last executing test programs: 6m8.331638906s ago: executing program 32 (id=907): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, 0x0, 0x80) ioctl$PPPIOCSMRU(r0, 0x40047452, 0x0) 4m43.159804907s ago: executing program 33 (id=2784): socket$nl_generic(0x10, 0x3, 0x10) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x40101) r0 = syz_io_uring_setup(0x8d2, &(0x7f00000002c0)={0x0, 0xfffffbfc, 0x400, 0x2, 0x374}, &(0x7f00000001c0)=0x0, &(0x7f00000000c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r0, 0x47ba, 0x3e82, 0x60, 0x0, 0x0) 4m38.171026866s ago: executing program 34 (id=2837): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000030900010073797a310000000054000000030a010400000000000000000100ffff0900030073797a310000000028000480080002400000000008000140000000051400030076657468315f6f6163767461700000000900010073797a310000000064000000050a01020000000000000000010020000c00024000000000000000010900010073797a3100000000040004800b00070066696c746572"], 0x330}}, 0x4008800) 3m36.273613802s ago: executing program 35 (id=4355): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x12, 0x0, 0x12) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='westwood', 0x8) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0xc9100120, 0x0, 0xfffffffffffffd25) 3m16.260744359s ago: executing program 36 (id=4815): r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000000)={@remote, @multicast1, 0x4, "d30f388c52647612d91de4353d68b0fa00", 0x0, 0x0, 0x4000000, 0x8}, 0x3c) setsockopt$MRT_ADD_MFC(r0, 0x0, 0xcc, &(0x7f0000000280)={@broadcast, @multicast1, 0x0, "7ea97ddb2ac127ffa5b7216fe75ebaa2855a422a8bf8ec7caf003751804500", 0x0, 0x80, 0x4, 0x6}, 0x3c) setsockopt$MRT_ADD_MFC(r0, 0x0, 0xcc, &(0x7f0000000200)={@empty, @private, 0x0, "606b177019716ea6ff1f2c7ed79c77e2e0f19a230000002007007c3d935f00", 0x3e1f}, 0x3c) setsockopt$MRT_ADD_MFC(r0, 0x0, 0xcc, &(0x7f0000000180)={@private=0xa010102, @multicast2, 0x0, "941621a61c5815f4678d8fd403f2f30229a88d74d71fd55708016d20fd419884", 0x0, 0x1}, 0x3c) setsockopt$MRT_FLUSH(r0, 0x0, 0xd4, &(0x7f00000003c0)=0xa, 0x4) 2m53.772645198s ago: executing program 37 (id=5220): r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000440), 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000180)={0x5, 0xfffffffe}, 0x8) close_range(r0, 0xffffffffffffffff, 0x0) 2m49.027178532s ago: executing program 0 (id=5297): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x11000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f00000001c0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x4}}, {@debug}, {@journal_dev={'journal_dev', 0x3d, 0x7}}]}, 0x1, 0x5fd, &(0x7f00000006c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x4040, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r1, &(0x7f0000004200)='t', 0x1) sendfile(r1, r0, 0x0, 0x3ffff) sendfile(r1, r0, 0x0, 0x7ffff000) 2m47.767755915s ago: executing program 0 (id=5308): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x10, 0x803, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0x9}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x4, 0xc00}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4048810}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=@newtfilter={0x70, 0x2c, 0xd27, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, r3, {0xc, 0xfff1}, {}, {0x5, 0xf}}, [@filter_kind_options=@f_flow={{0x9}, {0x40, 0x2, [@TCA_FLOW_EMATCHES={0x3c, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xfffb}}, @TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x7, 0x7, 0x2}, {{0x0, 0x1, 0x0, 0x1}, {0x0, 0x1, 0x1, 0x1}}}}, @TCF_EM_META={0x18, 0x2, 0x0, 0x0, {{0xfffb, 0x4, 0x2}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x5, 0xe, 0x2}, {0x0, 0x7, 0x2}}}]}}]}]}]}}]}, 0x70}}, 0x20040054) 2m47.592602626s ago: executing program 0 (id=5310): socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001c00010429bd7000ffdbdf2507000000", @ANYRES32=r0, @ANYBLOB="e0ff8b0a0a0002"], 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x24040040) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001d"], 0x30}, 0x1, 0x0, 0x0, 0x1}, 0xc31fe084736598c) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4001}, 0x4000004) 2m47.51892409s ago: executing program 0 (id=5312): mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x23e9c9e, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x28a5291, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='devpts\x00', 0x101c040, 0x0) 2m47.51803895s ago: executing program 0 (id=5315): r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000000)={0x20000002}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000040)={0x20000001}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x40000001}) 2m47.434178135s ago: executing program 38 (id=5317): r0 = openat$selinux_policy(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) openat$selinux_context(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x9) readv(r0, &(0x7f0000000bc0)=[{&(0x7f00000019c0)=""/4096, 0x1000}], 0x1) 2m46.916802944s ago: executing program 0 (id=5323): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000040000000800000009"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0d00000006000000040000000100000000000000", @ANYRES32=r0], 0x50) close(r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r1}, &(0x7f0000000840), &(0x7f0000000880)=r0}, 0x20) 2m46.910672985s ago: executing program 39 (id=5323): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000040000000800000009"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0d00000006000000040000000100000000000000", @ANYRES32=r0], 0x50) close(r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r1}, &(0x7f0000000840), &(0x7f0000000880)=r0}, 0x20) 2m45.812214468s ago: executing program 3 (id=5328): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x7fa962bfffff, 0x12, r0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x20040000) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f00005b7000/0x2000)=nil) mbind(&(0x7f00005b4000/0x4000)=nil, 0x100000000004000, 0x0, 0x0, 0x0, 0x2) 2m45.688984705s ago: executing program 3 (id=5330): ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r2, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xffffffffffff0000, 0xac14140c}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)="8bcd", 0xffe3}], 0x1, 0x0, 0x0, 0x900}, 0x60) 2m45.576582192s ago: executing program 3 (id=5332): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0xfffffffffffffcb9) r0 = syz_io_uring_setup(0x116c, &(0x7f0000000000)={0x0, 0x7f36, 0x0, 0x1, 0x34f}, &(0x7f00000000c0)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x1, &(0x7f0000000200)=[{0x32, 0x0, 0x0, 0x4}]}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8}) io_uring_enter(r0, 0x47bc, 0x0, 0x0, 0x0, 0x0) 2m45.539890514s ago: executing program 3 (id=5333): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) chroot(&(0x7f0000000440)='./file0/../file0/../file0/../file0\x00') r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x9101) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f00000001c0)='./file0/../file0/../file0/../file0\x00', &(0x7f0000000100)='./file0/../file0/../file0/../file0/file0\x00') 2m45.475821578s ago: executing program 3 (id=5335): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000400)=[{&(0x7f0000000000)='n', 0x1}], 0x1, 0x0) splice(r1, 0x0, r3, 0x0, 0x1, 0x0) vmsplice(r3, &(0x7f0000000c40)=[{&(0x7f0000000500)='6', 0x1}], 0x1, 0x6) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, 0x0) write(r0, 0x0, 0x0) 2m45.152543596s ago: executing program 3 (id=5339): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000010c0)=0x5, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x1000, 0x3a, 0x1000, 0x3a}, 0x1c) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) write(r1, 0x0, 0x0) 2m45.152372547s ago: executing program 40 (id=5339): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000010c0)=0x5, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x1000, 0x3a, 0x1000, 0x3a}, 0x1c) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) write(r1, 0x0, 0x0) 2m2.17834795s ago: executing program 7 (id=6022): openat(0xffffffffffffff9c, 0x0, 0x2c45, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x3, 0x8604, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x736f, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/tcp\x00') cachestat(r0, &(0x7f0000000000)={0x264, 0x1}, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000200025a728bd7000fddbdf250a004007ff000001020001000800"], 0x24}, 0x1, 0x0, 0x0, 0x20008081}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="80000000000803000000000000000000020000090900010073797a3100000000050003003a00000006000240891700000900010073797a310000000014000480080003400000000208000440000000030900010073797a310000000024000480080005400000975a0800014000000005080002400000000308000340000000083e642c9e359d9452877b"], 0x80}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000000) 2m2.099526914s ago: executing program 7 (id=6024): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x2}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000085c0)=@newtfilter={0x70, 0x2c, 0xd27, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0x0, 0xe}, {}, {0x8, 0xc}}, [@filter_kind_options=@f_flow={{0x9}, {0x40, 0x2, [@TCA_FLOW_EMATCHES={0x3c, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x7, 0x3, 0x67e6}, {0x9, 0x3, 0x5, 0x9}}}, @TCF_EM_NBYTE={0x10, 0x2, 0x0, 0x0, {{0x24}, {0x7d, 0x31, 0x2}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2}}]}]}}]}, 0x70}}, 0x20004000) 2m1.962430533s ago: executing program 7 (id=6025): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x101002, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000740)=0xe) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000340)=0xff) 2m1.868686258s ago: executing program 7 (id=6026): syz_mount_image$ext4(&(0x7f00000005c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000440)={[{@noblock_validity}, {@errors_continue}, {@sysvgroups}, {@data_journal}, {}, {@noinit_itable}, {@norecovery}]}, 0x2, 0x5cc, &(0x7f0000000b80)="$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") mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') sendfile(r0, r0, 0x0, 0x80000000) 2m1.691213188s ago: executing program 7 (id=6029): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x100}, 0x0) select(0x2a, 0x0, 0x0, &(0x7f0000000400)={0xfefdffffffffffff, 0x1, 0x2, 0x300}, &(0x7f0000000440)={0x0, 0x2710}) 2m1.324563359s ago: executing program 7 (id=6033): setresgid(0xee00, 0xee01, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_udp(0x2, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) setuid(0xee00) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000007000/0x4000)=nil) 2m1.316663889s ago: executing program 41 (id=6033): setresgid(0xee00, 0xee01, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_udp(0x2, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) setuid(0xee00) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000007000/0x4000)=nil) 1m54.991200715s ago: executing program 4 (id=6120): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffffff, 0x2}, 0x106020, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = eventfd2(0x0, 0x0) read$eventfd(r2, &(0x7f0000000000), 0x8) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8}], 0x1) 1m54.839098584s ago: executing program 1 (id=6126): socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000002000000000000000000000000000000010000000a000000090002008d001f106f194eb3050001"], 0x30}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="1b0000001c008102e00f80ecdb4cb9f207c804a00d", 0x15}], 0x1, 0x0, 0x0, 0x5865}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="300000001d0001000000000004086aa42d"], 0x30}}, 0x0) 1m54.804054026s ago: executing program 1 (id=6127): syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x200000, &(0x7f0000000040)={[{@grpquota}]}, 0x1, 0xbac, &(0x7f00000017c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ftruncate(r0, 0x5) 1m54.517555643s ago: executing program 1 (id=6135): bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8931, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8932, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) 1m54.312785014s ago: executing program 1 (id=6141): syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xc000, &(0x7f00000006c0), 0x2, 0x246, &(0x7f0000000ac0)="$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") openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x441, 0x108) open(&(0x7f0000000040)='./bus\x00', 0x400141042, 0x2a) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x8000, 0xa0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x8005, 0x0, 0x0, 0x14, 0xd, "ef359f413bb9386ff7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e7376b7a5ff537ed73ac58818d78c660e677df8dc905b90242b7c528a076d2f6a00400", "036c5bc6780820d1cbf7966d61fdcf335263bd9b0abdc2542ded71038259ca171ce1a311ef545032d71e14ef3dc177e9b48b001d00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x8]}) unlink(&(0x7f0000000100)='./file1\x00') 1m54.133055755s ago: executing program 4 (id=6143): socket$packet(0x11, 0x2, 0x300) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'veth1_to_bond\x00', 0x0}) r3 = socket(0x11, 0x2, 0x0) setsockopt(r3, 0x107, 0x1, &(0x7f0000000000)="110000000000060000071a80010061cc", 0x10) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="200000001100010029bd700000dcdf2500000000", @ANYRES32=r2], 0x20}}, 0x2000e844) 1m53.914013117s ago: executing program 4 (id=6146): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x8}) fcntl$lock(r0, 0x26, &(0x7f0000000280)={0x1, 0x0, 0x9, 0x9}) timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) 1m53.835201842s ago: executing program 1 (id=6147): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWSET={0x14, 0x9, 0xa, 0x401, 0x0, 0x0, {0x0, 0x0, 0xd}}, @NFT_MSG_NEWSET={0x20, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x9}, [@NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_DELOBJ={0x34, 0x14, 0xa, 0x3, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x3}]}, @NFT_MSG_NEWOBJ={0x18, 0x12, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0x3}, @NFT_OBJECT_CONNLIMIT=@NFTA_OBJ_DATA={0x4}}], {0x14}}, 0xa8}, 0x1, 0x0, 0x0, 0x44810}, 0x44000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000100)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1313f, 0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0), 0x10, 0x746}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200), 0x88081, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x4010744d, &(0x7f0000000180)) 1m52.806098141s ago: executing program 1 (id=6164): socket$inet(0x2, 0xa, 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) socket$kcm(0xa, 0x5, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000730121000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000400)=""/73}, 0x20) 1m52.805699151s ago: executing program 42 (id=6164): socket$inet(0x2, 0xa, 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) socket$kcm(0xa, 0x5, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000730121000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000400)=""/73}, 0x20) 1m52.393951315s ago: executing program 4 (id=6167): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000400)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x219d88b, 0x0) mount$bind(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x40000, 0x0) 1m52.341492298s ago: executing program 4 (id=6169): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x80000001, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r0, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000a40)={r0, &(0x7f0000000080), &(0x7f0000001500)=@udp6=r1, 0x1}, 0x20) 1m51.401854443s ago: executing program 4 (id=6180): socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x40000000000000, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_usb_connect(0x2, 0x6ee78b90ef7fb6da, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x88ce359bdb00143c, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCFLSH(r0, 0x400455c8, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000005c0)) 1m51.253763121s ago: executing program 43 (id=6180): socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x40000000000000, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_usb_connect(0x2, 0x6ee78b90ef7fb6da, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x88ce359bdb00143c, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCFLSH(r0, 0x400455c8, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000005c0)) 6.305374176s ago: executing program 8 (id=9038): openat(0xffffffffffffff9c, 0x0, 0x2c41, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) setuid(0xee00) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000002c0)=0x1, 0x4) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x4, 0x0) r1 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r1, 0x2, 0x0, 0x0) 6.171957383s ago: executing program 8 (id=9045): bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[@ANYBLOB="1000000004"], 0x48) syz_read_part_table(0x5cc, &(0x7f0000000000)="$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") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xfe, "0062ba7d82000000160000000000f738096304"}) r1 = syz_open_pts(r0, 0x80) r2 = dup3(r1, r0, 0x80000) read(r2, &(0x7f00000000c0)=""/226, 0xe2) read$watch_queue(r2, &(0x7f0000001d40)=""/4095, 0xfdef) 5.564824658s ago: executing program 8 (id=9054): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x11, &(0x7f00000008c0)=ANY=[@ANYBLOB="18000000800000000000000001000000850000000f000000b7080000000000007b8af8ff00000000b7080000161300007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a500000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) prlimit64(0x0, 