last executing test programs: 4m41.355233427s ago: executing program 4 (id=3690): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x69, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000d00)=""/242, 0xfffffd63}, {&(0x7f0000000240)=""/205, 0xcd}, {&(0x7f0000000380)=""/210, 0xd2}, {&(0x7f00000006c0)=""/188, 0xc9}, {&(0x7f0000000f40)=""/213, 0xd5}, {&(0x7f0000002100)=""/4077, 0xfed}, {&(0x7f00000007c0)=""/211, 0xd3}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000480)=""/176, 0xb0}, {&(0x7f0000000c00)=""/208, 0xd0}], 0xa}, 0x40012100) recvmsg$kcm(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) recvmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 4m41.184783971s ago: executing program 4 (id=3699): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000046c0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x8000000, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x2, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x40000000, 0x1000, 0x2, 0x0, 0x0, 0x8000002, 0x0, 0x7e150a0b, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0xfffffffd, 0x0, 0x10000, 0x5d2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x1007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x3, 0x0, 0x1, 0x8, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x9, 0x0, 0x0, 0x7, 0xfbfffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x4fd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x7e98263b, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2d1, 0x0, 0x0, 0xb2e, 0x0, 0xfffffffe, 0xfffffffe, 0x0, 0x0, 0xff, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x6, 0xc3f3, 0x1, 0x0, 0x800, 0x9, 0x800, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0xfffffffe, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0xfffffffd, 0x0, 0x0, 0xd819ac9, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x0, 0x0, 0x80000001, 0x0, 0x10, 0x20, 0x4, 0x400000b2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1000, 0x100, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x1, 0x4, 0xfffffffe, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0x20000040, 0xffffffff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0xaaf0]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x3, 0x0, 0x0, 0x0, 0xc0000001}, {0x3, 0x0, 0xb, 0x0, 0x0, 0xffffffff}, 0x7, 0x10, 0x2000000}}]}}]}, 0x45c}}, 0x0) 4m41.092233333s ago: executing program 4 (id=3703): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r2}, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r3, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) 4m40.463565095s ago: executing program 4 (id=3718): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x808003, &(0x7f0000000000), 0x3, 0x4fc, &(0x7f0000001500)="$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") r2 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$binfmt_register(r2, &(0x7f0000000000)={0x3a, 'syz2', 0x3a, 'E', 0x3a, 0x7, 0x3a, 'M', 0x3a, 'M', 0x3a, './file2', 0x3a, [0x46]}, 0x2a) 4m40.292289238s ago: executing program 4 (id=3721): socket$packet(0x11, 0xa, 0x300) socket$packet(0x11, 0xa, 0x300) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000002c0)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="259a53f271a76d2688ca4c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 4m40.17069505s ago: executing program 4 (id=3723): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000008c0), 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x1fffffd, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xb851}, 0x1c) 4m40.115150481s ago: executing program 32 (id=3723): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000008c0), 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x1fffffd, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xb851}, 0x1c) 4m0.086563554s ago: executing program 5 (id=5048): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000540)='./file0\x00', 0x80000a, &(0x7f0000000240)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@gid}, {@hide}, {@utf8}, {@nocompress}, {@check_relaxed}, {@map_off}, {@cruft}]}, 0x2, 0x533, &(0x7f0000001000)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r2, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)=[0x6], 0x0, 0x0, 0x1}}, 0x40) 3m59.932698047s ago: executing program 5 (id=5052): unshare(0xa050400) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8923, &(0x7f0000000040)={'bond0\x00', 0x1001}) 3m59.848893769s ago: executing program 5 (id=5054): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0xb30, 0x0, 0x0, 0x40f00, 0x49, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x109}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00', r1}, 0x18) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000007c0)=@newqdisc={0x4c, 0x24, 0xd0f, 0x3, 0x0, {0x60, 0x0, 0x0, r3, {0x0, 0x2}, {0xffff, 0xffff}, {0x4}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x10, 0x3, 0x1, 0x3, 0x400, 0x8}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40001d4}, 0x8840) 3m59.79464945s ago: executing program 5 (id=5056): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = open_tree(r0, &(0x7f0000000bc0)='./file0\x00', 0x801) move_mount(r1, &(0x7f00000001c0)='.\x00', r0, &(0x7f0000000300)='./file0\x00', 0x220) 3m59.740001491s ago: executing program 5 (id=5057): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r3, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01dfffffff9a26000000210000000c00018008000100", @ANYRES32=r2], 0x20}, 0x1, 0x0, 0x0, 0x4000c00}, 0x0) 3m59.059384494s ago: executing program 5 (id=5071): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000b00)={0xa, 0xfdfe, 0x100007, @remote, 0xa}, 0x1c) connect$pppl2tp(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x8, 0x0, 0x2, 0x0, {0xa, 0x0, 0xf9d, @private2={0xfc, 0x2, '\x00', 0x1}}}}, 0x32) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x34000}], 0x1) 3m59.016751635s ago: executing program 33 (id=5071): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000b00)={0xa, 0xfdfe, 0x100007, @remote, 0xa}, 0x1c) connect$pppl2tp(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x8, 0x0, 0x2, 0x0, {0xa, 0x0, 0xf9d, @private2={0xfc, 0x2, '\x00', 0x1}}}}, 0x32) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x34000}], 0x1) 2m46.365337069s ago: executing program 0 (id=7178): connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(&(0x7f0000001cc0), 0x80000) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000800)={{0x2, 0x4e1f, @remote}, {0x0, @remote}, 0x0, {0x2, 0x4e21, @empty}, 'lo\x00'}) 2m46.29297215s ago: executing program 0 (id=7181): r0 = syz_io_uring_setup(0x24fa, &(0x7f00000006c0)={0x0, 0x35cd, 0x10100, 0x3, 0x8f}, &(0x7f0000000100)=0x0, &(0x7f0000000180)=0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="2600000022004701050007108980e8ff06006d20002b1ffec0", 0x19) write$UHID_CREATE2(r3, &(0x7f0000000040)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x24844}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 2m46.266732441s ago: executing program 0 (id=7183): r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000180)=ANY=[@ANYBLOB="680000001000030400"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000400012800c0001006d6163766c616e003000028008000100100000001c0005800a000400aaaaaaaaaabb00000a000400aaaaaaaaaa0000000800030003"], 0x68}}, 0x64000004) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x101100, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 2m46.161535703s ago: executing program 0 (id=7185): syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='mnt\x00', 0x4, &(0x7f0000000000), 0x0, 0x236, &(0x7f0000000300)="$eJzs3TFoM2UcBvDnLomf/b4gVRdBUEFEtFDqJrjURaEgpYgIKlREXJRWqC1urZOLg84qnVyKuFkdpUtxUQSnqh3qImhxsDjoELlcK9VGFFNz8t3vB5fcJe97//e4e95kOS5Aa00nmU/SSTKTpJekON/grnqZPt3cntpfTgaDx38shu3q7dpZv2tJtpI8mGSvLPJiN9nYffro54NH731jvXfPe7tPTU30IE8dHx0+dvLu4usfLjyw8fmX3y8WmU//D8d1+YoRn3WL5Jb/otj/RNFtegT8E0uvfvBVlftbk9w9zH8vZeqT9+baDXu93P/OX/V964cvbp/kWIHLNxj0qt/ArQHQOmWSfopyNkm9Xpazs/V/+K87V8uXVtdemXlhdX3l+aZnKuCy9JPDRz6+8tG1P+X/u06df+D6VeX/iaWdb6r1k07TowEmqcr/zLOb90X+oXXkH9pL/qG95B/aS/6hveQf2kv+ob3kH9pL/qG95B/a63z+AYB2GVxp+g5koClNzz8AAAAAAAAAAAAAAAAAAMBF21P7y2fLpGp++nZy/HCS7qj6neHziJMbh69XfyqqZr8r6m5jeebOMXcwpvcbvvv6pm+brf/ZHc3W31xJtl5LMtftXrz+itPr79+7+W++7z03ZoExPfRks/V/3Wm2/sJB8kk1/8yNmn/K3DZ8Hz3/9KvzN2b9l38ZcwcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABMzG8BAAD//8n0bSk=") syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x185093, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x20000, 0x0) move_mount(r0, &(0x7f0000008080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x152) 2m45.927471618s ago: executing program 0 (id=7190): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) 2m45.774700081s ago: executing program 0 (id=7195): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex_waitv(&(0x7f0000001080)=[{0x3, &(0x7f0000001040)=0x3, 0x82}], 0x1, 0x0, 0x0, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) 2m45.743481551s ago: executing program 34 (id=7195): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex_waitv(&(0x7f0000001080)=[{0x3, &(0x7f0000001040)=0x3, 0x82}], 0x1, 0x0, 0x0, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) 2m34.075579183s ago: executing program 7 (id=7581): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) io_setup(0x8f0, &(0x7f0000002400)=0x0) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2002000000, 0x4, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="5c00ffff0000", 0x6, 0x0, 0x0, 0x2}]) 2m33.963262305s ago: executing program 7 (id=7587): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3, 0x0, 0x7fff}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000200), &(0x7f0000000240)=r2}, 0x20) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x548}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) 2m33.913086977s ago: executing program 7 (id=7589): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000020000000000002000085000000ae00000095"], &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x41, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000140)='kfree\x00', r0}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'tunl0\x00', 0x0}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002bbd7000000000001c0000002000018014000200766c616e31000000000000000000000008000100", @ANYRES32=r4], 0x34}}, 0x0) 2m33.854674468s ago: executing program 7 (id=7591): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0/../file0\x00', 0x0, 0x2125099, 0x0) mount$cgroup2(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000000), 0x81, 0x0) 2m33.794318219s ago: executing program 7 (id=7594): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffd8, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) setsockopt(r0, 0x84, 0x81, &(0x7f0000000280)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000001280)={0x0, 0x0, 0x1, "e0"}, 0x9) 2m33.530738904s ago: executing program 7 (id=7599): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000400000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe26}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x18) setuid(0x0) 2m33.468334235s ago: executing program 35 (id=7599): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000400000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe26}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x18) setuid(0x0) 1.944992513s ago: executing program 1 (id=13586): mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x11c0, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x3}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040), 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x148640, 0x78e22799f4a46f8e) 1.430816923s ago: executing program 8 (id=13583): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_bridge\x00', 0x200}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000002c0)={0x2, 'veth1_virt_wifi\x00'}, 0x18) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x38, 0x1403, 0x1, 0x70bd2d, 0x25dfdbfb, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'bond_slave_0\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x24000811}, 0x0) 1.399853573s ago: executing program 8 (id=13585): syz_mount_image$iso9660(&(0x7f0000000dc0), &(0x7f0000002380)='./file1\x00', 0x3a0cc0a, &(0x7f00000023c0)=ANY=[@ANYBLOB='hide,dmode=0x0000000000000005,map=normal,map=normal,session=0x000000000000000e,overriderockperm,showassoc,nocompress,utf8,map=normal,session=0x0000000000000006,map=acorn,mode=0x0000000000000086,uid=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00', @ANYRESDEC, @ANYRESDEC, @ANYRES8, @ANYRESDEC], 0x43, 0xa02, &(0x7f0000003640)="$eJzs3U9sXdWdB/DvfbYTj4lCgAyTQUBewgQMZBzbGcJEbCaxnxMz/jOyHYloNCIMSaooVqmgSIAqNZWqroraRdUF3SF10xUSG9hU2bXbbrqoVLHuDnUVddFX3fueYzv283MSxzbh87Ge3/3zu+f8zrv33SNfv3dP+CZrNpvV4x7nL/xmO5Nl9zk7/tWnn31cPn50I3vSk1eKL5L+JPWkN8mhJGPjc7PTXQq6nlxKcjMpkuxN63lTLqX4WfYtz99M8auq3tKFe2wYm9LkW22njz8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANiNirHx4eGRIlOTMxfeqHdWDQHeaWVtubwvq1G/iy+71psU5SP9/UtDfR86uLz6yfLX0Tzdmnu6GpA8/fnokScPvPZEb21p+w0Svht/bw+GfNcbvvfhR9ffWly88m6H9T3t5tx3hrvUucbM5Pzs5PSZc4365Pxs/fSpU8Mnzk/M1ycmpxrzF+cXGtP1sbnGmYXZufrg2Iv1kdOnT9YbQxdnL8ycGx+aaiwtfPXfR4eHT9VfH/qfxpm5+dmZE68PzY+dn5yampw5V8WUq8uYV8sD8b8nF+oLjTPT9frVa4tXTq7KaJ2Xugwa6daSMmi0W9Do8OjoyMjo6MipV06/8urwcO/ygp5UC4bvkDWb3D5os+/hPS6+hT6pbSKoPDnWt/DsDfen1u7/M5XJzORC3kh93Z+xjGcus5nusL5tqf8/dqKxYb0r+/+lXv7Q8uqnUvX/z7bmnu3U/3fIZft+3suH+SjX81YWs5greXfV2r33UGKzuX6rfv2H1mux0y1e/XMujcxkMvOZzWSmc6ZaUm8vqed0TuVUhvNmzmci86lnIpOZSiPzuZj5LKRRHVFjmUsjZ7LQ22rjYMbyYuoZyemczsnU08hQLmY2FzKTcxnPmaqUq7lWve4nN8jxdtDIZoJGNwjaoP9vL7iL/p9vqa0+hcM9a7b7/z13LK+tDR0c266kAAAAgC31r7/P/oOP/+7PSV+eqa6xAwAAAA+b6uN6T5dPfeXUMykmJqcaw2sD39/+3AAAAICtUVTfsSuSDORwa2rpm1DrXAQAAAAAvomq//8/Wz4NlFOHU/j7HwAAAB423e+x3zWiOJ56bpSr6pdbkZfbEe37/A5MTE41hsZmp14byfPVXQaqbxqsKa0nB5Lq6wcv5Ugr6shA63lgdYn9ZdTI0Gsj6c/RdkMGnyufnhtcJ3K0jHwpL7QiX1iK7M+ayJNlJAA87I5u0B9vtv9/KcdbEcefqm7f3vvUOn3wcKtn/eEOtRMAWNZ9jJ2uEcV/LA3/0+Hv/55cPdz6SMFQ3s47WczlHK++bVB94qBdam4WWS51YMXHEI53uRowsGKEl+NL1wMO71v3esDAioFejq+5ItAp9uS6r12x5XsDALbH0TX98Ab9f7PZmlpz/X/jv/8HfKQQAHaV2yPYP8CJO+vs25mmAgBtnXvpDfQ8wIQAAAAAAAAAAAAAAAAAAAAAAAAAAADgIfAg7/9fS/JgRxa4j4kbSXZBGts88Zf2bl+zqr38xo5nuGJib+6/nP5tGeHiw//bs4sP9Xub2MGTEgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANumSHrWW15L9ia9w0lObH9WD86NnU5ghxW3cisfZP9O5wEAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8LBp3/+/ltbzI61F6a0lx5JcSvK/O53jVrq10wnssBX3/y/3eZpFelu7PUXf2Pjc7HS5+7O3XP/Vp599XD7upZ6ygLKGVYNLtGvovNVj1VYD41feu/79d75XHz9bJXl2YWJqfPrc3H8tBz5ZfJ7U03osWcr3B0X7KF7d8s/Llnavt6xloqp3fG29/7Le1rfrPfbbn3du27LlNK4tXhkta1povLHw/nevfbAi6PEcSZ4bTAZX1/Sd8tGhpiPp26je4uviJ8X+/DKXqv1fplE0i3IXPZrsSe2frl5bvDL09juLlzvkdCCHk1xO+jef0+G1e2JJddTV+spah6ug8tfBLuVt6JGe/c1mq8SRDm14rDpkBu6qDfXObah0ed3bbTzZIaMn8vxd7+nnu9TY9rdmS2uu+Lr4U3E+f8yPV4z/USv3/7Fs5t1ZxlSRK46Uzm0+ttzy0ZUr3rwzsuO7kgfgp/n//Oft/V9bcf5v76vtOR+tqPGBvS+KVi/UVk0fvKNHap99OmXZzvNgK6pDnv+cl9du1yXPl7ucUbbo/b9a8XXxSTGYv+aG8X8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDdr0h61lteS44lOZDk0XK+njS3or7aQLEVxWzSnjVLbmxj7btH7fZUcSu38kH272g6AAAAAAAAAGyZs+NfffrZx+Wj+n98T/6t+CLpb/2nvzfJgeIXfWPjc7PTXQrqSy4luVlO999dDuV22bc8f7OcO3T3bQEANucfAQAA//+INm5i") syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="73686f72746e616d653d77696e39352c73686f72746e616d653d77696e6e742c756e695f786c6174653d302c756e695f786c6174653d312c757466383d312c757466383d312c646973636172642c757466383d302c756e695f786c6174653d302c666c7573682c73686f72746e616d653d6d697865642c73686f72746e616d653d6c6f7765722c646f733178666c6f7070792c73686f72746e616d653d77696e6e742c73686f72746e616d653d6c6f7765722c757466382c0014697a7960fb374b723f64329787434c6c9f891d2e309efaf1d4e529e1ba0f697fedffb095592bc19d5a8f8141ee9bf46262f3a2b1452bf206c0e2ae8a465e6e1be6eeb5d588035a24458d476fc1f9a234cdc4ba352a4185614ce67df4870bff796357ee95fffb99cde9"], 0xfe, 0x2ae, &(0x7f0000000a40)="$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") pipe2(0x0, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x109041, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x81105a, 0x0) mount$bind(&(0x7f0000000880)='./file0/../file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x1adc11, 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x887008, 0x0) umount2(&(0x7f0000000240)='./file0/file0\x00', 0x2) 1.345011094s ago: executing program 8 (id=13589): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = socket(0x11, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'gre0\x00', 0x0}) bind$packet(r2, &(0x7f0000000180)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000240)=0xe9, 0x4) sendmsg$netlink(r2, &(0x7f0000002ac0)={0x0, 0xb, &(0x7f0000000540)=[{&(0x7f0000000440)=ANY=[@ANYBLOB="02012c00012918000e3580009f0001140000002f0600ac141414e0000003808a8972bd0b72e41082b1a3d2061fd7fdfe4b88942a31f48597e36e039b1c599db6e466749c2d4c8303a0f7fbda34fb8825f80200e3c0aba61f6304a80500ffffca88faca"], 0xdd12}], 0x1}, 0x0) 1.220139907s ago: executing program 8 (id=13604): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x18) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) set_mempolicy_home_node(&(0x7f0000146000/0x1000)=nil, 0x1000, 0x0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x0) 1.120466669s ago: executing program 6 (id=13594): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) 1.119788239s ago: executing program 3 (id=13596): r0 = epoll_create(0x3ff) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0000000}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000280)={0x2000000}) 1.06876185s ago: executing program 3 (id=13597): unshare(0x66000080) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x1, 0x553, &(0x7f0000001080)="$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") open(0x0, 0x145142, 0x0) open(0x0, 0x4827e, 0xdc) syz_usb_connect(0x0, 0x24, 0x0, 0x0) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x54, r0, 0x1, 0xfffffffd, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}, {0xc, 0x90, 0x5}, {0xc, 0x90, 0x8000000000000001}}]}, 0x54}}, 0x40) 1.06533816s ago: executing program 6 (id=13598): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) r1 = io_uring_setup(0x423d, &(0x7f00000000c0)={0x0, 0x6087, 0x1040, 0x3, 0x160}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r1, 