last executing test programs: 2m3.652231929s ago: executing program 0 (id=1232): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x17, 0x0, 0x1b, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x2000035e, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000630120000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 2m3.458016761s ago: executing program 0 (id=1237): socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x101001, 0x200) write$tun(r3, &(0x7f0000000000)={@val={0x0, 0x886c}, @void, @eth={@random="000000f400", @dev={'\xaa\xaa\xaa\xaa\xaa', 0x18}, @val={@void, {0x8100, 0x0, 0x1, 0x2}}, {@llc_tr={0x11, {@llc={0xaa, 0xe, "d8"}}}}}}, 0x19) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'veth1_to_bridge\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', r4, 0x0, 0x0, 0x0, 0x4}, 0x50) gettid() r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000000000)={0x38, r5, 0x1, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x38}}, 0x10004000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = dup(r7) write$UHID_INPUT(r8, &(0x7f0000004000)={0xf, {"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", 0xfffffffffffffe59}}, 0xfa) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x4000054) r9 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r9, 0x8982, &(0x7f0000000080)={0x7, 'syz_tun\x00', {0x7fff}, 0x2}) remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2800000, 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r9) getsockname$packet(r9, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x40) 2m2.578563571s ago: executing program 0 (id=1245): r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ipv6_route\x00') pread64(r0, &(0x7f0000001240)=""/102400, 0x19000, 0x1000000300) 2m2.480172712s ago: executing program 0 (id=1247): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x0, &(0x7f0000000240)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x1}}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x3}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@discard}, {@lazytime}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6}}]}, 0x1, 0x451, &(0x7f0000000bc0)="$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") mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='debugfs\x00', 0x1214040, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./bus\x00', 0x0, 0x2400, 0x0) 2m2.332755334s ago: executing program 0 (id=1250): bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f0000000340)=ANY=[@ANYRES16, @ANYRESOCT=0x0, @ANYBLOB], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84e}, 0x94) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_emit_ethernet(0x11, &(0x7f00000005c0)=ANY=[], 0x0) timer_create(0x1, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000300)={0xa, 0x2, 0xfffffffc, @empty, 0x80000001}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xfffffffe}, 0x1c) r4 = dup(r3) sendto$packet(r4, &(0x7f0000000400), 0xfffffd23, 0x24005010, 0x0, 0x0) connect$unix(r4, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e22}, 0x6e) 2m1.131447458s ago: executing program 0 (id=1256): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0xffffffff, 0x401, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/32], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22ff892f"], 0x3e) 2m1.038318309s ago: executing program 32 (id=1256): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0xffffffff, 0x401, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/32], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22ff892f"], 0x3e) 48.084284775s ago: executing program 5 (id=2955): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000580)={{0x14}, [@NFT_MSG_NEWRULE={0x40, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2, 0x0, 0x5}, [@NFTA_RULE_EXPRESSIONS={0x14, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @dup_ipv6={{0x8}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x68}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 48.026960766s ago: executing program 5 (id=2959): socket$kcm(0xa, 0x1, 0x106) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a80)={{0x14}, [@NFT_MSG_NEWRULE={0x40, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x14, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @masq={{0x9}, @void}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3cd2e7b3d6526bf5}}}, 0x68}}, 0x0) r1 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r1, &(0x7f0000001000)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000000500)=[{&(0x7f0000001640)="5346f7f875528ef24043c68e04180a332e94ee4784fffee263c06f2d924e8699b6af71aa257b5a316af31628e5148c7012f4d55ce4c29fea9e", 0x39}, {0x0}], 0x2, &(0x7f0000000580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @remote}}}], 0x20}, 0x0) 47.926294287s ago: executing program 5 (id=2962): bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0x5, 0x3, 0x4, 0x1ff}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002f00000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 47.793716479s ago: executing program 5 (id=2965): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x1b, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x45, 0x8, 0x0, 0x0}}, 0x10) socket$kcm(0x2, 0x2, 0x73) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xc801) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000054000000030a01020000000000000000010000000900030073797a3100000000280004800800024000000000080001400000000514000300"], 0xf4}}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="5c0000000206050000000000000000000000000105000100070000000900020073797a30000000000c00078008001240fffffffb0500050002000000050004000000000015000300686173683a69702c706f72742c6e6574"], 0x5c}, 0x1, 0x0, 0x0, 0x8040}, 0x4010) 47.71422255s ago: executing program 5 (id=2968): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd3c0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x100, 0x0, 0x0, 0x8, 0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040018}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000040), 0x4) recvmsg(r0, 0x0, 0x0) close(r1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$nbd(0x1, 0x1, 0x0, 0x0) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000740)=@updpolicy={0xc0, 0x19, 0x1, 0x0, 0x10, {{@in=@multicast1=0xe0000002, @in=@rand_addr=0x64010102, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80, 0x6}, {0x0, 0x0, 0x1abe1019, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd}, {}, 0x0, 0x6e6bb8, 0x0, 0x1, 0x0, 0x1}, [@XFRMA_IF_ID={0x8, 0x1f, 0x1}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4008011}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000c40)=ANY=[@ANYBLOB="d40000001b001d0328bd7000fcdbdf25ffffffff000000000000000000000000fe8000000000000000000000000000264e2000014e2404000200000087000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000000000000000100010000000000f4ffffffffffffff04000000000000000200000000000000ba410000000091ad07000000000000000000008000000000ffffff7f0000000003000000000000000400000000000000080000000000000003000000b86b6e000000030100000000040000000000000008001f0001"], 0xd4}}, 0x0) 47.602455951s ago: executing program 5 (id=2971): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60a84c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000500)=""/220, 0xdc}, {&(0x7f0000000ac0)=""/4040, 0xfc8}, {&(0x7f0000003b80)=""/4137, 0x1029}, {&(0x7f0000000600)=""/212, 0xd4}, {&(0x7f00000001c0)=""/71, 0x47}], 0x5}, 0x20) 32.526633711s ago: executing program 33 (id=2971): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60a84c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000500)=""/220, 0xdc}, {&(0x7f0000000ac0)=""/4040, 0xfc8}, {&(0x7f0000003b80)=""/4137, 0x1029}, {&(0x7f0000000600)=""/212, 0xd4}, {&(0x7f00000001c0)=""/71, 0x47}], 0x5}, 0x20) 2.083639666s ago: executing program 2 (id=3952): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x806, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x3, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) r2 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r1}, 0x8) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = perf_event_open(0x0, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT(r5, &(0x7f0000000680)={0x0, 0x39, &(0x7f0000000640)={&(0x7f0000000380)=ANY=[@ANYBLOB="20000000010301510000000400000000010000000c0002"], 0x20}, 0x1, 0x0, 0x0, 0x804}, 0x4004840) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x38, 0x40, 0x107, 0xfffffffe, 0x25dfdbfb, {0x1, 0x7c}, [@nested={0x4, 0x142}, @nested={0x1c, 0x1, 0x0, 0x1, [@typed={0x6, 0x6, 0x0, 0x0, @str='\x80\n'}, @typed={0x8, 0x11, 0x0, 0x0, @uid}, @typed={0x6, 0xb, 0x0, 0x0, @str='\x80\n'}]}, @nested={0x4, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x48815}, 0xc000) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)={0x54, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x9}]}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) r6 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r6, &(0x7f00000019c0)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @remote, 0xfffffffe}, 0x80, 0x0}, 0x20040010) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r7, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4, 0x1, 0x101, 0x0, 0x0, {0x7, 0x0, 0x2}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4041}, 0x4048014) sendmsg$kcm(r6, &(0x7f0000000780)={&(0x7f0000000300)=@in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x4}, 0x80, 0x0}, 0x20000000) 1.892284228s ago: executing program 2 (id=3963): r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001780)='*', 0x1}], 0x1}, 0x810) 1.837155579s ago: executing program 2 (id=3967): perf_event_open(&(0x7f00000009c0)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x20010000, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0xd}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4048011}, 0xc000) socket$kcm(0x11, 0xa, 0x300) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x40002000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r5 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={0x0, 0x0, 0x0, r5}, 0x18) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r6, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_audit(0x10, 0x3, 0x9) mount$bpf(0x200000000000, 0x0, 0x0, 0x989046, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40010040) r10 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r10, 0x11b, 0x2, &(0x7f0000000900)=r9, 0x4) 1.304757395s ago: executing program 4 (id=3990): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x23) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x10, 0x400000002, 0x0) socketpair$unix(0x1, 0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x890b, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x702, 0xe80, 0x0, &(0x7f0000000580)="e460334470d8d400eb00c15286dd", 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 815.919121ms ago: executing program 3 (id=4002): sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)={0x88, 0x2, 0x6, 0x1f3ea855875a761f, 0x0, 0x0, {0x1, 0x0, 0x9}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x88}, 0x1, 0x0, 0x0, 0x40080}, 0xc1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000200"/20, @ANYRES32=0x1, @ANYBLOB="00000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="020000000000100004000000001300000000000000000037b4dac1e8"], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = socket$nl_rdma(0x10, 0x3, 0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x20, 0x2c, 0x107, 0x1, 0x0, {0x3, 0x7c}, [@nested={0xa, 0x1, 0x0, 0x1, [@generic="3422ade7d663"]}]}, 0x20}, 0x1, 0x0, 0x0, 0xc000}, 0xc000) sendmsg$RDMA_NLDEV_CMD_SET(r2, &(0x7f00000050c0)={0x0, 0x0, &(0x7f0000005080)={&(0x7f0000000000)=ANY=[@ANYBLOB="180000000614010026bd7000fe"], 0x18}, 0x1, 0x0, 0x0, 0xc0}, 0x40) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x90024, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x6}, 0x8224, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x5, 0x4) sendmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000740)="2e00000010008188e6b62aa73f72cc9f0ba1f8481a0000005e140602000000000e000a00100000000a8000001294", 0x2e}], 0x1}, 0x0) r4 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000c40)=ANY=[@ANYBLOB="180000002500010323bd7045caac98da6b"], 0x18}, 0x1, 0x0, 0x0, 0x20000000}, 0x20044010) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r2}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x7, 0x7fff, 0x2, 0x20000, r0, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0xd, 0x13, &(0x7f0000000980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xaee}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_fd={0x18, 0x3, 0x1, 0x0, r0}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0xc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00'}, 0x94) 756.286682ms ago: executing program 6 (id=4003): r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f00000027c0)={&(0x7f0000001740)={0xa, 0x4e24, 0xfffffffa, @mcast2}, 0x1c, 0x0}, 0x810) 726.047482ms ago: executing program 6 (id=4004): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[], 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1206"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x8309}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETLE(r0, 0x4010744d, &(0x7f0000000180)) 404.228185ms ago: executing program 2 (id=4005): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b000000000000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x3, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000008000000000000000200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000004000000850000008600000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @sched_cls=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000900)="928e04b416cac951c35f7f4586e6", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 403.970585ms ago: executing program 4 (id=4006): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0xe, &(0x7f0000002300)=ANY=[], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040), 0x10}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet(0x2, 0x3, 0x1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="100000002d000b02d25a806f8c6394f9101a04000a", 0x15}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d80000001c0081ee4d81ffffffffb9040a1d08030e000000e8fea4a118001500060001e9dada9c6f77570f1000810401a80016000a0001", 0x37}], 0x1, 0x0, 0x0, 0x7400}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0, 0x0, 0x0, 0x5c8}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce620300fe"], 0xfe1b) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="563f00001800599c6d0eab070004000523"], 0xfe33) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="563f000019"], 0xfe33) 400.548085ms ago: executing program 2 (id=4007): socket$kcm(0x2, 0x1000000000000002, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xf, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1c, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x9, 0xc, 0x5, 0x0, 0x0, 0x3, 0x400, 0x6, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x12ab80, 0x8001}, 0x80, 0x400, 0x10, 0x0, 0x8, 0xa, 0x6, 0x0, 0x9000, 0x0, 0x100000001}, 0xffffffffffffffff, 0x9, r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'hsr0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8931, &(0x7f0000000080)) r4 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r4, 0x0, 0x8040) r5 = socket$kcm(0xa, 0x1, 0x0) r6 = socket$kcm(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000080000000200000000000000", @ANYRES32=r6], 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x8916, &(0x7f0000000000)={r6}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8936, &(0x7f0000000000)={r6}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x4, 0x80, 0xf9, 0x3, 0x0, 0x0, 0x0, 0x62af, 0x62f02, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x800, 0x1, @perf_bp={0x0, 0x4}, 0x110, 0xfffffffffffffff0, 0x4b2, 0x5, 0x1000, 0x5, 0x88cc, 0x0, 0x0, 0x0, 0x8000000000000001}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001340)=[{0x0}], 0x1, 0x0, 0x0, 0xc9e}, 0x8000) setsockopt$sock_attach_bpf(r0, 0x84, 0x24, 