0x6, &(0x7f0000000140)={0x0, 0x4}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02080000040000000100000009000100000000", @ANYRES32, @ANYBLOB='\x00\x00'], 0x48) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) 5.517935921s ago: executing program 8 (id=9055): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x0, 0x7fff0000}]}) close_range(r0, 0xffffffffffffffff, 0x0) r1 = syz_create_resource$binfmt(&(0x7f00000001c0)='./file0\x00') openat$binfmt(0xffffffffffffff9c, r1, 0x42, 0x1ff) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) truncate(&(0x7f0000000180)='./file0\x00', 0x8fff5) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001300)={0x0, 0xfe9, "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"}, &(0x7f0000000280)=0xff1) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r2, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=[0x4, 0x8], 0x0, 0x0, 0x12, 0x1}}, 0x40) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x8, 0x10012, r0, 0x0) 5.422261337s ago: executing program 8 (id=9058): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000001440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002002, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000140)=[{0x6, 0x5, 0x3, 0x7fff0000}]}) close_range(r1, 0xffffffffffffffff, 0x0) 5.273160175s ago: executing program 8 (id=9062): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) r0 = syz_create_resource$binfmt(&(0x7f0000000040)='./file1\x00') r1 = openat$binfmt(0xffffffffffffff9c, r0, 0x42, 0x1ff) move_pages(0x0, 0x20000000000000fe, &(0x7f0000000080)=[&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000017000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fed000/0x13000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f000000f000/0x3000)=nil, &(0x7f0000007000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f000000f000/0x2000)=nil, 0x0}, 0x68) close(r1) execveat$binfmt(0xffffffffffffff9c, r0, &(0x7f0000000100)={[], 0x11}, 0x0, 0x0) 2.77274227s ago: executing program 6 (id=9124): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x3ff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x6, &(0x7f0000002000)={0x1}) fcntl$lock(r1, 0x26, &(0x7f00000031c0)={0x1, 0x0, 0xb00, 0x2000000}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) fcntl$lock(r1, 0x7, &(0x7f0000000040)={0x0, 0x4, 0x100000000000003, 0x3}) timer_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) 2.7724143s ago: executing program 6 (id=9125): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x42718, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x4}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0xd3a, 0x2c, 0x2, 0x76, 0x7, 0x6a, 0x4, 0x8, 0x80000000}}}}]}, 0x58}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@gettclass={0x24, 0x2a, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xfff1}}}, 0x24}}, 0x0) 2.679809386s ago: executing program 6 (id=9127): r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000050000000100000001000013040000000200000088060000ff0f0000002e2e"], &(0x7f00000005c0)=""/207, 0x35, 0xcf, 0x1}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x19, 0x4, 0x4, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x1, 0x1}, 0x50) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xa) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x2, 0xd, 0x6, 0x8c, 0x0, 0x5, 0x240, 0xf, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x8, 0x6}, 0x2400, 0x0, 0x8, 0x3, 0x1000, 0x10000, 0x9, 0x0, 0x4, 0x0, 0x67}, r1, 0xc, r3, 0xa) 2.393396322s ago: executing program 6 (id=9133): pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) splice(r1, 0x0, r0, 0x0, 0xffffffffffff8000, 0x0) close(r2) 1.620703716s ago: executing program 2 (id=9142): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0xa00048, &(0x7f0000000140), 0x1, 0x7c8, &(0x7f0000001a80)="$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") syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./bus\x00', 0x24b837, 0x0, 0x3, 0x0, &(0x7f0000000240)) chdir(&(0x7f00000003c0)='./bus\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='blkio.bfq.io_merged\x00', 0x275a, 0x0) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r0 = open(&(0x7f00000000c0)='.\x00', 0x8000, 0x50) getdents(r0, &(0x7f0000001fc0)=""/184, 0xb8) getdents(r0, &(0x7f0000001fc0)=""/184, 0xb8) 1.464396315s ago: executing program 6 (id=9143): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x8000f28, 0x0) splice(r2, 0x0, r1, 0x0, 0x7f, 0xe) write(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x4012831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) gettid() 1.429285708s ago: executing program 2 (id=9145): getgid() syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="10000000040000000800000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008900000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)=r3}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={r3, r1}, 0x14) syz_emit_ethernet(0xfdef, &(0x7f0000000080)={@multicast, @remote, @val={@void}, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x88, 0x0, @empty, @broadcast}, @timestamp={0xd, 0x0, 0x0, 0x800}}}}}, 0x0) 1.320776994s ago: executing program 2 (id=9147): unshare(0x2c020400) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000cc0)="e1", 0x5603d}], 0x1) mknod(&(0x7f0000000080)='./bus\x00', 0x1000, 0x0) open(&(0x7f00000002c0)='./bus\x00', 0x60102, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) tee(r1, r2, 0x3, 0x0) 1.320272694s ago: executing program 2 (id=9148): r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000040)=0x7f, 0x4) bind$inet(r1, &(0x7f0000e15000)={0x2, 0x4e20, @multicast2}, 0x10) listen(r1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000040)=0x7f, 0x4) bind$inet(r0, &(0x7f0000e15000)={0x2, 0x4e20, @empty}, 0x10) 1.240041328s ago: executing program 2 (id=9149): r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000100)={0x20000014}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000000)={0xa0000001}) epoll_pwait(r3, &(0x7f0000000400)=[{}], 0x1, 0x80, 0x0, 0x0) 732.633388ms ago: executing program 5 (id=9151): r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x21000000000000ff) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x2c, 0xffffffffffbffff8) prlimit64(0x0, 0xb, &(0x7f0000000140), 0x0) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x13) 620.166484ms ago: executing program 5 (id=9152): r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000180)=ANY=[@ANYBLOB="680000001000030400"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000400012800c0001006d6163766c616e003000028008000100100000001c0005800a000400aaaaaaaaaabb00000a000400aaaaaaaaaa0000000800030003"], 0x68}}, 0x64000004) mount(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x10, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000), 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 491.504002ms ago: executing program 5 (id=9155): socketpair(0x1, 0x20000000000001, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xf1, 0x1, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x8, 0x0, 0x0, 0x2, 0x0, 0x0, 0xb6df4c32c1d5c814}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x3e}, [@call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x600}, 0x94) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@fwd={0x5}, @const={0x0, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x36}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x37}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 439.883935ms ago: executing program 5 (id=9156): syz_io_uring_setup(0x2afc, &(0x7f00000005c0)={0x0, 0x0, 0x13090, 0x1, 0x800002}, 0x0, 0x0) mq_open(&(0x7f00000001c0)='!selin\xdb\xa1\x02\xbf\xd9l\xd7\xcd\xc0uxse\xee\x0e\xcd\xce6\xbf\xfa;\xb9-a\xb8\xef\x8de\x14\xbc\x9ej\xa1q\xa2\xa5\t\x98\x8a\x8f>\xba', 0x6e93ebbbcc088cf2, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1600000004"], 0x50) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) 431.415986ms ago: executing program 9 (id=9157): r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @dev={0xac, 0x14, 0x14, 0xf}, 0x15, 0x3, 'lblcr\x00', 0x1, 0x6, 0x48}, 0x2c) socket$kcm(0xa, 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x84, @private=0xa010102, 0x4e21, 0x3, 'lc\x00', 0x5, 0x8, 0x77}, {@remote, 0x4e20, 0x10000, 0xc, 0x2}}, 0x44) sendmsg$sock(r1, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e22, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}, 0x0) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$sock(r3, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0x2, 0x15, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}, 0x0) 413.071516ms ago: executing program 5 (id=9158): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/unix\x00') r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e20}, 0x1c) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e20}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bind$unix(r3, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e20}, 0x6e) pread64(r0, &(0x7f0000000240)=""/164, 0x131, 0x131) 368.844219ms ago: executing program 9 (id=9159): r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x200, 0xfffffffd}}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000200)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0xfffffffd}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140)={0x42, 0xf5}, 0x10) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{0x42, 0x3}}}, 0x31) r3 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r3, &(0x7f0000000380)={&(0x7f0000000140)=@nameseq={0x1e, 0x1, 0xec5ae005342a7336, {0x42, 0x2, 0x4}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000884}, 0x4) 329.371021ms ago: executing program 5 (id=9160): mknod(&(0x7f00000002c0)='./file0\x00', 0x1000, 0x761) r0 = open(&(0x7f0000000400)='./file0\x00', 0x80002, 0xff) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x16) r2 = creat(&(0x7f0000002880)='./file0\x00', 0x0) write$P9_RSTATFS(r2, &(0x7f00000002c0)={0x43, 0x9, 0x2, {0x2, 0x0, 0x6, 0x4, 0x3ff, 0x48, 0x7, 0x9, 0x1}}, 0xfffffe13) r3 = socket$inet6_udp(0xa, 0x2, 0x0) shutdown(r3, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x2204000, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 301.827833ms ago: executing program 2 (id=9161): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7ffb, 0x510, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x80, 0x2}, 0x0, 0x8, 0x40008, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa"], 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x1000000009, 0xfd026, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0xef, 0xec}, 0x400, 0xc, 0x43a1bd76, 0x7, 0x203, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) splice(r2, 0x0, r1, 0x0, 0xffffffffffff8000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)=ANY=[@ANYRES32=r3, @ANYRES32=r1, @ANYRES64=0x0], 0x20) write$P9_RLERRORu(r1, &(0x7f0000000100)=ANY=[], 0xe) 268.151005ms ago: executing program 9 (id=9162): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r1 = syz_io_uring_setup(0x116c, &(0x7f0000000000)={0x0, 0x7f36, 0x0, 0x1, 0x34f}, &(0x7f00000000c0)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x1, &(0x7f0000000200)=[{0x32, 0x0, 0x0, 0x4}]}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8}) io_uring_enter(r1, 0x47bc, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_SYNC_CANCEL(r1, 0x18, &(0x7f00000001c0)={0x79c, r0, 0x32, {0xb, 0x100004000}, 0x2}, 0x1) 267.801275ms ago: executing program 9 (id=9163): setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4000, &(0x7f00000003c0), 0x2, 0xbdb, &(0x7f0000003840)="$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") perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8458, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x58, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x62, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) 110.003074ms ago: executing program 6 (id=9164): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x1, 0x0, 0xc000, 0xe, "0062ba7d8200000016001b000200f705096604"}) r1 = syz_open_pts(r0, 0x20000) r2 = dup3(r1, r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000540)={0x100, 0xd0, 0x4, 0x6, 0x18, "e8381d3c39ce1ff81803b95a9c5b202e2f8b0d"}) io_setup(0x8, &(0x7f0000004200)=0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') io_submit(r3, 0x1, &(0x7f0000004540)=[&(0x7f0000004280)={0x0, 0x0, 0x0, 0x5, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x2}]) 109.533704ms ago: executing program 9 (id=9174): socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004c80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)="7bb3c27c57bf6fc8517bf4", 0xb}], 0x1}}], 0x1, 0x40015) write$tun(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="083c86dd0001280004600000a60c6eec00be00442cfffe8000000000000000000000000000aaff020000000000000000000000000001", @ANYRES16=r1], 0xfdef) 0s ago: executing program 9 (id=9165): sched_setscheduler(0x0, 0x7, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x30e, &(0x7f0000000f00)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x12) write(r1, &(0x7f0000000240)="53d38327618ea978d262acb7d75f89c7802d", 0x12) sendfile(r1, r0, 0x0, 0x3ffff) sendfile(r1, r0, 0x0, 0x7ffff000) kernel console output (not intermixed with test programs): macvtap: left promiscuous mode [ 330.148298][ T8599] veth1_vlan: left promiscuous mode [ 330.153618][ T8599] veth0_vlan: left promiscuous mode [ 330.351994][T26790] chnl_net:caif_netlink_parms(): no params data found [ 330.433782][T26843] loop8: detected capacity change from 0 to 2048 [ 330.476209][T26790] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.514635][T26790] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.520718][T26843] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 330.524266][T26790] bridge_slave_0: entered allmulticast mode [ 330.542917][T26790] bridge_slave_0: entered promiscuous mode [ 330.550017][T26790] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.557424][T26790] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.565422][T26790] bridge_slave_1: entered allmulticast mode [ 330.573794][T26790] bridge_slave_1: entered promiscuous mode [ 330.592529][T26790] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 330.605917][T26790] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 330.626840][T26790] team0: Port device team_slave_0 added [ 330.633512][T26790] team0: Port device team_slave_1 added [ 330.649635][T26790] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 330.657253][T26790] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 330.694128][T26790] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 330.711001][T26790] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 330.730245][T26790] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 330.772424][T26790] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 330.806931][T26146] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 330.852664][T26790] hsr_slave_0: entered promiscuous mode [ 330.861779][T26790] hsr_slave_1: entered promiscuous mode [ 330.867716][T26790] debugfs: 'hsr0' already exists in 'hsr' [ 330.878672][T26790] Cannot create hsr debugfs directory [ 330.933968][T26878] netlink: 12 bytes leftover after parsing attributes in process `syz.8.6182'. [ 330.954764][T26878] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6182'. [ 330.996624][ T8602] netdevsim netdevsim8 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 331.005572][T26878] netlink: 12 bytes leftover after parsing attributes in process `syz.8.6182'. [ 331.016106][ T8602] netdevsim netdevsim8 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 331.041328][ T8602] netdevsim netdevsim8 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 331.050440][T26878] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6182'. [ 331.063817][ T8602] netdevsim netdevsim8 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 331.276008][T26871] chnl_net:caif_netlink_parms(): no params data found [ 331.343742][T26790] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 331.353939][T26790] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 331.369378][T26790] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 331.387317][T26790] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 331.403455][T26871] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.412463][T26871] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.419762][T26871] bridge_slave_0: entered allmulticast mode [ 331.426725][T26871] bridge_slave_0: entered promiscuous mode [ 331.450132][T26871] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.464775][T26871] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.471937][T26871] bridge_slave_1: entered allmulticast mode [ 331.478543][T26871] bridge_slave_1: entered promiscuous mode [ 331.493572][T26944] ipip1: entered promiscuous mode [ 331.525036][T26871] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 331.542806][ T28] audit: type=1400 audit(1771054795.803:3650): avc: denied { setopt } for pid=26949 comm="syz.5.6192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 331.549210][T26871] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 331.583312][T26871] team0: Port device team_slave_0 added [ 331.590366][T26871] team0: Port device team_slave_1 added [ 331.632554][T26871] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 331.642126][T26871] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 331.668277][T26871] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 331.690672][T26871] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 331.707215][T26871] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 331.736346][T26871] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 331.787559][T26790] 8021q: adding VLAN 0 to HW filter on device bond0 [ 331.815732][T26871] hsr_slave_0: entered promiscuous mode [ 331.828312][T26871] hsr_slave_1: entered promiscuous mode [ 331.837602][T26871] debugfs: 'hsr0' already exists in 'hsr' [ 331.849218][T26871] Cannot create hsr debugfs directory [ 331.884017][T26790] 8021q: adding VLAN 0 to HW filter on device team0 [ 331.895751][ T8604] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.902849][ T8604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.949292][T26790] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 331.969345][T26790] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 331.993495][ T8604] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.000814][ T8604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.188741][T26790] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 332.334980][ T28] audit: type=1400 audit(1771054796.593:3651): avc: denied { read } for pid=27011 comm="syz.2.6198" path="socket:[72713]" dev="sockfs" ino=72713 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 332.486407][T27034] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27034 comm=syz.2.6203 [ 332.547370][T26871] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 332.583839][T26871] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 332.608074][T27051] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27051 comm=syz.5.6207 [ 332.634745][T26871] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 332.652756][T26871] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 332.678944][T26790] veth0_vlan: entered promiscuous mode [ 332.691557][T26790] veth1_vlan: entered promiscuous mode [ 332.731691][T27061] macvtap1: entered promiscuous mode [ 332.737228][T27061] macvtap1: entered allmulticast mode [ 332.742884][T27061] syz_tun: entered promiscuous mode [ 332.748136][T27061] syz_tun: entered allmulticast mode [ 332.754431][T27061] team0: Device macvtap1 failed to register rx_handler [ 332.761530][T27061] syz_tun: left allmulticast mode [ 332.766768][T27061] syz_tun: left promiscuous mode [ 332.790538][T26790] veth0_macvtap: entered promiscuous mode [ 332.844730][T26790] veth1_macvtap: entered promiscuous mode [ 332.878568][ T8604] Bluetooth: hci0: Frame reassembly failed (-84) [ 332.902714][T26790] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 332.926817][T26790] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 332.935935][T27088] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6213'. [ 332.952072][ T8606] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 332.964848][T27088] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6213'. [ 332.974199][ T8606] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 332.988569][T27088] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6213'. [ 333.011878][T27088] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6213'. [ 333.025210][ T8606] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 333.057321][ T8606] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 333.082754][T26871] 8021q: adding VLAN 0 to HW filter on device bond0 [ 333.140705][T26871] 8021q: adding VLAN 0 to HW filter on device team0 [ 333.158089][ T8606] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.165236][ T8606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.180674][T27103] batadv_slave_0: entered promiscuous mode [ 333.209294][ T8602] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.216399][ T8602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.259636][T27102] batadv_slave_0: left promiscuous mode [ 333.436643][T26871] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 333.863747][T27193] batadv_slave_0: entered promiscuous mode [ 333.872287][T27193] batadv_slave_1: entered promiscuous mode [ 333.888008][T27192] batadv_slave_1: left promiscuous mode [ 333.910511][T27192] batadv_slave_0: left promiscuous mode [ 333.990082][T26871] veth0_vlan: entered promiscuous mode [ 334.019969][T26871] veth1_vlan: entered promiscuous mode [ 334.054118][T26871] veth0_macvtap: entered promiscuous mode [ 334.080452][T26871] veth1_macvtap: entered promiscuous mode [ 334.120009][T26871] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 334.149649][T26871] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 334.186002][ T234] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.203091][ T234] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.224285][ T234] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.251974][ T234] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.375146][T27243] loop6: detected capacity change from 0 to 1024 [ 334.387983][T27243] EXT4-fs: inline encryption not supported [ 334.404307][T27243] EXT4-fs: Ignoring removed mblk_io_submit option [ 334.453454][T27243] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 334.520865][T26871] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 334.547739][ T28] audit: type=1400 audit(1771054798.813:3652): avc: denied { read } for pid=27258 comm="syz.2.6239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 334.884878][ T5416] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 334.937252][T27323] netlink: 24 bytes leftover after parsing attributes in process `syz.2.6254'. [ 335.341017][T27383] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6264'. [ 335.366713][T27383] netlink: 16 bytes leftover after parsing attributes in process `syz.2.6264'. [ 335.428570][T27392] loop8: detected capacity change from 0 to 1024 [ 335.434848][T27393] geneve2: entered promiscuous mode [ 335.444592][T27393] geneve2: entered allmulticast mode [ 335.455874][T27392] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=a016c118, mo2=0002] [ 335.472839][ T8602] netdevsim netdevsim2 netdevsim0: set [1, 1] type 2 family 0 port 20000 - 0 [ 335.483839][T27392] System zones: 0-1, 3-12 [ 335.504792][ T8602] netdevsim netdevsim2 netdevsim1: set [1, 1] type 2 family 0 port 20000 - 0 [ 335.515310][T27392] EXT4-fs (loop8): mounted filesystem 00000000-0500-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 335.555316][ T8602] netdevsim netdevsim2 netdevsim2: set [1, 1] type 2 family 0 port 20000 - 0 [ 335.591120][ T8602] netdevsim netdevsim2 netdevsim3: set [1, 1] type 2 family 0 port 20000 - 0 [ 335.639829][T26146] EXT4-fs (loop8): unmounting filesystem 00000000-0500-0000-0000-000000000000. [ 335.982562][T27454] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6277'. [ 336.016555][T27454] netlink: 'syz.8.6277': attribute type 5 has an invalid length. [ 336.024411][T27454] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6277'. [ 336.046374][T27454] geneve2: entered promiscuous mode [ 336.064823][T27454] geneve2: entered allmulticast mode [ 336.081349][ T8600] netdevsim netdevsim8 netdevsim0: set [1, 1] type 2 family 0 port 55713 - 0 [ 336.092462][ T8600] netdevsim netdevsim8 netdevsim1: set [1, 1] type 2 family 0 port 55713 - 0 [ 336.122476][ T28] audit: type=1400 audit(1771054800.363:3653): avc: denied { ioctl } for pid=27465 comm="syz.5.6280" path="socket:[74278]" dev="sockfs" ino=74278 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 336.129654][ T8600] netdevsim netdevsim8 netdevsim2: set [1, 1] type 2 family 0 port 55713 - 0 [ 336.208044][ T8600] netdevsim netdevsim8 netdevsim3: set [1, 1] type 2 family 0 port 55713 - 0 [ 336.488181][T27491] batadv1: entered promiscuous mode [ 336.566057][ T28] audit: type=1400 audit(1771054800.833:3654): avc: denied { read } for pid=27510 comm="syz.9.6292" laddr=::1 lport=255 faddr=::1 fport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 337.092876][ T28] audit: type=1404 audit(1771054801.353:3655): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 337.122935][ T28] audit: type=1400 audit(1771054801.383:3656): avc: denied { search } for pid=27575 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 337.174589][T27575] audit: audit_backlog=65 > audit_backlog_limit=64 [ 337.182138][T27575] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 337.190889][T27575] audit: backlog limit exceeded [ 337.198168][ T28] audit: type=1400 audit(1771054801.423:3657): avc: denied { create } for pid=27573 comm="syz.9.6307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 337.220830][T27575] audit: audit_backlog=65 > audit_backlog_limit=64 [ 338.252078][T27662] netlink: 'syz.5.6331': attribute type 1 has an invalid length. [ 338.280707][T27662] 8021q: adding VLAN 0 to HW filter on device bond8 [ 338.302194][T27662] bond8: (slave syz_tun): making interface the new active one [ 338.317122][T27662] bond8: (slave syz_tun): Enslaving as an active interface with an up link [ 338.356622][T27674] netlink: 'syz.5.6334': attribute type 29 has an invalid length. [ 338.364940][T27674] netlink: 'syz.5.6334': attribute type 29 has an invalid length. [ 338.453165][T27684] netlink: 104 bytes leftover after parsing attributes in process `syz.8.6339'. [ 338.463334][T27684] netlink: 104 bytes leftover after parsing attributes in process `syz.8.6339'. [ 338.958897][T27703] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.969675][T27703] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.980166][T27705] netlink: 'syz.6.6347': attribute type 16 has an invalid length. [ 338.995115][T27705] netlink: 'syz.6.6347': attribute type 17 has an invalid length. [ 339.095200][T27705] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 339.709098][ T28] kauditd_printk_skb: 573 callbacks suppressed [ 339.709113][ T28] audit: type=1400 audit(1771054803.973:4226): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 339.775384][ T28] audit: type=1400 audit(1771054804.023:4227): avc: denied { read write } for pid=26790 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 339.826734][ T28] audit: type=1400 audit(1771054804.083:4228): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 339.907328][ T28] audit: type=1400 audit(1771054804.123:4229): avc: denied { read write } for pid=26790 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 340.011379][ T28] audit: type=1400 audit(1771054804.133:4230): avc: denied { allowed } for pid=27756 comm="syz.9.6367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 340.054775][ T28] audit: type=1400 audit(1771054804.153:4231): avc: denied { read write } for pid=26790 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 340.286045][ T28] audit: type=1400 audit(1771054804.153:4232): avc: denied { create } for pid=27760 comm="syz.2.6368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 340.344694][ T28] audit: type=1400 audit(1771054804.163:4233): avc: denied { create } for pid=27759 comm="syz.9.6369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 340.479164][ T28] audit: type=1400 audit(1771054804.173:4234): avc: denied { open } for pid=27759 comm="syz.9.6369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 340.529669][ T28] audit: type=1400 audit(1771054804.173:4235): avc: denied { prog_load } for pid=27759 comm="syz.9.6369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 341.412215][T27877] netlink: 'syz.6.6421': attribute type 11 has an invalid length. [ 341.420285][T27877] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6421'. [ 341.438669][ T8600] netdevsim netdevsim6 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 341.438741][T27877] netlink: 'syz.6.6421': attribute type 11 has an invalid length. [ 341.448945][ T8600] netdevsim netdevsim6 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 341.466022][T27877] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6421'. [ 341.501397][ T8600] netdevsim netdevsim6 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 341.517456][ T8600] netdevsim netdevsim6 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 341.536468][T27882] all: renamed from veth1_to_bond (while UP) [ 341.553216][T27884] netlink: 'syz.6.6424': attribute type 10 has an invalid length. [ 341.624062][T27884] team0: Port device dummy0 added [ 342.933933][ T8600] Bluetooth: hci0: Frame reassembly failed (-84) [ 343.245998][T28024] ipip0: entered promiscuous mode [ 343.447549][T28039] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6488'. [ 343.477445][T28039] team1: entered promiscuous mode [ 343.487957][T28039] team1: entered allmulticast mode [ 343.499825][T28039] 8021q: adding VLAN 0 to HW filter on device team1 [ 343.741374][T28048] netlink: 'syz.2.6492': attribute type 1 has an invalid length. [ 343.758227][T28048] netlink: 'syz.2.6492': attribute type 4 has an invalid length. [ 343.775879][T28048] netlink: 9462 bytes leftover after parsing attributes in process `syz.2.6492'. [ 343.890327][T28064] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6499'. [ 343.899657][T28064] netlink: 'syz.2.6499': attribute type 12 has an invalid length. [ 343.912615][T28064] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6499'. [ 343.912601][ T8600] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 343.921952][T28064] netlink: 'syz.2.6499': attribute type 12 has an invalid length. [ 343.939254][ T8600] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 343.949425][ T8600] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 343.959578][ T8600] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 344.180839][T28080] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6506'. [ 344.191616][T28080] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6506'. [ 344.233268][T28082] netlink: 24 bytes leftover after parsing attributes in process `syz.6.6507'. [ 344.264945][T28080] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6506'. [ 344.274500][T28080] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6506'. [ 344.439835][T28099] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6515'. [ 344.502728][T28109] netlink: 'syz.8.6520': attribute type 2 has an invalid length. [ 344.539259][T28109] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6520'. [ 344.554009][T28113] netlink: 'syz.8.6520': attribute type 2 has an invalid length. [ 344.658835][T28123] netlink: 'syz.2.6523': attribute type 16 has an invalid length. [ 344.671449][T28116] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.682248][T28116] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.795520][T28123] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 344.846936][ T28] kauditd_printk_skb: 415 callbacks suppressed [ 344.846950][ T28] audit: type=1400 audit(2000000004.850:4651): avc: denied { search } for pid=28126 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 344.886854][ T28] audit: type=1400 audit(2000000004.890:4652): avc: denied { search } for pid=28127 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 344.922434][ T28] audit: type=1400 audit(2000000004.890:4653): avc: denied { search } for pid=28127 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 344.954776][ T28] audit: type=1400 audit(2000000004.890:4654): avc: denied { search } for pid=28127 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 344.978420][ T28] audit: type=1400 audit(2000000004.890:4655): avc: denied { search } for pid=28127 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 344.984738][ T5416] Bluetooth: hci0: command 0x1003 tx timeout [ 345.006657][ T3879] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 345.017364][ T28] audit: type=1400 audit(2000000004.890:4656): avc: denied { search } for pid=28127 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 345.041400][ T28] audit: type=1400 audit(2000000004.890:4657): avc: denied { search } for pid=28127 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 345.066669][ T28] audit: type=1400 audit(2000000004.890:4658): avc: denied { search } for pid=28127 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 345.088917][ T28] audit: type=1400 audit(2000000004.890:4659): avc: denied { search } for pid=28127 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 345.121487][ T28] audit: type=1400 audit(2000000004.890:4660): avc: denied { search } for pid=28127 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 345.415390][T28151] gretap1: entered allmulticast mode [ 345.423169][T28151] bond1: (slave gretap1): making interface the new active one [ 345.431145][T28151] bond1: (slave gretap1): Enslaving as an active interface with an up link [ 345.995106][T28211] 8021q: adding VLAN 0 to HW filter on device bond1 [ 346.016692][T28211] bond1: option tlb_dynamic_lb: unable to set because the bond device is up [ 346.238322][T28233] sch_tbf: burst 6 is lower than device gretap0 mtu (1476) ! [ 347.158999][T28280] geneve2: entered promiscuous mode [ 347.221094][T28287] validate_nla: 5 callbacks suppressed [ 347.221168][T28287] netlink: 'syz.9.6593': attribute type 1 has an invalid length. [ 347.267529][T28287] netlink: 'syz.9.6593': attribute type 1 has an invalid length. [ 347.335612][T28298] policy can only be matched on NF_INET_PRE_ROUTING [ 347.335630][T28298] unable to load match [ 347.739201][T28348] netlink: 'syz.9.6621': attribute type 1 has an invalid length. [ 347.778322][T28348] bond2: entered promiscuous mode [ 347.797158][T28348] 8021q: adding VLAN 0 to HW filter on device bond2 [ 347.829653][T28348] 8021q: adding VLAN 0 to HW filter on device bond2 [ 347.844799][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 347.854834][T28348] bond2: (slave vcan1): The slave device specified does not support setting the MAC address [ 347.894824][T28348] bond2: (slave vcan1): Setting fail_over_mac to active for active-backup mode [ 347.917372][T28348] bond2: (slave vcan1): making interface the new active one [ 347.945041][T28348] vcan1: entered promiscuous mode [ 347.963940][T28348] bond2: (slave vcan1): Enslaving as an active interface with an up link [ 348.225322][ T234] netdevsim netdevsim9 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 348.248446][ T234] netdevsim netdevsim9 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 348.276668][ T234] netdevsim netdevsim9 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 348.302670][ T234] netdevsim netdevsim9 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 348.464975][T28402] A link change request failed with some changes committed already. Interface gre1 may have been left with an inconsistent configuration, please check. [ 349.873469][ T28] kauditd_printk_skb: 553 callbacks suppressed [ 349.873491][ T28] audit: type=1400 audit(2000000009.870:5214): avc: denied { prog_load } for pid=28489 comm="syz.9.6679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 349.944992][ T28] audit: type=1400 audit(2000000009.910:5215): avc: denied { bpf } for pid=28489 comm="syz.9.6679" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 349.993640][T28497] netlink: 'syz.9.6685': attribute type 1 has an invalid length. [ 350.012344][ T28] audit: type=1400 audit(2000000009.940:5216): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 350.112215][ T28] audit: type=1400 audit(2000000009.970:5217): avc: denied { read write } for pid=26790 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 350.153802][ T28] audit: type=1400 audit(2000000010.070:5218): avc: denied { block_suspend } for pid=28492 comm="syz.2.6683" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 350.275321][T28497] 8021q: adding VLAN 0 to HW filter on device bond3 [ 350.302403][ T28] audit: type=1400 audit(2000000010.300:5219): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 350.388236][ T28] audit: type=1400 audit(2000000010.390:5220): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 350.473394][ T28] audit: type=1400 audit(2000000010.430:5221): avc: denied { create } for pid=28511 comm="syz.2.6690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 350.535111][ T28] audit: type=1400 audit(2000000010.430:5222): avc: denied { mounton } for pid=28511 comm="syz.2.6690" path="/179/file0" dev="tmpfs" ino=939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 350.585013][ T28] audit: type=1400 audit(2000000010.440:5223): avc: denied { create } for pid=28510 comm="syz.8.6689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 350.649972][T28534] netlink: 'syz.5.6700': attribute type 10 has an invalid length. [ 350.674831][T28534] batman_adv: batadv0: Removing interface: dummy0 [ 350.700932][T28535] netlink: 'syz.5.6700': attribute type 10 has an invalid length. [ 350.703066][T28534] team0: Port device dummy0 added [ 350.794245][T28535] team0: Port device dummy0 removed [ 350.818458][T28535] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 350.850010][T28540] __nla_validate_parse: 9 callbacks suppressed [ 350.850026][T28540] netlink: 40 bytes leftover after parsing attributes in process `syz.2.6702'. [ 351.205379][T28569] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28569 comm=syz.2.6714 [ 351.308303][T28573] lo: Caught tx_queue_len zero misconfig [ 351.439764][T28581] netlink: 'syz.2.6720': attribute type 5 has an invalid length. [ 351.503048][T28587] netlink: 48 bytes leftover after parsing attributes in process `syz.9.6723'. [ 351.569436][T28587] netlink: 48 bytes leftover after parsing attributes in process `syz.9.6723'. [ 352.257943][T28655] netlink: 24 bytes leftover after parsing attributes in process `syz.5.6752'. [ 352.560041][T28701] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6769'. [ 352.573825][T28700] geneve3: entered promiscuous mode [ 352.610190][T28705] pim6reg1: entered allmulticast mode [ 352.772567][T28732] netlink: 16 bytes leftover after parsing attributes in process `syz.6.6788'. [ 352.789671][T28732] gtp0: entered promiscuous mode [ 353.140480][T28784] gretap1: entered promiscuous mode [ 353.412025][T28812] netlink: 'syz.2.6824': attribute type 1 has an invalid length. [ 353.425846][T28812] 8021q: adding VLAN 0 to HW filter on device bond2 [ 353.450624][T28812] bond2: (slave syz_tun): making interface the new active one [ 353.461002][T28812] bond2: (slave syz_tun): Enslaving as an active interface with an up link [ 353.516498][T28816] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6825'. [ 354.925416][ T28] kauditd_printk_skb: 371 callbacks suppressed [ 354.925433][ T28] audit: type=1400 audit(2000000014.930:5595): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 355.002505][ T28] audit: type=1400 audit(2000000015.000:5596): avc: denied { mount } for pid=28890 comm="syz.5.6859" name="/" dev="autofs" ino=78321 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=0 [ 355.045987][ T28] audit: type=1400 audit(2000000015.030:5597): avc: denied { prog_load } for pid=28886 comm="syz.6.6857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.065693][ T28] audit: type=1400 audit(2000000015.030:5598): avc: denied { open } for pid=28886 comm="syz.6.6857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 355.134756][ T28] audit: type=1400 audit(2000000015.100:5599): avc: denied { prog_load } for pid=28886 comm="syz.6.6857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.169164][ T28] audit: type=1400 audit(2000000015.110:5600): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 355.233774][ T28] audit: type=1400 audit(2000000015.110:5601): avc: denied { create } for pid=28897 comm="syz.6.6861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 355.275857][ T28] audit: type=1400 audit(2000000015.130:5602): avc: denied { prog_load } for pid=28888 comm="syz.2.6858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.341268][ T28] audit: type=1400 audit(2000000015.160:5603): avc: denied { mounton } for pid=28894 comm="syz.5.6860" path="/1275" dev="tmpfs" ino=6608 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 355.379806][T28906] netlink: 'syz.5.6865': attribute type 1 has an invalid length. [ 355.391105][ T28] audit: type=1400 audit(2000000015.200:5604): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 355.423809][T28906] netlink: 'syz.5.6865': attribute type 4 has an invalid length. [ 355.465022][T28906] netlink: 9462 bytes leftover after parsing attributes in process `syz.5.6865'. [ 355.607684][T28926] netlink: 'syz.5.6873': attribute type 1 has an invalid length. [ 355.642563][T28926] 8021q: adding VLAN 0 to HW filter on device bond9 [ 356.164823][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 356.863775][T29025] netlink: 'syz.8.6916': attribute type 11 has an invalid length. [ 356.884793][T29025] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6916'. [ 356.904068][T29025] netlink: 'syz.8.6916': attribute type 11 has an invalid length. [ 356.924718][T29025] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6916'. [ 356.977527][T29034] netlink: 24 bytes leftover after parsing attributes in process `syz.5.6922'. [ 357.050378][T29049] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6929'. [ 357.059971][T29049] netlink: 'syz.5.6929': attribute type 5 has an invalid length. [ 357.068782][T29049] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6929'. [ 357.081641][T29049] geneve5: entered promiscuous mode [ 357.089004][T29049] geneve5: entered allmulticast mode [ 357.104601][ T8604] netdevsim netdevsim5 eth0: set [1, 2] type 2 family 0 port 55872 - 0 [ 357.115318][ T8604] netdevsim netdevsim5 eth1: set [1, 2] type 2 family 0 port 55872 - 0 [ 357.123690][ T8604] netdevsim netdevsim5 eth2: set [1, 2] type 2 family 0 port 55872 - 0 [ 357.156512][ T8604] netdevsim netdevsim5 eth3: set [1, 2] type 2 family 0 port 55872 - 0 [ 358.779152][T29182] netlink: 'syz.2.6984': attribute type 39 has an invalid length. [ 358.946389][T29201] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6993'. [ 358.971817][T29201] team1: entered promiscuous mode [ 358.997418][T29201] team1: entered allmulticast mode [ 359.002798][T29201] 8021q: adding VLAN 0 to HW filter on device team1 [ 359.014612][T29210] xt_hashlimit: size too large, truncated to 1048576 [ 359.163585][T29222] netlink: 4 bytes leftover after parsing attributes in process `syz.5.7011'. [ 359.199156][T29224] netlink: 4 bytes leftover after parsing attributes in process `syz.6.7003'. [ 359.460846][T29241] netlink: 8 bytes leftover after parsing attributes in process `syz.5.7010'. [ 359.524479][T29247] netlink: 'syz.9.7013': attribute type 29 has an invalid length. [ 359.550216][T29247] netlink: 'syz.9.7013': attribute type 29 has an invalid length. [ 359.563731][T29247] netlink: 'syz.9.7013': attribute type 29 has an invalid length. [ 359.683487][ T8606] netdevsim netdevsim5 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 359.703002][ T8606] netdevsim netdevsim5 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 359.723696][ T8606] netdevsim netdevsim5 eth0: unset [1, 1] type 2 family 0 port 20002 - 0 [ 359.742283][ T8606] netdevsim netdevsim5 eth0: unset [1, 2] type 2 family 0 port 55872 - 0 [ 359.763839][ T8606] netdevsim netdevsim5 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 359.781460][ T8606] netdevsim netdevsim5 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 359.799136][ T8606] netdevsim netdevsim5 eth1: unset [1, 1] type 2 family 0 port 20002 - 0 [ 359.816689][ T8606] netdevsim netdevsim5 eth1: unset [1, 2] type 2 family 0 port 55872 - 0 [ 359.835700][ T8606] netdevsim netdevsim5 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 359.844188][ T8606] netdevsim netdevsim5 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 359.866310][ T8606] netdevsim netdevsim5 eth2: unset [1, 1] type 2 family 0 port 20002 - 0 [ 359.884718][ T8606] netdevsim netdevsim5 eth2: unset [1, 2] type 2 family 0 port 55872 - 0 [ 359.906178][ T8606] netdevsim netdevsim5 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 359.914814][ T8606] netdevsim netdevsim5 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 359.926898][ T8606] netdevsim netdevsim5 eth3: unset [1, 1] type 2 family 0 port 20002 - 0 [ 359.935422][ T8606] netdevsim netdevsim5 eth3: unset [1, 2] type 2 family 0 port 55872 - 0 [ 359.975748][ T28] kauditd_printk_skb: 290 callbacks suppressed [ 359.975761][ T28] audit: type=1400 audit(2000000019.980:5895): avc: denied { read write } for pid=26790 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 360.027260][ T28] audit: type=1400 audit(2000000020.010:5896): avc: denied { open } for pid=29265 comm="syz.9.7024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 360.062827][ T28] audit: type=1400 audit(2000000020.020:5897): avc: denied { map_create } for pid=29265 comm="syz.9.7024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.102424][ T28] audit: type=1400 audit(2000000020.020:5898): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 360.239749][ T28] audit: type=1400 audit(2000000020.050:5899): avc: denied { prog_load } for pid=29267 comm="syz.8.7019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.259495][ T28] audit: type=1400 audit(2000000020.050:5900): avc: denied { watch watch_reads } for pid=29267 comm="syz.8.7019" path="/157" dev="tmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 360.284015][ T28] audit: type=1400 audit(2000000020.050:5901): avc: denied { read write } for pid=29265 comm="syz.9.7024" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 360.328911][ T28] audit: type=1400 audit(2000000020.060:5902): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 360.370104][ T28] audit: type=1400 audit(2000000020.240:5903): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 360.395169][ T28] audit: type=1400 audit(2000000020.320:5904): avc: denied { create } for pid=29272 comm="syz.8.7026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 360.532479][T29292] netlink: 24 bytes leftover after parsing attributes in process `syz.9.7028'. [ 361.054548][T29323] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 361.061816][T29323] IPv6: NLM_F_CREATE should be set when creating new route [ 361.312862][T29334] netlink: 'syz.9.7052': attribute type 1 has an invalid length. [ 361.350095][T29334] gretap1: entered allmulticast mode [ 361.358336][T29334] bond4: (slave gretap1): making interface the new active one [ 361.372662][T29334] bond4: (slave gretap1): Enslaving as an active interface with an up link [ 362.569082][T29431] __nla_validate_parse: 6 callbacks suppressed [ 362.569131][T29431] netlink: 24 bytes leftover after parsing attributes in process `syz.8.7093'. [ 362.742056][T29457] netlink: 'syz.8.7105': attribute type 1 has an invalid length. [ 362.765250][T29457] netlink: 'syz.8.7105': attribute type 1 has an invalid length. [ 363.320294][T29491] netlink: 20 bytes leftover after parsing attributes in process `syz.8.7118'. [ 364.452514][T29570] netlink: 24 bytes leftover after parsing attributes in process `syz.5.7150'. [ 364.966621][T29615] netlink: 4 bytes leftover after parsing attributes in process `syz.5.7171'. [ 364.986335][ T28] kauditd_printk_skb: 350 callbacks suppressed [ 364.986350][ T28] audit: type=1400 audit(2000000024.990:6255): avc: denied { allowed } for pid=29616 comm="syz.2.7173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 365.053627][T29615] netlink: 12 bytes leftover after parsing attributes in process `syz.5.7171'. [ 365.062658][ T28] audit: type=1400 audit(2000000025.020:6256): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 365.120727][ T28] audit: type=1400 audit(2000000025.020:6257): avc: denied { map_create } for pid=29616 comm="syz.2.7173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 365.160606][T29625] netlink: 8 bytes leftover after parsing attributes in process `syz.5.7176'. [ 365.168818][ T28] audit: type=1400 audit(2000000025.050:6258): avc: denied { create } for pid=29619 comm="syz.8.7174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 365.195833][T29625] netlink: 12 bytes leftover after parsing attributes in process `syz.5.7176'. [ 365.231416][ T28] audit: type=1400 audit(2000000025.050:6259): avc: denied { create } for pid=29619 comm="syz.8.7174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 365.250013][ T8600] netdevsim netdevsim5 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 365.260570][T29625] netlink: 8 bytes leftover after parsing attributes in process `syz.5.7176'. [ 365.275218][ T8600] netdevsim netdevsim5 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 365.291452][T29625] netlink: 12 bytes leftover after parsing attributes in process `syz.5.7176'. [ 365.305457][ T28] audit: type=1400 audit(2000000025.050:6260): avc: denied { create } for pid=29619 comm="syz.8.7174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 365.324880][ T8600] netdevsim netdevsim5 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 365.334918][ T8600] netdevsim netdevsim5 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 365.374658][ T28] audit: type=1400 audit(2000000025.150:6261): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 365.446520][ T28] audit: type=1400 audit(2000000025.160:6262): avc: denied { create } for pid=29623 comm="syz.2.7186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 365.508715][ T28] audit: type=1400 audit(2000000025.160:6263): avc: denied { create } for pid=29623 comm="syz.2.7186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 365.571951][ T28] audit: type=1400 audit(2000000025.160:6264): avc: denied { create } for pid=29623 comm="syz.2.7186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 365.765213][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 366.196123][T29691] netlink: 20 bytes leftover after parsing attributes in process `syz.6.7205'. [ 366.224493][T29691] IPv6: Can't replace route, no match found [ 367.182837][T29731] netlink: 'syz.6.7224': attribute type 12 has an invalid length. [ 367.210728][T29727] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.217983][T29727] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.339239][T29727] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 367.358627][T29727] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 367.485253][T29731] netlink: 'syz.6.7224': attribute type 12 has an invalid length. [ 367.493246][ T8606] netdevsim netdevsim9 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 367.502294][ T8606] netdevsim netdevsim9 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 367.535458][ T8606] netdevsim netdevsim9 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 367.544685][ T8606] netdevsim netdevsim9 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 367.566707][ T8606] netdevsim netdevsim9 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 367.613764][ T8606] netdevsim netdevsim9 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 367.644695][ T8606] netdevsim netdevsim9 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 367.653594][ T8606] netdevsim netdevsim9 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 367.783574][T29760] __nla_validate_parse: 4 callbacks suppressed [ 367.783588][T29760] netlink: 12 bytes leftover after parsing attributes in process `syz.5.7236'. [ 367.909038][T29771] netlink: 8 bytes leftover after parsing attributes in process `syz.2.7225'. [ 367.919259][T29771] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7225'. [ 367.948250][T29775] netlink: 'syz.2.7242': attribute type 1 has an invalid length. [ 367.964481][T29775] 8021q: adding VLAN 0 to HW filter on device bond3 [ 367.987065][T29775] bond3: (slave gretap2): making interface the new active one [ 367.997438][T29775] bond3: (slave gretap2): Enslaving as an active interface with an up link [ 368.503998][T29826] netlink: 48 bytes leftover after parsing attributes in process `syz.5.7265'. [ 368.513870][T29826] netlink: 48 bytes leftover after parsing attributes in process `syz.5.7265'. [ 368.667720][T29853] netlink: 'syz.9.7278': attribute type 5 has an invalid length. [ 368.715618][T29856] netlink: 24 bytes leftover after parsing attributes in process `syz.6.7279'. [ 368.866993][T29863] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 