29] audit: type=1326 audit(1747172945.956:12172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8945 comm="syz.4.1686" exe="/root/syz-executor" sig=0 arch=c000003e syscall=253 compat=0 ip=0x7f7a2751e969 code=0x7ffc0000 [ 194.755060][ T29] audit: type=1326 audit(1747172945.956:12173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8945 comm="syz.4.1686" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a2751e969 code=0x7ffc0000 [ 194.778895][ T29] audit: type=1400 audit(1747172945.956:12174): avc: denied { create } for pid=8946 comm="syz.1.1698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 194.918801][ T29] audit: type=1400 audit(1747172946.106:12175): avc: denied { map_create } for pid=8941 comm="syz.0.1695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 194.938147][ T29] audit: type=1400 audit(1747172946.106:12176): avc: denied { prog_load } for pid=8941 comm="syz.0.1695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 194.957512][ T29] audit: type=1400 audit(1747172946.106:12177): avc: denied { prog_load } for pid=8941 comm="syz.0.1695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 195.023256][ T8960] netlink: 'syz.4.1691': attribute type 13 has an invalid length. [ 195.947278][ T8985] netlink: 'syz.3.1705': attribute type 13 has an invalid length. [ 195.995045][ T8989] netlink: 'syz.4.1707': attribute type 13 has an invalid length. [ 197.083516][ T9019] netlink: 'syz.3.1718': attribute type 13 has an invalid length. [ 197.231187][ T9023] netlink: 'syz.3.1720': attribute type 13 has an invalid length. [ 197.792063][ T9033] netlink: 'syz.2.1724': attribute type 13 has an invalid length. [ 198.462333][ T9044] netlink: 'syz.3.1729': attribute type 13 has an invalid length. [ 198.558143][ T9046] netlink: 'syz.3.1730': attribute type 13 has an invalid length. [ 198.674488][ T9050] netlink: 'syz.3.1732': attribute type 13 has an invalid length. [ 198.827203][ T9056] netlink: 'syz.0.1735': attribute type 13 has an invalid length. [ 199.641041][ T29] kauditd_printk_skb: 344 callbacks suppressed [ 199.641058][ T29] audit: type=1400 audit(1747172950.906:12522): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 199.723747][ T29] audit: type=1400 audit(1747172950.926:12523): avc: denied { create } for pid=9074 comm="syz.3.1742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 199.743555][ T29] audit: type=1400 audit(1747172950.926:12524): avc: denied { prog_load } for pid=9074 comm="syz.3.1742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 199.762835][ T29] audit: type=1400 audit(1747172950.926:12525): avc: denied { create } for pid=9074 comm="syz.3.1742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 199.783252][ T29] audit: type=1400 audit(1747172950.926:12526): avc: denied { read write } for pid=9074 comm="syz.3.1742" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 199.807748][ T29] audit: type=1400 audit(1747172950.946:12527): avc: denied { map_create } for pid=9074 comm="syz.3.1742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 199.827225][ T29] audit: type=1400 audit(1747172950.946:12528): avc: denied { prog_load } for pid=9074 comm="syz.3.1742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 199.846564][ T29] audit: type=1400 audit(1747172950.946:12529): avc: denied { create } for pid=9074 comm="syz.3.1742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 199.867430][ T29] audit: type=1400 audit(1747172950.946:12530): avc: denied { prog_load } for pid=9074 comm="syz.3.1742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 199.883662][ T29] audit: type=1400 audit(1747172950.996:12531): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 200.277971][ T9090] validate_nla: 2 callbacks suppressed [ 200.277990][ T9090] netlink: 'syz.4.1748': attribute type 13 has an invalid length. [ 201.035044][ T9108] netlink: 'syz.2.1755': attribute type 13 has an invalid length. [ 201.148982][ T9110] netlink: 'syz.2.1756': attribute type 13 has an invalid length. [ 202.647342][ T9158] netlink: 'syz.1.1776': attribute type 13 has an invalid length. [ 202.777411][ T9163] netlink: 'syz.4.1778': attribute type 13 has an invalid length. [ 202.849660][ T9170] netlink: 'syz.4.1781': attribute type 13 has an invalid length. [ 203.108022][ T9187] netlink: 'syz.3.1789': attribute type 13 has an invalid length. [ 203.296715][ T9191] netlink: 'syz.2.1791': attribute type 13 has an invalid length. [ 203.781832][ T9210] netlink: 'syz.1.1800': attribute type 13 has an invalid length. [ 204.214470][ T9238] netlink: 'syz.1.1813': attribute type 13 has an invalid length. [ 204.509605][ T9268] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 204.673783][ T29] kauditd_printk_skb: 514 callbacks suppressed [ 204.673798][ T29] audit: type=1400 audit(1747172955.936:13046): avc: denied { read } for pid=9277 comm="syz.4.1831" name="event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 204.784014][ T29] audit: type=1400 audit(1747172955.936:13047): avc: denied { create } for pid=9276 comm="syz.1.1832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 204.803920][ T29] audit: type=1400 audit(1747172955.996:13048): avc: denied { prog_load } for pid=9276 comm="syz.1.1832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 204.824057][ T29] audit: type=1400 audit(1747172956.006:13049): avc: denied { create } for pid=9276 comm="syz.1.1832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 204.844665][ T29] audit: type=1400 audit(1747172956.006:13050): avc: denied { map_create } for pid=9276 comm="syz.1.1832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 204.865389][ T29] audit: type=1400 audit(1747172956.006:13051): avc: denied { prog_load } for pid=9276 comm="syz.1.1832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 204.884578][ T29] audit: type=1400 audit(1747172956.006:13052): avc: denied { create } for pid=9276 comm="syz.1.1832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 204.905733][ T29] audit: type=1400 audit(1747172956.006:13053): avc: denied { prog_load } for pid=9280 comm="syz.4.1833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 204.925252][ T29] audit: type=1400 audit(1747172956.006:13054): avc: denied { prog_load } for pid=9276 