0x0, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="60040000170001002dbd7000fbdbdf2500000000000000000000000000000000000004d53c000000e0000001000000000000000000000000ffffffff0000000000000000000000002000000000000000b382df0dcd79119b4e2204000a0090a03a000000", @ANYBLOB="a2922518e42e1371638b8ffa07433ebb118412808d7fb9ef0e3e6dcae6b388840c8b38781823fd0543d77eb002ff2999e06c830bfaf503b6dff9cc3cd405a947353ac49f43c49e11dbf7bd45d8ddcc09f0c4908c55291a2d"], 0x460}}, 0x844) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x6, 0x8}, 0x50) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000e00000000000000000000297f1500", @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 394.673906ms ago: executing program 1 (id=4008): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000f8ff1c000000000000000000850000003600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, 0x0, 0x43}, 0x28) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, 0x0, r1}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r2, 0x0, 0x0}, 0x10) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000001940)={r0, 0x0, 0x25, 0x4}, 0x14) 342.392446ms ago: executing program 3 (id=4009): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c00000002060108000034e40000000000060000050001000600000005000400000000000900020073797a3100"], 0x5c}}, 0x0) 341.976566ms ago: executing program 1 (id=4010): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="7f7b353e77867e4605ff29b669134390e04874599cb75d726e261bb1903d58944cc025326a9b2db74d6adb2a7b1a571c6f9a", 0x32}], 0x1, 0x0, 0x0, 0x4004050}, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000180)={0x0, 0x3b, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000160a03020002000000000000020000000900020073797a30000000000900010073797a30000000002c00038008000140000000000800024000000000180003801400010073797a5f74756e00000000000000000014000000110001"], 0x80}}, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0xc8, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) 279.949996ms ago: executing program 3 (id=4011): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000040)="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", 0x26f}], 0x1}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000500)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWRULE={0x48, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_EXPRESSIONS={0x1c, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @synproxy={{0xd}, @val={0x4}}}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x24044010) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f00000002c0)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x2940000, @mcast1, 0x9}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000780)="f4000900062b2c25fe80000000000000dc8b850f238466ccfe807a000000ad6e911b51818462b4002f00", 0x2a}], 0x1}, 0x0) 268.578617ms ago: executing program 1 (id=4012): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000500)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWRULE={0x48, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_EXPRESSIONS={0x1c, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @synproxy={{0xd}, @val={0x4}}}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x24044010) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x85}, 0x9}, 0x80, 0x0}, 0x0) 260.158827ms ago: executing program 2 (id=4013): socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x101001, 0x200) write$tun(r2, &(0x7f0000000000)={@val={0x0, 0x886c}, @void, @eth={@random="000000f400", @dev={'\xaa\xaa\xaa\xaa\xaa', 0x18}, @val={@void, {0x8100, 0x0, 0x1, 0x2}}, {@llc_tr={0x11, {@llc={0xaa, 0xe, "d8"}}}}}}, 0x19) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'veth1_to_bridge\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', r3, 0x0, 0x0, 0x0, 0x4}, 0x50) gettid() r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000000000)={0x2c, r4, 0x1, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x10004000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) r7 = dup(r6) write$UHID_INPUT(r7, &(0x7f0000004000)={0xf, {"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", 0xfffffffffffffe59}}, 0xfa) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x4000054) r8 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r8, 0x8982, &(0x7f0000000080)={0x7, 'syz_tun\x00', {0x7fff}, 0x2}) remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2800000, 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r8) getsockname$packet(r8, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x40) 254.053197ms ago: executing program 4 (id=4014): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2d, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000001c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000640)="80", 0x26892}], 0x1}, 0xfc) sendmsg$inet(0xffffffffffffffff, &(0x7f00000029c0)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0x10, 0x0}, 0x30000001) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000500)="0f", 0x1}], 0x20}, 0x40040) 215.087397ms ago: executing program 6 (id=4015): socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x806, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x3, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(0x0, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT(r4, &(0x7f0000000680)={0x0, 0x39, &(0x7f0000000640)={&(0x7f0000000380)=ANY=[@ANYBLOB="20000000010301510000000400000000010000000c0002"], 0x20}, 0x1, 0x0, 0x0, 0x804}, 0x4004840) 214.680277ms ago: executing program 1 (id=4016): r0 = syz_clone(0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0xd50a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x9, 0x1ef7}, 0x11efb, 0x4, 0x0, 0x8, 0x0, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext={0x0, 0x2}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}, 0x1, 0x0, 0x0, 0x200448d3}, 0x48030) ioctl$TUNGETVNETLE(r2, 0x8953, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004240)={0x0, 0x0, 0x0}, 0x22) sendmsg(0xffffffffffffffff, 0x0, 0x4824) socket$phonet_pipe(0x23, 0x5, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x8, 0x0, 0x0, 0x71129, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x2, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100810, 0x0, 0x100, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x328e4570b4ee5f2d}, 0x14) recvmsg(r6, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x60) sendmsg$nl_generic(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x20}, 0x1, 0x0, 0x0, 0x400c801}, 0x4008094) socket$kcm(0x10, 0x2, 0x10) socket$nl_rdma(0x10, 0x3, 0x14) 213.003597ms ago: executing program 3 (id=4017): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00"/11], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x3, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000008000000000000000200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000004000000850000008600000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @sched_cls=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000900)="928e04b416cac951c35f7f4586e6", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 177.802188ms ago: executing program 4 (id=4018): bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1206"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x65, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x42000, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x4010744d, &(0x7f0000000180)) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1b, 0x0, 0x3ff, 0x8003, 0x4}, 0x50) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000000)={0x2, 0x0, [0x0, 0x0]}) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="050000000f00000040000000400000d17052ee0041000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/13], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), 0x1003, r3}, 0x38) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000b80)={r3, &(0x7f00000014c0), &(0x7f0000000100)=""/31}, 0x20) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xb0}, 0x800) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100020, 0x12504, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0xa, 0x5, 0x0) getpid() socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x54}, 0x1, 0x0, 0x0, 0x34040017}, 0x80) 177.422858ms ago: executing program 6 (id=4019): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 124.173168ms ago: executing program 3 (id=4020): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000840)=ANY=[@ANYBLOB="58010000100013070000000000000000fc020000000000000000000000000001fe8000000000000000000000000000aa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac141417000000000000000000000000000004d533000000e000000100000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000220000000000000000000000000000000200000000000000000000005c001400636d616328616573290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000003509fe8fd57fd44aa5074c50bc700e530c001c00", @ANYRES32=0x0, @ANYBLOB], 0x158}}, 0x0) 123.587998ms ago: executing program 1 (id=4021): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 108.437929ms ago: executing program 6 (id=4022): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="7f7b353e77867e4605ff29b669134390e04874599cb75d726e261bb1903d58944cc025326a9b2db74d6adb2a7b1a571c6f9a", 0x32}], 0x1, 0x0, 0x0, 0x4004050}, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000180)={0x0, 0x3b, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000160a03020002000000000000020000000900020073797a30000000000900010073797a30000000002c00038008000140000000000800024000000000180003801400010073797a5f74756e00000000000000000014000000110001"], 0x80}}, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0xc8, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) 86.602249ms ago: executing program 3 (id=4023): socket$kcm(0x2, 0x1000000000000002, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xf, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1c, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x9, 0xc, 0x5, 0x0, 0x0, 0x3, 0x400, 0x6, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x12ab80, 0x8001}, 0x80, 0x400, 0x10, 0x0, 0x8, 0xa, 0x6, 0x0, 0x9000, 0x0, 0x100000001}, 0xffffffffffffffff, 0x9, r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'hsr0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8931, &(0x7f0000000080)) r4 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r4, 0x0, 0x8040) r5 = socket$kcm(0xa, 0x1, 0x0) r6 = socket$kcm(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000080000000200000000000000", @ANYRES32=r6], 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x8916, &(0x7f0000000000)={r6}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8936, &(0x7f0000000000)={r6}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x4, 0x80, 0xf9, 0x3, 0x0, 0x0, 0x0, 0x62af, 0x62f02, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x800, 0x1, @perf_bp={0x0, 0x4}, 0x110, 0xfffffffffffffff0, 0x4b2, 0x5, 0x1000, 0x5, 0x88cc, 0x0, 0x0, 0x0, 0x8000000000000001}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001340)=[{0x0}], 0x1, 0x0, 0x0, 0xc9e}, 0x8000) setsockopt$sock_attach_bpf(r0, 0x84, 0x24, 0x0, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="60040000170001002dbd7000fbdbdf2500000000000000000000000000000000000004d53c000000e0000001000000000000000000000000ffffffff0000000000000000000000002000000000000000b382df0dcd79119b4e2204000a0090a03a000000", @ANYBLOB="a2922518e42e1371638b8ffa07433ebb118412808d7fb9ef0e3e6dcae6b388840c8b38781823fd0543d77eb002ff2999e06c830bfaf503b6dff9cc3cd405a947353ac49f43c49e11dbf7bd45d8ddcc09f0c4908c55291a2d"], 0x460}}, 0x844) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x6, 0x8}, 0x50) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000e00000000000000000000297f1500", @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 84.075179ms ago: executing program 4 (id=4024): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x3, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x4f}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x73}}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x8}, 0xa4) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 44.487479ms ago: executing program 6 (id=4025): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b80)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x6}]}]}, @NFT_MSG_DELFLOWTABLE={0x2c, 0x18, 0xa, 0x101, 0xb00, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8, 0x1, 0x1, 0x0, 0x6000000}]}]}], {0x14, 0x10}}, 0xb4}}, 0x0) 248.81µs ago: executing program 1 (id=4026): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000500)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWRULE={0x48, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_EXPRESSIONS={0x1c, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @synproxy={{0xd}, @val={0x4}}}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x24044010) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x85}, 0x9}, 0x80, 0x0}, 0x0) 0s ago: executing program 4 (id=4027): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000040)="a72d11a15c048c0a7d63aebc5cea1f815108f6091475aeec600831aa9d3944e60bc2ad06a619c560aa0118b28f68f1eb14549d633b4b23f179fb680716faa43414787559be90843c35ab30acad8a6740140e00721abc2eb362f7bde53b3c992d3e28ccc20ec84fdc569947047f6c09a647ee8c0a747b951e66c068ccf1af93ee9e6f9528ff79e2f989383b05a690a6bec4634b867c9446c1c644b3010e8a3514c6328323b4bbdd602b8f0dace6aea70902c4ddd2a2f2810f1348b0d0df3c1e6a5938fcfdc87e7580c6be0c6a06eca62d6f787dd16add086a21391c4c707d8b61929d1252681b84c245e0efafe2e6e73ad86a3cf59235ab0eacbb414af92ec3cdac420a064a98e8cc18bdf63f8997f96436e0fe6f06fdbf47fff353b01a861babd4a38d126bfe3e29049e6cc883e6efae6e70ef9ed124b1b09887a58c991e223b6420dca5ae238027e91b17b1707dc5c0d5f59f0ca95614f1ea1d263c1ee54dfe31ae35eb3c8e3b931dff7920c57fbba89adf2e392c1ad719b90c7ade0d38ff9792934ef1fb12f51d8e2fad12486d5883d5b1a46696fad128c6805cfb25bc6487e1e407d6b266971b09d0d864a7a550284e24b6cdc9f4ae1081a638175dffef002c76ac5558d23e41edbe68f4b4950a13aa000326dae5a857603dc5a40d6c6618a98c7b6e1eebd325ea2c14601a25658965f40864fd015d9b2fff83ee5ed3212ebd9fa429f0140f633556ac07c0c08e67a1848c9942ecc47dd4ffede9a429e9e0472be7cdbcd117e621ddf745c00a814ffff0224634472577dc0b35a9c153409f1a2bddc193b20b4d244d9cbbd59816c46000c596865f58b4e640ed4a9ab6086cede697fb113560925498da83273e67", 0x26f}], 0x1}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000500)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWRULE={0x48, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_EXPRESSIONS={0x1c, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @synproxy={{0xd}, @val={0x4}}}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x24044010) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f00000002c0)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x2940000, @mcast1, 0x9}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000780)="f4000900062b2c25fe80000000000000dc8b850f238466ccfe807a000000ad6e911b51818462b4002f00", 0x2a}], 0x1}, 0x0) kernel console output (not intermixed with test programs): r permissive=1 [ 124.223192][ T6697] loop4: p3 start 201326592 is beyond EOD, truncated [ 124.243769][ T6697] loop4: p4 size 33554432 extends beyond EOD, truncated [ 124.275221][ T6718] validate_nla: 2 callbacks suppressed [ 124.275236][ T6718] netlink: 'syz.3.1279': attribute type 10 has an invalid length. [ 124.326349][ T3021] 8021q: adding VLAN 0 to HW filter on device eth1 [ 124.380050][ T30] hsr_slave_0: left promiscuous mode [ 124.394179][ T30] hsr_slave_1: left promiscuous mode [ 124.400890][ T30] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 124.408416][ T30] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 124.422229][ T30] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 124.431181][ T30] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 124.449242][ T30] veth1_macvtap: left promiscuous mode [ 124.455023][ T30] veth0_macvtap: left promiscuous mode [ 124.539574][ T30] team0 (unregistering): Port device team_slave_1 removed [ 124.549655][ T30] team0 (unregistering): Port device team_slave_0 removed [ 124.647745][ T28] audit: type=1400 audit(1778030574.761:452): avc: denied { read append } for pid=6722 comm="syz.3.1281" name="cgroup.controllers" dev="cgroup2" ino=323 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 124.717465][ T28] audit: type=1400 