0xb, &(0x7f00000004c0), 0x0) io_uring_register$IORING_REGISTER_ENABLE_RINGS(r1, 0xc, 0x0, 0x0) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r1, 0x13, 0x0, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x10e, &(0x7f00000000c0)={[{@stripe={'stripe', 0x3d, 0x3}}, {@noinit_itable}, {@jqfmt_vfsold}, {@stripe={'stripe', 0x3d, 0x8}}, {@orlov}, {@stripe={'stripe', 0x3d, 0xbb3d}}]}, 0x4, 0x470, &(0x7f0000000540)="$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") 621.497568ms ago: executing program 1 (id=13599): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008"], 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0x2, 0x80805, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x18) setgroups(0x0, 0x0) 620.224578ms ago: executing program 6 (id=13613): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) unshare(0x20060400) r2 = syz_io_uring_setup(0x70ad, &(0x7f0000000240)={0x0, 0x5a36, 0x3180, 0x0, 0x40024f}, &(0x7f0000000340)=0x0, &(0x7f00000004c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_MSG_RING={0x28, 0x6, 0x0, r2, 0x0, 0x0, 0x0, 0x2}) io_uring_enter(r2, 0x627, 0x4c1, 0x43, 0x0, 0x0) 615.273588ms ago: executing program 8 (id=13601): syz_usb_connect(0x5, 0xc9, &(0x7f0000000040)=ANY=[@ANYBLOB="120101029cf8cd08042348028c7c010203010902b70002020c508209049301039df99ab1052406000005240087000d240f01080000000e008000020210000205c20307250181485400072501800900fffffffffffffffa0001020f0905"], 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r1, 0x65, 0x1, &(0x7f0000000080), 0x1d0) bind$can_raw(r1, &(0x7f0000000000), 0x10) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r2, 0x65, 0x1, &(0x7f0000000080), 0x1d0) bind$can_raw(r2, &(0x7f00000001c0), 0x10) dup3(r0, r1, 0x0) 489.331031ms ago: executing program 2 (id=13602): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = socket(0x11, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'gre0\x00', 0x0}) bind$packet(r2, &(0x7f0000000180)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000240)=0xe9, 0x4) sendmsg$netlink(r2, &(0x7f0000002ac0)={0x0, 0xb, &(0x7f0000000540)=[{&(0x7f0000000440)=ANY=[@ANYBLOB="02012c00012918000e3580009f0001140000002f0600ac141414e0000003808a8972bd0b72e41082b1a3d2061fd7fdfe4b88942a31f48597e36e039b1c599db6e466749c2d4c8303a0f7fbda34fb8825f80200e3c0aba61f6304a80500ffffca88faca"], 0xdd12}], 0x1}, 0x0) 426.166542ms ago: executing program 2 (id=13617): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) unshare(0x20060400) r2 = syz_io_uring_setup(0x70ad, &(0x7f0000000240)={0x0, 0x5a36, 0x3180, 0x0, 0x40024f}, &(0x7f0000000340)=0x0, &(0x7f00000004c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_MSG_RING={0x28, 0x6, 0x0, r2, 0x0, 0x0, 0x0, 0x2}) io_uring_enter(r2, 0x627, 0x4c1, 0x43, 0x0, 0x0) 238.747496ms ago: executing program 3 (id=13606): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x3, 0x7, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffffe}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r2}, 0x10) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x304}, "a6341a1a379332f5", "1fd33c81cf7995313c09de00fd6ded74", "62266bd8", "0500"}, 0x28) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x304}, "3b444c4a45b2809e", "4db9f6c4a51139c579f71eb12c5d8c9e", "d597a076", "a9f99e0b9f466c49"}, 0x28) 238.492116ms ago: executing program 6 (id=13607): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x20) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x8000, 0x20) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x804000, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, 0x12, r3, 0x0) 236.449155ms ago: executing program 1 (id=13608): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) r1 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r1, &(0x7f0000000200)={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0xc) r2 = syz_io_uring_setup(0x497, &(0x7f0000000240)={0x0, 0x4660, 0x800, 0x3, 0x285}, &(0x7f00000004c0)=0x0, &(0x7f0000000480)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r1, 0x0, 0x0}) io_uring_enter(r2, 0x3498, 0x969, 0x0, 0x0, 0x0) dup3(r2, r0, 0x80000) 235.967005ms ago: executing program 2 (id=13609): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002a20702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000380)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='kfree\x00', r1}, 0x18) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$selinux_access(r2, &(0x7f0000001a80)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a7570647077645f657865635f742073797374656d5f753a73797374656d5f723afaffffffffffffff3a73302030"], 0x56) 195.409737ms ago: executing program 6 (id=13611): r0 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xff7f) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r1, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="070000000400000008000000d9"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r3}, 0x18) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=@delchain={0x24, 0x11, 0x1, 0x1f, 0x0, {0x0, 0x0, 0x0, r1, {0x6}}}, 0x24}}, 0x0) 194.480126ms ago: executing program 3 (id=13612): getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0xf) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8f0, &(0x7f0000002400)=0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2000000000, 0x4, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)="0200ffff0000", 0x6, 0x0, 0x0, 0x2}]) 193.941267ms ago: executing program 2 (id=13623): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) r1 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r1, &(0x7f0000000200)={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0xc) r2 = syz_io_uring_setup(0x497, &(0x7f0000000240)={0x0, 0x4660, 0x800, 0x3, 0x285}, &(0x7f00000004c0)=0x0, &(0x7f0000000480)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r1, 0x0, 0x0}) io_uring_enter(r2, 0x3498, 0x969, 0x0, 0x0, 0x0) dup3(r2, r0, 0x80000) 193.438496ms ago: executing program 1 (id=13624): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x20) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x8000, 0x20) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x804000, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, 0x12, r3, 0x0) 80.092048ms ago: executing program 3 (id=13614): unshare(0x26020480) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x1, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff000000009408000000001700638af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000008000000850000006900000095"], &(0x7f0000005d80)='syzkaller\x00', 0xc}, 0x94) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x7}, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x7}, 0x4) setsockopt$packet_int(r2, 0x107, 0x16, &(0x7f0000000000)=0x4, 0x4) setsockopt$packet_int(r1, 0x107, 0x16, &(0x7f0000000000)=0x4, 0x4) 79.371138ms ago: executing program 2 (id=13627): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x67, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x2}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000000), &(0x7f00000000c0)=r1}, 0x20) r2 = syz_io_uring_setup(0x4b5, &(0x7f0000010400)={0x0, 0x86e1, 0x1, 0x8}, &(0x7f0000010080), &(0x7f0000000000)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000000140)=[{0x0}, {0x0}], 0x2) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4), 0xc) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r2, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) 77.659369ms ago: executing program 1 (id=13628): setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x210000000013, 0x0, 0x0) r0 = syz_io_uring_setup(0x7440, &(0x7f00000004c0)={0x0, 0xa6e9, 0x10100, 0x2, 0x26}, &(0x7f0000000140)=0x0, &(0x7f0000000380)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f00000001c0)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, {0x0, r3}}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB='.'], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r4, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_MKDIRAT={0x25, 0x3, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x1}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 52.198319ms ago: executing program 2 (id=13615): mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x11c0, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x3}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040), 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x148640, 0x78e22799f4a46f8e) 8.5161ms ago: executing program 8 (id=13616): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000100)={0x1, 0x80000001}, 0x8) connect$inet(r2, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) close(r2) 7.59887ms ago: executing program 3 (id=13631): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100202, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) statx(0xffffffffffffff9c, 0x0, 0x400, 0x10, 0x0) 3.19662ms ago: executing program 6 (id=13632): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r1}, 0x10) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000200)={'team_slave_1\x00', &(0x7f0000000000)=@ethtool_cmd={0x4a, 0x20000000, 0x0, 0x7, 0x0, 0x0, 0x5, 0x0, 0xfd}}) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) sigaltstack(&(0x7f0000000000)={0x0, 0x80000001}, 0x0) 0s ago: executing program 1 (id=13633): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x2, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "87ee8ac6c46dad33", "2607080d7f4fcf00fd4ef2dece6c7c58", '\x00', '#\x00'}, 0x28) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000280)="581a17919cc77431510e7fc4ed9fb860505f1495ff92f16a44f8a13d58751d926def1f80b315bdc726cdd8b5d1a91f485854af8fc854b0da7a02522fe7b2c21db7a46c48473099d4a4654cfd97a67c9e79afc0d444e6c78b0216d2201b128df9d4ed5b4dbe676fe56a6354f819d997a6acb8595633cff6f77473b2b3abcc65b51cb3d3a30bf9b0b2ce59d568d3a89b49331904da2a37c89ea236f5d5640c32c3ac74e4bde1a62c560cb63836552f881c8a8305d2a13d838a5160a6c06c63decc865a", 0xc2}], 0x1) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000680)=@gcm_128={{0x303}, "000037d7009400", "c0b6c5b29ca2b838d41ac2fc7ddf972d", "e9be1eae", "bb10000000000001"}, 0x28) readv(r0, &(0x7f0000000e40)=[{&(0x7f0000000f40)=""/250, 0xff1}], 0x17) kernel console output (not intermixed with test programs): 0][T25962] batman_adv: batadv0: Adding interface: veth1_vlan [ 310.002625][T25962] batman_adv: batadv0: The MTU of interface veth1_vlan is too small (1500) to handle the transport of batman-adv packets. If you experience problems getting traffic through try increasing the MTU to 1560. [ 310.025287][T25962] batman_adv: batadv0: Interface activated: veth1_vlan [ 310.098156][ T29] kauditd_printk_skb: 236 callbacks suppressed [ 310.098175][ T29] audit: type=1326 audit(2000002782.941:9157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25967 comm="syz.3.9275" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 310.163785][ T29] audit: type=1326 audit(2000002782.971:9158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25967 comm="syz.3.9275" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 310.187723][ T29] audit: type=1326 audit(2000002782.971:9159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25967 comm="syz.3.9275" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 310.211629][ T29] audit: type=1326 audit(2000002782.971:9160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25967 comm="syz.3.9275" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 310.235666][ T29] audit: type=1326 audit(2000002782.971:9161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25967 comm="syz.3.9275" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 310.259729][ T29] audit: type=1326 audit(2000002782.971:9162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25967 comm="syz.3.9275" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 310.283898][ T29] audit: type=1326 audit(2000002782.971:9163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25967 comm="syz.3.9275" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 310.308121][ T29] audit: type=1326 audit(2000002782.971:9164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25967 comm="syz.3.9275" exe="/root/syz-executor" sig=0 arch=c000003e syscall=131 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 310.332217][ T29] audit: type=1326 audit(2000002782.971:9165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25967 comm="syz.3.9275" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 310.449833][T25982] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9280'. [ 310.565333][T25989] netlink: 288 bytes leftover after parsing attributes in process `syz.2.9284'. [ 310.611587][T25997] netlink: 'syz.6.9288': attribute type 1 has an invalid length. [ 310.619778][ T29] audit: type=1326 audit(2000002783.452:9166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25998 comm="syz.3.9287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 310.646979][T26003] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9290'. [ 310.675636][T25997] bond2: (slave bridge2): making interface the new active one [ 310.689054][T25997] bond2: (slave bridge2): Enslaving as an active interface with an up link [ 310.764293][T26020] netlink: 4 bytes leftover after parsing attributes in process `syz.8.9296'. [ 310.834594][T26034] netlink: 'syz.3.9303': attribute type 10 has an invalid length. [ 310.871583][T26038] netlink: 'syz.2.9306': attribute type 10 has an invalid length. [ 310.936658][T26051] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9306'. [ 311.013547][T26063] netlink: 4 bytes leftover after parsing attributes in process `syz.8.9316'. [ 311.028540][ C1] vcan0: j1939_session_tx_dat: 0xffff88812b371600: queue data error: -100 [ 311.408091][T26113] netlink: 12 bytes leftover after parsing attributes in process `syz.8.9346'. [ 312.649287][T26231] netlink: 12 bytes leftover after parsing attributes in process `syz.2.9385'. [ 312.661288][T26231] netlink: 12 bytes leftover after parsing attributes in process `syz.2.9385'. [ 312.796064][ C1] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 313.481842][T26291] tipc: New replicast peer: 255.255.255.83 [ 313.487988][T26291] tipc: Enabled bearer , priority 10 [ 313.574210][ T3387] kernel write not supported for file bpf-prog (pid: 3387 comm: kworker/0:4) [ 313.790852][T26345] xt_policy: neither incoming nor outgoing policy selected [ 314.022303][T26368] serio: Serial port ptm0 [ 314.642157][T11649] kernel write not supported for file bpf-prog (pid: 11649 comm: kworker/1:6) [ 315.116086][T26429] lo speed is unknown, defaulting to 1000 [ 315.122988][T26429] lo speed is unknown, defaulting to 1000 [ 315.148808][ T29] kauditd_printk_skb: 150 callbacks suppressed [ 315.148828][ T29] audit: type=1400 audit(2000002787.992:9317): avc: denied { override_creds } for pid=26433 comm="syz.3.9477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 315.200276][T26438] rdma_op ffff888127065580 conn xmit_rdma 0000000000000000 [ 315.397510][T26456] __nla_validate_parse: 3 callbacks suppressed [ 315.397529][T26456] netlink: 12 bytes leftover after parsing attributes in process `syz.8.9487'. [ 315.458403][T26456] netlink: 12 bytes leftover after parsing attributes in process `syz.8.9487'. [ 315.494657][T26456] netlink: 12 bytes leftover after parsing attributes in process `syz.8.9487'. [ 315.522031][ T29] audit: type=1326 audit(2000002788.362:9318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26465 comm="syz.3.9489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 315.588425][ T29] audit: type=1326 audit(2000002788.402:9319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26465 comm="syz.3.9489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=13 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 315.612484][ T29] audit: type=1326 audit(2000002788.402:9320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26465 comm="syz.3.9489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 315.636922][ T29] audit: type=1326 audit(2000002788.402:9321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26465 comm="syz.3.9489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 315.660815][ T29] audit: type=1326 audit(2000002788.402:9322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26465 comm="syz.3.9489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 315.684739][ T29] audit: type=1326 audit(2000002788.402:9323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26465 comm="syz.3.9489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 315.708598][ T29] audit: type=1326 audit(2000002788.402:9324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26465 comm="syz.3.9489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 315.733403][ T29] audit: type=1326 audit(2000002788.402:9325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26465 comm="syz.3.9489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=285 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 315.737767][T26469] 9pnet: Could not find request transport: f [ 315.757524][ T29] audit: type=1326 audit(2000002788.402:9326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26465 comm="syz.3.9489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=96 compat=0 ip=0xffffffffff600000 code=0x7ffc0000 [ 315.901551][T26482] netlink: 24 bytes leftover after parsing attributes in process `syz.6.9494'. [ 315.952892][T26486] netlink: 96 bytes leftover after parsing attributes in process `syz.2.9496'. [ 315.985078][T26490] netlink: 24 bytes leftover after parsing attributes in process `syz.6.9499'. [ 316.269104][T26525] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=26525 comm=syz.2.9514 [ 316.290620][T26528] netlink: 'syz.1.9515': attribute type 10 has an invalid length. [ 316.299413][T26528] netlink: 'syz.1.9515': attribute type 10 has an invalid length. [ 316.307728][T26528] netlink: 40 bytes leftover after parsing attributes in process `syz.1.9515'. [ 316.317792][T26528] batadv0: entered allmulticast mode [ 316.323971][T26528] bridge0: port 5(batadv0) entered blocking state [ 316.331034][T26528] bridge0: port 5(batadv0) entered disabled state [ 316.340191][T26528] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 316.494781][T26535] bond3: (slave macvlan0): Releasing active interface [ 