369.588036][T29930] netlink: 8 bytes leftover after parsing attributes in process `syz.8.7307'. [ 369.598788][T29930] netlink: 12 bytes leftover after parsing attributes in process `syz.8.7307'. [ 369.655015][T29930] netlink: 8 bytes leftover after parsing attributes in process `syz.8.7307'. [ 369.664190][T29930] netlink: 12 bytes leftover after parsing attributes in process `syz.8.7307'. [ 370.026438][ T28] kauditd_printk_skb: 381 callbacks suppressed [ 370.026452][ T28] audit: type=1400 audit(2000000030.030:6646): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 370.069233][ T28] audit: type=1400 audit(2000000030.070:6647): avc: denied { open } for pid=29973 comm="syz.8.7328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 370.112226][ T28] audit: type=1400 audit(2000000030.100:6648): avc: denied { create } for pid=29973 comm="syz.8.7328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 370.174696][ T28] audit: type=1400 audit(2000000030.100:6649): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 370.214483][ T28] audit: type=1400 audit(2000000030.100:6650): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 370.244231][ T28] audit: type=1400 audit(2000000030.110:6651): avc: denied { create } for pid=29975 comm="syz.6.7330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 370.264385][ T28] audit: type=1400 audit(2000000030.140:6652): avc: denied { prog_load } for pid=29977 comm="syz.8.7331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.294598][ T28] audit: type=1400 audit(2000000030.140:6653): avc: denied { prog_load } for pid=29977 comm="syz.8.7331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.313988][ T28] audit: type=1400 audit(2000000030.140:6654): avc: denied { open } for pid=29977 comm="syz.8.7331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 370.334936][ T28] audit: type=1400 audit(2000000030.140:6655): avc: denied { open } for pid=29977 comm="syz.8.7331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 370.519415][T30011] syzkaller0: entered promiscuous mode [ 370.524948][T30011] syzkaller0: entered allmulticast mode [ 370.585854][T30023] bond2: (slave syz_tun): Releasing active interface [ 370.611749][T30023] bridge_slave_0: left allmulticast mode [ 370.617690][T30023] bridge_slave_0: left promiscuous mode [ 370.623371][T30023] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.643096][T30023] bridge_slave_1: left allmulticast mode [ 370.654790][T30023] bridge_slave_1: left promiscuous mode [ 370.661308][T30023] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.673548][T30023] bond0: (slave bond_slave_0): Releasing backup interface [ 370.691446][T30023] bond0: (slave bond_slave_1): Releasing backup interface [ 370.710455][T30023] team0: Port device team_slave_0 removed [ 370.725634][T30023] team0: Port device team_slave_1 removed [ 370.736348][T30023] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 370.749190][T30023] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 370.757975][T30023] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 370.766401][T30023] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 370.777419][T30023] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 370.833212][T30033] bond0: option lp_interval: invalid value (0) [ 370.843211][T30033] bond0: option lp_interval: allowed values 1 - 2147483647 [ 371.317403][T30062] netlink: 'syz.5.7363': attribute type 1 has an invalid length. [ 371.337568][T30062] bond10: entered promiscuous mode [ 371.342733][T30062] bond10: entered allmulticast mode [ 371.348114][T30062] 8021q: adding VLAN 0 to HW filter on device bond10 [ 371.360113][T30062] macvlan2: entered promiscuous mode [ 371.366297][T30062] macvlan2: entered allmulticast mode [ 371.375552][T30062] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 371.955490][T30091] netlink: 'syz.6.7376': attribute type 7 has an invalid length. [ 371.964532][T30091] netlink: 'syz.6.7376': attribute type 8 has an invalid length. [ 372.291464][T30112] netlink: 'syz.9.7384': attribute type 1 has an invalid length. [ 372.465405][T30112] netlink: 'syz.9.7384': attribute type 4 has an invalid length. [ 372.551805][T30122] dummy0: entered promiscuous mode [ 372.569605][T30122] netdevsim netdevsim9 netdevsim0: entered promiscuous mode [ 372.585868][T30122] hsr1: Slave A (dummy0) is not up; please bring it up to get a fully working HSR network [ 372.608421][T30122] hsr1: Slave B (netdevsim0) is not up; please bring it up to get a fully working HSR network [ 372.634696][T30122] hsr1: entered allmulticast mode [ 372.648580][T30122] dummy0: entered allmulticast mode [ 372.663931][T30122] netdevsim netdevsim9 netdevsim0: entered allmulticast mode [ 372.795745][T30141] __nla_validate_parse: 11 callbacks suppressed [ 372.795764][T30141] netlink: 24 bytes leftover after parsing attributes in process `syz.6.7397'. [ 372.828390][T30143] netlink: 12 bytes leftover after parsing attributes in process `syz.9.7398'. [ 373.162759][T30167] netlink: 28 bytes leftover after parsing attributes in process `syz.9.7409'. [ 373.181124][T30167] netlink: 28 bytes leftover after parsing attributes in process `syz.9.7409'. [ 373.231108][T30169] netlink: 24 bytes leftover after parsing attributes in process `syz.9.7410'. [ 374.596286][T30228] netlink: 24 bytes leftover after parsing attributes in process `syz.8.7444'. [ 374.643514][T30233] netlink: 8 bytes leftover after parsing attributes in process `syz.2.7436'. [ 374.666095][T30233] netlink: 'syz.2.7436': attribute type 5 has an invalid length. [ 374.674003][T30233] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7436'. [ 374.693680][T30233] geneve3: entered promiscuous mode [ 374.706691][T30233] geneve3: entered allmulticast mode [ 374.715221][ T8600] netdevsim netdevsim2 netdevsim0: set [1, 2] type 2 family 0 port 56374 - 0 [ 374.726481][ T8600] netdevsim netdevsim2 netdevsim1: set [1, 2] type 2 family 0 port 56374 - 0 [ 374.736324][ T8600] netdevsim netdevsim2 netdevsim2: set [1, 2] type 2 family 0 port 56374 - 0 [ 374.774212][ T8600] netdevsim netdevsim2 netdevsim3: set [1, 2] type 2 family 0 port 56374 - 0 [ 374.848224][T30248] netlink: 4 bytes leftover after parsing attributes in process `syz.8.7443'. [ 375.013287][T30268] netlink: 12 bytes leftover after parsing attributes in process `syz.2.7453'. [ 375.092257][ T28] kauditd_printk_skb: 275 callbacks suppressed [ 375.092273][ T28] audit: type=1400 audit(2000000035.090:6931): avc: denied { read write } for pid=26790 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 375.129953][ T28] audit: type=1400 audit(2000000035.130:6932): avc: denied { watch watch_reads } for pid=30270 comm="syz.2.7455" path="/334" dev="tmpfs" ino=1752 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 375.158061][ T28] audit: type=1400 audit(2000000035.160:6933): avc: denied { read write } for pid=30272 comm="syz.9.7454" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 375.187460][ T28] audit: type=1400 audit(2000000035.190:6934): avc: denied { execute } for pid=30272 comm="syz.9.7454" path="/239/file1" dev="tmpfs" ino=1258 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 375.652460][ T28] audit: type=1400 audit(2000000035.650:6935): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 375.705049][ T28] audit: type=1400 audit(2000000035.690:6936): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 375.753627][ T28] audit: type=1400 audit(2000000035.700:6937): avc: denied { open } for pid=30279 comm="syz.6.7457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 375.803082][ T28] audit: type=1400 audit(2000000035.790:6938): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 375.888059][ T28] audit: type=1400 audit(2000000035.890:6939): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 375.981757][ T28] audit: type=1400 audit(2000000035.980:6940): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 376.520189][T30312] netlink: 'syz.8.7469': attribute type 1 has an invalid length. [ 376.534765][T30312] netlink: 'syz.8.7469': attribute type 4 has an invalid length. [ 377.151012][T30341] 8021q: adding VLAN 0 to HW filter on device team0 [ 377.159489][T30341] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 377.180458][T30342] team1: entered promiscuous mode [ 377.185928][T30342] team1: entered allmulticast mode [ 377.191304][T30342] 8021q: adding VLAN 0 to HW filter on device team1 [ 377.203407][T30341] lo: left promiscuous mode [ 377.208476][T30341] lo: left allmulticast mode [ 377.235363][T30341] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 377.753613][T30373] geneve1: Caught tx_queue_len zero misconfig [ 377.760480][T30372] netlink: 'syz.6.7494': attribute type 2 has an invalid length. [ 377.768706][T30372] netlink: 'syz.6.7494': attribute type 2 has an invalid length. [ 377.809244][T30378] netlink: 'syz.6.7495': attribute type 13 has an invalid length. [ 377.847367][T30379] xt_hashlimit: size too large, truncated to 1048576 [ 378.002288][T30381] sch_tbf: burst 6 is lower than device gretap0 mtu (1476) ! [ 379.016447][T30424] netlink: 'syz.9.7513': attribute type 13 has an invalid length. [ 379.028734][T30425] __nla_validate_parse: 8 callbacks suppressed [ 379.028746][T30425] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7514'. [ 379.095949][T30424] sch_tbf: burst 6 is lower than device gretap0 mtu (1476) ! [ 379.376409][T30452] netlink: 24 bytes leftover after parsing attributes in process `syz.2.7528'. [ 379.398010][T30452] netlink: 100 bytes leftover after parsing attributes in process `syz.2.7528'. [ 379.426080][T30454] netlink: 'syz.8.7529': attribute type 1 has an invalid length. [ 379.507239][T30454] gretap1: entered allmulticast mode [ 379.542110][T30454] bond1: (slave gretap1): making interface the new active one [ 379.585258][T30454] bond1: (slave gretap1): Enslaving as an active interface with an up link [ 379.812725][T30478] netlink: 4 bytes leftover after parsing attributes in process `syz.5.7539'. [ 379.847991][T30478] netlink: 12 bytes leftover after parsing attributes in process `syz.5.7539'. [ 379.994012][T30496] netlink: 16 bytes leftover after parsing attributes in process `syz.9.7544'. [ 380.019436][T30496] gtp0: entered promiscuous mode [ 380.111709][ T28] kauditd_printk_skb: 157 callbacks suppressed [ 380.111787][ T28] audit: type=1400 audit(2000000040.110:7098): avc: denied { relabelfrom } for pid=30504 comm="syz.9.7560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=0 [ 380.154635][ T28] audit: type=1400 audit(2000000040.140:7099): avc: denied { relabelfrom } for pid=30504 comm="syz.9.7560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=0 [ 380.232904][T30513] netlink: 24 bytes leftover after parsing attributes in process `syz.9.7562'. [ 380.344246][ T28] audit: type=1400 audit(2000000040.140:7100): avc: denied { mount } for pid=30506 comm="syz.2.7549" name="/" dev="configfs" ino=1010 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=0 [ 380.435189][ T28] audit: type=1400 audit(2000000040.210:7101): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 380.477971][ T28] audit: type=1400 audit(2000000040.210:7102): avc: denied { read write } for pid=26790 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 380.503583][ T28] audit: type=1400 audit(2000000040.390:7103): avc: denied { read write } for pid=26790 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 380.634203][ T28] audit: type=1400 audit(2000000040.630:7104): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 380.685509][ T28] audit: type=1326 audit(2000000040.670:7105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30479 comm="syz.6.7540" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f150c68bf79 code=0x7fc00000 [ 380.724692][ T28] audit: type=1400 audit(2000000040.670:7106): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 380.838943][ T28] audit: type=1400 audit(2000000040.840:7107): avc: denied { open } for pid=30521 comm="syz.2.7553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 380.924919][T30524] netlink: 'syz.9.7565': attribute type 4 has an invalid length. [ 381.011133][T30532] netlink: 4 bytes leftover after parsing attributes in process `syz.9.7555'. [ 381.431979][T30555] netlink: 20 bytes leftover after parsing attributes in process `syz.5.7579'. [ 381.478807][T30560] netlink: 24 bytes leftover after parsing attributes in process `syz.2.7570'. [ 381.748818][T30583] xt_hashlimit: size too large, truncated to 1048576 [ 381.764774][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 382.371155][T30610] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 382.493294][T30610] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 383.149946][ T8599] netdevsim netdevsim2 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 383.191646][ T8599] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 383.319969][ T8599] netdevsim netdevsim2 netdevsim0: unset [1, 1] type 2 family 0 port 20000 - 0 [ 383.351625][ T8599] netdevsim netdevsim2 netdevsim0: unset [1, 2] type 2 family 0 port 56374 - 0 [ 383.468373][ T8599] netdevsim netdevsim2 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 383.506802][ T8599] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 383.544986][ T8599] netdevsim netdevsim2 netdevsim1: unset [1, 1] type 2 family 0 port 20000 - 0 [ 383.564286][ T8599] netdevsim netdevsim2 netdevsim1: unset [1, 2] type 2 family 0 port 56374 - 0 [ 383.594763][ T8599] netdevsim netdevsim2 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 383.603797][ T8599] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 383.859910][ T8599] netdevsim netdevsim2 netdevsim2: unset [1, 1] type 2 family 0 port 20000 - 0 [ 383.905854][ T8599] netdevsim netdevsim2 netdevsim2: unset [1, 2] type 2 family 0 port 56374 - 0 [ 383.997869][ T8599] netdevsim netdevsim2 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 384.034873][ T8599] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 384.055309][ T8599] netdevsim netdevsim2 netdevsim3: unset [1, 1] type 2 family 0 port 20000 - 0 [ 384.084090][ T8599] netdevsim netdevsim2 netdevsim3: unset [1, 2] type 2 family 0 port 56374 - 0 [ 384.284399][T30679] netlink: 'syz.8.7615': attribute type 29 has an invalid length. [ 384.296417][T30679] netlink: 'syz.8.7615': attribute type 29 has an invalid length. [ 384.311311][T30679] netlink: 'syz.8.7615': attribute type 29 has an invalid length. [ 384.414250][T30695] __nla_validate_parse: 5 callbacks suppressed [ 384.414268][T30695] netlink: 24 bytes leftover after parsing attributes in process `syz.8.7622'. [ 384.527871][T30711] netlink: 'syz.6.7638': attribute type 1 has an invalid length. [ 384.567530][T30711] 8021q: adding VLAN 0 to HW filter on device bond1 [ 384.595385][T30717] bond1: (slave gretap2): making interface the new active one [ 384.614356][T30717] bond1: (slave gretap2): Enslaving as an active interface with an up link [ 384.896324][T30739] netlink: 'syz.6.7639': attribute type 29 has an invalid length. [ 384.897076][T30739] netlink: 'syz.6.7639': attribute type 29 has an invalid length. [ 384.914722][T30739] netlink: 'syz.6.7639': attribute type 29 has an invalid length. [ 384.995277][T30741] netlink: 24 bytes leftover after parsing attributes in process `syz.2.7640'. [ 385.055477][T30747] team0: Port device dummy0 removed [ 385.075907][T30751] netlink: 'syz.5.7645': attribute type 1 has an invalid length. [ 385.084209][T30747] bridge_slave_0: left allmulticast mode [ 385.092094][T30747] bridge_slave_0: left promiscuous mode [ 385.099147][T30747] bridge0: port 1(bridge_slave_0) entered disabled state [ 385.110882][T30747] bridge_slave_1: left allmulticast mode [ 385.116627][T30747] bridge_slave_1: left promiscuous mode [ 385.122468][T30747] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.137395][T30747] bond0: (slave bond_slave_0): Releasing backup interface [ 385.147744][T30747] bond0: (slave bond_slave_1): Releasing backup interface [ 385.161479][T30747] team0: Port device team_slave_0 removed [ 385.170871][T30747] team0: Port device team_slave_1 removed [ 385.177976][T30747] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 385.186243][T30747] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 385.197705][ T28] kauditd_printk_skb: 162 callbacks suppressed [ 385.197718][ T28] audit: type=1400 audit(2000000045.190:7270): avc: denied { map_create } for pid=30753 comm="syz.9.7647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 385.226269][T30747] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 385.233703][ T28] audit: type=1400 audit(2000000045.190:7271): avc: denied { prog_load } for pid=30753 comm="syz.9.7647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 385.256254][T30747] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 385.263525][ T28] audit: type=1400 audit(2000000045.200:7272): avc: denied { prog_load } for pid=30753 comm="syz.9.7647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 385.267190][T30747] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 385.304046][ T28] audit: type=1400 audit(2000000045.200:7273): avc: denied { prog_load } for pid=30753 comm="syz.9.7647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 385.324224][ T28] audit: type=1400 audit(2000000045.310:7274): avc: denied { open } for pid=30753 comm="syz.9.7647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 385.388581][ T28] audit: type=1400 audit(2000000045.390:7275): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 385.421231][T30751] 8021q: adding VLAN 0 to HW filter on device bond11 [ 385.435407][T30756] bond11: (slave gretap2): making interface the new active one [ 385.448099][ T28] audit: type=1400 audit(2000000045.420:7276): avc: denied { name_bind } for pid=30757 comm="syz.6.7648" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 