audit(1778030574.761:453): avc: denied { open } for pid=6722 comm="syz.3.1281" path="" dev="cgroup2" ino=323 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 124.779879][ T6738] loop2: detected capacity change from 0 to 512 [ 124.780847][ T6641] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 124.789309][ T28] audit: type=1400 audit(1778030574.761:454): avc: denied { write } for pid=6722 comm="syz.3.1281" name="cgroup.controllers" dev="cgroup2" ino=323 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 124.825728][ T6738] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 124.839841][ T6641] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 124.854765][ T6738] EXT4-fs error (device loop2): ext4_orphan_get:1423: comm syz.2.1286: bad orphan inode 131083 [ 124.866496][ T6738] loop2: lost filesystem error report for type 5 error -117 [ 124.870377][ T6738] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 124.901223][ T6641] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 124.928447][ T6641] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 124.990228][ T6641] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 125.000915][ T28] audit: type=1400 audit(1778030575.111:455): avc: denied { write } for pid=6736 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 125.026561][ T6641] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 125.035934][ T3303] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 125.051882][ T6641] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 125.078209][ T28] audit: type=1400 audit(1778030575.191:456): avc: denied { write } for pid=6757 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 125.078955][ T6641] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 125.154129][ T3021] 8021q: adding VLAN 0 to HW filter on device eth2 [ 125.172281][ T6759] netlink: 'syz.2.1290': attribute type 10 has an invalid length. [ 125.191685][ T6763] loop1: detected capacity change from 0 to 512 [ 125.220731][ T6759] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.228267][ T6759] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.245728][ T6763] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 125.303369][ T6763] ext4 filesystem being mounted at /313/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 125.373071][ T6641] 8021q: adding VLAN 0 to HW filter on device bond0 [ 125.421023][ T6641] 8021q: adding VLAN 0 to HW filter on device team0 [ 125.436147][ T3297] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 125.461166][ T1689] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.468285][ T1689] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.491195][ T28] audit: type=1400 audit(1778030575.601:457): avc: denied { write } for pid=6777 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 125.523694][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.530823][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.643089][ T3021] 8021q: adding VLAN 0 to HW filter on device eth3 [ 125.660513][ T6791] netlink: 'syz.2.1296': attribute type 21 has an invalid length. [ 125.686348][ T6791] netlink: 'syz.2.1296': attribute type 6 has an invalid length. [ 125.707217][ T6791] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1296'. [ 125.799235][ T6641] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 125.946613][ T3021] 8021q: adding VLAN 0 to HW filter on device eth4 [ 126.042615][ T6641] veth0_vlan: entered promiscuous mode [ 126.060293][ T6641] veth1_vlan: entered promiscuous mode [ 126.088193][ T6641] veth0_macvtap: entered promiscuous mode [ 126.096499][ T6641] veth1_macvtap: entered promiscuous mode [ 126.107629][ T6641] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 126.119182][ T6641] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 126.129506][ T30] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.160889][ T30] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.183773][ T30] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.220480][ T30] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.245270][ T6846] loop2: detected capacity change from 0 to 128 [ 126.270614][ T6846] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 126.298592][ T6846] FAT-fs (loop2): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 126.337241][ T6852] loop5: detected capacity change from 0 to 512 [ 126.386407][ T6852] EXT4-fs (loop5): 1 truncate cleaned up [ 126.404931][ T6852] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 126.586267][ T6641] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 126.642116][ T6867] netlink: 'syz.2.1307': attribute type 2 has an invalid length. [ 126.680040][ T6873] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 126.761510][ T6880] loop3: detected capacity change from 0 to 128 [ 126.779851][ T6880] FAT-fs (loop3): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 126.828313][ T6880] FAT-fs (loop3): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 126.859074][ T6880] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 126.874603][ T6880] FAT-fs (loop3): Filesystem has been set read-only [ 126.941930][ T6884] loop3: detected capacity change from 0 to 512 [ 126.950688][ T6884] EXT4-fs: Ignoring removed bh option [ 126.957333][ T6884] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 126.970814][ T6884] EXT4-fs error (device loop3): ext4_iget_extra_inode:5128: inode #15: comm syz.3.1312: corrupted in-inode xattr: e_value size too large [ 126.995835][ T6884] loop3: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 126.996117][ T6884] EXT4-fs error (device loop3): ext4_orphan_get:1402: comm syz.3.1312: couldn't read orphan inode 15 (err -117) [ 127.005377][ C1] EXT4-fs (loop3): error count since last fsck: 1 [ 127.005393][ C1] EXT4-fs (loop3): initial error at time 1778030577: ext4_iget_extra_inode:5128: inode 15 [ 127.005427][ C1] EXT4-fs (loop3): last error at time 1778030577: ext4_iget_extra_inode:5128: inode 15 [ 127.071782][ T6884] loop3: lost filesystem error report for type 5 error -117 [ 127.074300][ T6884] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 127.674390][ T6902] loop5: detected capacity change from 0 to 512 [ 127.689224][ T6902] FAT-fs (loop5): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 127.885198][ T3298] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 127.900841][ T6915] FAT-fs (loop5): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 127.928875][ T6915] FAT-fs (loop5): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 127.949815][ T6917] netlink: 'syz.1.1324': attribute type 3 has an invalid length. [ 127.964829][ T6915] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 127.987197][ T6915] FAT-fs (loop5): Filesystem has been set read-only [ 127.995433][ T6917] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.1324'. [ 128.071703][ T6929] FAT-fs (loop5): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 128.116511][ T6931] netlink: 'syz.1.1330': attribute type 10 has an invalid length. [ 128.130227][ T6931] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 128.230844][ T6935] netlink: 'syz.4.1331': attribute type 21 has an invalid length. [ 128.250968][ T6935] netlink: 'syz.4.1331': attribute type 6 has an invalid length. [ 128.259458][ T6935] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1331'. [ 128.269941][ T6931] bond0: entered promiscuous mode [ 128.275373][ T6931] bond_slave_0: entered promiscuous mode [ 128.281425][ T6931] bond_slave_1: entered promiscuous mode [ 128.287700][ T6931] dummy0: entered promiscuous mode [ 128.293292][ T6931] bond0: entered allmulticast mode [ 128.299150][ T6931] bond_slave_0: entered allmulticast mode [ 128.305206][ T6931] bond_slave_1: entered allmulticast mode [ 128.311007][ T6931] dummy0: entered allmulticast mode [ 128.510279][ T6964] set_capacity_and_notify: 2 callbacks suppressed [ 128.510299][ T6964] loop5: detected capacity change from 0 to 128 [ 128.588187][ T6972] netlink: 'syz.3.1349': attribute type 16 has an invalid length. [ 128.604736][ T6972] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1349'. [ 128.718865][ T6984] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1351'. [ 128.839918][ T7002] loop4: detected capacity change from 0 to 128 [ 128.930154][ T7011] loop4: detected capacity change from 0 to 128 [ 128.947964][ T7011] FAT-fs (loop4): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 128.989752][ T7011] FAT-fs (loop4): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 129.161748][ T7024] netlink: 132 bytes leftover after parsing attributes in process `syz.5.1370'. [ 130.289474][ T7050] loop2: detected capacity change from 0 to 128 [ 130.296366][ T7050] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 130.309189][ T7050] FAT-fs (loop2): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 130.392085][ T7064] loop2: detected capacity change from 0 to 128 [ 130.399335][ T7064] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 130.413176][ T7064] FAT-fs (loop2): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 130.427468][ T7064] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 130.447511][ T7064] FAT-fs (loop2): Filesystem has been set read-only [ 130.625214][ T7079] validate_nla: 4 callbacks suppressed [ 130.625234][ T7079] netlink: 'syz.1.1393': attribute type 21 has an invalid length. [ 130.639402][ T7079] netlink: 'syz.1.1393': attribute type 6 has an invalid length. [ 130.647327][ T7079] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1393'. [ 131.714350][ T7090] loop1: detected capacity change from 0 to 128 [ 131.733581][ T7090] FAT-fs (loop1): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 131.764076][ T7090] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 131.821091][ T7098] loop4: detected capacity change from 0 to 128 [ 131.828683][ T7098] FAT-fs (loop4): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 131.874851][ T7098] FAT-fs (loop4): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 131.897508][ T7098] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 131.907064][ T7098] FAT-fs (loop4): Filesystem has been set read-only [ 133.262982][ T7130] loop5: detected capacity change from 0 to 128 [ 133.312457][ T7136] loop1: detected capacity change from 0 to 128 [ 133.331076][ T7136] FAT-fs (loop1): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 133.344370][ T7136] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 133.370195][ T7136] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 133.379239][ T7136] FAT-fs (loop1): Filesystem has been set read-only [ 134.663254][ T7167] netlink: 'syz.1.1429': attribute type 10 has an invalid length. [ 134.689517][ T7170] loop4: detected capacity change from 0 to 128 [ 134.700518][ T7170] FAT-fs (loop4): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 134.718820][ T7170] FAT-fs (loop4): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 134.761557][ T7167] team0: Port device veth0 added [ 134.826083][ T7167] syz.1.1429 (7167) used greatest stack depth: 9344 bytes left [ 134.868347][ T7185] netlink: 'syz.5.1432': attribute type 10 has an invalid length. [ 134.885324][ T7185] netlink: 2 bytes leftover after parsing attributes in process `syz.5.1432'. [ 134.904323][ T7185] veth1_virt_wifi: entered promiscuous mode [ 134.910710][ T7185] bridge0: port 3(veth1_virt_wifi) entered blocking state [ 134.919855][ T7185] bridge0: port 3(veth1_virt_wifi) entered disabled state [ 134.928584][ T7185] veth1_virt_wifi: entered allmulticast mode [ 134.935907][ T7185] bridge0: port 3(veth1_virt_wifi) entered blocking state [ 134.943100][ T7185] bridge0: port 3(veth1_virt_wifi) entered forwarding state [ 134.952090][ T7188] netlink: 'syz.4.1435': attribute type 10 has an invalid length. [ 134.966553][ T7188] team0: Port device veth1_to_hsr added [ 135.140589][ T7202] loop4: detected capacity change from 0 to 128 [ 135.157141][ T7202] FAT-fs (loop4): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 135.181695][ T7202] FAT-fs (loop4): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 135.349397][ T7222] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 135.427139][ T7222] loop3: detected capacity change from 0 to 8192 [ 135.464952][ T7222] loop3: p1 < > p3 p4 [ 135.472912][ T7222] loop3: p3 start 201326592 is beyond EOD, truncated [ 135.479725][ T7222] loop3: p4 size 33554432 extends beyond EOD, truncated [ 135.510028][ T2982] loop3: p1 < > p3 p4 [ 135.530005][ T2982] loop3: p3 start 201326592 is beyond EOD, truncated [ 135.581631][ T2982] loop3: p4 size 33554432 extends beyond EOD, truncated [ 135.648515][ T7229] netlink: 'syz.4.1449': attribute type 6 has an invalid length. [ 135.729023][ T7231] IPv6: Can't replace route, no match found [ 135.754835][ T7229] netlink: 140 bytes leftover after parsing attributes in process `syz.4.1449'. [ 136.382826][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 136.382842][ T28] audit: type=1400 audit(1778030586.491:469): avc: denied { write } for pid=7233 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 136.448651][ T28] audit: type=1400 audit(1778030586.561:470): avc: denied { write } for pid=7255 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 136.852432][ T7269] loop1: detected capacity change from 0 to 128 [ 136.859300][ T7269] FAT-fs (loop1): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 136.871499][ T7269] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 136.944901][ T7275] loop1: detected capacity change from 0 to 128 [ 137.160519][ T7302] loop4: detected capacity change from 0 to 128 [ 137.185267][ T7302] FAT-fs (loop4): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 137.228084][ T7302] FAT-fs (loop4): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 137.240502][ T7302] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 137.243200][ T28] audit: type=1400 audit(1778030587.351:471): avc: denied { write } for pid=7282 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 137.256868][ T7302] FAT-fs (loop4): Filesystem has been set read-only [ 137.328056][ T28] audit: type=1400 audit(1778030587.431:472): avc: denied { write } for pid=7312 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 137.404637][ T7320] loop1: detected capacity change from 0 to 128 [ 137.477806][ T7325] netlink: 10 bytes leftover after parsing attributes in process `syz.3.1477'. [ 137.532044][ T7325] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 137.637809][ T7325] netlink: 'syz.3.1477': attribute type 10 has an invalid length. [ 137.672657][ T7338] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 137.748701][ T7338] loop5: detected capacity change from 0 to 8192 [ 137.792000][ T7325] 8021q: adding VLAN 0 to HW filter on device team0 [ 137.799546][ T7338] loop5: p1 < > p3 p4 [ 137.804331][ T7338] loop5: p3 start 201326592 is beyond EOD, truncated [ 137.811069][ T7338] loop5: p4 size 33554432 extends beyond EOD, truncated [ 137.939371][ T7325] bond0: (slave team0): Enslaving as an active interface with an up link [ 138.097709][ T7349] loop4: detected capacity change from 0 to 128 [ 138.133287][ T7349] FAT-fs (loop4): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 138.182035][ T7349] FAT-fs (loop4): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 138.204004][ T7349] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 138.222879][ T7349] FAT-fs (loop4): Filesystem has been set read-only [ 138.552554][ T28] audit: type=1400 audit(1778030588.661:473): avc: denied { write } for pid=7321 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 138.640572][ T7325] syz.3.1477 (7325) used greatest stack depth: 9280 bytes left [ 138.656025][ T28] audit: type=1400 audit(1778030588.711:474): avc: denied { write } for pid=7363 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 138.695427][ T7367] loop3: detected capacity change from 0 to 128 [ 139.088583][ T28] audit: type=1400 audit(1778030589.201:475): avc: denied { write } for pid=7388 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 139.122847][ T7401] netlink: 'syz.2.1496': attribute type 39 has an invalid length. [ 139.159555][ T28] audit: type=1400 audit(1778030589.271:476): avc: denied { write } for pid=7404 