comm="syz.1.1832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 204.945230][ T29] audit: type=1400 audit(1747172956.006:13055): avc: denied { open } for pid=9280 comm="syz.4.1833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 205.649251][ T9339] validate_nla: 4 callbacks suppressed [ 205.649310][ T9339] netlink: 'syz.0.1860': attribute type 13 has an invalid length. [ 206.086265][ T9362] netlink: 'syz.4.1871': attribute type 13 has an invalid length. [ 206.202702][ T9378] netlink: 'syz.2.1877': attribute type 13 has an invalid length. [ 206.458003][ T9400] netlink: 'syz.2.1887': attribute type 13 has an invalid length. [ 206.531446][ T9402] netlink: 'syz.2.1888': attribute type 6 has an invalid length. [ 206.539529][ T9402] netlink: 'syz.2.1888': attribute type 5 has an invalid length. [ 206.547432][ T9402] netlink: 3637 bytes leftover after parsing attributes in process `syz.2.1888'. [ 207.117389][ T9412] netlink: 'syz.1.1893': attribute type 13 has an invalid length. [ 207.309926][ T9444] netlink: 'syz.3.1909': attribute type 13 has an invalid length. [ 207.440513][ T9466] netlink: 'syz.1.1920': attribute type 13 has an invalid length. [ 208.265168][ T9595] netlink: 'syz.2.1984': attribute type 13 has an invalid length. [ 208.998620][ T9706] SELinux: syz.4.2039 (9706) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 209.696085][ T29] kauditd_printk_skb: 808 callbacks suppressed [ 209.696105][ T29] audit: type=1400 audit(1747172960.956:13864): avc: denied { prog_load } for pid=9779 comm="syz.4.2075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 209.756201][ T29] audit: type=1400 audit(1747172961.006:13865): avc: denied { prog_load } for pid=9767 comm="syz.1.2070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 209.775587][ T29] audit: type=1400 audit(1747172961.006:13866): avc: denied { prog_load } for pid=9767 comm="syz.1.2070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 209.794767][ T29] audit: type=1400 audit(1747172961.006:13867): avc: denied { execute } for pid=9767 comm="syz.1.2070" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=24257 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=0 [ 209.821379][ T29] audit: type=1400 audit(1747172961.006:13868): avc: denied { create } for pid=9767 comm="syz.1.2070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 209.841134][ T29] audit: type=1400 audit(1747172961.016:13869): avc: denied { prog_load } for pid=9782 comm="syz.2.2076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 209.882716][ T29] audit: type=1400 audit(1747172961.066:13870): avc: denied { map_create } for pid=9784 comm="syz.4.2077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 209.902110][ T29] audit: type=1400 audit(1747172961.116:13871): avc: denied { prog_load } for pid=9784 comm="syz.4.2077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 209.921422][ T29] audit: type=1400 audit(1747172961.116:13872): avc: denied { prog_load } for pid=9784 comm="syz.4.2077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 209.940654][ T29] audit: type=1400 audit(1747172961.126:13873): avc: denied { prog_load } for pid=9784 comm="syz.4.2077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 210.179323][ T9816] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2092'. [ 210.384913][ T9844] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2105'. [ 210.762324][ T9874] validate_nla: 4 callbacks suppressed [ 210.762374][ T9874] netlink: 'syz.1.2118': attribute type 13 has an invalid length. [ 211.270400][ T9892] netlink: 'syz.2.2125': attribute type 13 has an invalid length. [ 211.438434][ T9901] netlink: 'syz.2.2129': attribute type 13 has an invalid length. [ 211.912368][ T9919] netlink: 'syz.1.2138': attribute type 13 has an invalid length. [ 212.342099][ T9932] netlink: 'syz.0.2143': attribute type 13 has an invalid length. [ 212.788168][ T9946] netlink: 'syz.2.2149': attribute type 13 has an invalid length. [ 213.625675][ T9997] netlink: 'syz.0.2174': attribute type 13 has an invalid length. [ 213.633599][ T9997] netlink: 'syz.0.2174': attribute type 27 has an invalid length. [ 214.168161][T10027] netlink: 'syz.0.2187': attribute type 13 has an invalid length. [ 214.176199][T10027] netlink: 'syz.0.2187': attribute type 27 has an invalid length. [ 214.359204][T10042] netlink: 164 bytes leftover after parsing attributes in process `syz.0.2195'. [ 214.397661][T10044] SELinux: syz.2.2196 (10044) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 214.477643][T10048] netlink: 16 bytes leftover after parsing attributes in process `syz.0.2198'. [ 214.699977][ T29] kauditd_printk_skb: 438 callbacks suppressed [ 214.699996][ T29] audit: type=1400 audit(1747172965.966:14312): avc: denied { map_create } for pid=10060 comm="syz.3.2204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 214.772229][ T29] audit: type=1400 audit(1747172965.996:14313): avc: denied { prog_load } for pid=10060 comm="syz.3.2204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 214.791727][ T29] audit: type=1400 audit(1747172965.996:14314): avc: denied { create } for pid=10060 comm="syz.3.2204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 214.812784][ T29] audit: type=1400 audit(1747172965.996:14315): avc: denied { prog_load } for pid=10060 comm="syz.3.2204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 214.812813][ T29] audit: type=1400 audit(1747172966.006:14316): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop0" dev="devtmpfs" ino=859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 214.812845][ T29] audit: type=1400 audit(1747172966.036:14317): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 214.926452][ T29] audit: type=1400 audit(1747172966.036:14318): avc: denied { create } for pid=10063 comm="syz.3.2205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 214.926490][ T29] audit: type=1400 audit(1747172966.036:14319): avc: denied { create } for pid=10065 comm="syz.0.2215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 214.926518][ T29] audit: type=1400 audit(1747172966.036:14320): avc: denied { prog_load } for pid=10065 comm="syz.0.2215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 214.926558][ T29] audit: type=1400 audit(1747172966.036:14321): avc: denied { create } for pid=10065 