316.510021][T26537] netlink: 'syz.6.9519': attribute type 21 has an invalid length. [ 316.546425][T26535] vlan0 (unregistering): left allmulticast mode [ 316.552790][T26535] veth0_vlan (unregistering): left allmulticast mode [ 316.559796][T26535] vlan0 (unregistering): left promiscuous mode [ 316.561962][T26541] netlink: 'syz.2.9521': attribute type 1 has an invalid length. [ 316.566276][T26535] bridge0: port 3(vlan0) entered disabled state [ 316.573873][T26541] netlink: 'syz.2.9521': attribute type 4 has an invalid length. [ 316.588395][T26541] netlink: 9462 bytes leftover after parsing attributes in process `syz.2.9521'. [ 316.602369][T26537] netlink: 156 bytes leftover after parsing attributes in process `syz.6.9519'. [ 316.603196][T26541] netlink: 'syz.2.9521': attribute type 1 has an invalid length. [ 316.619472][T26541] netlink: 'syz.2.9521': attribute type 4 has an invalid length. [ 316.627318][T26541] netlink: 9462 bytes leftover after parsing attributes in process `syz.2.9521'. [ 316.820027][T26563] pimreg: entered allmulticast mode [ 316.829903][T26563] pimreg: left allmulticast mode [ 317.199007][T26606] lo speed is unknown, defaulting to 1000 [ 317.205934][T26606] lo speed is unknown, defaulting to 1000 [ 317.353674][T26626] netlink: 'syz.2.9558': attribute type 10 has an invalid length. [ 317.522505][T26643] netlink: 'syz.2.9566': attribute type 12 has an invalid length. [ 317.965784][T26693] 9pnet: Could not find request transport: f [ 318.109177][T26705] IPVS: Error connecting to the multicast addr [ 318.699186][T26782] : renamed from bond0 [ 319.248176][T26752] syz.8.9616 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), order=0, oom_score_adj=0 [ 319.262490][T26752] CPU: 0 UID: 0 PID: 26752 Comm: syz.8.9616 Not tainted syzkaller #0 PREEMPT(voluntary) [ 319.262542][T26752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 319.262559][T26752] Call Trace: [ 319.262569][T26752] [ 319.262578][T26752] __dump_stack+0x1d/0x30 [ 319.262605][T26752] dump_stack_lvl+0xe8/0x140 [ 319.262629][T26752] dump_stack+0x15/0x1b [ 319.262650][T26752] dump_header+0x81/0x220 [ 319.262698][T26752] oom_kill_process+0x342/0x400 [ 319.262743][T26752] out_of_memory+0x979/0xb80 [ 319.262814][T26752] try_charge_memcg+0x5e6/0x9e0 [ 319.262853][T26752] obj_cgroup_charge_pages+0xa6/0x150 [ 319.262897][T26752] __memcg_kmem_charge_page+0x9f/0x170 [ 319.262957][T26752] __alloc_frozen_pages_noprof+0x188/0x360 [ 319.263047][T26752] alloc_pages_mpol+0xb3/0x250 [ 319.263220][T26752] alloc_pages_noprof+0x90/0x130 [ 319.263304][T26752] __vmalloc_node_range_noprof+0x6f2/0xe00 [ 319.263361][T26752] __kvmalloc_node_noprof+0x30f/0x4e0 [ 319.263400][T26752] ? ip_set_alloc+0x1f/0x30 [ 319.263443][T26752] ? ip_set_alloc+0x1f/0x30 [ 319.263472][T26752] ? __kmalloc_cache_noprof+0x189/0x320 [ 319.263511][T26752] ip_set_alloc+0x1f/0x30 [ 319.263539][T26752] hash_netiface_create+0x282/0x740 [ 319.263578][T26752] ? __pfx_hash_netiface_create+0x10/0x10 [ 319.263638][T26752] ip_set_create+0x3c9/0x960 [ 319.263682][T26752] ? __nla_parse+0x40/0x60 [ 319.263756][T26752] nfnetlink_rcv_msg+0x4c3/0x590 [ 319.263846][T26752] netlink_rcv_skb+0x123/0x220 [ 319.263880][T26752] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 319.263915][T26752] nfnetlink_rcv+0x16b/0x1690 [ 319.263943][T26752] ? nlmon_xmit+0x4f/0x60 [ 319.263979][T26752] ? consume_skb+0x49/0x150 [ 319.264020][T26752] ? nlmon_xmit+0x4f/0x60 [ 319.264043][T26752] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 319.264083][T26752] ? __dev_queue_xmit+0x1200/0x2000 [ 319.264179][T26752] ? __dev_queue_xmit+0x182/0x2000 [ 319.264280][T26752] ? ref_tracker_free+0x37d/0x3e0 [ 319.264324][T26752] ? __netlink_deliver_tap+0x4dc/0x500 [ 319.264385][T26752] netlink_unicast+0x5bd/0x690 [ 319.264418][T26752] netlink_sendmsg+0x58b/0x6b0 [ 319.264457][T26752] ? __pfx_netlink_sendmsg+0x10/0x10 [ 319.264493][T26752] __sock_sendmsg+0x145/0x180 [ 319.264578][T26752] ____sys_sendmsg+0x31e/0x4e0 [ 319.264619][T26752] ___sys_sendmsg+0x17b/0x1d0 [ 319.264671][T26752] __x64_sys_sendmsg+0xd4/0x160 [ 319.264784][T26752] x64_sys_call+0x191e/0x2ff0 [ 319.264812][T26752] do_syscall_64+0xd2/0x200 [ 319.264837][T26752] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 319.264868][T26752] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 319.264972][T26752] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 319.265007][T26752] RIP: 0033:0x7f966a8deec9 [ 319.265027][T26752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 319.265051][T26752] RSP: 002b:00007f966933f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 319.265076][T26752] RAX: ffffffffffffffda RBX: 00007f966ab35fa0 RCX: 00007f966a8deec9 [ 319.265092][T26752] RDX: 0000000000000800 RSI: 0000200000000040 RDI: 0000000000000006 [ 319.265142][T26752] RBP: 00007f966a961f91 R08: 0000000000000000 R09: 0000000000000000 [ 319.265158][T26752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 319.265174][T26752] R13: 00007f966ab36038 R14: 00007f966ab35fa0 R15: 00007ffebc87f8c8 [ 319.265203][T26752] [ 319.603796][T26752] memory: usage 307200kB, limit 307200kB, failcnt 140 [ 319.611151][T26752] memory+swap: usage 307436kB, limit 9007199254740988kB, failcnt 0 [ 319.619238][T26752] kmem: usage 307184kB, limit 9007199254740988kB, failcnt 0 [ 319.627013][T26752] Memory cgroup stats for /syz8: [ 319.654733][T26752] cache 0 [ 319.662999][T26752] rss 4096 [ 319.666510][T26752] shmem 0 [ 319.669479][T26752] mapped_file 0 [ 319.673411][T26752] dirty 0 [ 319.676748][T26752] writeback 0 [ 319.680139][T26752] workingset_refault_anon 64 [ 319.684871][T26752] workingset_refault_file 0 [ 319.689441][T26752] swap 245760 [ 319.692924][T26752] swapcached 12288 [ 319.697408][T26752] pgpgin 83115 [ 319.701253][T26752] pgpgout 83112 [ 319.704824][T26752] pgfault 79536 [ 319.708438][T26752] pgmajfault 25 [ 319.712438][T26752] inactive_anon 8192 [ 319.716456][T26752] active_anon 0 [ 319.720101][T26752] inactive_file 0 [ 319.723950][T26752] active_file 0 [ 319.727525][T26752] unevictable 0 [ 319.731094][T26752] hierarchical_memory_limit 314572800 [ 319.736607][T26752] hierarchical_memsw_limit 9223372036854771712 [ 319.743019][T26752] total_cache 0 [ 319.746638][T26752] total_rss 4096 [ 319.750529][T26752] total_shmem 0 [ 319.754129][T26752] total_mapped_file 0 [ 319.758517][T26752] total_dirty 0 [ 319.762243][T26752] total_writeback 0 [ 319.766624][T26752] total_workingset_refault_anon 64 [ 319.772244][T26752] total_workingset_refault_file 0 [ 319.777577][T26752] total_swap 245760 [ 319.781536][T26752] total_swapcached 12288 [ 319.786081][T26752] total_pgpgin 83115 [ 319.790168][T26752] total_pgpgout 83112 [ 319.794348][T26752] total_pgfault 79536 [ 319.798732][T26752] total_pgmajfault 25 [ 319.803117][T26752] total_inactive_anon 8192 [ 319.807892][T26752] total_active_anon 0 [ 319.812073][T26752] total_inactive_file 0 [ 319.817104][T26752] total_active_file 0 [ 319.821463][T26752] total_unevictable 0 [ 319.826366][T26752] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz8,task_memcg=/syz8,task=syz.8.9616,pid=26751,uid=0 [ 319.841765][T26752] Memory cgroup out of memory: Killed process 26751 (syz.8.9616) total-vm:96004kB, anon-rss:1264kB, file-rss:22312kB, shmem-rss:128kB, UID:0 pgtables:144kB oom_score_adj:0 [ 320.175466][ T29] kauditd_printk_skb: 109 callbacks suppressed [ 320.175484][ T29] audit: type=1400 audit(2000002793.023:9436): avc: denied { getopt } for pid=26840 comm="syz.6.9654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 320.340259][ T29] audit: type=1326 audit(2000002793.183:9437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26853 comm="syz.2.9660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 320.364366][ T29] audit: type=1326 audit(2000002793.183:9438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26853 comm="syz.2.9660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 320.398916][ T29] audit: type=1326 audit(2000002793.183:9439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26853 comm="syz.2.9660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 320.422647][ T29] audit: type=1326 audit(2000002793.183:9440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26853 comm="syz.2.9660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 320.446934][ T29] audit: type=1326 audit(2000002793.183:9441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26853 comm="syz.2.9660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 320.470813][ T29] audit: type=1326 audit(2000002793.183:9442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26853 comm="syz.2.9660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 320.495276][ T29] audit: type=1326 audit(2000002793.193:9443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26853 comm="syz.2.9660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 320.519212][ T29] audit: type=1326 audit(2000002793.233:9444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26853 comm="syz.2.9660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 320.543179][ T29] audit: type=1326 audit(2000002793.233:9445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26853 comm="syz.2.9660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 321.472458][T26905] lo speed is unknown, defaulting to 1000 [ 321.481760][T26905] lo speed is unknown, defaulting to 1000 [ 321.719488][T26905] chnl_net:caif_netlink_parms(): no params data found [ 321.830238][T26905] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.837460][T26905] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.874377][T26905] bridge_slave_0: entered allmulticast mode [ 321.895864][T26905] bridge_slave_0: entered promiscuous mode [ 321.920479][T26905] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.927802][T26905] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.968897][T26905] bridge_slave_1: entered allmulticast mode [ 321.994049][T26905] bridge_slave_1: entered promiscuous mode [ 322.071158][T26905] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 322.091490][T26905] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 322.208847][T26905] team0: Port device team_slave_0 added [ 322.215746][T26905] team0: Port device team_slave_1 added [ 322.237958][T26905] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 322.245014][T26905] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 322.272108][T26905] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 322.285779][T26905] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 322.292741][T26905] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 322.320120][T26905] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 322.357347][T26905] hsr_slave_0: entered promiscuous mode [ 322.363806][T26905] hsr_slave_1: entered promiscuous mode [ 322.371868][T26905] debugfs: 'hsr0' already exists in 'hsr' [ 322.377905][T26905] Cannot create hsr debugfs directory [ 322.498039][T26905] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 322.597098][T26905] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 322.637536][T26905] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 322.708634][T26905] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 322.804464][T26905] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 322.819319][T26905] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 322.829897][T26905] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 322.845301][T26905] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 322.928888][T26905] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.967976][T26905] 8021q: adding VLAN 0 to HW filter on device team0 [ 323.011119][T15708] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.018370][T15708] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.055913][T15708] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.063139][T15708] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.092064][T26979] __nla_validate_parse: 8 callbacks suppressed [ 323.092085][T26979] netlink: 44 bytes leftover after parsing attributes in process `syz.3.9702'. [ 323.108180][T26979] netem: unknown loss type 12 [ 323.113238][T26979] netem: change failed [ 323.149723][T26905] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 323.309972][T26905] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 323.340746][T26995] netlink: 24 bytes leftover after parsing attributes in process `syz.6.9707'. [ 323.507824][T26905] veth0_vlan: entered promiscuous mode [ 323.547721][T26905] veth1_vlan: entered promiscuous mode [ 323.562109][T26905] veth0_macvtap: entered promiscuous mode [ 323.590914][T26905] veth1_macvtap: entered promiscuous mode [ 323.619579][T26905] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 323.638824][T26905] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 323.660884][ T7170] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 323.679474][ T7170] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 323.708312][ T7170] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 323.734617][ T7170] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 323.936080][T27031] netlink: 24 bytes leftover after parsing attributes in process `syz.6.9720'. [ 324.070091][T27042] lo speed is unknown, defaulting to 1000 [ 324.108872][T27042] lo speed is unknown, defaulting to 1000 [ 324.857668][T27111] netem: change failed [ 325.191176][ T29] kauditd_printk_skb: 182 callbacks suppressed [ 325.191196][ T29] audit: type=1326 audit(2000002798.033:9628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27145 comm="syz.2.9767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 325.257235][ T29] audit: type=1326 audit(2000002798.033:9629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27145 comm="syz.2.9767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 325.281434][ T29] audit: type=1326 audit(2000002798.033:9630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27145 comm="syz.2.9767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 325.305553][ T29] audit: type=1326 audit(2000002798.033:9631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27145 comm="syz.2.9767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 325.329359][ T29] audit: type=1326 audit(2000002798.033:9632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27145 comm="syz.2.9767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 325.353368][ T29] audit: type=1326 audit(2000002798.033:9633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27145 comm="syz.2.9767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 325.377208][ T29] audit: type=1326 audit(2000002798.033:9634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27145 comm="syz.2.9767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 325.401573][ T29] audit: type=1326 audit(2000002798.033:9635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27145 comm="syz.2.9767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fc2e499d710 code=0x7ffc0000 [ 325.425532][ T29] audit: type=1326 audit(2000002798.033:9636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27145 comm="syz.2.9767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 325.449739][ T29] audit: type=1326 audit(2000002798.033:9637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27145 comm="syz.2.9767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 326.046742][T27202] syzkaller0: entered allmulticast mode [ 326.048824][T27202] syzkaller0 (unregistering): left allmulticast mode [ 326.617686][T27239] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9805'. [ 326.660957][T27239] netlink: 12 bytes leftover after parsing attributes in process `syz.2.9805'. [ 326.678551][T27243] lo speed is unknown, defaulting to 1000 [ 326.685000][T27243] lo speed is unknown, defaulting to 1000 [ 327.215570][T27280] 9pnet: Could not find request transport: 0xffffffffffffffff0xffffffffffffffff [ 327.361376][T27289] netlink: 4380 bytes leftover after parsing attributes in process `syz.2.9824'. [ 327.376341][T27289] netlink: 4380 bytes leftover after parsing attributes in process `syz.2.9824'. [ 327.477882][T27302] netlink: 'syz.2.9830': attribute type 1 has an invalid length. [ 327.493756][T27302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 327.510759][T27302] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9830'. [ 327.561609][T27302] bond0 (unregistering): Released all slaves [ 327.630220][T27305] netdevsim netdevsim8: Direct firmware load for ./file0/file1 failed with error -2 [ 328.420973][T27382] netlink: 24 bytes leftover after parsing attributes in process `syz.2.9866'. [ 328.464522][T27382] netlink: 16 bytes leftover after parsing attributes in process `syz.2.9866'. [ 328.500118][T27388] bridge0: port 4(batadv2) entered blocking state [ 328.506922][T27388] bridge0: port 4(batadv2) entered disabled state [ 328.519401][T27388] batadv2: entered allmulticast mode [ 328.526005][T27388] batadv2: entered promiscuous mode [ 328.934184][T27399] veth1_to_bond: entered allmulticast mode [ 328.953330][T27399] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9874'. [ 328.996575][T27399] veth1_to_bond (unregistering): left allmulticast mode [ 329.004354][ T7185] batman_adv: batadv2: No IGMP Querier present - multicast optimizations disabled [ 329.013784][ T7185] batman_adv: batadv2: No MLD Querier present - multicast optimizations disabled [ 329.155682][T27409] netlink: 'syz.8.9878': attribute type 10 has an invalid length. [ 329.200302][T27409] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 329.238066][T27409] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 330.581218][T27479] bridge0: entered promiscuous mode [ 330.587555][ T29] kauditd_printk_skb: 158 callbacks suppressed [ 330.587638][ T29] audit: type=1326 audit(2000002803.434:9796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27482 comm="syz.1.9907" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4188e6eec9 code=0x7ffc0000 [ 330.617529][ T29] audit: type=1326 audit(2000002803.434:9797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27482 comm="syz.1.9907" exe="/root/syz-executor" sig=0 arch=c000003e syscall=97 compat=0 ip=0x7f4188e6eec9 code=0x7ffc0000 [ 330.624842][T27479] macvtap1: entered