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 139.323843][ T7419] EXT4-fs: Ignoring removed bh option [ 139.358546][ T7419] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-001000000000 r/w without journal. Quota mode: writeback. [ 139.383197][ T28] audit: type=1400 audit(1778030589.491:477): avc: denied { write } for pid=7417 comm="syz.2.1500" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 139.430872][ T7426] netlink: 'syz.4.1501': attribute type 6 has an invalid length. [ 139.473531][ T7426] netlink: 140 bytes leftover after parsing attributes in process `syz.4.1501'. [ 139.516340][ T7428] IPv6: Can't replace route, no match found [ 140.076465][ T3303] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-001000000000. [ 140.284246][ T7440] netlink: 1047 bytes leftover after parsing attributes in process `syz.2.1508'. [ 140.410205][ T7456] netlink: 'syz.5.1512': attribute type 10 has an invalid length. [ 140.741481][ T7484] netlink: 16186 bytes leftover after parsing attributes in process `syz.1.1523'. [ 140.843182][ T7489] netlink: 'syz.2.1524': attribute type 10 has an invalid length. [ 140.856777][ T7489] netlink: 2 bytes leftover after parsing attributes in process `syz.2.1524'. [ 140.873810][ T7489] veth1_virt_wifi: entered promiscuous mode [ 140.880985][ T7489] bridge0: port 3(veth1_virt_wifi) entered blocking state [ 140.888827][ T7489] bridge0: port 3(veth1_virt_wifi) entered disabled state [ 140.897132][ T7489] veth1_virt_wifi: entered allmulticast mode [ 140.973784][ T7497] set_capacity_and_notify: 1 callbacks suppressed [ 140.973802][ T7497] loop2: detected capacity change from 0 to 1024 [ 140.987232][ T7497] EXT4-fs: Ignoring removed bh option [ 140.998701][ T7497] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-001000000000 r/w without journal. Quota mode: writeback. [ 141.012949][ T28] audit: type=1400 audit(1778030591.121:478): avc: denied { write } for pid=7496 comm="syz.2.1528" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 141.048809][ T3303] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-001000000000. [ 141.262571][ T7525] loop3: detected capacity change from 0 to 1024 [ 141.272926][ T7525] EXT4-fs: Ignoring removed bh option [ 141.300074][ T7525] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 141.341904][ T3298] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 141.404185][ T7531] loop3: detected capacity change from 0 to 1024 [ 141.412269][ T7531] EXT4-fs: Ignoring removed bh option [ 141.445996][ T7531] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-001000000000 r/w without journal. Quota mode: writeback. [ 141.460645][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 141.460662][ T28] audit: type=1400 audit(1778030591.571:480): avc: denied { write } for pid=7530 comm="syz.3.1540" name="/" dev="loop3" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 141.491304][ T3298] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-001000000000. [ 141.699855][ T7558] loop4: detected capacity change from 0 to 1024 [ 141.707187][ T7558] EXT4-fs: Ignoring removed bh option [ 141.716895][ T7558] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 141.734386][ T28] audit: type=1400 audit(1778030591.851:481): avc: denied { write } for pid=7557 comm="syz.4.1550" name="/" dev="loop4" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 141.765409][ T3304] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 141.967453][ T7583] netlink: 128124 bytes leftover after parsing attributes in process `syz.1.1559'. [ 142.058765][ T7589] netlink: 'syz.1.1563': attribute type 21 has an invalid length. [ 142.070834][ T7589] IPv6: NLM_F_CREATE should be specified when creating new route [ 142.079641][ T7589] IPv6: Can't replace route, no match found [ 142.368932][ T7624] netlink: 65051 bytes leftover after parsing attributes in process `syz.1.1578'. [ 142.696166][ T7662] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 143.132139][ T7703] netlink: 'syz.2.1614': attribute type 6 has an invalid length. [ 143.140157][ T7703] netlink: 156 bytes leftover after parsing attributes in process `syz.2.1614'. [ 143.295502][ T7697] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 143.302860][ T7697] IPv6: NLM_F_CREATE should be set when creating new route [ 143.310184][ T7697] IPv6: NLM_F_CREATE should be set when creating new route [ 143.317532][ T7697] IPv6: NLM_F_CREATE should be set when creating new route [ 143.452963][ T7724] netlink: 128124 bytes leftover after parsing attributes in process `syz.4.1624'. [ 143.517003][ T7738] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.1629'. [ 143.532864][ T7736] netlink: 'syz.5.1628': attribute type 10 has an invalid length. [ 143.568386][ T7742] netlink: 'syz.4.1630': attribute type 10 has an invalid length. [ 143.599307][ T7736] team0: Port device veth1_to_hsr added [ 143.615585][ T7742] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 143.674794][ T7742] bond0: entered promiscuous mode [ 143.690879][ T7742] bond_slave_0: entered promiscuous mode [ 143.701019][ T7736] syz.5.1628 (7736) used greatest stack depth: 8896 bytes left [ 143.713930][ T7742] bond_slave_1: entered promiscuous mode [ 143.724293][ T7742] dummy0: entered promiscuous mode [ 143.737296][ T7742] bond0: entered allmulticast mode [ 143.752011][ T7742] bond_slave_0: entered allmulticast mode [ 143.770224][ T7742] bond_slave_1: entered allmulticast mode [ 143.782302][ T7742] dummy0: entered allmulticast mode [ 143.902209][ T7763] netlink: 128124 bytes leftover after parsing attributes in process `syz.3.1640'. [ 143.998013][ T7762] netlink: 'syz.1.1639': attribute type 10 has an invalid length. [ 144.318105][ T7786] netlink: 'syz.4.1649': attribute type 39 has an invalid length. [ 144.744869][ T7813] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 145.130277][ T7824] syzkaller0: entered promiscuous mode [ 145.143826][ T7820] loop1: detected capacity change from 0 to 8192 [ 145.168259][ T7824] syzkaller0: entered allmulticast mode [ 145.208484][ T7820] loop1: p1 < > p3 p4 [ 145.236183][ T7820] loop1: p3 start 201326592 is beyond EOD, truncated [ 145.291843][ T7820] loop1: p4 size 33554432 extends beyond EOD, truncated [ 145.550850][ T7863] netlink: 'syz.2.1680': attribute type 7 has an invalid length. [ 145.569035][ T7863] netlink: 'syz.2.1680': attribute type 6 has an invalid length. [ 146.064804][ T7884] netlink: 'syz.4.1689': attribute type 2 has an invalid length. [ 146.083120][ T7884] netlink: 'syz.4.1689': attribute type 8 has an invalid length. [ 146.111842][ T7884] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1689'. [ 146.118158][ T7886] netlink: 'syz.4.1689': attribute type 2 has an invalid length. [ 146.149929][ T7886] netlink: 'syz.4.1689': attribute type 8 has an invalid length. [ 146.170747][ T7886] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1689'. [ 146.380076][ T7894] C: renamed from veth1_to_team (while UP) [ 146.419660][ T7894] netlink: 'syz.4.1693': attribute type 3 has an invalid length. [ 146.444745][ T7894] netlink: 148 bytes leftover after parsing attributes in process `syz.4.1693'. [ 146.464666][ T28] audit: type=1400 audit(1778030596.571:482): avc: denied { create } for pid=7893 comm="syz.4.1693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 147.235464][ T7935] netlink: 'syz.3.1710': attribute type 28 has an invalid length. [ 147.258835][ T7935] netlink: 'syz.3.1710': attribute type 29 has an invalid length. [ 147.283017][ T7935] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1710'. [ 148.128699][ T7999] netlink: 'syz.1.1740': attribute type 10 has an invalid length. [ 148.167215][ T7999] team0: Port device veth1_to_hsr added [ 148.312601][ T8019] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 148.370909][ T8018] netlink: 'syz.1.1748': attribute type 10 has an invalid length. [ 148.533591][ T8019] loop5: detected capacity change from 0 to 8192 [ 148.584965][ T8019] loop5: p1 < > p3 p4 [ 148.612232][ T8019] loop5: p3 start 201326592 is beyond EOD, truncated [ 148.626180][ T8019] loop5: p4 size 33554432 extends beyond EOD, truncated [ 149.287335][ T8070] netlink: 'syz.3.1770': attribute type 10 has an invalid length. [ 149.307687][ T8070] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 149.332794][ T8070] bond0: entered promiscuous mode [ 149.338517][ T8070] bond_slave_0: entered promiscuous mode [ 149.344824][ T8070] bond_slave_1: entered promiscuous mode [ 149.350954][ T8070] team0: entered promiscuous mode [ 149.356581][ T8070] team_slave_0: entered promiscuous mode [ 149.362556][ T8070] team_slave_1: entered promiscuous mode [ 149.369286][ T8070] dummy0: entered promiscuous mode [ 149.375136][ T8070] bond0: entered allmulticast mode [ 149.380526][ T8070] bond_slave_0: entered allmulticast mode [ 149.386757][ T8070] bond_slave_1: entered allmulticast mode [ 149.392693][ T8070] team0: entered allmulticast mode [ 149.398544][ T8070] team_slave_0: entered allmulticast mode [ 149.404695][ T8070] team_slave_1: entered allmulticast mode [ 149.410763][ T8070] dummy0: entered allmulticast mode [ 149.696908][ T8089] sit0: entered allmulticast mode [ 149.731586][ T8091] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1780'. [ 149.741624][ T8089] sit0: entered promiscuous mode [ 150.423085][ T8146] netlink: 128124 bytes leftover after parsing attributes in process `syz.1.1806'. [ 151.118217][ T8166] vlan1: entered promiscuous mode [ 151.132330][ T8166] vlan1: entered allmulticast mode [ 151.138491][ T8166] veth0_vlan: entered allmulticast mode [ 151.213607][ T8166] team0: Port device vlan1 added [ 151.225931][ T8166] syz.3.1814 (8166) used greatest stack depth: 8720 bytes left [ 151.353847][ T8199] syzkaller0: entered promiscuous mode [ 151.364985][ T8199] syzkaller0: entered allmulticast mode [ 151.608943][ T8213] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 151.766871][ T8213] loop2: detected capacity change from 0 to 8192 [ 151.808348][ T8213] loop2: p1 < > p3 p4 [ 151.813961][ T8213] loop2: p3 start 201326592 is beyond EOD, truncated [ 151.820813][ T8213] loop2: p4 size 33554432 extends beyond EOD, truncated [ 151.841479][ T2982] loop2: p1 < > p3 p4 [ 151.916124][ T2982] loop2: p3 start 201326592 is beyond EOD, truncated [ 151.957526][ T2982] loop2: p4 size 33554432 extends beyond EOD, truncated [ 152.116235][ T8221] validate_nla: 3 callbacks suppressed [ 152.116250][ T8221] netlink: 'syz.5.1835': attribute type 10 has an invalid length. [ 152.272821][ T8221] team0: Port device vlan1 added [ 152.664411][ T8244] netlink: 1047 bytes leftover after parsing attributes in process `syz.5.1842'. [ 152.674517][ T8244] veth0_to_bond: entered promiscuous mode [ 152.881476][ T8251] netlink: 'syz.3.1845': attribute type 10 has an invalid length. [ 153.604496][ T8309] netlink: 'syz.4.1872': attribute type 28 has an invalid length. [ 153.616552][ T8309] netlink: 'syz.4.1872': attribute type 29 has an invalid length. [ 153.633576][ T8309] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1872'. [ 154.902499][ T8417] pimreg0: tun_chr_ioctl cmd 35111 [ 155.069681][ T8427] netlink: 128124 bytes leftover after parsing attributes in process `syz.4.1923'. [ 155.211981][ T8457] netlink: 'syz.4.1932': attribute type 28 has an invalid length. [ 155.223710][ T8457] netlink: 'syz.4.1932': attribute type 29 has an invalid length. [ 155.233063][ T8457] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1932'. [ 155.458857][ T28] audit: type=1400 audit(1778030605.571:483): avc: denied { ioctl } for pid=8474 comm="syz.5.1942" path="mnt:[4026533235]" dev="nsfs" ino=4026533235 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 155.663171][ T8491] netlink: 'syz.1.1950': attribute type 21 has an invalid length. [ 155.687371][ T8491] netlink: 'syz.1.1950': attribute type 6 has an invalid length. [ 155.709725][ T8491] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1950'. [ 155.994189][ T8511] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.001503][ T8511] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.034580][ T8511] bridge0: entered allmulticast mode [ 156.069640][ T8511] bridge_slave_1: left allmulticast mode [ 156.085753][ T8511] bridge_slave_1: left promiscuous mode [ 156.098128][ T8511] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.120842][ T8511] bridge_slave_0: left allmulticast mode [ 156.130971][ T8511] bridge_slave_0: left promiscuous mode [ 156.145171][ T8511] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.276712][ T8525] netlink: 'syz.1.1964': attribute type 28 has an invalid length. [ 156.285685][ T8525] netlink: 'syz.1.1964': attribute type 29 has an invalid length. [ 156.293862][ T8525] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1964'. [ 156.406576][ T28] audit: type=1400 audit(1778030606.521:484): avc: denied { create } for pid=8529 comm="syz.3.1966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 156.473170][ T8540] sit0: left promiscuous mode [ 156.657034][ T8544] sit0: entered promiscuous mode [ 156.709746][ T8567] netlink: 132 bytes leftover after parsing attributes in process `syz.5.1980'. [ 156.886659][ T8587] netlink: 1047 bytes leftover after parsing attributes in process `syz.2.1989'. [ 157.219732][ T8625] netlink: 1047 bytes leftover after parsing attributes in process `syz.2.2007'. [ 157.379219][ T8644] validate_nla: 2 callbacks suppressed [ 157.379246][ T8644] netlink: 'syz.1.2017': attribute type 28 has an invalid length. [ 157.414283][ T8644] netlink: 'syz.1.2017': attribute type 29 has an invalid length. [ 157.434948][ T8644] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2017'. [ 157.680097][ T8682] sit0: entered allmulticast mode [ 157.712971][ T8682] sit0: entered promiscuous mode [ 157.755001][ T8687] netlink: 'syz.3.2037': attribute type 28 has an invalid length. [ 157.768667][ T8687] netlink: 'syz.3.2037': attribute type 29 has an invalid length. [ 157.786608][ T8687] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2037'. [ 157.810233][ T8693] netlink: 'syz.2.2039': attribute type 10 has an invalid length. [ 157.858687][ T8693] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 157.885236][ T8693] bond0: entered promiscuous mode [ 157.891594][ T8693] bond_slave_0: entered promiscuous mode [ 157.898223][ T8693] bond_slave_1: entered promiscuous mode [ 157.904117][ T8693] bridge0: entered promiscuous mode [ 157.910556][ T8693] dummy0: entered promiscuous mode [ 157.916061][ T8693] bond0: entered allmulticast mode [ 157.921217][ T8693] bond_slave_0: entered allmulticast mode [ 157.927380][ T8693] bond_slave_1: entered allmulticast mode [ 157.953080][ T8693] bridge0: entered allmulticast mode [ 157.973478][ T8693] dummy0: entered allmulticast mode [ 158.463396][ T8763] netlink: 'syz.1.2069': attribute type 28 has an invalid length. [ 158.479346][ T8763] netlink: 'syz.1.2069': attribute type 29 has an invalid length. [ 158.498781][ T8763] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2069'. [ 158.557454][ T8773] netlink: 'syz.2.2072': attribute type 10 has an invalid length. [ 159.463534][ T28] audit: type=1400 audit(1778030609.571:485): avc: denied { remount } for pid=8829 comm="syz.3.2096" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 159.542765][ T28] audit: type=1400 audit(1778030609.651:486): avc: denied { unmount } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 159.965881][ T28] audit: type=1400 audit(1778030610.081:487): avc: denied { create } for pid=8854 comm="syz.1.2108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 160.103791][ T28] audit: type=1400 audit(1778030610.211:488): avc: denied { create } for pid=8869 comm="syz.3.2114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 160.126773][ T28] audit: type=1400 audit(1778030610.241:489): avc: denied { write } for pid=8869 comm="syz.3.2114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 160.164750][ T28] audit: type=1400 audit(1778030610.241:490): avc: denied { nlmsg_write } for pid=8869 comm="syz.3.2114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 160.186596][ T28] audit: type=1400 audit(1778030610.261:491): avc: denied { mounton } for pid=8869 comm="syz.3.2114" path="/syzcgroup/unified/syz3/cgroup.procs" dev="cgroup2" ino=56 