comm="syz.0.2215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 216.569147][T10134] futex_wake_op: syz.3.2235 tries to shift op by -1; fix this program [ 219.725492][ T29] kauditd_printk_skb: 271 callbacks suppressed [ 219.725510][ T29] audit: type=1400 audit(1747172970.986:14593): avc: denied { map_create } for pid=10261 comm="syz.1.2294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 219.828874][ T29] audit: type=1400 audit(1747172971.036:14594): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 219.853533][ T29] audit: type=1400 audit(1747172971.046:14595): avc: denied { prog_load } for pid=10261 comm="syz.1.2294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 219.873344][ T29] audit: type=1400 audit(1747172971.046:14596): avc: denied { prog_load } for pid=10261 comm="syz.1.2294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 219.893111][ T29] audit: type=1400 audit(1747172971.056:14597): avc: denied { create } for pid=10271 comm="syz.4.2298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 219.913894][ T29] audit: type=1400 audit(1747172971.066:14598): avc: denied { prog_load } for pid=10261 comm="syz.1.2294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 219.933852][ T29] audit: type=1400 audit(1747172971.066:14599): avc: denied { prog_load } for pid=10261 comm="syz.1.2294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 219.953139][ T29] audit: type=1400 audit(1747172971.066:14600): avc: denied { create } for pid=10269 comm="syz.3.2297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 219.973109][ T29] audit: type=1400 audit(1747172971.066:14601): avc: denied { create } for pid=10271 comm="syz.4.2298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 219.993954][ T29] audit: type=1400 audit(1747172971.076:14602): avc: denied { bpf } for pid=10261 comm="syz.1.2294" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 220.632756][T10330] xt_TPROXY: Can be used only with -p tcp or -p udp [ 220.659202][T10334] netlink: 'syz.4.2326': attribute type 1 has an invalid length. [ 221.073200][T10379] netlink: 'syz.3.2347': attribute type 3 has an invalid length. [ 221.090025][T10383] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2350'. [ 222.279951][T10434] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2372'. [ 222.784985][T10467] netlink: 'syz.2.2388': attribute type 8 has an invalid length. [ 222.857737][T10473] netlink: 'syz.4.2391': attribute type 29 has an invalid length. [ 222.865751][T10473] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2391'. [ 222.894606][T10473] netlink: 'syz.4.2391': attribute type 29 has an invalid length. [ 222.902590][T10473] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2391'. [ 223.345050][T10520] netlink: 'syz.1.2414': attribute type 13 has an invalid length. [ 223.682102][T10544] netlink: 'syz.1.2425': attribute type 13 has an invalid length. [ 224.226901][T10579] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2441'. [ 224.330875][T10588] netlink: 24 bytes leftover after parsing attributes in process `syz.1.2446'. [ 224.351264][T10589] loop3: detected capacity change from 0 to 512 [ 224.371480][T10589] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 224.384461][T10589] ext4 filesystem being mounted at /506/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 224.456745][T10604] netlink: 24 bytes leftover after parsing attributes in process `syz.1.2452'. [ 224.466736][T10604] netlink: 'syz.1.2452': attribute type 13 has an invalid length. [ 224.604554][T10613] loop0: detected capacity change from 0 to 512 [ 224.619348][T10613] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 224.657750][T10613] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 224.672849][T10613] ext4 filesystem being mounted at /484/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 224.698097][T10613] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2456'. [ 224.729619][T10613] netlink: 'syz.0.2456': attribute type 13 has an invalid length. [ 224.737549][T10613] netlink: 'syz.0.2456': attribute type 27 has an invalid length. [ 224.789448][ T29] kauditd_printk_skb: 524 callbacks suppressed [ 224.789465][ T29] audit: type=1400 audit(1747172976.056:15127): avc: denied { create } for pid=10620 comm="syz.4.2459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 224.823332][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 224.873582][ T29] audit: type=1400 audit(1747172976.086:15128): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 224.893658][ T29] audit: type=1400 audit(1747172976.126:15129): avc: denied { create } for pid=10624 comm="syz.1.2462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 224.913499][ T29] audit: type=1400 audit(1747172976.126:15130): avc: denied { setopt } for pid=10624 comm="syz.1.2462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 225.075866][T10641] xt_hashlimit: max too large, truncated to 1048576 [ 225.079132][ T29] audit: type=1400 audit(1747172976.336:15131): avc: denied { execute } for pid=10630 comm="syz.1.2464" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=26395 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 225.108929][ T29] audit: type=1400 audit(1747172976.336:15132): avc: denied { setopt } for pid=10630 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 225.112207][T10641] Cannot find set identified by id 0 to match [ 225.185049][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 225.250771][T10650] loop3: detected capacity change from 0 to 512 [ 225.293639][T10650] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 225.326569][T10658] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=10658 comm=syz.0.2475 [ 225.339393][T10658] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=10658 comm=syz.0.2475 [ 225.359321][T10650] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 225.385107][T10650] ext4 filesystem being mounted at /507/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 225.405091][ T29] audit: type=1400 audit(1747172976.666:15133): avc: denied { create } for pid=10663 comm="syz.0.2478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 225.425819][ T29] audit: type=1400 audit(1747172976.666:15134): avc: denied { setopt } for pid=10663 