allmulticast mode [ 330.642109][ T29] audit: type=1326 audit(2000002803.434:9798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27482 comm="syz.1.9907" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4188e6eec9 code=0x7ffc0000 [ 330.672629][T27479] bridge0: entered allmulticast mode [ 330.692738][T27479] bridge0: port 1(macvtap1) entered blocking state [ 330.699735][T27479] bridge0: port 1(macvtap1) entered disabled state [ 330.718978][T27479] bridge0: left allmulticast mode [ 330.724260][T27479] bridge0: left promiscuous mode [ 330.857924][T27508] netlink: 9 bytes leftover after parsing attributes in process `syz.8.9917'. [ 330.873954][T27508] gretap0: entered promiscuous mode [ 330.900862][T27508] netlink: 5 bytes leftover after parsing attributes in process `syz.8.9917'. [ 330.937102][T27508] 0ªî{X¹¦: renamed from gretap0 [ 330.956188][T27508] 0ªî{X¹¦: left promiscuous mode [ 330.961322][T27508] 0ªî{X¹¦: entered allmulticast mode [ 330.974284][T27508] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 331.073729][ T29] audit: type=1326 audit(2000002803.914:9799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27514 comm="syz.3.9920" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 331.098326][ T29] audit: type=1326 audit(2000002803.914:9800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27514 comm="syz.3.9920" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 331.148068][ T29] audit: type=1326 audit(2000002803.974:9801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27514 comm="syz.3.9920" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 331.173184][ T29] audit: type=1326 audit(2000002803.974:9802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27514 comm="syz.3.9920" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 331.197159][ T29] audit: type=1326 audit(2000002803.974:9803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27514 comm="syz.3.9920" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 331.221015][ T29] audit: type=1326 audit(2000002803.974:9804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27514 comm="syz.3.9920" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fcf58baef03 code=0x7ffc0000 [ 331.244976][ T29] audit: type=1326 audit(2000002803.974:9805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27514 comm="syz.3.9920" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fcf58bad97f code=0x7ffc0000 [ 331.610112][T27550] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 331.630589][T27550] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 331.786568][T27535] Set syz1 is full, maxelem 65536 reached [ 331.879790][T27556] netlink: 96 bytes leftover after parsing attributes in process `syz.6.9936'. [ 333.076661][T27659] netlink: 9 bytes leftover after parsing attributes in process `syz.3.9981'. [ 333.115402][T27659] gretap0: entered promiscuous mode [ 333.133796][T27659] netlink: 5 bytes leftover after parsing attributes in process `syz.3.9981'. [ 333.142944][T27659] 0ªî{X¹¦: renamed from gretap0 [ 333.149416][T27659] 0ªî{X¹¦: left promiscuous mode [ 333.154783][T27659] 0ªî{X¹¦: entered allmulticast mode [ 333.167122][T27659] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 333.335507][T27679] af_packet: tpacket_rcv: packet too big, clamped from 4710 to 4294967272. macoff=96 [ 333.509219][T27686] sch_tbf: burst 0 is lower than device lo mtu (1550) ! [ 333.633356][T27698] veth1_to_bond: entered allmulticast mode [ 333.644642][T27698] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9999'. [ 333.661059][T27698] veth1_to_bond (unregistering): left allmulticast mode [ 333.783463][T27710] netlink: 24 bytes leftover after parsing attributes in process `syz.2.10004'. [ 334.940405][T27814] netlink: 'syz.1.10048': attribute type 4 has an invalid length. [ 334.972456][T27814] netlink: 'syz.1.10048': attribute type 4 has an invalid length. [ 335.038669][T27794] Set syz1 is full, maxelem 65536 reached [ 335.058373][T27817] lo speed is unknown, defaulting to 1000 [ 335.065831][T27817] lo speed is unknown, defaulting to 1000 [ 335.394499][T27847] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10063'. [ 335.408026][T27847] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10063'. [ 335.475081][T27855] bond_slave_0: entered promiscuous mode [ 335.480827][T27855] bond_slave_1: entered promiscuous mode [ 335.504990][T27855] macvlan2: entered promiscuous mode [ 335.510657][T27855] bond0: entered promiscuous mode [ 335.516124][T27855] macvlan2: entered allmulticast mode [ 335.521559][T27855] bond0: entered allmulticast mode [ 335.526912][T27855] bond_slave_0: entered allmulticast mode [ 335.532874][T27855] bond_slave_1: entered allmulticast mode [ 335.540918][T27855] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 335.552676][T27855] bond0: left allmulticast mode [ 335.557707][T27855] bond_slave_0: left allmulticast mode [ 335.563564][T27855] bond_slave_1: left allmulticast mode [ 335.569227][T27855] bond0: left promiscuous mode [ 335.574925][T27855] bond_slave_0: left promiscuous mode [ 335.580547][T27855] bond_slave_1: left promiscuous mode [ 335.597236][ T29] kauditd_printk_skb: 184 callbacks suppressed [ 335.597255][ T29] audit: type=1400 audit(2000002808.445:9990): avc: denied { map_create } for pid=27867 comm="syz.2.10072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.626469][ T29] audit: type=1400 audit(2000002808.445:9991): avc: denied { prog_load } for pid=27867 comm="syz.2.10072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.646301][ T29] audit: type=1400 audit(2000002808.445:9992): avc: denied { prog_load } for pid=27867 comm="syz.2.10072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.666797][ T29] audit: type=1326 audit(2000002808.445:9993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27867 comm="syz.2.10072" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 335.691128][ T29] audit: type=1326 audit(2000002808.445:9994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27867 comm="syz.2.10072" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 335.715285][ T29] audit: type=1326 audit(2000002808.445:9995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27867 comm="syz.2.10072" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 335.739169][ T29] audit: type=1400 audit(2000002808.475:9996): avc: denied { prog_load } for pid=27869 comm="syz.8.10073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.774791][ T29] audit: type=1400 audit(2000002808.495:9997): avc: denied { map_create } for pid=27872 comm="syz.8.10075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.794492][ T29] audit: type=1400 audit(2000002808.495:9998): avc: denied { prog_load } for pid=27872 comm="syz.8.10075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.814019][ T29] audit: type=1400 audit(2000002808.495:9999): avc: denied { allowed } for pid=27872 comm="syz.8.10075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 336.082601][T27928] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10103'. [ 336.094532][T27932] netlink: 24 bytes leftover after parsing attributes in process `syz.1.10104'. [ 336.250740][T27961] netlink: 'syz.6.10118': attribute type 13 has an invalid length. [ 336.266221][ T7144] netdevsim netdevsim6 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 336.266280][T27961] netlink: 'syz.6.10118': attribute type 13 has an invalid length. [ 336.284206][ T7144] netdevsim netdevsim6 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 336.297416][ T7144] netdevsim netdevsim6 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 336.306641][ T7144] netdevsim netdevsim6 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 336.499880][T27991] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10133'. [ 336.702406][T28023] macvlan4: entered promiscuous mode [ 336.708198][T28023] bond0: entered promiscuous mode [ 336.713410][T28023] macvlan4: entered allmulticast mode [ 336.719080][T28023] bond0: entered allmulticast mode [ 336.726038][T28023] 8021q: adding VLAN 0 to HW filter on device macvlan4 [ 336.734432][T28023] bond0: left allmulticast mode [ 336.739813][T28023] bond0: left promiscuous mode [ 336.855783][T28036] netlink: 14 bytes leftover after parsing attributes in process `syz.2.10155'. [ 337.060942][T28071] netlink: 20 bytes leftover after parsing attributes in process `syz.8.10172'. [ 337.243942][T28107] netlink: 24 bytes leftover after parsing attributes in process `syz.3.10186'. [ 337.706367][T28163] netlink: 'syz.6.10216': attribute type 4 has an invalid length. [ 337.730948][T28163] netlink: 'syz.6.10216': attribute type 4 has an invalid length. [ 337.735657][T28167] netlink: 'syz.8.10218': attribute type 4 has an invalid length. [ 337.777544][T28167] netlink: 'syz.8.10218': attribute type 4 has an invalid length. [ 337.985571][T28167] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 337.996601][T28188] netlink: 'syz.6.10226': attribute type 4 has an invalid length. [ 338.007892][T28167] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 338.048046][T28192] netlink: 'syz.6.10226': attribute type 4 has an invalid length. [ 338.092392][T15708] netdevsim netdevsim8 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.132947][T15708] netdevsim netdevsim8 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.142089][T15708] netdevsim netdevsim8 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.186541][T15708] netdevsim netdevsim8 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.214006][T15708] netdevsim netdevsim6 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 338.235354][T15708] netdevsim netdevsim6 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 338.253163][T15708] netdevsim netdevsim6 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 338.263191][T15708] netdevsim netdevsim6 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 338.988306][T28310] __nla_validate_parse: 4 callbacks suppressed [ 338.988325][T28310] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10283'. [ 339.585746][T28385] netlink: 128 bytes leftover after parsing attributes in process `syz.6.10320'. [ 339.598020][T28385] netlink: 3 bytes leftover after parsing attributes in process `syz.6.10320'. [ 339.627251][T28386] lo speed is unknown, defaulting to 1000 [ 339.644035][T28386] lo speed is unknown, defaulting to 1000 [ 340.472041][T28496] validate_nla: 4 callbacks suppressed [ 340.472057][T28496] netlink: 'syz.2.10374': attribute type 4 has an invalid length. [ 340.511789][T28496] netlink: 'syz.2.10374': attribute type 4 has an invalid length. [ 340.525996][T28503] netlink: 'syz.1.10377': attribute type 1 has an invalid length. [ 340.531413][T11649] lo speed is unknown, defaulting to 1000 [ 340.534001][T28503] netlink: 'syz.1.10377': attribute type 4 has an invalid length. [ 340.539824][T11649] syz2: Port: 1 Link ACTIVE [ 340.547793][T28503] netlink: 9462 bytes leftover after parsing attributes in process `syz.1.10377'. [ 340.587967][T18973] lo speed is unknown, defaulting to 1000 [ 340.593970][T18973] syz2: Port: 1 Link DOWN [ 340.598587][ T7144] netdevsim netdevsim2 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 340.632889][ T7144] netdevsim netdevsim2 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 340.650820][ T29] kauditd_printk_skb: 1030 callbacks suppressed [ 340.650839][ T29] audit: type=1400 audit(2000002813.495:11030): avc: denied { create } for pid=28509 comm="syz.3.10379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 340.659618][ T7144] netdevsim netdevsim2 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 340.759936][ T29] audit: type=1400 audit(2000002813.525:11031): avc: denied { map_create } for pid=28509 comm="syz.3.10379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 340.779647][ T29] audit: type=1400 audit(2000002813.525:11032): avc: denied { prog_load } for pid=28509 comm="syz.3.10379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 340.785570][ T7144] netdevsim netdevsim2 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 340.799623][ T29] audit: type=1400 audit(2000002813.555:11033): avc: denied { prog_load } for pid=28512 comm="syz.2.10381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 340.827741][ T29] audit: type=1400 audit(2000002813.555:11034): avc: denied { map_create } for pid=28512 comm="syz.2.10381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 340.847811][ T29] audit: type=1400 audit(2000002813.555:11035): avc: denied { prog_load } for pid=28512 comm="syz.2.10381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 340.868820][ T29] audit: type=1400 audit(2000002813.555:11036): avc: denied { prog_load } for pid=28512 comm="syz.2.10381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 340.888506][ T29] audit: type=1400 audit(2000002813.565:11037): avc: denied { map_create } for pid=28512 comm="syz.2.10381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 340.908971][ T29] audit: type=1400 audit(2000002813.575:11038): avc: denied { create } for pid=28514 comm="syz.1.10380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 340.929961][ T29] audit: type=1400 audit(2000002813.575:11039): avc: denied { prog_load } for pid=28514 comm="syz.1.10380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 341.188980][T28555] netlink: 20 bytes leftover after parsing attributes in process `syz.3.10402'. [ 341.253858][T28567] netlink: 24 bytes leftover after parsing attributes in process `syz.3.10407'. [ 341.721883][T28613] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=28613 comm=syz.6.10427 [ 342.224884][T28620] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10429'. [ 342.244659][T28620] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10429'. [ 342.308382][T28625] netlink: 'syz.8.10432': attribute type 29 has an invalid length. [ 342.318796][T28625] netlink: 'syz.8.10432': attribute type 29 has an invalid length. [ 342.559347][T28646] netlink: 24 bytes leftover after parsing attributes in process `syz.3.10442'. [ 343.246733][T28700] netlink: 4 bytes leftover after parsing attributes in process `syz.8.10467'. [ 343.499197][T28732] netlink: 'syz.3.10484': attribute type 13 has an invalid length. [ 343.522132][T28732] batman_adv: batadv0: Interface deactivated: veth1_vlan [ 343.573608][ T7144] netdevsim netdevsim3 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 343.592769][ T7144] netdevsim netdevsim3 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 343.616877][ T7144] netdevsim netdevsim3 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 343.635683][ T7144] netdevsim netdevsim3 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 343.726051][T28744] netlink: 'syz.3.10489': attribute type 29 has an invalid length. [ 343.752145][T28744] netlink: 'syz.3.10489': attribute type 29 has an invalid length. [ 343.797488][T28750] sch_tbf: burst 3298 is lower than device lo mtu (11337746) ! [ 343.995751][T28778] sch_fq: defrate 0 ignored. [ 345.337409][T28891] __nla_validate_parse: 1 callbacks suppressed [ 345.337431][T28891] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10548'. [ 345.647354][T28932] netlink: 24 bytes leftover after parsing attributes in process `syz.6.10571'. [ 345.705723][ T29] kauditd_printk_skb: 688 callbacks suppressed [ 345.705741][ T29] audit: type=1400 audit(2000002818.546:11728): avc: denied { prog_load } for pid=28935 comm="syz.2.10573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 345.731729][ T29] audit: type=1400 audit(2000002818.546:11729): avc: denied { map_create } for pid=28935 comm="syz.2.10573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 345.751539][ T29] audit: type=1400 audit(2000002818.546:11730): avc: denied { prog_load } for pid=28935 comm="syz.2.10573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 345.771105][ T29] audit: type=1400 audit(2000002818.546:11731): avc: denied { prog_load } for pid=28935 comm="syz.2.10573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 345.790942][ T29] audit: type=1400 audit(2000002818.546:11732): avc: denied { prog_load } for pid=28935 comm="syz.2.10573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 345.810948][ T29] audit: type=1400 audit(2000002818.576:11733): avc: denied { create } for pid=28937 comm="syz.2.10574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 345.832840][ T29] audit: type=1400 audit(2000002818.576:11734): avc: denied { create } for pid=28937 comm="syz.2.10574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 345.854230][ T29] audit: type=1400 audit(2000002818.616:11735): avc: denied { map_create } for pid=28940 comm="syz.2.10575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 345.874886][ T29] audit: type=1400 audit(2000002818.616:11736): avc: denied { prog_load } for pid=28940 comm="syz.2.10575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 345.895158][ T29] audit: type=1326 audit(2000002818.616:11737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28940 comm="syz.2.10575" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc2e499eec9 code=0x7ffc0000 [ 346.024605][T28967] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10587'. [ 346.037109][T28967] netlink: 12 bytes leftover after parsing attributes in process `syz.2.10587'. [ 346.278932][T29007] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=29007 comm=syz.2.10606 [ 346.450351][T29033] netlink: 24 bytes leftover after parsing attributes in process `syz.2.10617'. [ 346.608946][T29049] netlink: 3 bytes leftover after parsing attributes in process `syz.6.10625'. [ 346.641726][T29049] batadv3: entered promiscuous mode [ 346.648044][T29049] batadv3: entered allmulticast mode [ 347.608666][T29108] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10651'. [ 347.816005][T29127] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 348.079272][T29155] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10673'. [ 348.193259][T29176] netlink: 'syz.6.10683': attribute type 12 has an invalid length. [ 348.549009][T29237] lo speed is unknown, defaulting to 1000 [ 348.555387][T29237] lo speed is unknown, defaulting to 1000 [ 348.595885][T29242] netlink: 28 bytes leftover after parsing attributes in process `syz.2.10712'. [ 