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=file permissive=1 [ 160.212590][ T28] audit: type=1400 audit(1778030610.271:492): avc: denied { mount } for pid=8869 comm="syz.3.2114" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 160.415181][ T8900] netlink: 24 bytes leftover after parsing attributes in process `syz.1.2128'. [ 160.448029][ T8902] netlink: 'syz.5.2129': attribute type 21 has an invalid length. [ 160.456128][ T8902] netlink: 'syz.5.2129': attribute type 6 has an invalid length. [ 160.465195][ T8902] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2129'. [ 160.529627][ T8910] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2132'. [ 160.693098][ T8929] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2141'. [ 160.703531][ T8931] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2143'. [ 160.799525][ T8933] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2144'. [ 160.941760][ T8952] netlink: 144 bytes leftover after parsing attributes in process `syz.3.2153'. [ 161.594025][ T9011] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2180'. [ 161.700300][ T28] audit: type=1400 audit(1778030611.811:493): avc: denied { nlmsg_read } for pid=9025 comm="syz.4.2186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 162.721067][ T9117] validate_nla: 17 callbacks suppressed [ 162.721681][ T9117] netlink: 'syz.4.2222': attribute type 10 has an invalid length. [ 162.832174][ T9136] netlink: 'syz.2.2230': attribute type 10 has an invalid length. [ 162.872220][ T9136] team0: Port device veth0 added [ 162.890727][ T9140] __nla_validate_parse: 5 callbacks suppressed [ 162.890757][ T9140] netlink: 128124 bytes leftover after parsing attributes in process `syz.3.2231'. [ 163.184402][ T9145] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.2234'. [ 163.251392][ T28] audit: type=1400 audit(1778030613.361:494): avc: denied { read } for pid=9152 comm="syz.2.2237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 163.301946][ T28] audit: type=1400 audit(1778030613.411:495): avc: denied { write } for pid=9152 comm="syz.2.2237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 163.698391][ T9194] netlink: 'syz.4.2256': attribute type 1 has an invalid length. [ 163.716819][ T9194] netlink: 'syz.4.2256': attribute type 2 has an invalid length. [ 163.722519][ T9196] netlink: 156 bytes leftover after parsing attributes in process `syz.1.2257'. [ 163.883582][ T9202] netlink: 128124 bytes leftover after parsing attributes in process `syz.4.2260'. [ 163.908271][ T28] audit: type=1400 audit(1778030614.021:496): avc: denied { setopt } for pid=9216 comm="syz.3.2265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 164.053673][ T9229] netlink: 'syz.5.2271': attribute type 1 has an invalid length. [ 164.062005][ T9229] netlink: 'syz.5.2271': attribute type 2 has an invalid length. [ 164.251126][ T9245] netlink: 128124 bytes leftover after parsing attributes in process `syz.5.2278'. [ 164.411383][ T9270] netlink: 'syz.2.2290': attribute type 10 has an invalid length. [ 164.523530][ T9286] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 164.533134][ T9286] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 164.542293][ T9286] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 164.551454][ T9286] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 164.560729][ T9286] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 164.569945][ T9286] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 164.579123][ T9286] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 164.588377][ T9286] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 164.597541][ T9286] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 164.606683][ T9286] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 164.861528][ T9290] netlink: 'syz.5.2299': attribute type 1 has an invalid length. [ 164.872594][ T9290] netlink: 'syz.5.2299': attribute type 2 has an invalid length. [ 164.937462][ T9300] netlink: 1047 bytes leftover after parsing attributes in process `syz.2.2304'. [ 164.976298][ T9305] netlink: 'syz.4.2306': attribute type 10 has an invalid length. [ 165.151588][ T9321] netlink: 128124 bytes leftover after parsing attributes in process `syz.4.2313'. [ 165.512048][ T9341] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 165.708287][ T9342] loop3: detected capacity change from 0 to 8192 [ 166.177735][ T9342] loop3: p1 < > p3 p4 [ 166.188956][ T9342] loop3: p3 start 201326592 is beyond EOD, truncated [ 166.211090][ T9342] loop3: p4 size 33554432 extends beyond EOD, truncated [ 166.897296][ T9409] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.2350'. [ 167.255030][ T9441] netlink: 9 bytes leftover after parsing attributes in process `syz.4.2364'. [ 167.380940][ T9450] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.2368'. [ 167.961584][ T9498] __nla_validate_parse: 2 callbacks suppressed [ 167.961631][ T9498] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2390'. [ 168.014291][ T9498] netlink: 8 bytes leftover after parsing attributes in process `syz.5.2390'. [ 168.295802][ T9518] validate_nla: 6 callbacks suppressed [ 168.295821][ T9518] netlink: 'syz.1.2400': attribute type 10 has an invalid length. [ 169.669613][ T9552] netlink: 'syz.2.2416': attribute type 10 has an invalid length. [ 169.828674][ T9560] netlink: 'syz.5.2419': attribute type 10 has an invalid length. [ 169.862158][ T9572] netlink: 128124 bytes leftover after parsing attributes in process `syz.1.2425'. [ 170.095848][ T28] audit: type=1400 audit(1778030620.211:497): avc: denied { nlmsg_read } for pid=9600 comm="syz.2.2436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 170.280245][ T9612] netlink: 'syz.1.2440': attribute type 10 has an invalid length. [ 170.510225][ T9639] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.2452'. [ 170.962378][ T9673] netlink: 1047 bytes leftover after parsing attributes in process `syz.5.2467'. [ 170.980912][ T9677] netlink: 'syz.2.2469': attribute type 1 has an invalid length. [ 170.991115][ T9677] netlink: 'syz.2.2469': attribute type 2 has an invalid length. [ 171.147849][ T9688] netlink: 128124 bytes leftover after parsing attributes in process `syz.5.2472'. [ 171.292613][ T9706] netlink: 'syz.3.2481': attribute type 21 has an invalid length. [ 171.305669][ T9706] netlink: 'syz.3.2481': attribute type 6 has an invalid length. [ 171.313906][ T9706] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2481'. [ 171.366492][ T9717] netlink: 'syz.5.2482': attribute type 10 has an invalid length. [ 171.541095][ T9733] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 171.615498][ T9733] loop2: detected capacity change from 0 to 8192 [ 171.675964][ T28] audit: type=1400 audit(1778030621.781:498): avc: denied { write } for pid=9724 comm="syz.5.2487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 171.888100][ T9733] loop2: p1 < > p3 p4 [ 171.892909][ T9733] loop2: p3 start 201326592 is beyond EOD, truncated [ 171.899705][ T9733] loop2: p4 size 33554432 extends beyond EOD, truncated [ 172.010295][ T9749] netlink: 'syz.5.2495': attribute type 21 has an invalid length. [ 172.050588][ T9749] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2495'. [ 172.782777][ T9780] netlink: 124 bytes leftover after parsing attributes in process `syz.1.2506'. [ 172.982216][ T9787] netlink: 128124 bytes leftover after parsing attributes in process `syz.2.2508'. [ 174.423872][ T9830] netlink: 128124 bytes leftover after parsing attributes in process `syz.4.2527'. [ 174.453973][ T9838] netlink: 236 bytes leftover after parsing attributes in process `syz.1.2526'. [ 174.498682][ T9849] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2532'. [ 174.595359][ T9863] netlink: 32 bytes leftover after parsing attributes in process `syz.4.2539'. [ 174.713728][ T9870] validate_nla: 2 callbacks suppressed [ 174.713754][ T9870] netlink: 'syz.2.2540': attribute type 21 has an invalid length. [ 174.728357][ T9870] netlink: 'syz.2.2540': attribute type 6 has an invalid length. [ 174.736546][ T9870] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2540'. [ 174.748100][ T9871] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.2541'. [ 175.880656][ T9897] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2554'. [ 176.117525][ T9928] netlink: 'syz.5.2551': attribute type 10 has an invalid length. [ 176.310817][ T9949] netlink: 'syz.4.2572': attribute type 21 has an invalid length. [ 176.322661][ T9949] netlink: 'syz.4.2572': attribute type 6 has an invalid length. [ 176.334600][ T9949] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2572'. [ 176.356946][ T4400] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 176.425894][ T4400] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 176.440033][ T9963] netlink: 128124 bytes leftover after parsing attributes in process `syz.4.2578'. [ 176.473474][ T4400] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 176.532577][ T4400] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 176.637478][ T9933] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.645421][ T9933] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.652623][ T9933] bridge_slave_0: entered allmulticast mode [ 176.660360][ T9933] bridge_slave_0: entered promiscuous mode [ 176.689254][ T9933] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.696698][ T9933] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.710371][ T9933] bridge_slave_1: entered allmulticast mode [ 176.718574][ T9933] bridge_slave_1: entered promiscuous mode [ 176.753759][ T4400] veth1_virt_wifi: left allmulticast mode [ 176.759808][ T4400] bridge0: port 3(veth1_virt_wifi) entered disabled state [ 176.767971][ T4400] bridge_slave_1: left allmulticast mode [ 176.780208][ T4400] bridge_slave_1: left promiscuous mode [ 176.796105][ T4400] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.821015][ T4400] bridge_slave_0: left allmulticast mode [ 176.838578][ T4400] bridge_slave_0: left promiscuous mode [ 176.856226][ T4400] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.046524][ T4400] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 177.056823][ T4400] bond_slave_0: left promiscuous mode [ 177.062423][ T4400] bond_slave_0: left allmulticast mode [ 177.069678][ T4400] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 177.078540][ T4400] bond_slave_1: left promiscuous mode [ 177.084151][ T4400] bond_slave_1: left allmulticast mode [ 177.091409][ T4400] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 177.099979][ T4400] dummy0: left promiscuous mode [ 177.105084][ T4400] dummy0: left allmulticast mode [ 177.110238][ T4400] bond0 (unregistering): Released all slaves [ 177.135566][ T9933] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 177.154811][ T9933] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 177.170739][ T4400] hsr_slave_0: left promiscuous mode [ 177.176912][ T4400] hsr_slave_1: left promiscuous mode [ 177.182590][ T4400] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 177.190215][ T4400] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 177.198069][ T4400] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 177.206781][ T4400] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 177.222702][ T4400] veth1_macvtap: left promiscuous mode [ 177.233541][ T4400] veth0_macvtap: left promiscuous mode [ 177.320967][ T4400] team0 (unregistering): Port device veth1_to_hsr removed [ 177.354330][ T4400] team0 (unregistering): Port device team_slave_1 removed [ 177.376384][ T4400] team0 (unregistering): Port device team_slave_0 removed [ 177.413499][ T4400] team0 (unregistering): Port device veth0 removed [ 177.449992][T10043] bond0: entered promiscuous mode [ 177.455897][T10043] bond_slave_0: entered promiscuous mode [ 177.461951][T10043] bond_slave_1: entered promiscuous mode [ 177.468348][T10043] bond0: entered allmulticast mode [ 177.473625][T10043] bond_slave_0: entered allmulticast mode [ 177.479865][T10043] bond_slave_1: entered allmulticast mode [ 177.492035][ T9933] team0: Port device team_slave_0 added [ 177.500779][ T9933] team0: Port device team_slave_1 added [ 177.532907][ T9933] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 177.543579][ T9933] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 177.582481][ T9933] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 177.605320][ T9933] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 177.613159][ T9933] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 177.645496][ T9933] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 177.712654][ T9933] hsr_slave_0: entered promiscuous mode [ 177.739059][ T28] audit: type=1400 audit(1778030627.851:499): avc: denied { write } for pid=10047 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 177.800386][ T28] audit: type=1400 audit(1778030627.891:500): avc: denied { write } for pid=10068 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 177.860366][ T9933] hsr_slave_1: entered promiscuous mode [ 177.867867][ T9933] debugfs: 'hsr0' already exists in 'hsr' [ 177.873617][ T9933] Cannot create hsr debugfs directory [ 177.900172][ T3021] 8021q: adding VLAN 0 to HW filter on device eth5 [ 178.014968][T10083] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 178.159228][T10083] loop4: detected capacity change from 0 to 8192 [ 178.195305][T10083] loop4: p1 < > p3 p4 [ 178.201206][T10083] loop4: p3 start 201326592 is beyond EOD, truncated [ 178.207972][T10083] loop4: p4 size 33554432 extends beyond EOD, truncated [ 178.237014][T10087] netlink: 'syz.2.2619': attribute type 16 has an invalid length. [ 178.309242][T10087] netlink: 'syz.2.2619': attribute type 3 has an invalid length. [ 178.324822][T10087] __nla_validate_parse: 2 callbacks suppressed [ 178.324880][T10087] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2619'. [ 178.735798][ T28] audit: type=1400 audit(1778030628.841:501): avc: denied { write } for pid=10093 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 178.783473][ T28] audit: type=1400 audit(1778030628.891:502): avc: denied { write } for pid=10106 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 178.928669][ T9933] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 178.945025][ T9933] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 178.959031][ T9933] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 178.975455][ T9933] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 178.985985][ T28] audit: type=1400 audit(1778030629.091:503): avc: denied { write } for pid=10109 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 179.013135][ T9933] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 179.031606][ T9933] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 179.046567][ T9933] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 179.059301][ T28] audit: type=1400 audit(1778030629.171:504): avc: denied { write } for pid=10120 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 179.087948][ T9933] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 179.164222][ T9933] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.185816][ T9933] 8021q: adding VLAN 0 to HW filter on device team0 [ 179.205180][ T3685] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.212287][ T3685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.238630][ T3685] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.245829][ T3685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.270970][ T28] audit: type=1400 audit(1778030629.381:505): avc: denied { write } for pid=10124 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 179.318696][ T9933] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 179.336702][ T28] audit: type=1400 audit(1778030629.451:506): avc: denied { write } for pid=10139 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 179.507709][ T9933] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 179.635501][T10162] netlink: 1047 bytes leftover after parsing attributes in process `syz.2.2625'. [ 179.766367][ T9933] veth0_vlan: entered promiscuous mode [ 179.806089][ T9933] veth1_vlan: entered promiscuous mode [ 179.849037][ T9933] veth0_macvtap: entered promiscuous mode [ 179.862561][ T9933] veth1_macvtap: entered promiscuous mode [ 179.879216][ T9933] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 179.887958][ T9933] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 179.907907][ T1689] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 179.919573][ T1689] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 179.934255][ T1689] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 179.953788][ T1689] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 180.031007][T10187] netlink: 'syz.5.2636': attribute type 21 has an invalid length. [ 180.048155][T10187] netlink: 'syz.5.2636': attribute type 6 has an invalid length. [ 180.060681][T10187] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2636'. [ 180.119404][T10206] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2644'. [ 180.152537][T10200] netlink: 1047 bytes leftover after parsing attributes in process `syz.2.2641'. [ 180.353882][T10235] netlink: 'syz.3.2656': attribute type 21 has an invalid length. [ 180.400543][T10237] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2657'. [ 181.596169][T10240] netlink: 'syz.3.2658': attribute type 21 has an invalid length. [ 181.612618][T10240] netlink: 'syz.3.2658': attribute type 6 has an invalid length. [ 181.629985][T10240] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2658'. [ 181.675954][ T28] audit: type=1400 audit(1778030631.791:507): avc: denied { write } for pid=10259 comm="syz.1.2668" path="socket:[30908]" dev="sockfs" ino=30908 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 181.705495][T10260] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2668'. [ 181.714644][T10260] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2668'. [ 181.728766][T10260] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2668'. [ 181.738271][T10260] net_ratelimit: 3319 callbacks suppressed [ 181.738302][T10260] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 181.764992][T10263] sch_tbf: burst 0 is lower than device bridge_slave_0 mtu (1514) ! [ 182.796186][T10307] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 182.899190][T10307] loop3: detected capacity change from 0 to 8192 [ 183.386360][T10307] loop3: p1 < > p3 p4 [ 183.403684][T10307] loop3: p3 start 201326592 is beyond EOD, truncated [ 183.429168][T10307] loop3: p4 size 33554432 extends beyond EOD, truncated [ 183.598202][T10323] __nla_validate_parse: 1 callbacks suppressed [ 183.598218][T10323] netlink: 128124 bytes leftover after parsing attributes in process `syz.5.2686'. [ 184.506005][T10345] netlink: 'syz.5.2701': attribute type 10 has an invalid length. [ 184.540096][T10352] netlink: 1047 bytes leftover after parsing attributes in process `syz.2.2703'. [ 186.545150][T10410] netlink: 'syz.3.2730': attribute type 10 has an invalid length. [ 186.840669][T10433] netlink: 128124 bytes leftover after parsing attributes in process `syz.3.2738'. [ 186.852941][T10440] netlink: 'syz.2.2741': attribute type 21 has an invalid length. [ 186.864667][T10440] netlink: 'syz.2.2741': attribute type 6 has an invalid length. [ 186.872711][T10440] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2741'. [ 186.898132][ T28] audit: type=1400 audit(1778030637.011:508): avc: denied { write } for pid=10432 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 186.956456][ T28] audit: type=1400 audit(1778030637.071:509): avc: denied { write } for pid=10466 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 187.152587][T10495] netlink: 32 bytes leftover after parsing attributes in process `syz.1.2756'. [ 187.166403][T10492] erspan0 speed is unknown, defaulting to 1000 [ 187.186877][T10492] erspan0 speed is unknown, defaulting to 1000 [ 187.208986][T10492] erspan0 speed is unknown, defaulting to 1000 [ 187.228866][T10492] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 187.252062][T10492] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 187.289954][T10492] erspan0 speed is unknown, defaulting to 1000 [ 187.296556][ T28] audit: type=1400 audit(1778030637.401:510): avc: denied { write } for pid=10485 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 187.325769][T10492] erspan0 speed is unknown, defaulting to 1000 [ 187.358839][T10492] erspan0 speed is unknown, defaulting to 1000 [ 187.359984][ T28] audit: type=1400 audit(1778030637.471:511): avc: denied { write } for pid=10520 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 187.385934][T10492] erspan0 speed is unknown, defaulting to 1000 [ 187.415908][T10512] erspan0 speed is unknown, defaulting to 1000 [ 187.426925][T10492] erspan0 speed is unknown, defaulting to 1000 [ 187.833088][T10568] netlink: 160 bytes leftover after parsing attributes in process `syz.4.2781'. [ 187.961970][T10579] netlink: 104 bytes leftover after parsing attributes in process `syz.3.2787'. [ 188.223083][T10600] netlink: 'syz.5.2792': attribute type 21 has an invalid length. [ 188.276675][T10600] netlink: 'syz.5.2792': attribute type 6 has an invalid length. [ 188.312852][T10600] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2792'. [ 188.343783][T10605] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=258 sclass=netlink_xfrm_socket pid=10605 comm=syz.3.2797 [ 188.626434][T10634] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.2811'. [ 188.666276][T10638] xt_socket: unknown flags 0x30 [ 189.044330][T10661] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 189.086641][T10661] erspan0 speed is unknown, defaulting to 1000 [ 189.191312][T10662] loop3: detected capacity change from 0 to 8192 [ 191.066058][T10662] loop3: p1 < > p3 p4 [ 191.079947][T10662] loop3: p3 start 201326592 is beyond EOD, truncated [ 191.095009][T10662] loop3: p4 size 33554432 extends beyond EOD, truncated [ 191.185680][ T28] audit: type=1400 audit(1778030641.291:512): avc: denied { ioctl } for pid=10675 comm="syz.4.2826" path="socket:[32687]" dev="sockfs" ino=32687 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 191.254317][ T28] audit: type=1400 audit(1778030641.321:513): avc: denied { write } for pid=10675 comm="syz.4.2826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 191.418413][T10702] netlink: 60 bytes leftover after parsing attributes in process `syz.5.2836'. [ 191.444760][T10702] netlink: 60 bytes leftover after parsing attributes in process `syz.5.2836'. [ 191.575387][T10723] netlink: 'syz.4.2840': attribute type 10 has an invalid length. [ 192.280947][T10765] netlink: 184 bytes leftover after parsing attributes in process `syz.3.2863'. [ 192.331766][T10769] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.2864'. [ 192.341488][T10769] veth0_to_bond: entered promiscuous mode [ 192.553861][T10798] netlink: 168 bytes leftover after parsing attributes in process `syz.4.2875'. [ 192.955496][T10827] netlink: 168 bytes leftover after parsing attributes in process `syz.2.2891'. [ 193.199747][T10850] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 193.221698][T10850] erspan0 speed is unknown, defaulting to 1000 [ 193.279212][T10849] netlink: 'syz.1.2902': attribute type 21 has an invalid length. [ 193.289738][T10850] loop4: detected capacity change from 0 to 8192 [ 193.308451][T10849] netlink: 'syz.1.2902': attribute type 6 has an invalid length. [ 193.316646][T10849] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2902'. [ 193.328350][T10864] netlink: 168 bytes leftover after parsing attributes in process `syz.2.2907'. [ 193.339232][T10850] loop4: p1 < > p3 p4 [ 193.344051][T10850] loop4: p3 start 201326592 is beyond EOD, truncated [ 193.350836][T10850] loop4: p4 size 33554432 extends beyond EOD, truncated [ 193.408052][T10870] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2911'. [ 193.495388][ T3291] udevd[3291]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 193.506142][ T3286] udevd[3286]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 194.044283][T10904] netlink: 32 bytes leftover after parsing attributes in process `syz.5.2924'. [ 194.061279][T10906] netlink: 32 bytes leftover after parsing attributes in process `syz.1.2923'. [ 194.434397][T10941] netlink: 32 bytes leftover after parsing attributes in process `syz.5.2939'. [ 195.432214][T11012] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2965'. [ 195.535814][T11019] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2968'. [ 195.611223][ T28] audit: type=1400 audit(1778030645.721:514): avc: denied { unmount } for pid=6641 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 195.735062][T10925] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 195.763184][T10925] erspan0 speed is unknown, defaulting to 1000 [ 195.827035][T11028] loop3: detected capacity change from 0 to 8192 [ 195.855332][T11028] loop3: p1 < > p3 p4 [ 195.860012][T11028] loop3: p3 start 201326592 is beyond EOD, truncated [ 195.866764][T11028] loop3: p4 size 33554432 extends beyond EOD, truncated [ 195.979471][ T3291] udevd[3291]: inotify_add_watch(7, /dev/loop3p1, 10) failed: No such file or directory [ 196.011378][ T3286] udevd[3286]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 196.661351][T11046] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2981'. [ 196.671851][T11046] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2981'. [ 196.720697][T11046] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2981'. [ 196.750647][T11046] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2981'. [ 197.951706][T11070] Dead loop on virtual device ip6_vti0 (net 36), fix it urgently! [ 198.032947][ T28] audit: type=1400 audit(1778030648.141:515): avc: denied { write } for pid=11060 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 198.123663][ T28] audit: type=1400 audit(1778030648.231:516): avc: denied { write } for pid=11081 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 198.271518][T11076] erspan0 speed is unknown, defaulting to 1000 [ 198.457301][T11059] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 198.495213][T11059] erspan0 speed is unknown, defaulting to 1000 [ 198.548372][T11092] loop2: detected capacity change from 0 to 8192 [ 198.615414][T11092] loop2: p1 < > p3 p4 [ 198.620893][T11092] loop2: p3 start 201326592 is beyond EOD, truncated [ 198.627819][T11092] loop2: p4 size 33554432 extends beyond EOD, truncated [ 198.771543][T11095] netlink: 'syz.1.2996': attribute type 21 has an invalid length. [ 198.798748][T11106] netlink: 277 bytes leftover after parsing attributes in process `syz.2.2998'. [ 198.808229][ T3291] udevd[3291]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 198.810916][T11095] netlink: 'syz.1.2996': attribute type 6 has an invalid length. [ 198.829255][ T3286] udevd[3286]: inotify_add_watch(7, /dev/loop2p4, 10) failed: No such file or directory [ 198.840361][T11102] netlink: 'syz.4.2999': attribute type 1 has an invalid length. [ 198.879675][T11102] netlink: 'syz.4.2999': attribute type 10 has an invalid length. [ 198.979919][T11102] team0: Device wg2 is of different type [ 199.443032][ T28] audit: type=1400 audit(1778030649.551:517): avc: denied { write } for pid=11115 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 199.556953][T11155] __nla_validate_parse: 2 callbacks suppressed [ 199.557006][T11155] netlink: 32 bytes leftover after parsing attributes in process `syz.1.3014'. [ 199.597433][ T28] audit: type=1400 audit(1778030649.711:518): avc: denied { write } for pid=11153 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 199.851969][T11163] netlink: 'syz.1.3017': attribute type 1 has an invalid length. [ 200.245777][T11177] netlink: 'syz.2.3022': attribute type 10 has an invalid length. [ 200.291058][T11177] netlink: 55 bytes leftover after parsing attributes in process `syz.2.3022'. [ 200.375788][T11187] netlink: 32 bytes leftover after parsing attributes in process `syz.3.3026'. [ 200.431551][T11187] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3026'. [ 200.484772][T11177] veth1_virt_wifi (unregistering): left allmulticast mode [ 200.527915][T11177] bridge0: port 3(veth1_virt_wifi) entered disabled state [ 200.784530][T11143] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 200.807286][T11143] erspan0 speed is unknown, defaulting to 1000 [ 200.874787][T11143] loop4: detected capacity change from 0 to 8192 [ 200.904965][T11143] loop4: p1 < > p3 p4 [ 200.909750][T11143] loop4: p3 start 201326592 is beyond EOD, truncated [ 200.916503][T11143] loop4: p4 size 33554432 extends beyond EOD, truncated [ 201.085539][ T3286] udevd[3286]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 201.097889][ T3291] udevd[3291]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 201.123099][T11218] netlink: 32 bytes leftover after parsing attributes in process `syz.2.3039'. [ 201.125258][T11209] erspan0 speed is unknown, defaulting to 1000 [ 201.283789][T11224] netlink: 'syz.4.3038': attribute type 10 has an invalid length. [ 201.406728][T11222] erspan0 speed is unknown, defaulting to 1000 [ 201.482177][T11240] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3043'. [ 201.537328][ T922] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 201.744898][ T922] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 201.757317][T11222] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.764773][T11222] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.785170][T11222] bridge_slave_0: entered allmulticast mode [ 201.800691][T11222] bridge_slave_0: entered promiscuous mode [ 201.813547][ T922] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 201.824838][T11261] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 201.833333][T11222] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.842220][T11222] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.849650][T11222] bridge_slave_1: entered allmulticast mode [ 201.857438][T11222] bridge_slave_1: entered promiscuous mode [ 201.873263][T11261] erspan0 speed is unknown, defaulting to 1000 [ 201.919519][T11262] loop3: detected capacity change from 0 to 8192 [ 201.930776][ T922] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 201.977143][T11262] loop3: p1 < > p3 p4 [ 201.982318][T11262] loop3: p3 start 201326592 is beyond EOD, truncated [ 201.990226][T11262] loop3: p4 size 33554432 extends beyond EOD, truncated [ 202.045799][T11222] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 202.062138][T11222] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 202.116223][T11222] team0: Port device team_slave_0 added [ 202.148665][T11222] team0: Port device team_slave_1 added [ 202.190098][T11222] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 202.204816][T11222] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 202.237501][T11222] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 202.274051][T11222] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 202.288026][T11222] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 202.314566][T11222] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 202.332249][ T28] audit: type=1400 audit(1778030652.441:519): avc: denied { create } for pid=11275 comm="syz.1.3054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 202.353589][ T922] bridge_slave_1: left allmulticast mode [ 202.363204][ T922] bridge_slave_1: left promiscuous mode [ 202.374845][ T922] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.393485][ T922] bridge_slave_0: left allmulticast mode [ 202.405354][ T922] bridge_slave_0: left promiscuous mode [ 202.417109][ T922] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.561042][ T922] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 202.570649][ T922] bridge0 (unregistering): left promiscuous mode [ 202.583604][ T922] bridge0 (unregistering): left allmulticast mode [ 202.647046][ T922] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 202.655890][ T922] bond_slave_0: left promiscuous mode [ 202.661366][ T922] bond_slave_0: left allmulticast mode [ 202.668240][ T922] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 202.677319][ T922] bond_slave_1: left promiscuous mode [ 202.682986][ T922] bond_slave_1: left allmulticast mode [ 202.690157][ T922] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 202.698680][ T922] dummy0: left promiscuous mode [ 202.703641][ T922] dummy0: left allmulticast mode [ 202.708967][ T922] bond0 (unregistering): Released all slaves [ 202.716742][T11269] erspan0 speed is unknown, defaulting to 1000 [ 202.725095][ T3412] erspan0 speed is unknown, defaulting to 1000 [ 202.731299][ T3412] syz2: Port: 1 Link DOWN [ 202.776599][T11222] hsr_slave_0: entered promiscuous mode [ 202.791426][T11222] hsr_slave_1: entered promiscuous mode [ 202.801152][T11222] debugfs: 'hsr0' already exists in 'hsr' [ 202.809325][T11222] Cannot create hsr debugfs directory [ 202.878740][ T28] audit: type=1400 audit(1778030652.991:520): avc: denied { read } for pid=3021 comm="dhcpcd" name="n34" dev="tmpfs" ino=12786 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 202.905798][ T28] audit: type=1400 audit(1778030652.991:521): avc: denied { open } for pid=3021 comm="dhcpcd" path="/run/udev/data/n34" dev="tmpfs" ino=12786 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 202.930952][ T28] audit: type=1400 audit(1778030652.991:522): avc: denied { getattr } for pid=3021 comm="dhcpcd" path="/run/udev/data/n34" dev="tmpfs" ino=12786 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 202.970670][ T922] hsr_slave_0: left promiscuous mode [ 202.976654][ T922] hsr_slave_1: left promiscuous mode [ 202.982385][ T922] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 202.993152][ T922] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 203.010168][ T922] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 203.018231][ T922] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 203.037957][ T922] veth1_macvtap: left promiscuous mode [ 203.044035][ T922] veth0_macvtap: left promiscuous mode [ 203.231872][ T28] audit: type=1400 audit(1778030653.341:523): avc: denied { nlmsg_write } for pid=11307 comm="syz.3.3065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 203.265677][ T922] team0 (unregistering): Port device team_slave_1 removed [ 203.278856][ T28] audit: type=1400 audit(1778030653.371:524): avc: denied { create } for pid=11307 comm="syz.3.3065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 203.307385][ T922] team0 (unregistering): Port device team_slave_0 removed [ 203.339623][ T922] team0 (unregistering): Port device veth0 removed [ 203.381864][T11312] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 203.475478][T11315] loop1: detected capacity change from 0 to 8192 [ 203.515586][T11315] loop1: p1 < > p3 p4 [ 203.520406][T11315] loop1: p3 start 201326592 is beyond EOD, truncated [ 203.527152][T11315] loop1: p4 size 33554432 extends beyond EOD, truncated [ 203.588670][ T28] audit: type=1400 audit(1778030653.701:525): avc: denied { write } for pid=11314 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 203.611831][ T28] audit: type=1400 audit(1778030653.701:526): avc: denied { create } for pid=11314 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 203.634396][ T28] audit: type=1400 audit(1778030653.721:527): avc: denied { write } for pid=11314 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth5.link" dev="tmpfs" ino=12879 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 203.690066][ T28] audit: type=1400 audit(1778030653.721:528): avc: denied { append } for pid=11314 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" dev="tmpfs" ino=12879 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 203.875786][T11222] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 203.899696][T11222] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 203.915167][T11222] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 203.929829][T11222] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 203.940324][T11222] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 203.950736][T11222] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 203.967313][T11222] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 204.047475][T11222] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 204.127183][T11222] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.147496][T11222] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.163593][ T3685] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.170709][ T3685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.254517][T11367] syzkaller0: entered promiscuous mode [ 204.267949][T11367] syzkaller0: entered allmulticast mode [ 204.293002][ T3685] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.300135][ T3685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.322723][T11382] netlink: 16 bytes leftover after parsing attributes in process `syz.4.3073'. [ 204.437160][T11384] netlink: 'syz.3.3074': attribute type 21 has an invalid length. [ 204.468628][T11384] netlink: 'syz.3.3074': attribute type 6 has an invalid length. [ 204.480350][T11384] netlink: 132 bytes leftover after parsing attributes in process `syz.3.3074'. [ 204.823732][T11222] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 205.157323][T11222] veth0_vlan: entered promiscuous mode [ 205.174095][T11222] veth1_vlan: entered promiscuous mode [ 205.202599][T11222] veth0_macvtap: entered promiscuous mode [ 205.218375][T11222] veth1_macvtap: entered promiscuous mode [ 205.233482][T11222] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 205.253641][T11222] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 205.268577][ T3685] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.293055][ T3685] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.324340][ T3685] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.358075][ T3685] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.390746][T11487] netlink: 'syz.1.3093': attribute type 1 has an invalid length. [ 205.420753][T11487] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3093'. [ 205.453271][T11487] netlink: 'syz.1.3093': attribute type 10 has an invalid length. [ 205.564031][T11487] team0: Device wg2 is of different type [ 205.946134][ T30] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 206.065424][ T30] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 206.260811][ T30] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 206.351805][ T30] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 206.365832][T11585] netlink: 'syz.1.3108': attribute type 1 has an invalid length. [ 206.394845][T11585] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3108'. [ 206.415487][T11585] netlink: 'syz.1.3108': attribute type 10 has an invalid length. [ 206.427632][T11588] netlink: 'syz.3.3109': attribute type 10 has an invalid length. [ 206.457092][T11585] team0: Device wg2 is of different type [ 206.511489][T11588] bond0: (slave team0): Releasing backup interface [ 206.554797][T11588] team0 (unregistering): left promiscuous mode [ 206.567465][T11588] team_slave_0: left promiscuous mode [ 206.577920][T11588] team_slave_1: left promiscuous mode [ 206.596372][T11588] vlan1: left promiscuous mode [ 206.623955][T11588] team0 (unregistering): left allmulticast mode [ 206.642974][T11588] team_slave_0: left allmulticast mode [ 206.659115][T11588] team_slave_1: left allmulticast mode [ 206.677660][T11588] vlan1: left allmulticast mode [ 206.694784][T11588] veth0_vlan: left allmulticast mode [ 206.746948][T11588] team0 (unregistering): Port device team_slave_0 removed [ 206.788838][T11588] team0 (unregistering): Port device team_slave_1 removed [ 206.814274][T11588] team0 (unregistering): Port device vlan1 removed [ 207.043182][ T30] veth1_virt_wifi: left allmulticast mode [ 207.061533][ T30] bridge0: port 3(veth1_virt_wifi) entered disabled state [ 207.090602][ T30] bridge_slave_1: left allmulticast mode [ 207.103067][ T30] bridge_slave_1: left promiscuous mode [ 207.115537][ T30] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.135647][ T30] bridge_slave_0: left allmulticast mode [ 207.147994][ T30] bridge_slave_0: left promiscuous mode [ 207.160380][ T30] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.536688][ T30] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 207.545762][ T30] bond_slave_0: left promiscuous mode [ 207.551273][ T30] bond_slave_0: left allmulticast mode [ 207.558436][ T30] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 207.567350][ T30] bond_slave_1: left promiscuous mode [ 207.572799][ T30] bond_slave_1: left allmulticast mode [ 207.584077][ T30] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 207.592636][ T30] dummy0: left promiscuous mode [ 207.597746][ T30] dummy0: left allmulticast mode [ 207.602870][ T30] bond0 (unregistering): Released all slaves [ 207.666112][T11520] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.685684][T11520] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.692932][T11520] bridge_slave_0: entered allmulticast mode [ 207.703470][T11520] bridge_slave_0: entered promiscuous mode [ 207.724140][T11651] netlink: 'syz.3.3124': attribute type 1 has an invalid length. [ 207.740351][ T30] hsr_slave_0: left promiscuous mode [ 207.750499][T11651] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3124'. [ 207.761990][ T30] hsr_slave_1: left promiscuous mode [ 207.778588][ T30] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 207.793427][T11651] netlink: 'syz.3.3124': attribute type 10 has an invalid length. [ 207.810414][ T30] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 207.825806][ T28] kauditd_printk_skb: 22 callbacks suppressed [ 207.825824][ T28] audit: type=1400 audit(1778030657.941:551): avc: denied { write } for pid=11654 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 207.875250][ T30] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 207.890044][ T30] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 207.900747][ T28] audit: type=1400 audit(1778030657.971:552): avc: denied { write } for pid=11665 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 207.924411][ T30] veth1_macvtap: left promiscuous mode [ 207.930411][ T30] veth0_macvtap: left promiscuous mode [ 207.979774][ T30] team0 (unregistering): Port device veth1_to_hsr removed [ 208.001021][ T30] team0 (unregistering): Port device team_slave_1 removed [ 208.012052][ T30] team0 (unregistering): Port device team_slave_0 removed [ 208.057837][T11520] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.065059][T11520] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.072332][T11520] bridge_slave_1: entered allmulticast mode [ 208.079082][T11520] bridge_slave_1: entered promiscuous mode [ 208.149351][T11520] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 208.164540][T11520] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 208.208367][T11520] team0: Port device team_slave_0 added [ 208.220447][T11520] team0: Port device team_slave_1 added [ 208.255280][T11520] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 208.262746][T11520] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 208.308684][T11520] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 208.379615][T11520] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 208.394564][T11520] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 208.456548][T11520] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 208.468617][ T28] audit: type=1400 audit(1778030658.571:553): avc: denied { write } for pid=11679 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 208.529209][ T28] audit: type=1400 audit(1778030658.641:554): avc: denied { write } for pid=11694 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 208.561958][T11520] hsr_slave_0: entered promiscuous mode [ 208.575678][T11520] hsr_slave_1: entered promiscuous mode [ 208.590395][T11520] debugfs: 'hsr0' already exists in 'hsr' [ 208.601786][T11520] Cannot create hsr debugfs directory [ 208.613240][ T3021] 8021q: adding VLAN 0 to HW filter on device eth5 [ 208.849076][ T28] audit: type=1400 audit(1778030658.961:555): avc: denied { write } for pid=11698 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 208.916559][ T28] audit: type=1400 audit(1778030659.031:556): avc: denied { write } for pid=11724 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 209.099279][ T3021] 8021q: adding VLAN 0 to HW filter on device eth6 [ 209.323828][ T28] audit: type=1400 audit(1778030659.431:557): avc: denied { write } for pid=11733 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 209.375337][ T28] audit: type=1400 audit(1778030659.491:558): avc: denied { write } for pid=11753 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 209.601123][T11520] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 209.646377][ T28] audit: type=1400 audit(1778030659.761:559): avc: denied { write } for pid=11755 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 209.720012][T11520] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 209.738116][ T28] audit: type=1400 audit(1778030659.841:560): avc: denied { write } for pid=11773 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 209.983423][T11520] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 210.011155][T11520] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 210.031909][T11520] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 210.059741][T11520] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 210.301275][T11520] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 210.332578][T11520] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 210.460343][T11520] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.490681][T11520] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.521260][ T117] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.528390][ T117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.582744][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.589883][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.624259][T11520] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 210.655430][T11520] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 210.853754][T11520] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 210.942895][T11875] netlink: 'syz.2.3158': attribute type 10 has an invalid length. [ 210.968615][T11875] team0: Port device vlan1 added [ 211.018948][T11882] netlink: 'syz.3.3162': attribute type 29 has an invalid length. [ 211.198920][T11845] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.222697][T11845] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.235651][T11845] bridge_slave_0: entered allmulticast mode [ 211.248161][T11845] bridge_slave_0: entered promiscuous mode [ 211.263854][T11520] veth0_vlan: entered promiscuous mode [ 211.273733][T11845] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.286707][T11845] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.301296][T11845] bridge_slave_1: entered allmulticast mode [ 211.316108][T11845] bridge_slave_1: entered promiscuous mode [ 211.331881][T11520] veth1_vlan: entered promiscuous mode [ 211.369720][T11845] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.396519][T11845] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.408191][T11520] veth0_macvtap: entered promiscuous mode [ 211.428080][T11520] veth1_macvtap: entered promiscuous mode [ 211.437714][T11845] team0: Port device team_slave_0 added [ 211.449175][T11845] team0: Port device team_slave_1 added [ 211.476979][T11520] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 211.486195][T11520] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 211.500647][T11845] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 211.507733][T11845] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 211.559796][T11845] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 211.584547][T11845] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 211.591626][T11845] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 211.622264][T11845] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 211.646968][ T12] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.664388][ T12] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.686099][ T12] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.696579][T11919] netlink: 'syz.1.3171': attribute type 29 has an invalid length. [ 211.726370][ T12] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.756873][T11845] hsr_slave_0: entered promiscuous mode [ 211.772021][T11845] hsr_slave_1: entered promiscuous mode [ 211.784283][T11845] debugfs: 'hsr0' already exists in 'hsr' [ 211.793251][T11845] Cannot