comm="syz.0.2478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 225.445639][ T29] audit: type=1400 audit(1747172976.696:15135): avc: denied { bind } for pid=10663 comm="syz.0.2478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 225.468333][T10650] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2471'. [ 225.494570][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 225.515468][T10670] syzkaller0: entered allmulticast mode [ 225.521284][ T4985] IPVS: starting estimator thread 0... [ 225.521281][ T29] audit: type=1400 audit(1747172976.776:15136): avc: denied { getopt } for pid=10671 comm="syz.2.2483" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 225.521518][T10670] syzkaller0: entered promiscuous mode [ 225.562433][T10670] syzkaller0 (unregistering): left promiscuous mode [ 225.569214][T10670] syzkaller0 (unregistering): left allmulticast mode [ 225.617902][T10682] loop3: detected capacity change from 0 to 512 [ 225.629646][T10682] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 225.642340][T10682] ext4 filesystem being mounted at /508/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 225.653003][T10673] IPVS: using max 2016 ests per chain, 100800 per kthread [ 225.834736][T10697] loop0: detected capacity change from 0 to 512 [ 225.856801][T10697] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 225.890845][T10697] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 225.912440][T10697] ext4 filesystem being mounted at /495/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 225.936676][T10697] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2491'. [ 225.967751][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 226.007273][T10709] syzkaller0: entered allmulticast mode [ 226.020187][T10709] syzkaller0: entered promiscuous mode [ 226.033468][T10709] syzkaller0 (unregistering): left promiscuous mode [ 226.040289][T10709] syzkaller0 (unregistering): left allmulticast mode [ 226.309136][T10731] SELinux: security_context_str_to_sid (ð) failed with errno=-22 [ 226.312412][T10730] xt_hashlimit: max too large, truncated to 1048576 [ 226.375907][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 226.455887][T10733] __nla_validate_parse: 1 callbacks suppressed [ 226.455916][T10733] netlink: 24 bytes leftover after parsing attributes in process `syz.4.2507'. [ 226.505606][T10737] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2507'. [ 226.679785][T10756] netlink: 24 bytes leftover after parsing attributes in process `syz.2.2517'. [ 226.693669][T10756] validate_nla: 2 callbacks suppressed [ 226.693690][T10756] netlink: 'syz.2.2517': attribute type 13 has an invalid length. [ 226.707157][T10756] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2517'. [ 227.003685][T10781] netlink: 24 bytes leftover after parsing attributes in process `syz.1.2529'. [ 227.024316][T10781] netlink: 'syz.1.2529': attribute type 13 has an invalid length. [ 227.032310][T10781] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2529'. [ 227.055904][T10785] loop3: detected capacity change from 0 to 256 [ 227.113318][T10787] loop0: detected capacity change from 0 to 512 [ 227.149427][T10787] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 227.186624][T10787] ext4 filesystem being mounted at /500/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 227.219204][T10787] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 227.359647][T10804] loop0: detected capacity change from 0 to 1024 [ 227.376865][T10804] EXT4-fs: Ignoring removed orlov option [ 227.403317][T10804] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 227.563948][T10816] netlink: 24 bytes leftover after parsing attributes in process `syz.2.2544'. [ 227.605172][T10816] netlink: 'syz.2.2544': attribute type 13 has an invalid length. [ 227.613108][T10816] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2544'. [ 227.949293][T10844] loop3: detected capacity change from 0 to 512 [ 228.000716][T10844] EXT4-fs (loop3): 1 orphan inode deleted [ 228.016861][ T3430] EXT4-fs error (device loop3): ext4_release_dquot:6971: comm kworker/u8:7: Failed to release dquot type 1 [ 228.031208][T10844] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 228.068097][T10844] ext4 filesystem being mounted at /520/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 228.145473][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 228.218853][T10849] loop3: detected capacity change from 0 to 512 [ 228.227262][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 228.245377][T10849] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 228.298906][T10849] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 228.336493][T10849] ext4 filesystem being mounted at /521/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 228.364634][T10849] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2558'. [ 228.411813][T10849] netlink: 'syz.3.2558': attribute type 13 has an invalid length. [ 228.485678][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 228.587083][T10880] loop3: detected capacity change from 0 to 512 [ 228.629091][T10880] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 228.666543][T10880] ext4 filesystem being mounted at /523/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 228.719855][T10880] EXT4-fs warning (device loop3): ext4_empty_dir:3088: inode #12: comm syz.3.2570: directory missing '.' [ 228.743147][T10886] xt_hashlimit: max too large, truncated to 1048576 [ 228.776699][T10886] Cannot find set identified by id 0 to match [ 228.792098][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 228.898368][T10898] netlink: 24 bytes leftover after parsing attributes in process `syz.1.2578'. [ 228.917328][T10898] netlink: 'syz.1.2578': attribute type 13 has an invalid length. [ 228.943792][T10905] syzkaller0: entered allmulticast mode [ 228.950022][T10905] syzkaller0: entered promiscuous mode [ 228.962399][T10905] syzkaller0 (unregistering): left promiscuous mode [ 228.969131][T10905] syzkaller0 (unregistering): left allmulticast mode [ 229.139137][T10933] loop3: detected capacity change from 0 to 512 [ 229.158772][T10933] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 229.194444][T10933] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 