348.605483][T29242] netem: change failed [ 348.822682][T29269] netlink: 4 bytes leftover after parsing attributes in process `syz.8.10727'. [ 348.862481][T29275] sch_fq: defrate 53322 ignored. [ 348.887323][T29277] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29277 comm=syz.8.10731 [ 349.233119][T29333] 0ªî{X¹¦: left allmulticast mode [ 349.249565][T29333] vlan2: left allmulticast mode [ 349.279871][T29334] netlink: 'syz.2.10759': attribute type 1 has an invalid length. [ 349.319976][T29334] 8021q: adding VLAN 0 to HW filter on device bond0 [ 349.409541][T29334] bond0 (unregistering): Released all slaves [ 349.669681][T29370] 8021q: adding VLAN 0 to HW filter on device bond2 [ 349.699602][T29370] vlan0: entered allmulticast mode [ 349.705059][T29370] bond2: entered allmulticast mode [ 350.014085][T29397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29397 comm=syz.8.10786 [ 350.287889][T29439] netlink: 'syz.8.10806': attribute type 10 has an invalid length. [ 350.313272][T29439] netlink: 'syz.8.10806': attribute type 10 has an invalid length. [ 350.331746][T29439] batadv0: entered promiscuous mode [ 350.337219][T29439] batadv0: entered allmulticast mode [ 350.346225][T29439] bond0: (slave batadv0): Releasing backup interface [ 350.372702][T29439] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 350.719648][ T29] kauditd_printk_skb: 941 callbacks suppressed [ 350.719668][ T29] audit: type=1400 audit(2000002823.556:12679): avc: denied { map_create } for pid=29496 comm="syz.3.10836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 350.747638][T29502] __nla_validate_parse: 8 callbacks suppressed [ 350.747657][T29502] netlink: 2036 bytes leftover after parsing attributes in process `syz.2.10830'. [ 350.763617][T29502] netlink: 24 bytes leftover after parsing attributes in process `syz.2.10830'. [ 350.773513][T29499] sch_tbf: burst 19869 is lower than device lo mtu (11337746) ! [ 350.805151][ T29] audit: type=1400 audit(2000002823.556:12680): avc: denied { prog_load } for pid=29496 comm="syz.3.10836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 350.824855][ T29] audit: type=1400 audit(2000002823.556:12681): avc: denied { map_create } for pid=29496 comm="syz.3.10836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 350.845252][ T29] audit: type=1400 audit(2000002823.556:12682): avc: denied { prog_load } for pid=29496 comm="syz.3.10836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 350.866032][ T29] audit: type=1400 audit(2000002823.556:12683): avc: denied { prog_load } for pid=29496 comm="syz.3.10836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 350.885866][ T29] audit: type=1400 audit(2000002823.586:12684): avc: denied { prog_load } for pid=29500 comm="syz.3.10837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 350.906563][ T29] audit: type=1400 audit(2000002823.586:12685): avc: denied { map_create } for pid=29500 comm="syz.3.10837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 350.926609][ T29] audit: type=1400 audit(2000002823.586:12686): avc: denied { prog_load } for pid=29500 comm="syz.3.10837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 350.946222][ T29] audit: type=1400 audit(2000002823.586:12687): avc: denied { prog_load } for pid=29500 comm="syz.3.10837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 350.966308][ T29] audit: type=1400 audit(2000002823.626:12688): avc: denied { name_bind } for pid=29498 comm="syz.1.10835" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 351.730562][T29583] netlink: 28 bytes leftover after parsing attributes in process `syz.6.10874'. [ 351.739804][T29583] netem: change failed [ 351.780325][T29587] netlink: 12 bytes leftover after parsing attributes in process `syz.6.10876'. [ 351.896558][T29601] wg2: entered promiscuous mode [ 351.902059][T29601] wg2: entered allmulticast mode [ 352.030130][T29615] netlink: 24 bytes leftover after parsing attributes in process `syz.6.10889'. [ 352.048175][T29615] sch_tbf: burst 511 is lower than device veth15 mtu (1514) ! [ 352.278107][T29640] netlink: '+}[@': attribute type 4 has an invalid length. [ 352.285622][T29640] netlink: 152 bytes leftover after parsing attributes in process `+}[@'. [ 352.446376][T29663] netlink: 12 bytes leftover after parsing attributes in process `syz.8.10912'. [ 353.417264][T29758] netlink: 96 bytes leftover after parsing attributes in process `syz.8.10955'. [ 353.570141][T29771] netlink: 24 bytes leftover after parsing attributes in process `syz.3.10960'. [ 353.643348][T29779] netlink: 'syz.3.10962': attribute type 13 has an invalid length. [ 353.697595][T29779] 8021q: adding VLAN 0 to HW filter on device team0 [ 353.714677][T29779] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 353.755417][T29789] netlink: 8 bytes leftover after parsing attributes in process `syz.8.10968'. [ 353.764668][T29789] netlink: 'syz.8.10968': attribute type 30 has an invalid length. [ 353.781249][T15708] netdevsim netdevsim8 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 353.802563][T15708] netdevsim netdevsim8 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 353.828119][T15708] netdevsim netdevsim8 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 353.853752][T15708] netdevsim netdevsim8 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 354.425064][T29868] netlink: 'syz.8.11008': attribute type 11 has an invalid length. [ 354.451675][T29868] netlink: 'syz.8.11008': attribute type 11 has an invalid length. [ 354.536945][T29887] netlink: 'syz.3.11016': attribute type 10 has an invalid length. [ 354.561189][T29887] team0: Device hsr_slave_0 failed to register rx_handler [ 354.728716][T29918] netlink: 'syz.2.11031': attribute type 1 has an invalid length. [ 354.736817][T29918] netlink: 'syz.2.11031': attribute type 4 has an invalid length. [ 354.764533][T29918] netlink: 'syz.2.11031': attribute type 1 has an invalid length. [ 354.772586][T29918] netlink: 'syz.2.11031': attribute type 4 has an invalid length. [ 354.978732][T29963] netlink: 'syz.3.11052': attribute type 1 has an invalid length. [ 355.009689][T29963] 8021q: adding VLAN 0 to HW filter on device bond9 [ 355.025982][T29963] vlan3: entered allmulticast mode [ 355.031568][T29963] bond9: entered allmulticast mode [ 355.746043][ T29] kauditd_printk_skb: 953 callbacks suppressed [ 355.746058][ T29] audit: type=1400 audit(2000002828.587:13642): avc: denied { map_create } for pid=30080 comm="syz.8.11108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.775757][ T29] audit: type=1400 audit(2000002828.617:13643): avc: denied { prog_load } for pid=30080 comm="syz.8.11108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.795823][ T29] audit: type=1400 audit(2000002828.617:13644): avc: denied { prog_load } for pid=30080 comm="syz.8.11108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.815734][ T29] audit: type=1400 audit(2000002828.617:13645): avc: denied { create } for pid=30080 comm="syz.8.11108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 355.837048][ T29] audit: type=1400 audit(2000002828.637:13646): avc: denied { map_create } for pid=30082 comm="syz.3.11109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.857115][ T29] audit: type=1400 audit(2000002828.637:13647): avc: denied { prog_load } for pid=30082 comm="syz.3.11109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.876876][ T29] audit: type=1400 audit(2000002828.637:13648): avc: denied { prog_load } for pid=30082 comm="syz.3.11109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.901252][ T29] audit: type=1400 audit(2000002828.727:13649): avc: denied { prog_load } for pid=30084 comm="syz.3.11110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.921255][ T29] audit: type=1326 audit(2000002828.727:13650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30084 comm="syz.3.11110" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 355.945503][ T29] audit: type=1326 audit(2000002828.727:13651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30084 comm="syz.3.11110" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 356.225205][T30117] __nla_validate_parse: 8 callbacks suppressed [ 356.225225][T30117] netlink: 63503 bytes leftover after parsing attributes in process `syz.3.11124'. [ 356.285916][T30124] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11129'. [ 356.452503][T30157] netlink: 12 bytes leftover after parsing attributes in process `syz.1.11143'. [ 356.473995][T30160] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30160 comm=syz.6.11146 [ 356.528863][T30170] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11151'. [ 356.547399][T30170] 8021q: adding VLAN 0 to HW filter on device bond10 [ 356.567714][T30170] vlan3: entered allmulticast mode [ 356.572974][T30170] bond10: entered allmulticast mode [ 356.688107][T30189] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30189 comm=syz.3.11160 [ 357.173339][T30199] netlink: 40 bytes leftover after parsing attributes in process `syz.3.11165'. [ 357.182897][T30199] batadv0: entered allmulticast mode [ 357.188284][T30199] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 357.226943][T30206] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11168'. [ 357.237377][T30208] 8021q: adding VLAN 0 to HW filter on device bond3 [ 357.251123][T30208] netlink: 4 bytes leftover after parsing attributes in process `syz.8.11169'. [ 357.272247][T30208] bond3 (unregistering): Released all slaves [ 357.382108][T30224] netlink: 3 bytes leftover after parsing attributes in process `syz.2.11175'. [ 357.404186][T30224] batadv1: entered promiscuous mode [ 357.409791][T30224] batadv1: entered allmulticast mode [ 357.431003][T30227] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 357.440607][T30227] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 357.454377][T30227] netlink: 40 bytes leftover after parsing attributes in process `syz.1.11178'. [ 357.465145][T30227] batadv0: entered promiscuous mode [ 357.470414][T30227] batadv0: entered allmulticast mode [ 357.481882][T30227] bond0: (slave batadv0): Releasing backup interface [ 357.503437][T30227] bridge0: port 3(batadv0) entered blocking state [ 357.510224][T30227] bridge0: port 3(batadv0) entered disabled state [ 357.602701][ T7170] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 357.612160][ T7170] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 357.690009][T30259] 8021q: adding VLAN 0 to HW filter on device bond3 [ 357.717949][T30259] bond3: (slave veth17): Enslaving as an active interface with a down link [ 357.747026][T30259] bond3: (slave dummy0): making interface the new active one [ 357.764584][T30259] dummy0: entered promiscuous mode [ 357.775687][T30259] bond3: (slave dummy0): Enslaving as an active interface with an up link [ 358.044830][T30300] team_slave_0: entered promiscuous mode [ 358.051563][T30300] team_slave_0: left promiscuous mode [ 358.124120][T30313] netlink: 152 bytes leftover after parsing attributes in process `+}[@'. [ 358.139285][T30313] .`: renamed from bond0 (while UP) [ 358.676777][T30390] batadv1: entered promiscuous mode [ 358.682164][T30390] batadv1: entered allmulticast mode [ 358.745893][T30398] validate_nla: 10 callbacks suppressed [ 358.745912][T30398] netlink: 'syz.2.11258': attribute type 12 has an invalid length. [ 359.857963][T30490] netlink: 'syz.1.11302': attribute type 21 has an invalid length. [ 360.022346][T30498] netlink: 'syz.8.11306': attribute type 1 has an invalid length. [ 360.036873][T30498] 8021q: adding VLAN 0 to HW filter on device bond3 [ 360.068916][T30498] bond3: (slave veth5): Enslaving as an active interface with a down link [ 360.090382][T30498] bond3: (slave dummy0): making interface the new active one [ 360.099849][T30498] dummy0: entered promiscuous mode [ 360.105346][T30498] bond3: (slave dummy0): Enslaving as an active interface with an up link [ 360.331341][T30532] netlink: 'syz.3.11321': attribute type 1 has an invalid length. [ 360.361777][T30532] 8021q: adding VLAN 0 to HW filter on device bond11 [ 360.402847][T30532] bond11: (slave veth15): Enslaving as an active interface with a down link [ 360.429786][T30532] bond11: (slave dummy0): making interface the new active one [ 360.449217][T30532] dummy0: entered promiscuous mode [ 360.455057][T30532] bond11: (slave dummy0): Enslaving as an active interface with an up link [ 360.547227][T30561] netlink: 'syz.6.11334': attribute type 30 has an invalid length. [ 360.559921][T15708] netdevsim netdevsim6 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 360.583689][T15708] netdevsim netdevsim6 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 360.612847][T15708] netdevsim netdevsim6 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 360.621178][T30568] netlink: 'syz.3.11336': attribute type 21 has an invalid length. [ 360.637615][T30570] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 360.640696][T15708] netdevsim netdevsim6 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 360.644843][T30570] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 360.645017][T30570] vhci_hcd vhci_hcd.0: Device attached [ 360.698002][T30570] vhci_hcd vhci_hcd.0: pdev(1) rhport(1) sockfd(5) [ 360.704710][T30570] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 360.712549][T30570] vhci_hcd vhci_hcd.0: Device attached [ 360.744375][T30583] vhci_hcd vhci_hcd.0: pdev(1) rhport(2) sockfd(7) [ 360.751028][T30583] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 360.758534][T30583] vhci_hcd vhci_hcd.0: Device attached [ 360.764202][ T29] kauditd_printk_skb: 908 callbacks suppressed [ 360.764216][ T29] audit: type=1400 audit(2000002833.588:14560): avc: denied { prog_load } for pid=30580 comm="syz.6.11342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.797626][T30570] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 360.830413][T30570] vhci_hcd vhci_hcd.0: pdev(1) rhport(4) sockfd(12) [ 360.837256][T30570] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 360.840840][ T29] audit: type=1400 audit(2000002833.618:14561): avc: denied { prog_load } for pid=30586 comm="syz.3.11343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.845562][T30570] vhci_hcd vhci_hcd.0: Device attached [ 360.865286][ T29] audit: type=1400 audit(2000002833.618:14562): avc: denied { map_create } for pid=30586 comm="syz.3.11343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.890455][ T29] audit: type=1400 audit(2000002833.658:14563): avc: denied { prog_load } for pid=30586 comm="syz.3.11343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.910258][ T29] audit: type=1400 audit(2000002833.658:14564): avc: denied { prog_load } for pid=30586 comm="syz.3.11343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.929683][ T29] audit: type=1400 audit(2000002833.658:14565): avc: denied { prog_load } for pid=30588 comm="syz.6.11344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.953002][ T29] audit: type=1400 audit(2000002833.778:14566): avc: denied { prog_load } for pid=30590 comm="syz.3.11345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.972521][ T29] audit: type=1400 audit(2000002833.778:14567): avc: denied { prog_load } for pid=30590 comm="syz.3.11345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.992732][ T29] audit: type=1400 audit(2000002833.798:14568): avc: denied { prog_load } for pid=30590 comm="syz.3.11345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.997817][T30583] vhci_hcd vhci_hcd.0: pdev(1) rhport(5) sockfd(9) [ 361.018867][T30583] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 361.026390][T30583] vhci_hcd vhci_hcd.0: Device attached [ 361.030231][ T3387] usb 3-1: new high-speed USB device number 2 using vhci_hcd [ 361.046267][ T29] audit: type=1400 audit(2000002833.838:14569): avc: denied { prog_load } for pid=30597 comm="syz.3.11347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 361.080518][T30570] vhci_hcd vhci_hcd.0: pdev(1) rhport(6) sockfd(14) [ 361.087214][T30570] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 361.095060][T30570] vhci_hcd vhci_hcd.0: Device attached [ 361.118284][T30583] vhci_hcd vhci_hcd.0: pdev(1) rhport(7) sockfd(18) [ 361.125032][T30583] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 361.132732][T30583] vhci_hcd vhci_hcd.0: Device attached [ 361.151564][T30613] vhci_hcd: connection closed [ 361.151768][ T7185] vhci_hcd: stop threads [ 361.160920][ T7185] vhci_hcd: release socket [ 361.165356][ T7185] vhci_hcd: disconnect device [ 361.167419][T30576] vhci_hcd: connection closed [ 361.170228][T30591] vhci_hcd: connection closed [ 361.170335][T30572] vhci_hcd: connection reset by peer [ 361.175173][T30603] vhci_hcd: connection closed [ 361.180199][T30594] vhci_hcd: connection closed [ 361.185832][T30584] vhci_hcd: connection closed [ 361.195696][ T7185] vhci_hcd: stop threads [ 361.204855][ T7185] vhci_hcd: release socket [ 361.209490][ T7185] vhci_hcd: disconnect device [ 361.214511][ T7185] vhci_hcd: stop threads [ 361.218768][ T7185] vhci_hcd: release socket [ 361.223239][ T7185] vhci_hcd: disconnect device [ 361.228402][ T7185] vhci_hcd: stop threads [ 361.232850][ T7185] vhci_hcd: release socket [ 361.237269][ T7185] vhci_hcd: disconnect device [ 361.242259][ T7185] vhci_hcd: stop threads [ 361.246801][ T7185] vhci_hcd: release socket [ 361.251379][ T7185] vhci_hcd: disconnect device [ 361.256249][ T7185] vhci_hcd: stop threads [ 361.260632][ T7185] vhci_hcd: release socket [ 361.265158][ T7185] vhci_hcd: disconnect device [ 361.270156][ T7185] vhci_hcd: stop threads [ 361.274502][ T7185] vhci_hcd: release socket [ 361.279120][ T7185] vhci_hcd: disconnect device [ 361.469997][T30648] __nla_validate_parse: 7 callbacks suppressed [ 361.470011][T30648] netlink: 4 bytes leftover after parsing attributes in process `syz.3.11368'. [ 361.835712][T30665] netlink: 'syz.1.11375': attribute type 7 has an invalid length. [ 361.843641][T30665] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11375'. [ 362.075705][T30676] netlink: 92 bytes leftover after parsing attributes in process `syz.8.11388'. [ 362.094874][T30678] netlink: 4 bytes leftover after parsing attributes in process `syz.2.11380'. [ 362.111552][T30678] syz_tun (unregistering): left