385.460310][T30756] bond11: (slave gretap2): Enslaving as an active interface with an up link [ 385.472320][ T28] audit: type=1400 audit(2000000045.440:7277): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 385.537925][ T28] audit: type=1400 audit(2000000045.540:7278): avc: denied { map_create } for pid=30761 comm="syz.8.7659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 385.573679][ T28] audit: type=1400 audit(2000000045.540:7279): avc: denied { prog_load } for pid=30761 comm="syz.8.7659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 385.598338][T30766] netlink: 'syz.2.7650': attribute type 1 has an invalid length. [ 385.639082][T30766] bond4: entered promiscuous mode [ 385.644282][T30766] bond4: entered allmulticast mode [ 385.650738][T30766] 8021q: adding VLAN 0 to HW filter on device bond4 [ 385.667333][T30766] macvlan2: entered promiscuous mode [ 385.672765][T30766] macvlan2: entered allmulticast mode [ 385.680624][T30766] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 385.959715][T30793] netlink: 'syz.8.7661': attribute type 1 has an invalid length. [ 385.996644][T30793] 8021q: adding VLAN 0 to HW filter on device bond2 [ 386.050671][T30795] bond2: (slave gretap2): making interface the new active one [ 386.060780][T30795] bond2: (slave gretap2): Enslaving as an active interface with an up link [ 386.629600][T30818] netlink: 24 bytes leftover after parsing attributes in process `syz.8.7666'. [ 386.708238][T30822] netlink: 24 bytes leftover after parsing attributes in process `syz.8.7669'. [ 386.742158][T30822] netlink: 100 bytes leftover after parsing attributes in process `syz.8.7669'. [ 387.441447][T30845] netlink: 12 bytes leftover after parsing attributes in process `syz.6.7680'. [ 387.469264][T30849] netlink: 4 bytes leftover after parsing attributes in process `syz.5.7681'. [ 387.489089][T30849] netlink: 12 bytes leftover after parsing attributes in process `syz.5.7681'. [ 387.877098][T30880] netlink: 12 bytes leftover after parsing attributes in process `syz.2.7696'. [ 387.966032][T30882] team0: Port device dummy0 added [ 387.994931][T30882] team0: Port device dummy0 removed [ 388.010434][T30882] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 388.059229][T30888] netlink: 4 bytes leftover after parsing attributes in process `syz.8.7699'. [ 388.079058][T30888] veth0_macvtap: left promiscuous mode [ 388.245028][T30904] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 388.870831][T30968] bond5: entered promiscuous mode [ 388.876193][T30968] 8021q: adding VLAN 0 to HW filter on device bond5 [ 388.893030][T30968] bond5: (slave bridge3): making interface the new active one [ 388.900626][T30968] bridge3: entered promiscuous mode [ 388.922821][T30968] bond5: (slave bridge3): Enslaving as an active interface with an up link [ 389.730586][T31027] __nla_validate_parse: 6 callbacks suppressed [ 389.730600][T31027] netlink: 8 bytes leftover after parsing attributes in process `syz.8.7760'. [ 389.780454][T31029] validate_nla: 5 callbacks suppressed [ 389.780466][T31029] netlink: 'syz.8.7761': attribute type 13 has an invalid length. [ 389.847820][T31034] netlink: 24 bytes leftover after parsing attributes in process `syz.9.7764'. [ 390.214471][ T28] kauditd_printk_skb: 277 callbacks suppressed [ 390.214485][ T28] audit: type=1400 audit(2000000050.210:7557): avc: denied { prog_load } for pid=31044 comm="syz.8.7769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 390.284689][ T28] audit: type=1400 audit(2000000050.260:7558): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 390.330156][ T28] audit: type=1400 audit(2000000050.280:7559): avc: denied { create } for pid=31052 comm="syz.5.7782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 390.362973][ T28] audit: type=1400 audit(2000000050.330:7560): avc: denied { mounton } for pid=31054 comm="syz.8.7771" path="/302" dev="tmpfs" ino=1590 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 390.507039][ T28] audit: type=1326 audit(2000000050.510:7561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31058 comm="syz.5.7773" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcd6650bf79 code=0x7ffc0000 [ 390.550439][ T28] audit: type=1400 audit(2000000050.530:7562): avc: denied { allowed } for pid=31059 comm="syz.2.7772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 390.593366][ T28] audit: type=1326 audit(2000000050.530:7563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31058 comm="syz.5.7773" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7fcd6650bf79 code=0x7ffc0000 [ 390.642961][ T28] audit: type=1326 audit(2000000050.530:7564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31058 comm="syz.5.7773" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcd6650bf79 code=0x7ffc0000 [ 390.695535][ T28] audit: type=1326 audit(2000000050.530:7565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31058 comm="syz.5.7773" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcd6650bf79 code=0x7ffc0000 [ 390.746085][ T28] audit: type=1326 audit(2000000050.530:7566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31058 comm="syz.5.7773" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7fcd6650bf79 code=0x7ffc0000 [ 391.028939][T31080] netlink: 8 bytes leftover after parsing attributes in process `syz.9.7784'. [ 391.097283][T31085] netlink: 4 bytes leftover after parsing attributes in process `syz.5.7786'. [ 391.121572][T31080] netlink: 16 bytes leftover after parsing attributes in process `syz.9.7784'. [ 391.142705][T31085] netlink: 12 bytes leftover after parsing attributes in process `syz.5.7786'. [ 391.239860][T31094] netlink: 'syz.8.7790': attribute type 1 has an invalid length. [ 391.261594][T31097] netlink: 8 bytes leftover after parsing attributes in process `syz.9.7792'. [ 391.278969][T31094] 8021q: adding VLAN 0 to HW filter on device bond3 [ 391.604214][T31118] netlink: 4 bytes leftover after parsing attributes in process `syz.9.7800'. [ 391.662879][T31120] netlink: 4 bytes leftover after parsing attributes in process `syz.8.7802'. [ 391.687160][T31120] netlink: 12 bytes leftover after parsing attributes in process `syz.8.7802'. [ 391.776519][T31124] netlink: 'syz.9.7814': attribute type 13 has an invalid length. [ 392.232462][T31166] lo: Caught tx_queue_len zero misconfig [ 393.816663][T31271] dummy0: entered promiscuous mode [ 393.822825][T31271] netdevsim netdevsim8 netdevsim0: entered promiscuous mode [ 393.832977][T31271] debugfs: 'hsr1' already exists in 'hsr' [ 393.839268][T31271] Cannot create hsr debugfs directory [ 393.844909][T31271] hsr1: entered allmulticast mode [ 393.850211][T31271] dummy0: entered allmulticast mode [ 393.859442][T31271] netdevsim netdevsim8 netdevsim0: entered allmulticast mode [ 393.903901][T31284] lo: Caught tx_queue_len zero misconfig [ 393.957924][T31292] ip6tnl2: entered promiscuous mode [ 395.217317][ T28] kauditd_printk_skb: 305 callbacks suppressed [ 395.217329][ T28] audit: type=1400 audit(2000000055.220:7872): avc: denied { prog_load } for pid=31362 comm="syz.9.7905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 395.276102][ T28] audit: type=1400 audit(2000000055.260:7873): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 395.338737][ T28] audit: type=1400 audit(2000000055.270:7874): avc: denied { read write } for pid=26790 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 395.377590][ T28] audit: type=1400 audit(2000000055.320:7875): avc: denied { map_create } for pid=31366 comm="syz.8.7906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 395.419555][ T28] audit: type=1400 audit(2000000055.320:7876): avc: denied { sys_module } for pid=31364 comm="syz.9.7916" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 395.452640][ T28] audit: type=1400 audit(2000000055.330:7877): avc: denied { module_request } for pid=31366 comm="syz.8.7906" kmod="netdev-syz_tun" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 395.470260][T31375] ip6tnl1: entered promiscuous mode [ 395.480199][ T28] audit: type=1400 audit(2000000055.330:7878): avc: denied { sys_module } for pid=31366 comm="syz.8.7906" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 395.515541][ T28] audit: type=1400 audit(2000000055.330:7879): avc: denied { map_create } for pid=31366 comm="syz.8.7906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 395.538079][ T28] audit: type=1400 audit(2000000055.330:7880): avc: denied { map_create } for pid=31366 comm="syz.8.7906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 395.561160][ T28] audit: type=1400 audit(2000000055.330:7881): avc: denied { prog_load } for pid=31366 comm="syz.8.7906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 395.965296][T31392] __nla_validate_parse: 5 callbacks suppressed [ 395.965459][T31392] netlink: 12 bytes leftover after parsing attributes in process `syz.2.7917'. [ 396.132537][T31418] bridge0: entered promiscuous mode [ 396.180265][T31418] bridge0: port 3(macsec1) entered blocking state [ 396.201307][T31418] bridge0: port 3(macsec1) entered disabled state [ 396.220562][T31418] macsec1: entered allmulticast mode [ 396.227237][T31418] bridge0: entered allmulticast mode [ 396.233961][T31418] macsec1: left allmulticast mode [ 396.240702][T31418] bridge0: left allmulticast mode [ 396.266304][T31418] bridge0: left promiscuous mode [ 397.877330][T31535] netlink: 'syz.9.7994': attribute type 1 has an invalid length. [ 397.911503][T31535] 8021q: adding VLAN 0 to HW filter on device bond6 [ 398.136850][T31538] bond6: (slave veth19): Enslaving as an active interface with a down link [ 398.152070][T31535] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 398.163878][T31535] bond6: (slave batadv1): dev_set_mac_address on slave failed! ALB mode requires that the base driver support setting the hw address also when the network device's interface is open [ 399.694857][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 400.134313][T31640] netlink: 'syz.5.8030': attribute type 1 has an invalid length. [ 400.151369][T31640] 8021q: adding VLAN 0 to HW filter on device bond12 [ 400.173651][T31640] bond12: (slave veth13): Enslaving as an active interface with a down link [ 400.188296][T31640] 8021q: adding VLAN 0 to HW filter on device batadv2 [ 400.198063][T31640] bond12: (slave batadv2): making interface the new active one [ 400.207563][T31640] batadv2: entered promiscuous mode [ 400.212895][T31640] bond12: (slave batadv2): Enslaving as an active interface with an up link [ 400.237423][ T28] kauditd_printk_skb: 282 callbacks suppressed [ 400.237435][ T28] audit: type=1400 audit(2000000060.240:8164): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 400.287377][T31656] netlink: 'syz.5.8037': attribute type 4 has an invalid length. [ 400.303695][T31656] netlink: 'syz.5.8037': attribute type 4 has an invalid length. [ 400.321339][ T28] audit: type=1400 audit(2000000060.270:8165): avc: denied { open } for pid=31651 comm="syz.2.8036" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 400.345659][ T28] audit: type=1400 audit(2000000060.280:8166): avc: denied { mount } for pid=31653 comm="syz.8.8035" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=0 [ 400.368158][ T28] audit: type=1400 audit(2000000060.280:8167): avc: denied { watch watch_reads } for pid=31653 comm="syz.8.8035" path="/356" dev="tmpfs" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 400.449175][ T28] audit: type=1400 audit(2000000060.280:8168): avc: denied { read } for pid=31653 comm="syz.8.8035" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 400.473801][ T28] audit: type=1400 audit(2000000060.300:8169): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 400.498852][ T28] audit: type=1400 audit(2000000060.320:8170): avc: denied { name_bind } for pid=31657 comm="syz.8.8038" src=28194 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 400.523591][ T28] audit: type=1400 audit(2000000060.320:8171): avc: denied { name_bind } for pid=31657 comm="syz.8.8038" src=24098 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 400.546052][ T28] audit: type=1400 audit(2000000060.320:8172): avc: denied { read write } for pid=26790 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 400.571059][ T28] audit: type=1400 audit(2000000060.390:8173): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 401.000724][T31735] netlink: 'syz.9.8072': attribute type 4 has an invalid length. [ 401.012501][T31735] netlink: 'syz.9.8072': attribute type 4 has an invalid length. [ 401.055922][T31744] netlink: 'syz.8.8075': attribute type 1 has an invalid length. [ 401.089806][T31744] 8021q: adding VLAN 0 to HW filter on device bond4 [ 401.113732][T31744] bond4: (slave veth13): Enslaving as an active interface with a down link [ 401.130944][T31744] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 401.140126][T31744] bond4: (slave batadv1): making interface the new active one [ 401.148603][T31744] batadv1: entered promiscuous mode [ 401.154173][T31744] bond4: (slave batadv1): Enslaving as an active interface with an up link [ 401.204792][T31759] netlink: 24 bytes leftover after parsing attributes in process `syz.8.8082'. [ 401.536695][T31807] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8103'. [ 401.549881][T31807] netlink: 12 bytes leftover after parsing attributes in process `syz.5.8103'. [ 401.606645][T31811] netlink: 24 bytes leftover after parsing attributes in process `syz.8.8104'. [ 401.677644][T31817] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8107'. [ 402.100091][T31852] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8121'. [ 402.148868][T31857] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8133'. [ 402.413376][T31882] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8134'. [ 402.423379][T31882] netlink: 12 bytes leftover after parsing attributes in process `syz.8.8134'. [ 402.619196][T31896] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8138'. [ 402.775128][T31914] 8021q: VLANs not supported on gre0 [ 402.918480][T31933] veth10: entered promiscuous mode [ 402.923687][T31933] veth10: entered allmulticast mode [ 404.611922][T31988] netlink: 'syz.5.8177': attribute type 27 has an invalid length. [ 404.693243][T31988] ip6erspan0: left promiscuous mode [ 404.710167][T31988] geneve2: left promiscuous mode [ 404.729346][T31988] ip6gre1: left promiscuous mode [ 404.753056][T31988] ip6gre1: left allmulticast mode [ 404.770310][T31988] bridge1: left allmulticast mode [ 404.790720][T31988] bond4: left promiscuous mode [ 404.807769][T31988] bridge2: left promiscuous mode [ 404.822437][T31988] ipip1: left promiscuous mode [ 404.838234][T31988] geneve5: left promiscuous mode [ 404.851832][T31988] geneve5: left allmulticast mode [ 404.865701][T31988] team1: left promiscuous mode [ 404.877427][T31988] team1: left allmulticast mode [ 404.895982][T31988] bond10: left promiscuous mode [ 404.901995][T31988] bond10: left allmulticast mode [ 405.002838][T32001] 8021q: adding VLAN 0 to HW filter on device team0 [ 405.012099][T32001] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 405.029797][ T8597] netdevsim netdevsim5 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 405.058820][ T8597] netdevsim netdevsim5 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 405.100189][ T8597] netdevsim netdevsim5 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 405.130254][ T8597] netdevsim netdevsim5 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 405.244672][ T28] kauditd_printk_skb: 325 callbacks suppressed [ 405.244689][ T28] audit: type=1400 audit(2000000065.240:8499): avc: denied { read write } for pid=26790 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 405.299081][ T28] audit: type=1400 audit(2000000065.260:8500): avc: denied { prog_load } for pid=32024 comm="syz.9.8190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 405.330030][ T28] audit: type=1400 audit(2000000065.260:8501): avc: denied { prog_load } for pid=32024 comm="syz.9.8190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 405.376487][ T28] audit: type=1400 audit(2000000065.260:8502): avc: denied { prog_load } for pid=32024 comm="syz.9.8190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 405.411556][ T28] audit: type=1400 audit(2000000065.280:8503): avc: denied { read write } for pid=26790 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 405.466686][ T28] audit: type=1400 audit(2000000065.350:8504): avc: denied { create } for pid=32028 comm="syz.2.8192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 405.486300][ T28] audit: type=1400 audit(2000000065.460:8505): avc: denied { name_bind } for pid=32031 comm="syz.2.8193" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 405.520404][ T28] audit: type=1400 audit(2000000065.520:8506): avc: denied { read write } for pid=26790 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 405.545110][ T28] audit: type=1400 audit(2000000065.530:8507): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 405.594522][ T28] audit: type=1400 audit(2000000065.590:8508): avc: denied { read write } for pid=26790 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 405.648688][T32044] veth24: entered promiscuous mode [ 405.654103][T32044] veth24: entered allmulticast mode [ 405.727029][T32059] team_slave_1: Caught tx_queue_len zero misconfig [ 405.741317][T32060] 8021q: adding VLAN 0 to HW filter on device bond2 [ 405.769879][T32060] bond2: (slave dummy0): Enslaving as an active interface with an up link [ 405.786840][T32060] bond2 (unregistering): (slave dummy0): Releasing backup interface [ 405.797000][T32060] bond2 (unregistering): Released all slaves [ 406.189643][T32110] xt_hashlimit: max too large, truncated to 1048576 [ 406.311649][T32122] __nla_validate_parse: 6 callbacks suppressed [ 