229.221362][T10933] ext4 filesystem being mounted at /528/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 229.226769][T10948] syzkaller0: entered allmulticast mode [ 229.243785][T10948] syzkaller0: entered promiscuous mode [ 229.251052][T10933] netlink: 'syz.3.2594': attribute type 13 has an invalid length. [ 229.259020][T10933] netlink: 'syz.3.2594': attribute type 27 has an invalid length. [ 229.267604][T10948] syzkaller0 (unregistering): left promiscuous mode [ 229.268415][T10946] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(6) [ 229.274357][T10948] syzkaller0 (unregistering): left allmulticast mode [ 229.280833][T10946] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 229.281030][T10946] vhci_hcd vhci_hcd.0: Device attached [ 229.316068][T10949] vhci_hcd: connection closed [ 229.320216][ T4184] vhci_hcd: stop threads [ 229.329496][ T4184] vhci_hcd: release socket [ 229.333952][ T4184] vhci_hcd: disconnect device [ 229.355595][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 229.463373][T10968] loop3: detected capacity change from 0 to 1024 [ 229.477571][T10968] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 229.488634][T10968] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 229.500687][T10968] JBD2: no valid journal superblock found [ 229.506650][T10968] EXT4-fs (loop3): Could not load journal inode [ 229.519753][T10968] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 229.553446][T10980] netlink: 'syz.1.2614': attribute type 13 has an invalid length. [ 229.561470][T10980] netlink: 'syz.1.2614': attribute type 27 has an invalid length. [ 229.608736][T10989] syzkaller0: entered allmulticast mode [ 229.615045][T10989] syzkaller0: entered promiscuous mode [ 229.623836][T10989] syzkaller0 (unregistering): left promiscuous mode [ 229.630773][T10989] syzkaller0 (unregistering): left allmulticast mode [ 229.638274][T10988] netlink: 'syz.4.2619': attribute type 13 has an invalid length. [ 229.701068][T10998] bridge: RTM_NEWNEIGH with invalid state 0x4 [ 229.788348][T11016] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 229.798169][T11016] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 229.813869][T11020] loop3: detected capacity change from 0 to 512 [ 229.821416][T11020] EXT4-fs: Ignoring removed orlov option [ 229.827505][T11020] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 229.828985][ T29] kauditd_printk_skb: 109 callbacks suppressed [ 229.829003][ T29] audit: type=1400 audit(1747172981.096:15245): avc: denied { execute } for pid=11021 comm="syz.1.2636" path="/486/file1" dev="tmpfs" ino=2541 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 229.867328][T11020] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 229.882487][T11020] ext4 filesystem being mounted at /541/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 229.898086][T11020] EXT4-fs warning (device loop3): ext4_group_add:1716: Can't resize non-sparse filesystem further [ 229.922189][T11030] syzkaller0: entered allmulticast mode [ 229.928043][T11030] syzkaller0: entered promiscuous mode [ 229.935449][T11020] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 229.945073][T11030] syzkaller0 (unregistering): left promiscuous mode [ 229.951748][T11030] syzkaller0 (unregistering): left allmulticast mode [ 230.138343][T11051] loop3: detected capacity change from 0 to 512 [ 230.159002][T11051] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 230.172467][T11051] ext4 filesystem being mounted at /545/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 230.226050][T11051] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 230.349121][T11064] loop3: detected capacity change from 0 to 512 [ 230.379546][T11064] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 230.430107][T11070] syzkaller0: entered allmulticast mode [ 230.446101][T11070] syzkaller0: entered promiscuous mode [ 230.461765][T11064] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 230.508406][T11064] ext4 filesystem being mounted at /546/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 230.521082][T11070] syzkaller0 (unregistering): left promiscuous mode [ 230.527812][T11070] syzkaller0 (unregistering): left allmulticast mode [ 230.638890][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 230.705526][T11082] loop3: detected capacity change from 0 to 512 [ 230.735000][T11082] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 230.785591][T11082] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 230.810922][T11090] xt_hashlimit: max too large, truncated to 1048576 [ 230.836449][T11082] ext4 filesystem being mounted at /547/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 230.857235][T11090] Cannot find set identified by id 0 to match [ 230.914222][T11082] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz.3.2661: bg 0: block 304: padding at end of block bitmap is not set [ 230.966446][T11082] EXT4-fs (loop3): Remounting filesystem read-only [ 231.022328][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 231.041165][ T51] Quota error (device loop3): dquot_write_dquot: Can't write quota structure (error -30). Quota may get out of sync! [ 231.064049][ T29] audit: type=1400 audit(1747172982.306:15246): avc: denied { read write } for pid=11098 comm="syz.4.2669" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 231.087998][ T29] audit: type=1400 audit(1747172982.306:15247): avc: denied { open } for pid=11098 comm="syz.4.2669" path="/dev/rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 231.117232][ T51] Quota error (device loop3): dquot_write_dquot: Can't write quota structure (error -30). Quota may get out of sync! [ 231.240285][T11110] loop3: detected capacity change from 0 to 512 [ 231.248584][T11110] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 231.270111][T11108] syzkaller0: entered allmulticast mode [ 231.278788][T11110] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 231.292090][T11108] syzkaller0: entered promiscuous mode [ 231.314104][T11108] syzkaller0 (unregistering): left promiscuous mode [ 231.320933][T11108] syzkaller0 (unregistering): left allmulticast mode [ 231.331756][T11110] ext4 filesystem being mounted at /549/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 