promiscuous mode [ 362.285468][T30697] netlink: 96 bytes leftover after parsing attributes in process `syz.8.11390'. [ 362.373474][T30705] netlink: 92 bytes leftover after parsing attributes in process `syz.6.11393'. [ 362.527695][T30724] netlink: 96 bytes leftover after parsing attributes in process `syz.6.11404'. [ 362.605164][T30732] netlink: 4 bytes leftover after parsing attributes in process `syz.6.11407'. [ 362.636568][T30732] netlink: 12 bytes leftover after parsing attributes in process `syz.6.11407'. [ 362.641251][T30735] netlink: 'syz.2.11408': attribute type 1 has an invalid length. [ 362.716229][T30735] bond0: (slave geneve3): making interface the new active one [ 362.732116][T30735] bond0: (slave geneve3): Enslaving as an active interface with an up link [ 362.743804][ T7170] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 20004 - 0 [ 362.790884][ T7170] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 20004 - 0 [ 362.851042][ T7170] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 20004 - 0 [ 362.884243][ T7170] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 20004 - 0 [ 362.928338][T30755] netlink: 'syz.6.11418': attribute type 10 has an invalid length. [ 362.964051][T30759] netlink: 96 bytes leftover after parsing attributes in process `syz.2.11417'. [ 363.367704][T30798] wg2: entered promiscuous mode [ 363.372772][T30798] wg2: entered allmulticast mode [ 363.846370][T30805] netlink: 'syz.1.11449': attribute type 4 has an invalid length. [ 363.910123][T30806] netlink: 'syz.2.11439': attribute type 7 has an invalid length. [ 364.895944][T30907] lo speed is unknown, defaulting to 1000 [ 364.940065][T30907] lo speed is unknown, defaulting to 1000 [ 365.801768][ T29] kauditd_printk_skb: 577 callbacks suppressed [ 365.801784][ T29] audit: type=1400 audit(2000002838.648:15147): avc: denied { map_create } for pid=30962 comm="syz.2.11512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 365.827545][ T29] audit: type=1400 audit(2000002838.648:15148): avc: denied { prog_load } for pid=30962 comm="syz.2.11512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 365.964191][ T29] audit: type=1400 audit(2000002838.658:15149): avc: denied { create } for pid=30962 comm="syz.2.11512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=0 [ 365.984877][ T29] audit: type=1400 audit(2000002838.708:15150): avc: denied { map_create } for pid=30965 comm="syz.1.11513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 366.005308][ T29] audit: type=1400 audit(2000002838.708:15151): avc: denied { prog_load } for pid=30965 comm="syz.1.11513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 366.025691][ T29] audit: type=1400 audit(2000002838.778:15152): avc: denied { prog_load } for pid=30967 comm="syz.3.11514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 366.045871][ T29] audit: type=1400 audit(2000002838.778:15153): avc: denied { create } for pid=30967 comm="syz.3.11514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 366.067012][ T29] audit: type=1400 audit(2000002838.798:15154): avc: denied { prog_load } for pid=30969 comm="syz.2.11515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 366.159657][ T3387] vhci_hcd: vhci_device speed not set [ 366.222126][ T29] audit: type=1400 audit(2000002838.938:15155): avc: denied { map_create } for pid=30972 comm="syz.2.11517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 366.241836][ T29] audit: type=1400 audit(2000002838.938:15156): avc: denied { prog_load } for pid=30972 comm="syz.2.11517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 366.407985][T31000] wireguard0: entered promiscuous mode [ 366.413733][T31000] wireguard0: entered allmulticast mode [ 366.903218][T11663] Process accounting resumed [ 367.413870][T31086] netlink: 'syz.1.11568': attribute type 4 has an invalid length. [ 367.462652][T31090] __nla_validate_parse: 4 callbacks suppressed [ 367.462671][T31090] netlink: 12 bytes leftover after parsing attributes in process `syz.1.11570'. [ 367.540010][T31094] netlink: 'syz.1.11572': attribute type 1 has an invalid length. [ 367.561013][T31094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 367.575083][T31094] netlink: 4 bytes leftover after parsing attributes in process `syz.1.11572'. [ 367.592051][T31094] bond0 (unregistering): Released all slaves [ 367.663213][T31101] netlink: 16402 bytes leftover after parsing attributes in process `syz.6.11575'. [ 367.795094][T31105] ipvlan2: entered promiscuous mode [ 367.801991][T31105] bridge0: port 4(ipvlan2) entered blocking state [ 367.808511][T31105] bridge0: port 4(ipvlan2) entered disabled state [ 367.819862][T31105] ipvlan2: entered allmulticast mode [ 367.825680][T31105] bridge0: entered allmulticast mode [ 367.861670][T31105] ipvlan2: left allmulticast mode [ 367.866880][T31105] bridge0: left allmulticast mode [ 367.900963][T31116] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11582'. [ 367.937456][T31120] netlink: 'syz.3.11584': attribute type 4 has an invalid length. [ 368.100154][T31134] netlink: 'syz.3.11591': attribute type 1 has an invalid length. [ 368.138564][T31134] bond12: entered promiscuous mode [ 368.144410][T31134] 8021q: adding VLAN 0 to HW filter on device bond12 [ 368.181527][T31134] bond12: (slave bridge4): making interface the new active one [ 368.189476][T31134] bridge4: entered promiscuous mode [ 368.196507][T31134] bond12: (slave bridge4): Enslaving as an active interface with an up link [ 368.572992][T31187] netlink: 24 bytes leftover after parsing attributes in process `syz.1.11615'. [ 368.589370][T31187] netlink: 4 bytes leftover after parsing attributes in process `syz.1.11615'. [ 368.751113][T31198] netlink: 'syz.2.11619': attribute type 10 has an invalid length. [ 368.969899][ T7144] dummy0: left promiscuous mode [ 369.001885][T31224] netlink: 'syz.1.11641': attribute type 12 has an invalid length. [ 369.672354][T31311] netlink: 4 bytes leftover after parsing attributes in process `syz.3.11673'. [ 369.682279][T31311] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11673'. [ 369.932009][T31333] ªªªªªª: renamed from vlan0 [ 370.064800][T31351] netlink: 2028 bytes leftover after parsing attributes in process `syz.3.11687'. [ 370.075366][T31351] netlink: 24 bytes leftover after parsing attributes in process `syz.3.11687'. [ 370.818069][ T29] kauditd_printk_skb: 812 callbacks suppressed [ 370.818084][ T29] audit: type=1400 audit(2000003099.663:15969): avc: denied { map_create } for pid=31453 comm="syz.8.11740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.924736][ T29] audit: type=1400 audit(2000003099.703:15970): avc: denied { prog_load } for pid=31453 comm="syz.8.11740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.944951][ T29] audit: type=1400 audit(2000003099.703:15971): avc: denied { prog_load } for pid=31453 comm="syz.8.11740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.965983][ T29] audit: type=1400 audit(2000003099.703:15972): avc: denied { create } for pid=31453 comm="syz.8.11740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 370.986506][ T29] audit: type=1400 audit(2000003099.733:15973): avc: denied { map_create } for pid=31456 comm="syz.3.11742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 371.006149][ T29] audit: type=1400 audit(2000003099.733:15974): avc: denied { prog_load } for pid=31456 comm="syz.3.11742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 371.026571][ T29] audit: type=1400 audit(2000003099.733:15975): avc: denied { prog_load } for pid=31456 comm="syz.3.11742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 371.046704][ T29] audit: type=1400 audit(2000003099.753:15976): avc: denied { map_create } for pid=31458 comm="syz.8.11741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 371.066307][ T29] audit: type=1400 audit(2000003099.753:15977): avc: denied { prog_load } for pid=31458 comm="syz.8.11741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 371.086071][ T29] audit: type=1400 audit(2000003099.753:15978): avc: denied { prog_load } for pid=31458 comm="syz.8.11741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 371.339488][T15708] dummy0: left promiscuous mode [ 373.027160][T31687] bridge0: port 3(batadv0) entered disabled state [ 373.038987][T31687] bridge_slave_0: left allmulticast mode [ 373.045506][T31687] bridge_slave_0: left promiscuous mode [ 373.051316][T31687] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.083054][T31687] bridge_slave_1: left allmulticast mode [ 373.088893][T31687] bridge_slave_1: left promiscuous mode [ 373.095016][T31687] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.117241][T31687] .`: (slave bond_slave_0): Releasing backup interface [ 373.138602][T31687] .`: (slave bond_slave_1): Releasing backup interface [ 373.153963][T31687] team0: Port device team_slave_0 removed [ 373.166530][T31687] team0: Port device team_slave_1 removed [ 373.174131][T31687] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 373.181907][T31687] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 373.192504][T31687] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 373.200085][T31687] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 373.235186][T31704] netlink: 'syz.3.11858': attribute type 12 has an invalid length. [ 373.303936][T31721] __nla_validate_parse: 7 callbacks suppressed [ 373.303956][T31721] netlink: 24 bytes leftover after parsing attributes in process `syz.1.11866'. [ 373.383082][T31733] ip6gre4: entered allmulticast mode [ 373.820283][T31823] netlink: 24 bytes leftover after parsing attributes in process `syz.3.11916'. [ 374.023008][T31848] netlink: 96 bytes leftover after parsing attributes in process `syz.6.11926'. [ 374.237038][T31876] netlink: 'syz.1.11938': attribute type 1 has an invalid length. [ 374.270926][T31876] 8021q: adding VLAN 0 to HW filter on device bond0 [ 374.291389][T31876] bond0: (slave veth11): Enslaving as an active interface with a down link [ 374.307397][T31876] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 374.315283][T31876] bond0: (slave batadv1): dev_set_mac_address on slave failed! ALB mode requires that the base driver support setting the hw address also when the network device's interface is open [ 374.458328][T31887] lo speed is unknown, defaulting to 1000 [ 374.466119][T31887] lo speed is unknown, defaulting to 1000 [ 374.741646][T31913] macsec1: entered promiscuous mode [ 374.747031][T31913] bridge0: entered promiscuous mode [ 374.756049][T31913] bridge0: port 1(macsec1) entered blocking state [ 374.762806][T31913] bridge0: port 1(macsec1) entered disabled state [ 374.780399][T31913] macsec1: entered allmulticast mode [ 374.785822][T31913] bridge0: entered allmulticast mode [ 374.836655][T31913] macsec1: left allmulticast mode [ 374.841923][T31913] bridge0: left allmulticast mode [ 374.880070][T31913] bridge0: left promiscuous mode [ 374.923998][T31927] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 375.139633][T31967] netlink: 4 bytes leftover after parsing attributes in process `syz.6.11981'. [ 375.156303][T31967] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 375.528747][T32040] netlink: 4 bytes leftover after parsing attributes in process `syz.3.12017'. [ 375.539862][T32040] netlink: 12 bytes leftover after parsing attributes in process `syz.3.12017'. [ 375.571961][T32044] syzkaller0: entered promiscuous mode [ 375.577463][T32044] syzkaller0: entered allmulticast mode [ 375.833451][ T29] kauditd_printk_skb: 1146 callbacks suppressed [ 375.833515][ T29] audit: type=1400 audit(2000003104.683:17125): avc: denied { map_create } for pid=32070 comm="syz.1.12032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 375.861395][ T29] audit: type=1400 audit(2000003104.713:17126): avc: denied { prog_load } for pid=32070 comm="syz.1.12032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 375.881276][ T29] audit: type=1400 audit(2000003104.713:17127): avc: denied { allowed } for pid=32070 comm="syz.1.12032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 375.905460][ T29] audit: type=1400 audit(2000003104.753:17128): avc: denied { map_create } for pid=32072 comm="syz.6.12033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 375.936140][ T29] audit: type=1326 audit(2000003104.783:17129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32051 comm="syz.3.12023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 375.960241][ T29] audit: type=1326 audit(2000003104.783:17130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32051 comm="syz.3.12023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcf58baeec9 code=0x7ffc0000 [ 375.984426][ T29] audit: type=1400 audit(2000003104.783:17131): avc: denied { prog_load } for pid=32072 comm="syz.6.12033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 376.052418][ T29] audit: type=1400 audit(2000003104.813:17132): avc: denied { prog_load } for pid=32075 comm="syz.2.12034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 376.072225][ T29] audit: type=1326 audit(2000003104.813:17133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32072 comm="syz.6.12033" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa83b7eeec9 code=0x7ffc0000 [ 376.097563][ T29] audit: type=1326 audit(2000003104.813:17134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32072 comm="syz.6.12033" exe="/root/syz-executor" sig=0 arch=c000003e syscall=291 compat=0 ip=0x7fa83b7eeec9 code=0x7ffc0000 [ 376.289756][T32104] netlink: 14 bytes leftover after parsing attributes in process `syz.2.12047'. [ 376.346754][T32110] netlink: 12 bytes leftover after parsing attributes in process `syz.2.12049'. [ 376.461452][T32123] netlink: 'syz.2.12056': attribute type 1 has an invalid length. [ 376.484757][T32123] 8021q: adding VLAN 0 to HW filter on device bond5 [ 376.510251][T32123] netlink: 4 bytes leftover after parsing attributes in process `syz.2.12056'. [ 376.541829][T32123] bond5 (unregistering): Released all slaves [ 376.556473][T32133] lo speed is unknown, defaulting to 1000 [ 376.565559][T32133] lo speed is unknown, defaulting to 1000 [ 376.766367][T32149] bridge0: entered promiscuous mode [ 376.784362][T32149] macsec1: entered promiscuous mode [ 376.794354][T32149] bridge0: port 1(macsec1) entered blocking state [ 376.801094][T32149] bridge0: port 1(macsec1) entered disabled state [ 376.814769][T32154] netlink: 12 bytes leftover after parsing attributes in process `syz.6.12070'. [ 376.827138][T32149] macsec1: entered allmulticast mode [ 376.832749][T32149] bridge0: entered allmulticast mode [ 376.848992][T32149] macsec1: left allmulticast mode [ 376.854252][T32149] bridge0: left allmulticast mode [ 376.864676][T32149] bridge0: left promiscuous mode [ 377.149214][T32196] netlink: 'syz.8.12089': attribute type 5 has an invalid length. [ 377.786487][T32279] lo speed is unknown, defaulting to 1000 [ 377.801802][T32279] lo speed is unknown, defaulting to 1000 [ 378.531082][T32333] __nla_validate_parse: 3 callbacks suppressed [ 378.531125][T32333] netlink: 12 bytes leftover after parsing attributes in process `syz.1.12151'. [ 378.546732][T32333] netlink: 12 bytes leftover after parsing attributes in process `syz.1.12151'. [ 379.334125][T32401] wg2: entered promiscuous mode [ 379.339181][T32401] wg2: entered allmulticast mode [ 379.836351][T32425] lo speed is unknown, defaulting to 1000 [ 379.848873][T32425] lo speed is unknown, defaulting to 1000 [ 379.990023][T32445] wireguard0: entered promiscuous mode [ 379.995638][T32445] wireguard0: entered allmulticast mode [ 380.020206][T32450] netlink: 12 bytes leftover after parsing attributes in process `syz.6.12206'. [ 380.031544][T32448] serio: Serial port ptm0 [ 380.335835][T32477] wg2: left promiscuous mode [ 380.340768][T32477] wg2: left allmulticast mode [ 380.385985][T32477] ip6gre4: left allmulticast mode [ 380.430058][T32477] wireguard0: left promiscuous mode [ 380.435540][T32477] wireguard0: left allmulticast mode [ 380.480796][ T7185] netdevsim netdevsim2 eth0: unset [1, 0] type 2 family 0 port 20004 - 0 [ 380.521739][ T7185] netdevsim netdevsim2 eth1: unset [1, 0] type 2 family 0 port 20004 - 0 [ 380.542843][ T7185] netdevsim netdevsim2 eth2: unset [1, 0] type 2 family 0 port 20004 - 0 [ 380.572358][ T7185] netdevsim netdevsim2 eth3: unset [1, 0] type 2 family 0 port 20004 - 0 [ 380.681085][T32527] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32527 comm=syz.6.12242 [ 380.847988][ T29] kauditd_printk_skb: 852 callbacks suppressed [ 380.848007][ T29] audit: type=1400 audit(2000003109.693:17987): avc: denied { map_create } for pid=32558 comm="syz.1.12258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 380.875327][ T29] audit: type=1400 audit(2000003109.703:17988): avc: denied { name_bind } for pid=32546 comm="syz.2.12252" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 380.898444][ T29] audit: type=1400 audit(2000003109.703:17989): avc: denied { prog_load } for pid=32546 comm="syz.2.12252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 380.919668][ T29] audit: type=1400 audit(2000003109.703:17990): avc: denied { open } for pid=32560 comm="syz.6.12259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 380.939661][ T29] audit: type=1400 audit(2000003109.703:17991): avc: denied { map_create } for pid=32560 comm="syz.6.12259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 380.959865][ T29] audit: type=1400 audit(2000003109.703:17992): avc: denied { prog_load } for pid=32560 comm="syz.6.12259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 380.979500][ T29] audit: type=1400 audit(2000003109.703:17993): avc: denied { prog_load } for pid=32560 comm="syz.6.12259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 381.002050][ T29] audit: type=1400 audit(2000003109.733:17994): avc: denied { prog_load } for pid=32558 comm="syz.1.12258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 381.022373][ T29] audit: type=1400 audit(2000003109.733:17995): avc: denied { prog_load } for pid=32558 comm="syz.1.12258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 381.041842][ T29] audit: type=1400 audit(2000003109.733:17996): avc: denied { map_create } for pid=32558 comm="syz.1.12258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 