406.311688][T32122] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8234'. [ 406.398493][T32131] 8021q: VLANs not supported on gre0 [ 406.441288][T32136] bond0: (slave bridge_slave_1): Enslaving as an active interface with an up link [ 406.589017][T32158] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8252'. [ 406.598286][T32158] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8252'. [ 406.609854][T32152] IPVS: dh: UDP 224.0.0.2:0 - no destination available [ 406.616997][ T3418] IPVS: starting estimator thread 0... [ 406.704856][T32160] IPVS: using max 2688 ests per chain, 134400 per kthread [ 406.765116][T32180] team_slave_1: Caught tx_queue_len zero misconfig [ 407.162768][T32212] 8021q: adding VLAN 0 to HW filter on device bond5 [ 407.184330][T32212] bond5 (unregistering): Released all slaves [ 407.628718][T32231] netlink: 'syz.2.8282': attribute type 27 has an invalid length. [ 407.726612][T32231] geneve2: left promiscuous mode [ 407.731590][T32231] geneve2: left allmulticast mode [ 407.750760][T32231] team1: left promiscuous mode [ 407.760562][T32231] team1: left allmulticast mode [ 407.766160][T32231] gretap1: left allmulticast mode [ 407.779801][T32231] geneve3: left promiscuous mode [ 407.793508][T32231] geneve3: left allmulticast mode [ 407.805505][T32231] bond4: left promiscuous mode [ 407.810331][T32231] bond4: left allmulticast mode [ 407.827025][T32231] ip6tnl1: left promiscuous mode [ 407.938098][T32234] 8021q: adding VLAN 0 to HW filter on device bond0 [ 407.956090][T32234] 8021q: adding VLAN 0 to HW filter on device team0 [ 407.966737][T32234] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 408.086001][T32251] 8021q: adding VLAN 0 to HW filter on device bond7 [ 408.101610][T32251] bond7 (unregistering): Released all slaves [ 408.155206][T32256] netlink: 'syz.6.8293': attribute type 6 has an invalid length. [ 408.354060][T32271] IPVS: dh: UDP 224.0.0.2:0 - no destination available [ 408.355501][ T8905] IPVS: starting estimator thread 0... [ 408.371930][T32277] netlink: 2028 bytes leftover after parsing attributes in process `syz.6.8299'. [ 408.383982][T32277] netlink: 24 bytes leftover after parsing attributes in process `syz.6.8299'. [ 408.454657][T32276] IPVS: using max 2640 ests per chain, 132000 per kthread [ 409.033932][T32300] netlink: 24 bytes leftover after parsing attributes in process `syz.8.8309'. [ 409.306537][T32337] netlink: 'syz.9.8325': attribute type 2 has an invalid length. [ 409.323728][T32341] netlink: 24 bytes leftover after parsing attributes in process `syz.6.8327'. [ 409.450003][T32357] syzkaller0: entered promiscuous mode [ 409.456071][T32357] syzkaller0: entered allmulticast mode [ 409.661678][T32388] IPVS: dh: UDP 224.0.0.2:0 - no destination available [ 410.057535][T32407] netlink: 'syz.8.8355': attribute type 27 has an invalid length. [ 410.100659][T32407] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.107989][T32407] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.153673][T32407] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 410.164403][T32407] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 410.212249][T32407] geneve2: left promiscuous mode [ 410.218940][T32407] geneve2: left allmulticast mode [ 410.233690][T32407] geneve3: left promiscuous mode [ 410.247751][T32407] gretap1: left allmulticast mode [ 410.257194][ T28] kauditd_printk_skb: 473 callbacks suppressed [ 410.257207][ T28] audit: type=1400 audit(2000000070.260:8982): avc: denied { read write } for pid=32437 comm="syz.6.8370" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 410.293535][T32407] hsr1: left allmulticast mode [ 410.305762][T32407] dummy0: left allmulticast mode [ 410.314098][T32407] netdevsim netdevsim8 netdevsim0: left allmulticast mode [ 410.322665][T32407] ip6tnl2: left promiscuous mode [ 410.328316][ T28] audit: type=1400 audit(2000000070.330:8983): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 410.342088][ T28] audit: type=1400 audit(2000000070.340:8984): avc: denied { create } for pid=32441 comm="syz.6.8372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 410.374909][ T28] audit: type=1400 audit(2000000070.340:8985): avc: denied { allowed } for pid=32441 comm="syz.6.8372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 410.401055][ T28] audit: type=1400 audit(2000000070.400:8986): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 410.449045][ T28] audit: type=1400 audit(2000000070.450:8987): avc: denied { mounton } for pid=32443 comm="syz.6.8373" path="/456/file0" dev="tmpfs" ino=2379 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 410.458054][T32415] 8021q: adding VLAN 0 to HW filter on device bond0 [ 410.494131][T32415] 8021q: adding VLAN 0 to HW filter on device team0 [ 410.504553][T32415] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 410.535286][ T8599] netdevsim netdevsim8 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 410.554398][ T28] audit: type=1400 audit(2000000070.450:8988): avc: denied { mounton } for pid=32443 comm="syz.6.8373" path="/" dev="tmpfs" ino=2374 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 410.584802][ T8599] netdevsim netdevsim8 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 410.601631][ T8599] netdevsim netdevsim8 netdevsim0: unset [1, 1] type 2 family 0 port 55713 - 0 [ 410.610279][ T28] audit: type=1400 audit(2000000070.490:8989): avc: denied { allowed } for pid=32444 comm="syz.5.8374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 410.616048][ T8599] netdevsim netdevsim8 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 410.668350][ T28] audit: type=1400 audit(2000000070.490:8990): avc: denied { allowed } for pid=32444 comm="syz.5.8374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 410.671548][ T8599] netdevsim netdevsim8 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 410.729744][ T28] audit: type=1400 audit(2000000070.510:8991): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 410.744515][ T8599] netdevsim netdevsim8 netdevsim1: unset [1, 1] type 2 family 0 port 55713 - 0 [ 410.798175][ T8599] netdevsim netdevsim8 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 410.819108][ T8599] netdevsim netdevsim8 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 410.838223][ T8599] netdevsim netdevsim8 netdevsim2: unset [1, 1] type 2 family 0 port 55713 - 0 [ 410.869181][ T8599] netdevsim netdevsim8 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 410.894789][ T8599] netdevsim netdevsim8 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 410.903693][ T8599] netdevsim netdevsim8 netdevsim3: unset [1, 1] type 2 family 0 port 55713 - 0 [ 411.086818][T32477] netlink: 32 bytes leftover after parsing attributes in process `syz.6.8386'. [ 411.252960][T32492] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 411.453625][T32505] netlink: 'syz.6.8397': attribute type 2 has an invalid length. [ 411.700637][T32520] -: renamed from syzkaller0 [ 412.785240][T32603] A link change request failed with some changes committed already. Interface vlan3 may have been left with an inconsistent configuration, please check. [ 412.909876][T32614] netlink: 24 bytes leftover after parsing attributes in process `syz.6.8444'. [ 412.959561][T32616] netlink: 2028 bytes leftover after parsing attributes in process `syz.5.8445'. [ 412.986046][T32616] netlink: 24 bytes leftover after parsing attributes in process `syz.5.8445'. [ 413.139571][ T8602] bridge_slave_1: left allmulticast mode [ 413.145346][ T8602] bridge_slave_1: left promiscuous mode [ 413.151088][ T8602] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.162713][ T8602] bridge_slave_0: left allmulticast mode [ 413.169797][ T8602] bridge_slave_0: left promiscuous mode [ 413.181265][ T8602] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.441582][ T8602] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 413.461858][ T8602] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 413.479475][ T8602] bond0 (unregistering): Released all slaves [ 413.563651][ T8602] tipc: Left network mode [ 413.613004][ T8602] hsr_slave_0: left promiscuous mode [ 413.629249][ T8602] hsr_slave_1: left promiscuous mode [ 413.630555][T32648] netlink: 12 bytes leftover after parsing attributes in process `syz.8.8454'. [ 413.644938][ T8602] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 413.652501][ T8602] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 413.684192][T32649] serio: Serial port pts0 [ 413.692258][T32651] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8458'. [ 413.725612][ T8602] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 413.733104][ T8602] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 413.762021][T32654] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8458'. [ 413.848959][ T8602] veth1_macvtap: left promiscuous mode [ 413.854510][ T8602] veth0_macvtap: left promiscuous mode [ 413.860235][ T8602] veth1_vlan: left promiscuous mode [ 413.865559][ T8602] veth0_vlan: left promiscuous mode [ 413.963405][ T8602] team0 (unregistering): Port device team_slave_1 removed [ 413.978240][ T8602] team0 (unregistering): Port device team_slave_0 removed [ 414.030818][T32648] vxlan0: entered promiscuous mode [ 414.040279][ T8606] netdevsim netdevsim8 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 414.049717][ T8606] netdevsim netdevsim8 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 414.063400][ T8606] netdevsim netdevsim8 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 414.072784][ T8606] netdevsim netdevsim8 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 414.167115][T32673] IPv6: sit1: Disabled Multicast RS [ 414.198062][ T8602] IPVS: stop unused estimator thread 0... [ 414.434170][T32702] IPv6: sit2: Disabled Multicast RS [ 414.518047][T32710] netlink: 2020 bytes leftover after parsing attributes in process `syz.2.8481'. [ 414.535483][T32710] netlink: 24 bytes leftover after parsing attributes in process `syz.2.8481'. [ 414.569589][T32717] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8488'. [ 414.579787][T32717] netlink: 12 bytes leftover after parsing attributes in process `syz.8.8488'. [ 414.713577][T32730] IPv6: sit2: Disabled Multicast RS [ 414.791057][T32734] A link change request failed with some changes committed already. Interface vlan0 may have been left with an inconsistent configuration, please check. [ 414.819966][T32741] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 414.836860][T32741] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 415.276280][ T28] kauditd_printk_skb: 310 callbacks suppressed [ 415.276330][ T28] audit: type=1400 audit(2000000075.280:9302): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 415.319721][ T28] audit: type=1400 audit(2000000075.320:9303): avc: denied { prog_load } for pid=305 comm="syz.5.8513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 415.339573][ T28] audit: type=1400 audit(2000000075.320:9304): avc: denied { open } for pid=305 comm="syz.5.8513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 415.360337][ T28] audit: type=1400 audit(2000000075.320:9305): avc: denied { map_create } for pid=305 comm="syz.5.8513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 415.381031][ T28] audit: type=1400 audit(2000000075.350:9306): avc: denied { prog_load } for pid=305 comm="syz.5.8513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 415.400118][ T28] audit: type=1400 audit(2000000075.370:9307): avc: denied { prog_load } for pid=305 comm="syz.5.8513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 415.420397][ T28] audit: type=1400 audit(2000000075.370:9308): avc: denied { map_create } for pid=305 comm="syz.5.8513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 415.463417][ T28] audit: type=1400 audit(2000000075.370:9309): avc: denied { prog_load } for pid=308 comm="syz.8.8512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 415.487400][ T28] audit: type=1400 audit(2000000075.370:9310): avc: denied { prog_load } for pid=308 comm="syz.8.8512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 415.508216][ T28] audit: type=1400 audit(2000000075.370:9311): avc: denied { open } for pid=308 comm="syz.8.8512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 417.147235][ T411] netlink: 'syz.6.8556': attribute type 27 has an invalid length. [ 417.347558][ T411] ipip0: left promiscuous mode [ 417.367146][ T411] gtp0: left promiscuous mode [ 417.372832][ T411] gretap1: left promiscuous mode [ 417.387572][ T411] veth10: left promiscuous mode [ 417.392451][ T411] veth10: left allmulticast mode [ 417.457762][ T414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 417.496431][ T414] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 417.518501][ T8606] netdevsim netdevsim6 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 417.539127][ T8606] netdevsim netdevsim6 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 417.566445][ T8606] netdevsim netdevsim6 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 417.593793][ T8606] netdevsim netdevsim6 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 417.607821][ T8606] netdevsim netdevsim6 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 417.623860][ T8606] netdevsim netdevsim6 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 417.633072][ T8606] netdevsim netdevsim6 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 417.644222][ T8606] netdevsim netdevsim6 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.204003][ T480] netlink: 'syz.5.8581': attribute type 4 has an invalid length. [ 418.236531][ T480] netlink: 'syz.5.8581': attribute type 4 has an invalid length. [ 418.544458][ T502] __nla_validate_parse: 10 callbacks suppressed [ 418.544476][ T502] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8584'. [ 419.067238][ T507] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8587'. [ 419.432641][ T523] netlink: 136 bytes leftover after parsing attributes in process `syz.8.8594'. [ 419.479834][ T528] netlink: 104 bytes leftover after parsing attributes in process `syz.8.8596'. [ 419.514748][ T528] netlink: 104 bytes leftover after parsing attributes in process `syz.8.8596'. [ 419.844281][ T549] syzkaller0: entered promiscuous mode [ 419.849964][ T549] syzkaller0: entered allmulticast mode [ 419.951195][ T561] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8610'. [ 419.998325][ T561] netlink: 12 bytes leftover after parsing attributes in process `syz.5.8610'. [ 420.284718][ T28] kauditd_printk_skb: 298 callbacks suppressed [ 420.284732][ T28] audit: type=1400 audit(2000000080.290:9610): avc: denied { create } for pid=592 comm="syz.8.8625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 420.311556][ T594] 8021q: VLANs not supported on gre0 [ 420.324770][ T28] audit: type=1400 audit(2000000080.290:9611): avc: denied { create } for pid=593 comm="syz.6.8626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 420.354054][ T28] audit: type=1400 audit(2000000080.290:9612): avc: denied { prog_load } for pid=593 comm="syz.6.8626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 420.385842][ T28] audit: type=1400 audit(2000000080.350:9613): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 420.441044][ T28] audit: type=1400 audit(2000000080.360:9614): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 420.494654][ T28] audit: type=1400 audit(2000000080.370:9615): avc: denied { create } for pid=597 comm="syz.6.8629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 420.515517][ T28] audit: type=1400 audit(2000000080.370:9616): avc: denied { create } for pid=597 comm="syz.6.8629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 420.537367][ T617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=617 comm=syz.5.8635 [ 420.550258][ T618] netlink: 2028 bytes leftover after parsing attributes in process `syz.8.8636'. [ 420.559425][ T28] audit: type=1400 audit(2000000080.380:9617): avc: denied { create } for pid=599 comm="syz.8.8630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 420.580940][ T618] netlink: 24 bytes leftover after parsing attributes in process `syz.8.8636'. [ 420.590100][ T28] audit: type=1400 audit(2000000080.380:9618): avc: denied { create } for pid=599 comm="syz.8.8630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 420.617566][ T28] audit: type=1400 audit(2000000080.410:9619): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 420.691436][ T633] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8644'. [ 421.489630][ T683] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=683 comm=syz.2.8668 [ 422.971087][ T755] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=755 comm=syz.5.8699 [ 423.049780][ T762] netlink: 'syz.5.8702': attribute type 27 has an invalid length. [ 423.107814][ T762] 8021q: adding VLAN 0 to HW filter on device team0 [ 423.117846][ T762] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 423.364702][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 423.462389][ T796] netlink: 'syz.6.8716': attribute type 4 has an invalid length. [ 423.472106][ T796] netlink: 'syz.6.8716': attribute type 4 has an invalid length. [ 423.620303][ T813] netlink: 'syz.6.8722': attribute type 1 has an invalid length. [ 423.636822][ T813] 8021q: adding VLAN 0 to HW filter on device bond2 [ 423.646946][ T813] bond2: option packets_per_slave: mode dependency failed, not supported in mode balance-alb(6) [ 424.334023][ T837] __nla_validate_parse: 6 callbacks suppressed [ 424.334041][ T837] netlink: 12 bytes leftover after parsing attributes in process `syz.8.8733'. [ 424.373089][ T841] netlink: 'syz.8.8734': attribute type 4 has an invalid length. [ 424.383558][ T841] netlink: 'syz.8.8734': attribute type 4 has an invalid length. [ 424.411107][ T8606] netdevsim netdevsim8 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 