231.357030][T11116] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 231.369127][T11116] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 231.432794][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 231.521405][T11124] loop3: detected capacity change from 0 to 512 [ 231.584535][T11124] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 231.608638][T11124] ext4 filesystem being mounted at /551/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 231.632366][ T29] audit: type=1400 audit(1747172982.896:15248): avc: denied { create } for pid=11123 comm="syz.3.2679" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=lnk_file permissive=1 [ 231.676495][ T29] audit: type=1400 audit(1747172982.926:15249): avc: denied { unlink } for pid=11123 comm="syz.3.2679" name="bus" dev="loop3" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=lnk_file permissive=1 [ 231.702649][T11133] xt_hashlimit: max too large, truncated to 1048576 [ 231.710793][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 231.759001][T11133] Cannot find set identified by id 0 to match [ 231.788145][ T29] audit: type=1326 audit(1747172983.056:15250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11134 comm="syz.3.2682" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f545666e969 code=0x7ffc0000 [ 231.811913][ T29] audit: type=1326 audit(1747172983.056:15251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11134 comm="syz.3.2682" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f545666e969 code=0x7ffc0000 [ 231.977499][ T29] audit: type=1326 audit(1747172983.056:15252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11134 comm="syz.3.2682" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f545666e969 code=0x7ffc0000 [ 232.029142][T11138] macvlan2: entered promiscuous mode [ 232.034491][T11138] bridge0: entered promiscuous mode [ 232.257930][T11146] lo speed is unknown, defaulting to 1000 [ 232.286709][T11147] __nla_validate_parse: 11 callbacks suppressed [ 232.286732][T11147] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2687'. [ 232.386139][T11146] dummy0 speed is unknown, defaulting to 1000 [ 232.871179][T11172] loop3: detected capacity change from 0 to 1024 [ 232.906843][T11172] EXT4-fs: Ignoring removed nomblk_io_submit option [ 232.935311][T11172] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 232.974291][T11172] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 233.078251][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 233.167878][T11177] syzkaller0: entered allmulticast mode [ 233.183379][T11177] syzkaller0: entered promiscuous mode [ 233.211783][T11177] syzkaller0 (unregistering): left promiscuous mode [ 233.218544][T11177] syzkaller0 (unregistering): left allmulticast mode [ 233.473885][T11205] loop0: detected capacity change from 0 to 128 [ 233.484869][T11204] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000100) [ 233.492897][T11204] FAT-fs (loop0): Filesystem has been set read-only [ 233.502446][T11204] syz.0.2713: attempt to access beyond end of device [ 233.502446][T11204] loop0: rw=524288, sector=2065, nr_sectors = 8 limit=128 [ 233.547337][T11204] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000100) [ 233.555218][T11204] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000100) [ 233.567659][T11205] syz.0.2713: attempt to access beyond end of device [ 233.567659][T11205] loop0: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 233.589940][T11205] syz.0.2713: attempt to access beyond end of device [ 233.589940][T11205] loop0: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 233.608871][T11212] xt_hashlimit: max too large, truncated to 1048576 [ 233.616490][T11212] Cannot find set identified by id 0 to match [ 233.630937][T11205] syz.0.2713: attempt to access beyond end of device [ 233.630937][T11205] loop0: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 233.664635][T11205] syz.0.2713: attempt to access beyond end of device [ 233.664635][T11205] loop0: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 234.056757][T11236] loop0: detected capacity change from 0 to 512 [ 234.069623][T11236] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 234.082341][T11236] ext4 filesystem being mounted at /524/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 235.158273][ T29] kauditd_printk_skb: 57 callbacks suppressed [ 235.158293][ T29] audit: type=1400 audit(1747172986.426:15310): avc: denied { name_bind } for pid=11262 comm="syz.2.2731" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 235.186544][ T29] audit: type=1400 audit(1747172986.426:15311): avc: denied { node_bind } for pid=11262 comm="syz.2.2731" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 235.388933][ T29] audit: type=1400 audit(1747172986.656:15312): avc: denied { create } for pid=11276 comm="syz.2.2742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 235.453316][ T29] audit: type=1400 audit(1747172986.686:15313): avc: denied { write } for pid=11276 comm="syz.2.2742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 235.503656][T11279] xt_hashlimit: max too large, truncated to 1048576 [ 235.520747][T11279] Cannot find set identified by id 0 to match [ 235.633516][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 235.660664][ T29] audit: type=1326 audit(1747172986.926:15314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11284 comm="syz.4.2746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a2751e969 code=0x7ffc0000 [ 235.665476][T11281] syzkaller0: entered allmulticast mode [ 235.720651][T11281] syzkaller0: entered promiscuous mode [ 235.733595][T11281] syzkaller0 (unregistering): left promiscuous mode [ 235.736824][ T29] audit: type=1326 audit(1747172986.956:15315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11284 comm="syz.4.2746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7f7a2751e969 code=0x7ffc0000 [ 235.740291][T11281] syzkaller0 (unregistering): left allmulticast mode [ 235.763884][ T29] audit: type=1326 audit(1747172986.956:15316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11284 comm="syz.4.2746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a2751e969 code=0x7ffc0000 [ 235.763914][ T29] audit: type=1326 audit(1747172986.956:15317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11284 