381.598200][T32639] netlink: 'syz.8.12296': attribute type 29 has an invalid length. [ 381.748647][T32668] netlink: 96 bytes leftover after parsing attributes in process `syz.3.12310'. [ 381.900965][T32687] netlink: 'syz.6.12319': attribute type 13 has an invalid length. [ 381.935739][T32687] gretap0: refused to change device tx_queue_len [ 381.960226][T32687] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 382.054318][T32695] netlink: 'syz.8.12323': attribute type 7 has an invalid length. [ 382.062506][T32695] netlink: 8 bytes leftover after parsing attributes in process `syz.8.12323'. [ 382.664556][ T303] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=303 comm=syz.6.12356 [ 382.754685][ T313] netlink: 'syz.6.12361': attribute type 7 has an invalid length. [ 382.763401][ T313] netlink: 8 bytes leftover after parsing attributes in process `syz.6.12361'. [ 382.860291][ T327] sch_tbf: burst 0 is lower than device lo mtu (11337746) ! [ 383.140545][ T359] bridge: RTM_NEWNEIGH with invalid ether address [ 383.154353][ T360] netlink: 'syz.2.12380': attribute type 1 has an invalid length. [ 383.179955][ T360] 8021q: adding VLAN 0 to HW filter on device bond5 [ 383.202727][ T360] netlink: 4 bytes leftover after parsing attributes in process `syz.2.12380'. [ 383.227356][ T360] bond5 (unregistering): Released all slaves [ 383.250891][ T367] netlink: 4 bytes leftover after parsing attributes in process `syz.6.12385'. [ 383.268083][ T367] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 383.275575][ T367] IPv6: NLM_F_CREATE should be set when creating new route [ 383.286551][ T367] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 383.294434][ T367] IPv6: NLM_F_CREATE should be set when creating new route [ 383.718342][ T434] netlink: 44 bytes leftover after parsing attributes in process `syz.6.12416'. [ 384.804937][ T536] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=536 comm=syz.3.12459 [ 384.992542][ T564] netlink: 96 bytes leftover after parsing attributes in process `syz.8.12474'. [ 384.993536][ T566] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=566 comm=syz.2.12473 [ 385.267612][ T584] lo speed is unknown, defaulting to 1000 [ 385.275226][ T584] lo speed is unknown, defaulting to 1000 [ 385.787303][ T618] netlink: 96 bytes leftover after parsing attributes in process `syz.1.12496'. [ 385.870268][ T29] kauditd_printk_skb: 1202 callbacks suppressed [ 385.870284][ T29] audit: type=1400 audit(2000003114.723:19199): avc: denied { create } for pid=621 comm="syz.1.12498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 385.902779][ T29] audit: type=1400 audit(2000003114.723:19200): avc: denied { create } for pid=621 comm="syz.1.12498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 385.923991][ T29] audit: type=1400 audit(2000003114.723:19201): avc: denied { open } for pid=621 comm="syz.1.12498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 385.943736][ T29] audit: type=1400 audit(2000003114.723:19202): avc: denied { read write } for pid=621 comm="syz.1.12498" name="uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=0 [ 385.967494][ T29] audit: type=1400 audit(2000003114.723:19203): avc: denied { prog_load } for pid=621 comm="syz.1.12498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 385.997316][ T29] audit: type=1400 audit(2000003114.823:19204): avc: denied { create } for pid=624 comm="syz.8.12499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 386.018185][ T29] audit: type=1400 audit(2000003114.823:19205): avc: denied { create } for pid=624 comm="syz.8.12499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 386.038940][ T29] audit: type=1400 audit(2000003114.823:19206): avc: denied { prog_load } for pid=624 comm="syz.8.12499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 386.058378][ T29] audit: type=1400 audit(2000003114.823:19207): avc: denied { create } for pid=624 comm="syz.8.12499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 386.079299][ T29] audit: type=1400 audit(2000003114.823:19208): avc: denied { create } for pid=624 comm="syz.8.12499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 386.152924][ T632] netlink: 96 bytes leftover after parsing attributes in process `syz.8.12503'. [ 386.213363][ T634] netlink: 36 bytes leftover after parsing attributes in process `syz.1.12504'. [ 386.265490][ T642] netlink: 96 bytes leftover after parsing attributes in process `syz.3.12507'. [ 386.495547][ T666] netlink: 8 bytes leftover after parsing attributes in process `syz.2.12519'. [ 386.608850][ T681] netlink: 96 bytes leftover after parsing attributes in process `syz.2.12526'. [ 386.680895][ T688] netlink: 2048 bytes leftover after parsing attributes in process `syz.6.12527'. [ 386.690402][ T688] netlink: 4 bytes leftover after parsing attributes in process `syz.6.12527'. [ 387.416346][ T733] bond0: (slave veth11): Releasing active interface [ 387.468494][ T741] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=741 comm=syz.1.12554 [ 387.517292][ T749] netlink: 'syz.1.12557': attribute type 13 has an invalid length. [ 387.531752][ T749] gretap0: refused to change device tx_queue_len [ 387.539034][ T749] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 387.668402][ T767] netlink: 'syz.3.12566': attribute type 1 has an invalid length. [ 387.669519][ C1] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 387.701829][ T767] 8021q: adding VLAN 0 to HW filter on device bond13 [ 387.732223][ T767] bond13: (slave veth19): Enslaving as an active interface with a down link [ 387.744217][ T772] netlink: 'syz.1.12568': attribute type 30 has an invalid length. [ 387.767224][ T767] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 387.775212][ T767] bond13: (slave batadv1): dev_set_mac_address on slave failed! ALB mode requires that the base driver support setting the hw address also when the network device's interface is open [ 387.955925][ T780] netlink: 'syz.3.12572': attribute type 13 has an invalid length. [ 387.972549][ T780] 0ªî{X¹¦: refused to change device tx_queue_len [ 387.982658][ T780] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 388.043787][ T784] 8021q: adding VLAN 0 to HW filter on device bond5 [ 388.056925][ T784] 8021q: adding VLAN 0 to HW filter on device ipvlan0 [ 388.068792][ T784] bond5: (slave ipvlan0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 388.277335][ T816] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=816 comm=syz.8.12589 [ 388.731646][ T864] __nla_validate_parse: 2 callbacks suppressed [ 388.731667][ T864] netlink: 8 bytes leftover after parsing attributes in process `syz.8.12620'. [ 388.747079][ T864] netlink: 'syz.8.12620': attribute type 30 has an invalid length. [ 389.183129][ T890] netlink: 4 bytes leftover after parsing attributes in process `syz.1.12622'. [ 389.212585][ T890] netlink: 12 bytes leftover after parsing attributes in process `syz.1.12622'. [ 389.750919][ T986] netlink: 12 bytes leftover after parsing attributes in process `syz.3.12666'. [ 390.106998][ T1027] netlink: 96 bytes leftover after parsing attributes in process `syz.6.12687'. [ 390.203600][ T1041] netlink: 'syz.8.12694': attribute type 4 has an invalid length. [ 390.316113][ T1057] lo speed is unknown, defaulting to 1000 [ 390.322754][ T1057] lo speed is unknown, defaulting to 1000 [ 390.622823][ T1088] netlink: 'syz.2.12716': attribute type 1 has an invalid length. [ 390.677772][ T1088] 8021q: adding VLAN 0 to HW filter on device bond6 [ 390.711624][ T1088] netlink: 4 bytes leftover after parsing attributes in process `syz.2.12716'. [ 390.727443][ T1096] lo speed is unknown, defaulting to 1000 [ 390.744685][ T1088] bond6 (unregistering): Released all slaves [ 390.755488][ T1096] lo speed is unknown, defaulting to 1000 [ 390.885599][ T29] kauditd_printk_skb: 1081 callbacks suppressed [ 390.885618][ T29] audit: type=1400 audit(2000003119.733:20290): avc: denied { map_create } for pid=1105 comm="syz.8.12723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 390.930448][ T29] audit: type=1400 audit(2000003119.783:20291): avc: denied { map_create } for pid=1105 comm="syz.8.12723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 390.968378][ T29] audit: type=1400 audit(2000003119.783:20292): avc: denied { prog_load } for pid=1105 comm="syz.8.12723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 390.988396][ T29] audit: type=1400 audit(2000003119.803:20293): avc: denied { prog_load } for pid=1105 comm="syz.8.12723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 391.109864][ T29] audit: type=1400 audit(2000003119.883:20294): avc: denied { prog_load } for pid=1109 comm="syz.8.12736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 391.130347][ T29] audit: type=1400 audit(2000003119.893:20295): avc: denied { open } for pid=1109 comm="syz.8.12736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 391.150327][ T29] audit: type=1326 audit(2000003119.893:20296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1109 comm="syz.8.12736" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f966a8deec9 code=0x7ffc0000 [ 391.174902][ T29] audit: type=1326 audit(2000003119.893:20297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1109 comm="syz.8.12736" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f966a8deec9 code=0x7ffc0000 [ 391.198557][ T29] audit: type=1326 audit(2000003119.893:20298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1109 comm="syz.8.12736" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f966a8deec9 code=0x7ffc0000 [ 391.222926][ T29] audit: type=1400 audit(2000003119.893:20299): avc: denied { map_create } for pid=1109 comm="syz.8.12736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 391.383664][ T1144] netlink: 'syz.3.12740': attribute type 4 has an invalid length. [ 391.551876][ T1170] serio: Serial port ptm0 [ 391.663325][ T1185] netlink: 96 bytes leftover after parsing attributes in process `syz.3.12759'. [ 392.407104][ T1240] ip6gre1: entered allmulticast mode [ 392.505232][ T1246] netlink: 4 bytes leftover after parsing attributes in process `syz.2.12789'. [ 392.539977][ T1250] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12790'. [ 392.602615][ T1250] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12790'. [ 393.773096][ T1393] __nla_validate_parse: 3 callbacks suppressed [ 393.773156][ T1393] netlink: 8 bytes leftover after parsing attributes in process `syz.2.12848'. [ 394.283193][ T1423] netlink: 8 bytes leftover after parsing attributes in process `syz.6.12861'. [ 394.308266][ T1419] batadv0: left promiscuous mode [ 394.313587][ T1419] batadv0: left allmulticast mode [ 394.403611][ T1419] wg2: left promiscuous mode [ 394.408273][ T1419] wg2: left allmulticast mode [ 394.608962][ T1419] ip6gre1: left allmulticast mode [ 394.645747][ T7129] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 394.696980][ T7129] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 394.719669][ T7129] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 394.749261][ T7129] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 395.095356][ T1456] lo speed is unknown, defaulting to 1000 [ 395.128407][ T1456] lo speed is unknown, defaulting to 1000 [ 395.181240][ T1465] netlink: 8 bytes leftover after parsing attributes in process `syz.6.12882'. [ 395.890343][ T29] kauditd_printk_skb: 639 callbacks suppressed [ 395.890440][ T29] audit: type=1400 audit(2000003124.743:20939): avc: denied { map_create } for pid=1514 comm="syz.8.12906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 395.918114][ T29] audit: type=1400 audit(2000003124.743:20940): avc: denied { prog_load } for pid=1512 comm="syz.6.12905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 395.938664][ T29] audit: type=1400 audit(2000003124.763:20941): avc: denied { prog_load } for pid=1512 comm="syz.6.12905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 395.958761][ T29] audit: type=1400 audit(2000003124.763:20942): avc: denied { prog_load } for pid=1514 comm="syz.8.12906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 395.980481][ T29] audit: type=1400 audit(2000003124.783:20943): avc: denied { prog_load } for pid=1490 comm="syz.1.12893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 396.000002][ T29] audit: type=1400 audit(2000003124.833:20944): avc: denied { open } for pid=1514 comm="syz.8.12906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 396.074651][ T29] audit: type=1400 audit(2000003124.883:20945): avc: denied { prog_load } for pid=1526 comm="syz.2.12910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 396.094451][ T29] audit: type=1400 audit(2000003124.883:20946): avc: denied { map_create } for pid=1526 comm="syz.2.12910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 396.113896][ T29] audit: type=1400 audit(2000003124.883:20947): avc: denied { prog_load } for pid=1526 comm="syz.2.12910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 396.133811][ T29] audit: type=1326 audit(2000003124.893:20948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1490 comm="syz.1.12893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4188e6eec9 code=0x7ffc0000 [ 396.484122][ T1580] netlink: 96 bytes leftover after parsing attributes in process `syz.3.12931'. [ 396.523615][ T1584] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1584 comm=syz.1.12933 [ 396.633147][ T1596] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1596 comm=syz.3.12940 [ 396.752784][ T1611] netlink: 'syz.1.12947': attribute type 7 has an invalid length. [ 396.760850][ T1611] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12947'. [ 397.045257][ T1663] bridge: RTM_NEWNEIGH with invalid ether address [ 397.091180][ T1673] netlink: 28 bytes leftover after parsing attributes in process `syz.6.12975'. [ 397.103380][ T1673] netem: change failed [ 397.311335][ T1697] netlink: 12 bytes leftover after parsing attributes in process `syz.6.12986'. [ 397.400738][ T1701] netlink: 4 bytes leftover after parsing attributes in process `syz.1.12988'. [ 397.548370][ T1721] lo speed is unknown, defaulting to 1000 [ 397.557810][ T1721] lo speed is unknown, defaulting to 1000 [ 397.978285][ T1751] netlink: 'syz.8.13009': attribute type 10 has an invalid length. [ 397.988052][ T1751] bond0: (slave netdevsim1): Enslaving as an active interface with an up link [ 398.217081][ T1785] sch_tbf: burst 2976 is lower than device lo mtu (11337746) ! [ 398.335592][ T1808] netlink: 44 bytes leftover after parsing attributes in process `syz.2.13035'. [ 399.039372][ T1855] netlink: 'syz.3.13056': attribute type 39 has an invalid length. [ 399.737855][ T1896] ip6gre3: entered allmulticast mode [ 399.893516][ T1903] netlink: 4 bytes leftover after parsing attributes in process `syz.3.13076'. [ 399.930118][ T1903] netlink: 4 bytes leftover after parsing attributes in process `syz.3.13076'. [ 400.027124][ T1905] netlink: 12 bytes leftover after parsing attributes in process `syz.2.13078'. [ 400.048198][ T1905] 8021q: adding VLAN 0 to HW filter on device bond6 [ 400.338737][ T1948] lo speed is unknown, defaulting to 1000 [ 400.347498][ T1948] lo speed is unknown, defaulting to 1000 [ 400.622552][ T1973] netlink: 'syz.1.13108': attribute type 7 has an invalid length. [ 400.632439][ T1973] netlink: 8 bytes leftover after parsing attributes in process `syz.1.13108'. [ 400.774371][ T1989] netlink: 24 bytes leftover after parsing attributes in process `syz.8.13117'. [ 400.919611][ T29] kauditd_printk_skb: 1129 callbacks suppressed [ 400.919658][ T29] audit: type=1400 audit(2000003129.773:22078): avc: denied { prog_load } for pid=2003 comm="syz.6.13123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 401.149979][ T2028] netlink: 8 bytes leftover after parsing attributes in process `syz.6.13132'. [ 401.245203][ T2030] netlink: 24 bytes leftover after parsing attributes in process `syz.6.13133'. [ 401.314260][ T29] audit: type=1326 audit(2000003129.793:22079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1996 comm="syz.3.13120" exe="/root/syz-executor" sig=0 arch=c000003e syscall=96 compat=0 ip=0xffffffffff600000 code=0x50000 [ 401.339244][ T29] audit: type=1400 audit(2000003129.793:22080): avc: denied { prog_load } for pid=2006 comm="syz.1.13134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 401.358980][ T29] audit: type=1326 audit(2000003129.793:22081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1996 comm="syz.3.13120" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7fcf58baeec9 code=0x50000 [ 401.382528][ T29] audit: type=1400 audit(2000003129.803:22082): avc: denied { prog_load } for pid=2006 comm="syz.1.13134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 401.401856][ T29] audit: type=1400 audit(2000003129.803:22083): avc: denied { read write } for pid=2006 comm="syz.1.13134" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 401.426026][ T29] audit: type=1400 audit(2000003129.803:22084): avc: denied { read } for pid=2006 comm="syz.1.13134" dev="nsfs" ino=4026532702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 401.447707][ T29] audit: type=1400 audit(2000003129.803:22085): avc: denied { create } for pid=2006 comm="syz.1.13134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 401.468899][ T29] audit: type=1400 audit(2000003129.823:22086): avc: denied { map_create } for pid=2010 comm="syz.1.13125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 401.488771][ T29] audit: type=1400 audit(2000003129.823:22087): avc: denied { prog_load } for pid=2010 comm="syz.1.13125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 401.715170][ T2061] bond3: (slave dummy0): Releasing active interface [ 401.732301][ T2061] bond0: (slave bond_slave_0): Releasing backup interface [ 401.742578][ T2061] bond0: (slave bond_slave_1): Releasing backup interface [ 401.759177][ T2061] team0: Port device team_slave_0 removed [ 401.766354][ T2061] team0: Port device team_slave_1 removed [ 401.772671][ T2061] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 401.780557][ T2061] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 401.788793][ T2067] netlink: 2048 bytes leftover after parsing attributes in process `syz.3.13150'. [ 401.798126][ T2067] netlink: 4 bytes leftover after parsing attributes in process `syz.3.13150'. [ 401.815854][ T2061] bond0: (slave netdevsim1): Releasing backup interface [ 401.825535][ T2061] bond1: (slave gretap1): Releasing active interface [ 401.837250][ T2061] bond3: (slave veth5): Releasing active interface [ 401.917080][ T2084] netlink: 'syz.8.13158': attribute type 10 has an invalid length. [ 401.925945][ T2084] 8021q: adding VLAN 0 to HW filter on device bond0 [ 401.934074][ T2084] team0: Port device bond0 added [ 401.942322][ T2084] netlink: 4 bytes leftover after parsing attributes in process `syz.8.13158'. [ 402.031313][ T2104] netlink: 'syz.1.13168': attribute type 16 has an invalid length. [ 402.071273][ T2104] 8021q: adding VLAN 0 to HW filter on device .