424.420796][ T8606] netdevsim netdevsim8 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 424.430130][ T8606] netdevsim netdevsim8 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 424.439343][ T8606] netdevsim netdevsim8 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 425.330575][ T28] kauditd_printk_skb: 294 callbacks suppressed [ 425.330617][ T28] audit: type=1400 audit(2000000085.330:9914): avc: denied { prog_load } for pid=885 comm="syz.6.8753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 425.404653][ T28] audit: type=1400 audit(2000000085.360:9915): avc: denied { create } for pid=885 comm="syz.6.8753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 425.464652][ T28] audit: type=1400 audit(2000000085.380:9916): avc: denied { open } for pid=885 comm="syz.6.8753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 425.526518][ T28] audit: type=1400 audit(2000000085.510:9917): avc: denied { read write } for pid=26146 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 425.654378][ T28] audit: type=1400 audit(2000000085.640:9918): avc: denied { read write } for pid=26871 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 425.685214][ T28] audit: type=1400 audit(2000000085.690:9919): avc: denied { open } for pid=880 comm="syz.5.8751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 425.840047][ T28] audit: type=1400 audit(2000000085.840:9920): avc: denied { create } for pid=880 comm="syz.5.8751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 425.973125][ T28] audit: type=1400 audit(2000000085.970:9921): avc: denied { read write } for pid=26790 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 426.016884][ T28] audit: type=1400 audit(2000000086.010:9922): avc: denied { map_create } for pid=890 comm="syz.6.8755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 426.043782][ T28] audit: type=1400 audit(2000000086.020:9923): avc: denied { block_suspend } for pid=896 comm="syz.9.8756" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 426.102947][ T905] netlink: 63503 bytes leftover after parsing attributes in process `syz.9.8757'. [ 427.547190][ T977] netlink: 'syz.8.8788': attribute type 1 has an invalid length. [ 427.589717][ T977] 8021q: adding VLAN 0 to HW filter on device bond5 [ 427.603366][ T977] bond5: option packets_per_slave: mode dependency failed, not supported in mode balance-alb(6) [ 427.735453][ T990] xt_hashlimit: max too large, truncated to 1048576 [ 427.887522][ T998] netlink: 'syz.2.8798': attribute type 10 has an invalid length. [ 427.897370][ T998] netlink: 65015 bytes leftover after parsing attributes in process `syz.2.8798'. [ 428.135138][ T1013] netlink: 'syz.2.8804': attribute type 4 has an invalid length. [ 428.174387][ T1013] netlink: 'syz.2.8804': attribute type 4 has an invalid length. [ 428.334002][ T1031] team0: Port device team_slave_0 removed [ 428.873645][ T1063] netlink: 'syz.6.8824': attribute type 10 has an invalid length. [ 428.884518][ T1063] netlink: 65015 bytes leftover after parsing attributes in process `syz.6.8824'. [ 429.587434][ T1092] netlink: 'syz.5.8838': attribute type 10 has an invalid length. [ 429.600811][ T1092] netlink: 65015 bytes leftover after parsing attributes in process `syz.5.8838'. [ 429.878468][ T1128] netlink: 'syz.2.8862': attribute type 4 has an invalid length. [ 430.601776][ T28] kauditd_printk_skb: 290 callbacks suppressed [ 430.601793][ T28] audit: type=1400 audit(2000000090.600:10214): avc: denied { allowed } for pid=1159 comm="syz.9.8877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 430.640448][ T28] audit: type=1400 audit(2000000090.630:10215): avc: denied { execmem } for pid=1159 comm="syz.9.8877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 430.660172][ T28] audit: type=1400 audit(2000000090.640:10216): avc: denied { mounton } for pid=1158 comm="syz.2.8868" path="/621/file1" dev="tmpfs" ino=3236 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=0 [ 430.730213][ T28] audit: type=1400 audit(2000000090.640:10217): avc: denied { create } for pid=1162 comm="syz.5.8867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 430.816024][ T28] audit: type=1400 audit(2000000090.640:10218): avc: denied { create } for pid=1162 comm="syz.5.8867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 430.859615][ T28] audit: type=1400 audit(2000000090.690:10219): avc: denied { read write } for pid=26790 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 430.886246][ T28] audit: type=1400 audit(2000000090.710:10220): avc: denied { create } for pid=1165 comm="syz.5.8870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 430.906080][ T28] audit: type=1400 audit(2000000090.710:10221): avc: denied { create } for pid=1165 comm="syz.5.8870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 430.926496][ T28] audit: type=1400 audit(2000000090.750:10222): avc: denied { create } for pid=1168 comm="syz.5.8871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 430.953660][ T28] audit: type=1400 audit(2000000090.750:10223): avc: denied { create } for pid=1168 comm="syz.5.8871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 431.521095][ T1210] macvtap1: entered promiscuous mode [ 431.536445][ T1210] bridge0: entered promiscuous mode [ 431.551918][ T1210] macvtap1: entered allmulticast mode [ 431.567436][ T1210] bridge0: entered allmulticast mode [ 431.583152][ T1210] bridge0: port 1(macvtap1) entered blocking state [ 431.603116][ T1210] bridge0: port 1(macvtap1) entered disabled state [ 431.652240][ T1210] bridge0: left allmulticast mode [ 431.665012][ T1210] bridge0: left promiscuous mode [ 431.981002][ T1260] macvtap1: entered promiscuous mode [ 431.994548][ T1260] bridge0: entered promiscuous mode [ 432.010977][ T1260] macvtap1: entered allmulticast mode [ 432.024899][ T1260] bridge0: entered allmulticast mode [ 432.035292][ T1260] bridge0: port 1(macvtap1) entered blocking state [ 432.057017][ T1260] bridge0: port 1(macvtap1) entered disabled state [ 432.085743][ T1260] bridge0: left allmulticast mode [ 432.091279][ T1277] netlink: 12 bytes leftover after parsing attributes in process `syz.5.8915'. [ 432.134885][ T1260] bridge0: left promiscuous mode [ 432.145147][ T1282] netlink: 12 bytes leftover after parsing attributes in process `syz.8.8916'. [ 432.325869][ T1310] macvtap0: entered promiscuous mode [ 432.332592][ T1310] bridge0: entered promiscuous mode [ 432.338448][ T1310] macvtap0: entered allmulticast mode [ 432.344272][ T1310] bridge0: entered allmulticast mode [ 432.351194][ T1310] bridge0: port 3(macvtap0) entered blocking state [ 432.364917][ T1310] bridge0: port 3(macvtap0) entered disabled state [ 432.372817][ T1310] bridge0: left allmulticast mode [ 432.378860][ T1310] bridge0: left promiscuous mode [ 432.476707][ T1324] bond13: entered promiscuous mode [ 432.490565][ T1324] vcan0: entered promiscuous mode [ 432.495958][ T1327] netlink: 28 bytes leftover after parsing attributes in process `syz.2.8937'. [ 432.496046][ T1327] netlink: 'syz.2.8937': attribute type 7 has an invalid length. [ 432.496059][ T1327] netlink: 'syz.2.8937': attribute type 8 has an invalid length. [ 432.496071][ T1327] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8937'. [ 432.530397][ T1324] vcan0: entered allmulticast mode [ 432.535892][ T1324] bond13: (slave vcan0): The slave device specified does not support setting the MAC address [ 432.546804][ T1324] bond13: (slave vcan0): Error -95 calling set_mac_address [ 432.787798][ T1359] batadv_slave_0: Caught tx_queue_len zero misconfig [ 433.078047][ T1390] netlink: 12 bytes leftover after parsing attributes in process `syz.8.8964'. [ 433.478876][ T1445] netlink: 16 bytes leftover after parsing attributes in process `syz.8.8984'. [ 433.554485][ T1457] netlink: 'syz.6.8989': attribute type 4 has an invalid length. [ 433.609409][ T8606] netdevsim netdevsim4 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 433.619984][ T8606] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 433.630711][ T8606] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 1] type 2 family 0 port 20004 - 0 [ 433.689598][ T8606] netdevsim netdevsim4 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 433.700494][ T8606] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 433.710855][ T8606] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 1] type 2 family 0 port 20004 - 0 [ 433.757808][ T8606] team0: Port device netdevsim1 removed [ 433.765723][ T8606] netdevsim netdevsim4 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 433.776077][ T8606] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 433.787103][ T8606] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 1] type 2 family 0 port 20004 - 0 [ 433.837347][ T8606] netdevsim netdevsim4 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 433.848534][ T8606] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 433.858856][ T8606] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 1] type 2 family 0 port 20004 - 0 [ 434.173044][ T8606] bond2 (unregistering): (slave gretap1): Releasing active interface [ 434.193806][ T8606] bond4 (unregistering): (slave gretap2): Releasing active interface [ 434.249995][ T8606] bond1 (unregistering): (slave geneve2): Releasing active interface [ 434.370336][ T8606] bond5 (unregistering): (slave bridge2): Releasing active interface [ 434.437244][ T8606] bond0 (unregistering): Released all slaves [ 434.457436][ T8606] bond1 (unregistering): Released all slaves [ 434.473559][ T8606] bond2 (unregistering): Released all slaves [ 434.493654][ T8606] bond3 (unregistering): Released all slaves [ 434.513740][ T8606] bond4 (unregistering): Released all slaves [ 434.537502][ T8606] bond5 (unregistering): Released all slaves [ 434.569134][ T1489] bond6: entered promiscuous mode [ 434.578783][ T1493] vcan0: entered promiscuous mode [ 434.607843][ T1493] vcan0: entered allmulticast mode [ 434.613364][ T1493] bond6: (slave vcan0): The slave device specified does not support setting the MAC address [ 434.624722][ T1493] bond6: (slave vcan0): Error -95 calling set_mac_address [ 434.647935][ T8606] tipc: Disabling bearer [ 434.656475][ T8606] tipc: Left network mode [ 434.689542][ T8606] hsr_slave_0: left promiscuous mode [ 434.738282][ T8606] veth1_macvtap: left promiscuous mode [ 434.743955][ T8606] veth0_macvtap: left promiscuous mode [ 434.755045][ T8606] veth1_vlan: left allmulticast mode [ 434.765103][ T8606] veth1_vlan: left promiscuous mode [ 434.789073][ T8606] veth0_vlan: left promiscuous mode [ 435.372874][ T8606] IPVS: stop unused estimator thread 0... [ 435.611639][ T28] kauditd_printk_skb: 6536 callbacks suppressed [ 435.611658][ T28] audit: type=1400 audit(2000000095.600:15716): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 435.657768][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 435.665868][T26146] audit: audit_backlog=65 > audit_backlog_limit=64 [ 435.672392][T26146] audit: audit_lost=352 audit_rate_limit=0 audit_backlog_limit=64 [ 435.680366][ T28] audit: type=1400 audit(2000000095.610:15717): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 435.681555][ T3040] audit: audit_lost=353 audit_rate_limit=0 audit_backlog_limit=64 [ 435.710085][ T1584] audit: audit_backlog=65 > audit_backlog_limit=64 [ 435.716831][T26146] audit: backlog limit exceeded [ 435.724486][ T1584] audit: audit_lost=354 audit_rate_limit=0 audit_backlog_limit=64 [ 435.741148][ T1584] audit: backlog limit exceeded [ 435.978161][ T1616] netlink: 'syz.2.9049': attribute type 4 has an invalid length. [ 436.566813][ T1636] netlink: 24 bytes leftover after parsing attributes in process `syz.6.9056'. [ 436.617501][ T1636] sch_tbf: burst 88 is lower than device veth19 mtu (1514) ! [ 436.744994][ T1646] netlink: 16 bytes leftover after parsing attributes in process `syz.6.9060'. [ 437.727952][ T1698] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9085'. [ 437.814348][ T1703] vlan4: entered allmulticast mode [ 437.837548][ T1703] veth0_to_bond: entered allmulticast mode [ 437.912083][ T1715] netlink: 24 bytes leftover after parsing attributes in process `syz.2.9093'. [ 438.143971][ T1737] netlink: 'syz.9.9103': attribute type 4 has an invalid length. [ 438.183664][ T1737] netlink: 'syz.9.9103': attribute type 4 has an invalid length. [ 438.363733][ T1750] netlink: 24 bytes leftover after parsing attributes in process `syz.5.9106'. [ 439.247096][ T1791] netlink: 24 bytes leftover after parsing attributes in process `syz.6.9125'. [ 439.421113][ T1800] netlink: 44 bytes leftover after parsing attributes in process `syz.2.9130'. [ 439.500427][ T1806] team0 (unregistering): Port device team_slave_1 removed [ 440.615745][ T28] kauditd_printk_skb: 18908 callbacks suppressed [ 440.615759][ T28] audit: type=1400 audit(2000000100.620:31925): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 440.655440][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 440.662018][ T3040] audit: audit_lost=1255 audit_rate_limit=0 audit_backlog_limit=64 [ 440.690569][ T28] audit: type=1400 audit(2000000100.620:31926): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 440.714555][ T1848] audit: audit_backlog=65 > audit_backlog_limit=64 [ 440.721119][ T1848] audit: audit_lost=1256 audit_rate_limit=0 audit_backlog_limit=64 [ 440.729359][ T3040] audit: backlog limit exceeded [ 440.734710][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 440.741620][ T1848] audit: backlog limit exceeded [ 440.756610][ T3040] audit: audit_lost=1257 audit_rate_limit=0 audit_backlog_limit=64 [ 440.816462][ T1854] netlink: 'syz.5.9150': attribute type 27 has an invalid length. [ 441.034773][ T1854] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 441.413926][ T1861] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9152'. [ 441.473765][ T1861] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9152'. [ 441.783916][ T1886] netlink: 44 bytes leftover after parsing attributes in process `syz.9.9163'. [ 441.793435][ T1886] ip6gre0: Caught tx_queue_len zero misconfig [ 442.123855][ T1896] ================================================================== [ 442.131990][ T1896] BUG: KCSAN: data-race in shmem_file_splice_read / shmem_file_splice_read [ 442.140623][ T1896] [ 442.142986][ T1896] write to 0xffff888103ff7828 of 8 bytes by task 1895 on cpu 0: [ 442.150628][ T1896] shmem_file_splice_read+0x470/0x600 [ 442.156020][ T1896] splice_direct_to_actor+0x26e/0x670 [ 442.161423][ T1896] do_splice_direct+0x119/0x1a0 [ 442.166301][ T1896] do_sendfile+0x382/0x650 [ 442.170740][ T1896] __x64_sys_sendfile64+0x105/0x150 [ 442.175948][ T1896] x64_sys_call+0x2dc4/0x3020 [ 442.180658][ T1896] do_syscall_64+0x12c/0x370 [ 442.185284][ T1896] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 442.191202][ T1896] [ 442.193546][ T1896] write to 0xffff888103ff7828 of 8 bytes by task 1896 on cpu 1: [ 442.201231][ T1896] shmem_file_splice_read+0x470/0x600 [ 442.206662][ T1896] splice_direct_to_actor+0x26e/0x670 [ 442.212068][ T1896] do_splice_direct+0x119/0x1a0 [ 442.216961][ T1896] do_sendfile+0x382/0x650 [ 442.221400][ T1896] __x64_sys_sendfile64+0x105/0x150 [ 442.226660][ T1896] x64_sys_call+0x2dc4/0x3020 [ 442.231373][ T1896] do_syscall_64+0x12c/0x370 [ 442.235992][ T1896] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 442.241918][ T1896] [ 442.244267][ T1896] value changed: 0x0000000000008fa6 -> 0x0000000000008fee [ 442.251390][ T1896] [ 442.253732][ T1896] Reported by Kernel Concurrency Sanitizer on: [ 442.259903][ T1896] CPU: 1 UID: 0 PID: 1896 Comm: syz.9.9165 Tainted: G W syzkaller #0 PREEMPT(full) [ 442.270871][ T1896] Tainted: [W]=WARN [ 442.274681][ T1896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 442.284758][ T1896] ================================================================== [ 445.624681][ T28] kauditd_printk_skb: 34348 callbacks suppressed [ 445.624698][ T28] audit: type=1400 audit(2000000105.620:66184): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 445.646292][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 445.652883][ T28] audit: type=1400 audit(2000000105.630:66185): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 445.659027][ T3040] audit: audit_lost=1288 audit_rate_limit=0 audit_backlog_limit=64 [ 445.681306][ T28] audit: type=1400 audit(2000000105.630:66186): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 445.688130][ T3040] audit: backlog limit exceeded [ 445.711159][ T28] audit: type=1400 audit(2000000105.630:66187): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 445.715184][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 445.735168][ T28] audit: type=1400 audit(2000000105.630:66188): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 445.742052][ T3040] audit: audit_lost=1289 audit_rate_limit=0 audit_backlog_limit=64 [ 450.634712][ T28] kauditd_printk_skb: 49119 callbacks suppressed [ 450.634726][ T28] audit: type=1400 audit(2000000110.640:115100): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 450.660757][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 450.663187][ T28] audit: type=1400 audit(2000000110.640:115101): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 450.669052][ T3040] audit: audit_lost=1359 audit_rate_limit=0 audit_backlog_limit=64 [ 450.690341][ T28] audit: type=1400 audit(2000000110.640:115102): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 450.698292][ T3040] audit: backlog limit exceeded [ 450.719624][ T28] audit: type=1400 audit(2000000110.640:115103): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 450.725571][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 450.748171][ T28] audit: type=1400 audit(2000000110.640:115104): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 450.752015][ T3040] audit: audit_lost=1360 audit_rate_limit=0 audit_backlog_limit=64