comm="syz.4.2746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a2751e969 code=0x7ffc0000 [ 235.945274][ T29] audit: type=1326 audit(1747172987.206:15318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11298 comm="syz.2.2751" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f133bd0e969 code=0x7ffc0000 [ 235.969061][ T29] audit: type=1326 audit(1747172987.206:15319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11298 comm="syz.2.2751" exe="/root/syz-executor" sig=0 arch=c000003e syscall=116 compat=0 ip=0x7f133bd0e969 code=0x7ffc0000 [ 236.021396][T11301] xt_hashlimit: max too large, truncated to 1048576 [ 237.075807][T11344] xt_hashlimit: max too large, truncated to 1048576 [ 237.100582][T11344] Cannot find set identified by id 0 to match [ 237.682669][T11373] netlink: 56 bytes leftover after parsing attributes in process `syz.3.2784'. [ 237.691741][T11373] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2784'. [ 237.893856][T11399] loop0: detected capacity change from 0 to 512 [ 237.926819][T11399] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 237.983159][T11399] EXT4-fs (loop0): 1 truncate cleaned up [ 237.998010][T11399] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 238.085290][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 238.368321][T11429] syzkaller0: entered allmulticast mode [ 238.376502][T11429] syzkaller0: entered promiscuous mode [ 238.404666][T11429] syzkaller0 (unregistering): left promiscuous mode [ 238.411465][T11429] syzkaller0 (unregistering): left allmulticast mode [ 238.740286][T11444] xt_hashlimit: max too large, truncated to 1048576 [ 239.887864][T11488] xt_hashlimit: max too large, truncated to 1048576 [ 239.919550][T11488] Cannot find set identified by id 0 to match [ 240.039446][T11495] xt_hashlimit: max too large, truncated to 1048576 [ 240.401691][ T29] kauditd_printk_skb: 56 callbacks suppressed [ 240.401710][ T29] audit: type=1326 audit(1747172991.666:15376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11507 comm="syz.1.2838" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f837fdce969 code=0x7ffc0000 [ 240.438429][ T29] audit: type=1326 audit(1747172991.666:15377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11507 comm="syz.1.2838" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f837fdce969 code=0x7ffc0000 [ 240.463671][ T29] audit: type=1326 audit(1747172991.706:15378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11507 comm="syz.1.2838" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f837fdce969 code=0x7ffc0000 [ 240.487431][ T29] audit: type=1326 audit(1747172991.706:15379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11507 comm="syz.1.2838" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f837fdce969 code=0x7ffc0000 [ 240.511060][ T29] audit: type=1326 audit(1747172991.706:15380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11507 comm="syz.1.2838" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f837fdce969 code=0x7ffc0000 [ 240.535827][ T29] audit: type=1326 audit(1747172991.736:15381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11507 comm="syz.1.2838" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f837fdce969 code=0x7ffc0000 [ 240.591109][ T29] audit: type=1326 audit(1747172991.826:15382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11507 comm="syz.1.2838" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f837fdce969 code=0x7ffc0000 [ 240.614936][ T29] audit: type=1326 audit(1747172991.826:15383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11507 comm="syz.1.2838" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f837fdce969 code=0x7ffc0000 [ 240.638543][ T29] audit: type=1326 audit(1747172991.836:15384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11507 comm="syz.1.2838" exe="/root/syz-executor" sig=0 arch=c000003e syscall=109 compat=0 ip=0x7f837fdce969 code=0x7ffc0000 [ 240.662336][ T29] audit: type=1326 audit(1747172991.836:15385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11507 comm="syz.1.2838" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f837fdce969 code=0x7ffc0000 [ 240.716448][T11515] loop0: detected capacity change from 0 to 512 [ 240.737743][T11515] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (57259!=33349) [ 240.758220][T11515] EXT4-fs (loop0): orphan cleanup on readonly fs [ 240.780209][T11515] EXT4-fs error (device loop0): ext4_read_block_bitmap_nowait:517: comm syz.0.2841: Block bitmap for bg 0 marked uninitialized [ 240.847673][T11515] EXT4-fs error (device loop0) in ext4_mb_clear_bb:6548: Corrupt filesystem [ 240.871760][T11515] EXT4-fs (loop0): 1 orphan inode deleted [ 240.883386][T11515] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: none. [ 240.956466][T11515] EXT4-fs (loop0): warning: mounting fs with errors, running e2fsck is recommended [ 240.978100][T11515] EXT4-fs (loop0): re-mounted 00000000-0000-0000-0000-000000000000 r/w. [ 241.085170][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 241.344036][T11546] x_tables: duplicate underflow at hook 1 [ 241.539850][T11554] loop0: detected capacity change from 0 to 4096 [ 241.596930][T11554] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 241.633711][T11561] netlink: 76 bytes leftover after parsing attributes in process `syz.1.2860'. [ 241.666838][T11554] EXT4-fs error (device loop0): ext4_do_update_inode:5211: inode #15: comm syz.0.2858: corrupted inode contents [ 241.702890][T11554] EXT4-fs error (device loop0): ext4_dirty_inode:6103: inode #15: comm syz.0.2858: mark_inode_dirty error [ 241.730308][T11563] loop3: detected capacity change from 0 to 1024 [ 241.767470][T11554] EXT4-fs error (device loop0): ext4_do_update_inode:5211: inode #15: comm syz.0.2858: corrupted inode contents [ 241.781730][T11563] EXT4-fs: Ignoring removed orlov option [ 241.812312][T11554] EXT4-fs error (device loop0): __ext4_ext_dirty:207: inode #15: comm syz.0.2858: mark_inode_dirty error [ 241.826666][T11563] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 241.857614][T11554] EXT4-fs error (device loop0): ext4_do_update_inode:5211: inode #15: comm syz.0.2858: corrupted inode contents [ 241.870331][T11554] EXT4-fs error (device loop0): __ext4_ext_dirty:207: inode #15: comm