` [ 402.080489][ T2104] 8021q: adding VLAN 0 to HW filter on device team0 [ 402.103577][ T2104] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 402.127525][ T2112] 8021q: adding VLAN 0 to HW filter on device bond7 [ 402.146036][ T2112] bond7: (slave ip6gretap0): Enslaving as an active interface with an up link [ 402.546153][ T2162] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2162 comm=syz.1.13196 [ 402.689280][ T2173] netlink: 'syz.3.13200': attribute type 1 has an invalid length. [ 402.752195][ T2173] 8021q: adding VLAN 0 to HW filter on device bond14 [ 402.766116][ T2175] bond14 (unregistering): Released all slaves [ 402.818658][ T2181] 8021q: adding VLAN 0 to HW filter on device bond4 [ 402.838059][ T2181] 8021q: adding VLAN 0 to HW filter on device ipvlan0 [ 402.850661][ T2181] bond4: (slave ipvlan0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 402.908301][ T2195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2195 comm=syz.3.13209 [ 403.998790][ T2351] lo speed is unknown, defaulting to 1000 [ 404.005123][ T2351] lo speed is unknown, defaulting to 1000 [ 404.756865][ T2419] lo speed is unknown, defaulting to 1000 [ 404.763289][ T2419] lo speed is unknown, defaulting to 1000 [ 405.044107][ T2440] netlink: 'syz.8.13324': attribute type 10 has an invalid length. [ 405.071098][ T2440] team0: Port device dummy0 added [ 405.079014][ T2440] netlink: 'syz.8.13324': attribute type 10 has an invalid length. [ 405.089099][ T2440] team0: Port device dummy0 removed [ 405.114980][ T2440] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 405.184450][ T2448] lo speed is unknown, defaulting to 1000 [ 405.203885][ T2448] lo speed is unknown, defaulting to 1000 [ 405.933694][ T29] kauditd_printk_skb: 837 callbacks suppressed [ 405.933711][ T29] audit: type=1400 audit(2000003134.783:22925): avc: denied { map_create } for pid=2484 comm="syz.3.13344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 405.959733][ T29] audit: type=1400 audit(2000003134.783:22926): avc: denied { prog_load } for pid=2484 comm="syz.3.13344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 405.979446][ T29] audit: type=1400 audit(2000003134.783:22927): avc: denied { prog_load } for pid=2484 comm="syz.3.13344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 406.095942][ T29] audit: type=1400 audit(2000003134.843:22928): avc: denied { prog_load } for pid=2484 comm="syz.3.13344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 406.115476][ T29] audit: type=1400 audit(2000003134.843:22929): avc: denied { prog_load } for pid=2484 comm="syz.3.13344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 406.135513][ T29] audit: type=1400 audit(2000003134.853:22930): avc: denied { prog_load } for pid=2484 comm="syz.3.13344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 406.154947][ T29] audit: type=1400 audit(2000003134.853:22931): avc: denied { allowed } for pid=2484 comm="syz.3.13344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 406.174942][ T29] audit: type=1326 audit(2000003134.873:22932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2486 comm="syz.6.13346" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa83b7eeec9 code=0x7ffc0000 [ 406.199049][ T29] audit: type=1326 audit(2000003134.873:22933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2486 comm="syz.6.13346" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa83b7eeec9 code=0x7ffc0000 [ 406.223679][ T29] audit: type=1326 audit(2000003134.873:22934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2486 comm="syz.6.13346" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fa83b7eeec9 code=0x7ffc0000 [ 406.280829][ T2499] __nla_validate_parse: 6 callbacks suppressed [ 406.280847][ T2499] netlink: 4 bytes leftover after parsing attributes in process `syz.3.13350'. [ 407.157313][ T2547] bridge: RTM_NEWNEIGH with invalid ether address [ 407.487397][ T2584] bridge: RTM_NEWNEIGH with invalid ether address [ 407.963937][ T2614] netlink: 96 bytes leftover after parsing attributes in process `syz.8.13403'. [ 408.565463][ T2630] netlink: 12 bytes leftover after parsing attributes in process `syz.8.13417'. [ 408.633961][ T2643] netlink: 96 bytes leftover after parsing attributes in process `syz.8.13413'. [ 409.816839][ T2709] bond0: (slave geneve3): Releasing active interface [ 409.832201][ T2709] bond7: (slave ip6gretap0): Releasing backup interface [ 409.923102][ T2718] lo speed is unknown, defaulting to 1000 [ 409.938328][ T2718] lo speed is unknown, defaulting to 1000 [ 409.939773][ T2720] lo speed is unknown, defaulting to 1000 [ 410.008181][ T2725] netlink: 20 bytes leftover after parsing attributes in process `syz.2.13448'. [ 410.018337][ T2720] lo speed is unknown, defaulting to 1000 [ 410.866679][ T2751] bond3: (slave dummy0): Releasing active interface [ 410.878934][ T2751] bridge_slave_0: left promiscuous mode [ 410.885302][ T2751] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.900155][ T2751] bridge_slave_1: left allmulticast mode [ 410.906034][ T2751] bridge_slave_1: left promiscuous mode [ 410.912104][ T2751] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.921016][ T2751] team0: Port device team_slave_0 removed [ 410.928112][ T2751] team0: Port device team_slave_1 removed [ 410.934286][ T2751] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 410.942167][ T2751] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 410.950176][ T2751] batadv1: left allmulticast mode [ 410.955395][ T2751] batadv1: left promiscuous mode [ 410.960564][ T2751] bridge0: port 3(batadv1) entered disabled state [ 410.968508][ T2751] bond2: (slave bridge2): Releasing active interface [ 410.975965][ T2751] batadv2: left allmulticast mode [ 410.981350][ T2751] batadv2: left promiscuous mode [ 410.986602][ T2751] bridge0: port 4(batadv2) entered disabled state [ 410.995432][ T2751] bond3: (slave veth17): Releasing active interface [ 411.038219][ T29] kauditd_printk_skb: 521 callbacks suppressed [ 411.038267][ T29] audit: type=1400 audit(2000003139.883:23456): avc: denied { prog_load } for pid=2757 comm="syz.6.13460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 411.066171][ T29] audit: type=1400 audit(2000003139.903:23457): avc: denied { map_create } for pid=2757 comm="syz.6.13460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 411.086447][ T29] audit: type=1400 audit(2000003139.903:23458): avc: denied { prog_load } for pid=2757 comm="syz.6.13460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 411.105902][ T29] audit: type=1400 audit(2000003139.903:23459): avc: denied { prog_load } for pid=2757 comm="syz.6.13460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 411.126002][ T29] audit: type=1400 audit(2000003139.903:23460): avc: denied { prog_load } for pid=2757 comm="syz.6.13460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 411.145477][ T29] audit: type=1400 audit(2000003139.903:23461): avc: denied { map_create } for pid=2757 comm="syz.6.13460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 411.165138][ T29] audit: type=1400 audit(2000003139.913:23462): avc: denied { map_create } for pid=2762 comm="syz.3.13477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 411.184839][ T29] audit: type=1400 audit(2000003139.913:23463): avc: denied { prog_load } for pid=2760 comm="syz.2.13474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 411.204607][ T29] audit: type=1400 audit(2000003139.913:23464): avc: denied { prog_load } for pid=2762 comm="syz.3.13477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 411.224687][ T29] audit: type=1400 audit(2000003139.923:23465): avc: denied { prog_load } for pid=2764 comm="syz.8.13462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 411.330299][ T2780] netlink: 96 bytes leftover after parsing attributes in process `syz.1.13482'. [ 412.356416][ T2809] bond11: (slave dummy0): Releasing active interface [ 412.367067][ T2809] dummy0: left promiscuous mode [ 412.377394][ T2809] batman_adv: batadv0: Removing interface: veth1_vlan [ 412.390488][ T2809] bond11: (slave veth15): Releasing active interface [ 412.410105][ T2809] bond12: (slave bridge4): Releasing backup interface [ 412.433246][ T2809] bridge4: left promiscuous mode [ 412.444244][ T2809] bond13: (slave veth19): Releasing active interface [ 412.458691][ T2820] netlink: 96 bytes leftover after parsing attributes in process `syz.1.13490'. [ 412.468518][ T2816] netlink: 96 bytes leftover after parsing attributes in process `syz.6.13488'. [ 412.481806][ T2817] 0ªî{X¹¦: left allmulticast mode [ 412.494551][ T2817] batadv0: left promiscuous mode [ 412.499930][ T2817] batadv0: left allmulticast mode [ 412.518376][ T2817] macvtap1: left promiscuous mode [ 412.523609][ T2817] macvtap1: left allmulticast mode [ 412.564103][T15708] netdevsim netdevsim8 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 412.799470][T15708] netdevsim netdevsim8 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 412.813801][T15708] netdevsim netdevsim8 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 412.839730][T15708] netdevsim netdevsim8 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 412.932048][ T2836] wg2: left promiscuous mode [ 412.937005][ T2836] wg2: left allmulticast mode [ 412.952998][ T2836] vlan3: left allmulticast mode [ 412.958289][ T2836] bridge_slave_0: left allmulticast mode [ 412.964523][ T2836] ipip0: left promiscuous mode [ 412.998376][T15708] netdevsim netdevsim6 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 413.007017][T15708] netdevsim netdevsim6 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 413.027514][T15708] netdevsim netdevsim6 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 413.039660][T15708] netdevsim netdevsim6 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 413.200203][ T2856] netlink: 96 bytes leftover after parsing attributes in process `syz.3.13503'. [ 413.223496][ T2858] team0: Port device bond0 removed [ 413.229523][ T2858] bond0: (slave dummy0): Releasing backup interface [ 413.272696][ T2864] netlink: 96 bytes leftover after parsing attributes in process `syz.3.13507'. [ 413.627834][ T2906] batadv0: left allmulticast mode [ 413.639813][ T2906] wireguard0: left promiscuous mode [ 413.646045][ T2906] wireguard0: left allmulticast mode [ 413.657668][ T2906] bond12: left promiscuous mode [ 413.676389][ T2906] ip6gre3: left allmulticast mode [ 414.276925][ T2966] netlink: 'syz.1.13560': attribute type 1 has an invalid length. [ 414.291667][ T2966] 8021q: adding VLAN 0 to HW filter on device bond1 [ 414.306422][ T2966] netlink: 4 bytes leftover after parsing attributes in process `syz.1.13560'. [ 414.317825][ T2966] bond1 (unregistering): Released all slaves [ 414.415357][ T2979] netlink: 8 bytes leftover after parsing attributes in process `syz.1.13563'. [ 414.425006][ T2979] netlink: 'syz.1.13563': attribute type 30 has an invalid length. [ 414.484772][ T7170] netdevsim netdevsim1 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 414.505666][ T7170] netdevsim netdevsim1 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 414.561044][ T2985] lo speed is unknown, defaulting to 1000 [ 414.562895][ T7170] netdevsim netdevsim1 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 414.603456][ T2985] lo speed is unknown, defaulting to 1000 [ 414.628023][ T7170] netdevsim netdevsim1 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 415.580157][ T3040] netlink: 'syz.6.13591': attribute type 7 has an invalid length. [ 415.588491][ T3040] netlink: 8 bytes leftover after parsing attributes in process `syz.6.13591'. [ 415.809331][ T3059] lo speed is unknown, defaulting to 1000 [ 415.831057][ T3059] lo speed is unknown, defaulting to 1000 [ 416.232729][ T29] kauditd_printk_skb: 439 callbacks suppressed [ 416.232748][ T29] audit: type=1400 audit(2000003145.083:23905): avc: denied { map_create } for pid=3063 comm="syz.6.13613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 416.265840][ T29] audit: type=1400 audit(2000003145.093:23906): avc: denied { prog_load } for pid=3063 comm="syz.6.13613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 416.285927][ T29] audit: type=1400 audit(2000003145.093:23907): avc: denied { prog_load } for pid=3063 comm="syz.6.13613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 416.300351][ T3069] netlink: 8 bytes leftover after parsing attributes in process `syz.2.13600'. [ 416.305457][ T29] audit: type=1400 audit(2000003145.093:23908): avc: denied { allowed } for pid=3063 comm="syz.6.13613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 416.314667][ T3069] netlink: 'syz.2.13600': attribute type 30 has an invalid length. [ 416.342823][ T29] audit: type=1400 audit(2000003145.113:23909): avc: denied { create } for pid=3065 comm="syz.8.13601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 416.363666][ T29] audit: type=1400 audit(2000003145.113:23910): avc: denied { map_create } for pid=3067 comm="syz.2.13600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 416.367213][T15708] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 416.383546][ T29] audit: type=1400 audit(2000003145.113:23911): avc: denied { create } for pid=3065 comm="syz.8.13601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 416.398090][T15708] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 416.423148][T15708] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 416.427315][ T29] audit: type=1400 audit(2000003145.113:23912): avc: denied { prog_load } for pid=3067 comm="syz.2.13600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 416.432108][T15708] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 416.451551][ T29] audit: type=1400 audit(2000003145.113:23913): avc: denied { map_create } for pid=3068 comm="syz.1.13599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 416.451604][ T29] audit: type=1400 audit(2000003145.123:23914): avc: denied { map_create } for pid=3068 comm="syz.1.13599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 416.658919][ T3084] netlink: 'syz.6.13611': attribute type 1 has an invalid length. [ 416.678212][ T3084] 8021q: adding VLAN 0 to HW filter on device bond5 [ 416.692447][ T3084] netlink: 4 bytes leftover after parsing attributes in process `syz.6.13611'. [ 416.706350][ T3084] bond5 (unregistering): Released all slaves [ 417.439117][ T3101] ================================================================== [ 417.447553][ T3101] BUG: KCSAN: data-race in fifo_open / wait_for_partner [ 417.454739][ T3101] [ 417.457226][ T3101] read-write to 0xffff88810306aaec of 4 bytes by task 3110 on cpu 0: [ 417.465836][ T3101] fifo_open+0x17f/0x5d0 [ 417.470311][ T3101] do_dentry_open+0x649/0xa20 [ 417.475567][ T3101] vfs_open+0x37/0x1e0 [ 417.480057][ T3101] path_openat+0x1c5e/0x2170 [ 417.485132][ T3101] do_filp_open+0x109/0x230 [ 417.489865][ T3101] do_sys_openat2+0xa6/0x110 [ 417.494622][ T3101] __x64_sys_open+0xe6/0x110 [ 417.499390][ T3101] x64_sys_call+0x1457/0x2ff0 [ 417.504389][ T3101] do_syscall_64+0xd2/0x200 [ 417.509042][ T3101] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 417.515154][ T3101] [ 417.517609][ T3101] read to 0xffff88810306aaec of 4 bytes by task 3101 on cpu 1: [ 417.525828][ T3101] wait_for_partner+0xf7/0x1c0 [ 417.530910][ T3101] fifo_open+0x462/0x5d0 [ 417.535214][ T3101] do_dentry_open+0x649/0xa20 [ 417.540051][ T3101] vfs_open+0x37/0x1e0 [ 417.544252][ T3101] path_openat+0x1c5e/0x2170 [ 417.548968][ T3101] do_filp_open+0x109/0x230 [ 417.553771][ T3101] do_sys_openat2+0xa6/0x110 [ 417.558506][ T3101] __x64_sys_openat+0xf2/0x120 [ 417.563364][ T3101] x64_sys_call+0x2e9c/0x2ff0 [ 417.568179][ T3101] do_syscall_64+0xd2/0x200 [ 417.572818][ T3101] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 417.578753][ T3101] [ 417.581102][ T3101] value changed: 0x00000002 -> 0x00000001 [ 417.586846][ T3101] [ 417.589252][ T3101] Reported by Kernel Concurrency Sanitizer on: [ 417.595679][ T3101] CPU: 1 UID: 0 PID: 3101 Comm: syz.2.13615 Not tainted syzkaller #0 PREEMPT(voluntary) [ 417.606920][ T3101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 417.618759][ T3101] ================================================================== [ 418.390890][ T7170] batadv1: left allmulticast mode [ 418.395978][ T7170] batadv1: left promiscuous mode [ 418.401398][ T7170] bridge0: port 4(batadv1) entered disabled state [ 418.408750][ T7170] bridge_slave_1: left allmulticast mode [ 418.414845][ T7170] bridge_slave_1: left promiscuous mode [ 418.420781][ T7170] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.429200][ T7170] bridge_slave_0: left promiscuous mode [ 418.435409][ T7170] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.473370][ T7170] bond2 (unregistering): (slave gretap1): Releasing active interface [ 418.611145][ T7170] bond0 (unregistering): left promiscuous mode [ 418.618144][ T7170] bond0 (unregistering): Released all slaves [ 418.626779][ T7170] bond1 (unregistering): Released all slaves [ 418.635566][ T7170] bond2 (unregistering): Released all slaves [ 418.644045][ T7170] bond3 (unregistering): Released all slaves [ 418.682570][ T7170] tipc: Disabling bearer [ 418.687963][ T7170] tipc: Left network mode [ 418.727382][ T7170] hsr_slave_0: left promiscuous mode [ 418.733594][ T7170] hsr_slave_1: left promiscuous mode [ 418.741622][ T7170] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 419.091257][ T7170] IPVS: stop unused estimator thread 0...