syz.0.2858: mark_inode_dirty error [ 241.883323][T11554] EXT4-fs error (device loop0): ext4_do_update_inode:5211: inode #15: comm syz.0.2858: corrupted inode contents [ 241.907616][T11554] EXT4-fs error (device loop0): ext4_truncate:4255: inode #15: comm syz.0.2858: mark_inode_dirty error [ 241.920140][T11554] EXT4-fs error (device loop0) in ext4_setattr:5628: Corrupt filesystem [ 241.944758][T11554] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 242.190269][T11586] loop0: detected capacity change from 0 to 512 [ 242.228256][T11586] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 242.260187][T11586] ext4 filesystem being mounted at /551/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 242.326072][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 242.471213][T11603] syzkaller0: entered allmulticast mode [ 242.480028][T11603] syzkaller0: entered promiscuous mode [ 242.488482][T11603] syzkaller0 (unregistering): left promiscuous mode [ 242.495175][T11603] syzkaller0 (unregistering): left allmulticast mode [ 242.559743][T11609] xt_hashlimit: max too large, truncated to 1048576 [ 242.588130][T11609] Cannot find set identified by id 0 to match [ 242.610316][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 243.451315][T11684] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2915'. [ 243.460477][T11684] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2915'. [ 243.492954][T11686] loop3: detected capacity change from 0 to 512 [ 243.507719][T11686] journal_path: Non-blockdev passed as './bus' [ 243.513974][T11686] EXT4-fs: error: could not find journal device path [ 243.720944][T11711] xt_hashlimit: max too large, truncated to 1048576 [ 243.747072][T11711] Cannot find set identified by id 0 to match [ 243.896110][T11726] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2934'. [ 244.034986][T11738] loop3: detected capacity change from 0 to 512 [ 244.050414][T11738] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 244.086035][T11738] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 244.096182][T11738] EXT4-fs (loop3): group descriptors corrupted! [ 244.217465][T11755] xt_hashlimit: max too large, truncated to 1048576 [ 244.239258][T11755] Cannot find set identified by id 0 to match [ 244.510710][T11770] loop3: detected capacity change from 0 to 1024 [ 244.536836][T11770] EXT4-fs: Ignoring removed nobh option [ 244.542467][T11770] EXT4-fs: Ignoring removed bh option [ 244.594687][T11770] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 244.683838][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 244.833673][T11795] netlink: 16 bytes leftover after parsing attributes in process `syz.3.2965'. [ 244.926506][T11798] loop0: detected capacity change from 0 to 1024 [ 244.955632][T11798] EXT4-fs: Ignoring removed orlov option [ 244.976495][T11798] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 245.073302][T11809] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2971'. [ 245.082643][T11809] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2971'. [ 245.103297][T11813] netlink: 20 bytes leftover after parsing attributes in process `syz.3.2972'. [ 245.132837][T11818] SELinux: syz.3.2975 (11818) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 245.209554][T11814] ================================================================== [ 245.217913][T11814] BUG: KCSAN: data-race in filemap_write_and_wait_range / xas_set_mark [ 245.226367][T11814] [ 245.228711][T11814] write to 0xffff888106f218d4 of 4 bytes by task 11798 on cpu 1: [ 245.236474][T11814] xas_set_mark+0x12b/0x140 [ 245.241082][T11814] __folio_start_writeback+0x1dd/0x430 [ 245.246642][T11814] ext4_bio_write_folio+0x590/0x9d0 [ 245.251876][T11814] mpage_process_page_bufs+0x46c/0x5b0 [ 245.257534][T11814] mpage_prepare_extent_to_map+0x775/0xb80 [ 245.263374][T11814] ext4_do_writepages+0xa25/0x2270 [ 245.268504][T11814] ext4_writepages+0x176/0x300 [ 245.273284][T11814] do_writepages+0x1d5/0x480 [ 245.277893][T11814] file_write_and_wait_range+0x156/0x2c0 [ 245.283560][T11814] generic_buffers_fsync_noflush+0x45/0x120 [ 245.289470][T11814] ext4_sync_file+0x1ab/0x690 [ 245.294167][T11814] vfs_fsync_range+0x10d/0x130 [ 245.298963][T11814] ext4_buffered_write_iter+0x34f/0x3c0 [ 245.304530][T11814] ext4_file_write_iter+0xdbf/0xf00 [ 245.309774][T11814] iter_file_splice_write+0x5ef/0x970 [ 245.315164][T11814] direct_splice_actor+0x156/0x2a0 [ 245.320413][T11814] splice_direct_to_actor+0x312/0x680 [ 245.326312][T11814] do_splice_direct+0xda/0x150 [ 245.331187][T11814] do_sendfile+0x380/0x640 [ 245.335629][T11814] __x64_sys_sendfile64+0x105/0x150 [ 245.341050][T11814] x64_sys_call+0xb39/0x2fb0 [ 245.345696][T11814] do_syscall_64+0xd0/0x1a0 [ 245.350253][T11814] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 245.356171][T11814] [ 245.358511][T11814] read to 0xffff888106f218d4 of 4 bytes by task 11814 on cpu 0: [ 245.366149][T11814] filemap_write_and_wait_range+0xfc/0x340 [ 245.371985][T11814] filemap_invalidate_pages+0xa4/0x1a0 [ 245.377462][T11814] kiocb_invalidate_pages+0x6e/0x80 [ 245.382685][T11814] __iomap_dio_rw+0x5d4/0x1250 [ 245.387458][T11814] iomap_dio_rw+0x40/0x90 [ 245.391802][T11814] ext4_file_write_iter+0xad9/0xf00 [ 245.397017][T11814] iter_file_splice_write+0x5ef/0x970 [ 245.402423][T11814] direct_splice_actor+0x156/0x2a0 [ 245.407564][T11814] splice_direct_to_actor+0x312/0x680 [ 245.412951][T11814] do_splice_direct+0xda/0x150 [ 245.417730][T11814] do_sendfile+0x380/0x640 [ 245.422156][T11814] __x64_sys_sendfile64+0x105/0x150 [ 245.427383][T11814] x64_sys_call+0xb39/0x2fb0 [ 245.431985][T11814] do_syscall_64+0xd0/0x1a0 [ 245.436505][T11814] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 245.442410][T11814] [ 245.444747][T11814] value changed: 0x0a000021 -> 0x04000021 [ 245.450506][T11814] [ 245.452864][T11814] Reported by Kernel Concurrency Sanitizer on: [ 245.459306][T11814] CPU: 0 UID: 0 PID: 11814 Comm: syz.0.2966 Not tainted 6.15.0-rc6-syzkaller-00051-g405e6c37c89e #0 PREEMPT(voluntary) [ 245.471866][T11814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 245.481952][T11814] ================================================================== [ 245.723362][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000.