create hsr debugfs directory [ 212.005501][T11845] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 212.084727][T11845] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 212.116060][T11845] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 212.153560][T11845] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 212.185420][T11845] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 212.217135][T11845] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 212.250465][T11845] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 212.393383][T11845] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 212.411516][T11949] pim6reg1: entered allmulticast mode [ 212.490748][T11845] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.505257][T11845] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.521739][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.528920][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.573287][ T3685] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.580404][ T3685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.819325][T11845] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 212.882212][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 212.882231][ T28] audit: type=1400 audit(1778030662.991:567): avc: denied { remount } for pid=12021 comm="syz.4.3201" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 213.000128][T12037] 2: renamed from team_slave_1 (while UP) [ 213.038619][ T28] audit: type=1400 audit(1778030663.141:568): avc: denied { unmount } for pid=11520 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 213.130270][T11845] veth0_vlan: entered promiscuous mode [ 213.155052][T11845] veth1_vlan: entered promiscuous mode [ 213.206087][T11845] veth0_macvtap: entered promiscuous mode [ 213.227927][T11845] veth1_macvtap: entered promiscuous mode [ 213.240545][T11845] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 213.263152][T11845] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 213.297618][ T117] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.330829][ T117] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.351923][ T117] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.376843][ T117] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.752345][T12108] netlink: 332 bytes leftover after parsing attributes in process `syz.2.3230'. [ 213.866432][ T30] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 213.898557][T12126] netlink: 'syz.2.3237': attribute type 1 has an invalid length. [ 213.933386][T12126] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3237'. [ 213.964102][T12126] netlink: 'syz.2.3237': attribute type 10 has an invalid length. [ 213.978099][ T30] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 214.102049][T12140] netlink: 'syz.1.3238': attribute type 10 has an invalid length. [ 214.124510][T12140] netlink: 55 bytes leftover after parsing attributes in process `syz.1.3238'. [ 214.185945][T12126] team0: Device wg2 is of different type [ 214.236963][T12143] netlink: 'syz.6.3240': attribute type 10 has an invalid length. [ 214.252172][ T30] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 214.272483][T12143] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.279993][T12143] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.308462][T12143] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.315893][T12143] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.323498][T12143] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.330749][T12143] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.354177][T12143] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 214.374386][ T30] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 214.967359][ T30] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 214.976885][ T30] bond_slave_0: left promiscuous mode [ 214.983559][ T30] bond_slave_0: left allmulticast mode [ 215.078806][ T30] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 215.088125][ T30] bond_slave_1: left promiscuous mode [ 215.093656][ T30] bond_slave_1: left allmulticast mode [ 215.100851][ T30] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 215.109994][ T30] dummy0: left promiscuous mode [ 215.115395][ T30] dummy0: left allmulticast mode [ 215.120641][ T30] bond0 (unregistering): Released all slaves [ 215.203426][ T30] hsr_slave_0: left promiscuous mode [ 215.221725][ T30] hsr_slave_1: left promiscuous mode [ 215.233406][T12198] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3262'. [ 215.246017][ T30] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 215.259934][ T30] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 215.374648][ T30] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 215.382386][ T30] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 215.414295][ T30] veth1_macvtap: left promiscuous mode [ 215.438832][ T30] veth0_macvtap: left promiscuous mode [ 215.452754][ T30] veth1_vlan: left promiscuous mode [ 215.458978][ T30] veth0_vlan: left promiscuous mode [ 215.603292][T12231] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3278'. [ 215.785978][T12109] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.817255][T12109] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.839822][T12109] bridge_slave_0: entered allmulticast mode [ 215.839998][ T28] audit: type=1400 audit(1778030665.951:569): avc: denied { write } for pid=12246 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 215.847270][T12109] bridge_slave_0: entered promiscuous mode [ 215.886197][T12109] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.908890][T12109] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.919036][ T28] audit: type=1400 audit(1778030666.031:570): avc: denied { write } for pid=12268 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 215.941168][T12109] bridge_slave_1: entered allmulticast mode [ 215.950066][T12109] bridge_slave_1: entered promiscuous mode [ 216.005556][T12109] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 216.016396][ T3021] 8021q: adding VLAN 0 to HW filter on device eth6 [ 216.028935][T12109] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 216.063135][T12278] netlink: 12 bytes leftover after parsing attributes in process `syz.6.3289'. [ 216.108871][T12109] team0: Port device team_slave_0 added [ 216.122659][T12109] team0: Port device team_slave_1 added [ 216.142430][T12109] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 216.149591][T12109] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 216.175745][T12109] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 216.196538][T12109] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 216.205721][T12109] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 216.256202][T12290] netlink: 36 bytes leftover after parsing attributes in process `syz.4.3293'. [ 216.275068][T12109] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 216.362720][T12109] hsr_slave_0: entered promiscuous mode [ 216.376686][T12109] hsr_slave_1: entered promiscuous mode [ 216.434529][ T28] audit: type=1400 audit(1778030666.541:571): avc: denied { write } for pid=12288 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 216.517873][ T28] audit: type=1400 audit(1778030666.621:572): avc: denied { write } for pid=12320 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 216.585934][ T3021] 8021q: adding VLAN 0 to HW filter on device eth5 [ 216.778780][ T28] audit: type=1400 audit(1778030666.891:573): avc: denied { write } for pid=12338 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 216.832059][ T28] audit: type=1400 audit(1778030666.941:574): avc: denied { write } for pid=12365 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 216.935403][T12109] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 216.946799][T12109] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 216.955481][T12109] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 216.967403][T12109] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 216.975333][T12109] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 216.987310][T12109] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 216.996650][T12109] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 217.010286][T12109] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 217.101083][ T28] audit: type=1400 audit(1778030667.211:575): avc: denied { write } for pid=12372 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 217.164394][T12109] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.180927][T12109] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.191482][T12410] netlink: 'syz.6.3324': attribute type 1 has an invalid length. [ 217.202259][ T28] audit: type=1400 audit(1778030667.311:576): avc: denied { write } for pid=12408 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 217.232673][T12410] netlink: 8 bytes leftover after parsing attributes in process `syz.6.3324'. [ 217.240198][ T1689] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.245313][T12410] netlink: 'syz.6.3324': attribute type 10 has an invalid length. [ 217.248692][ T1689] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.267137][ T1689] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.274336][ T1689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.321942][T12410] team0: Device wg2 is of different type [ 217.417098][T12429] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 217.438680][T12429] syzkaller0: entered promiscuous mode [ 217.444226][T12429] syzkaller0: entered allmulticast mode [ 217.673220][T12109] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.903609][T12109] veth0_vlan: entered promiscuous mode [ 217.919535][T12109] veth1_vlan: entered promiscuous mode [ 217.951124][T12109] veth0_macvtap: entered promiscuous mode [ 217.970605][T12109] veth1_macvtap: entered promiscuous mode [ 217.997027][T12109] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 218.018923][T12109] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 218.047601][ T117] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.069933][ T117] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.102275][ T117] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.131111][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 218.131127][ T28] audit: type=1400 audit(1778030668.241:581): avc: denied { write } for pid=12512 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 218.166308][ T117] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 218.246228][ T28] audit: type=1400 audit(1778030668.341:582): avc: denied { write } for pid=12542 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 218.320291][T12552] netlink: 'syz.6.3358': attribute type 10 has an invalid length. [ 218.331431][T12552] netlink: 55 bytes leftover after parsing attributes in process `syz.6.3358'. [ 218.507827][ T28] audit: type=1400 audit(1778030668.621:583): avc: denied { write } for pid=12555 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 218.556493][ T28] audit: type=1400 audit(1778030668.671:584): avc: denied { write } for pid=12588 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 218.673208][ T28] audit: type=1400 audit(1778030668.781:585): avc: denied { write } for pid=12592 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 218.727641][ T28] audit: type=1400 audit(1778030668.841:586): avc: denied { write } for pid=12604 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 218.769968][T12607] netlink: 'syz.3.3369': attribute type 29 has an invalid length. [ 218.787130][T12607] netlink: 'syz.3.3369': attribute type 29 has an invalid length. [ 218.859681][T12610] syzkaller0: entered promiscuous mode [ 218.881880][T12610] syzkaller0: entered allmulticast mode [ 219.039373][ T28] audit: type=1400 audit(1778030669.151:587): avc: denied { write } for pid=12617 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 219.068736][T12645] netlink: 'syz.4.3381': attribute type 29 has an invalid length. [ 219.101985][T12645] netlink: 'syz.4.3381': attribute type 29 has an invalid length. [ 219.121546][ T28] audit: type=1400 audit(1778030669.231:588): avc: denied { write } for pid=12649 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 219.325531][ T28] audit: type=1400 audit(1778030669.441:589): avc: denied { write } for pid=12657 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 219.374675][ T28] audit: type=1400 audit(1778030669.471:590): avc: denied { write } for pid=12681 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 219.550403][T12708] netlink: 'syz.6.3397': attribute type 29 has an invalid length. [ 219.559572][T12708] netlink: 'syz.6.3397': attribute type 29 has an invalid length. [ 219.747761][T12730] netlink: 'syz.2.3402': attribute type 10 has an invalid length. [ 219.775590][T12730] netlink: 55 bytes leftover after parsing attributes in process `syz.2.3402'. [ 220.303943][T12773] syzkaller0: entered promiscuous mode [ 220.322848][T12773] syzkaller0: entered allmulticast mode [ 220.470795][T12788] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3420'. [ 220.632904][T12804] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3427'. [ 220.792541][T12810] syzkaller0: entered promiscuous mode [ 220.804056][T12810] syzkaller0: entered allmulticast mode [ 221.036512][T12836] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3440'. [ 221.283479][T12868] netlink: 12 bytes leftover after parsing attributes in process `syz.6.3455'. [ 221.954582][T12940] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 221.967141][T12940] syzkaller0: entered promiscuous mode [ 221.972814][T12940] syzkaller0: entered allmulticast mode [ 222.258665][T12970] validate_nla: 11 callbacks suppressed [ 222.258680][T12970] netlink: 'syz.1.3503': attribute type 29 has an invalid length. [ 222.308248][T12970] netlink: 'syz.1.3503': attribute type 29 has an invalid length. [ 222.393971][T12982] syzkaller0: entered promiscuous mode [ 222.411736][T12982] syzkaller0: entered allmulticast mode [ 222.511597][T12993] netlink: 'syz.6.3514': attribute type 10 has an invalid length. [ 222.523799][T12993] netlink: 55 bytes leftover after parsing attributes in process `syz.6.3514'. [ 222.695440][T13008] netlink: 'syz.3.3520': attribute type 29 has an invalid length. [ 222.703993][T13008] netlink: 'syz.3.3520': attribute type 29 has an invalid length. [ 222.885183][T13032] netlink: 'syz.1.3531': attribute type 29 has an invalid length. [ 222.903210][T13032] netlink: 'syz.1.3531': attribute type 29 has an invalid length. [ 223.156639][T13063] netlink: 'syz.6.3544': attribute type 29 has an invalid length. [ 223.165204][T13063] netlink: 'syz.6.3544': attribute type 29 has an invalid length. [ 223.750965][T13091] netlink: 'syz.3.3555': attribute type 29 has an invalid length. [ 224.178718][T13142] netlink: 48 bytes leftover after parsing attributes in process `syz.6.3574'. [ 224.210677][T13139] team0: Port device vlan1 added [ 225.377227][T13205] netlink: 9462 bytes leftover after parsing attributes in process `syz.3.3597'. [ 225.505091][T13213] netlink: 824 bytes leftover after parsing attributes in process `syz.1.3600'. [ 226.947431][T13229] Set syz1 is full, maxelem 65536 reached [ 229.120542][T13324] validate_nla: 7 callbacks suppressed [ 229.120590][T13324] netlink: 'syz.4.3643': attribute type 74 has an invalid length. [ 229.159244][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 229.159341][ T28] audit: type=1400 audit(1778030679.271:597): avc: denied { read } for pid=13323 comm="syz.4.3643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 229.190816][T13324] netlink: 65047 bytes leftover after parsing attributes in process `syz.4.3643'. [ 229.208643][T13330] netlink: 'syz.2.3646': attribute type 1 has an invalid length. [ 229.226488][T13330] netlink: 'syz.2.3646': attribute type 10 has an invalid length. [ 229.247861][T13330] team0: Device wg2 is of different type [ 229.455011][ T28] audit: type=1400 audit(1778030679.571:598): avc: denied { write } for pid=13349 comm="syz.3.3653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 229.550108][T13370] netlink: 'syz.6.3662': attribute type 1 has an invalid length. [ 229.559306][T13370] netlink: 'syz.6.3662': attribute type 10 has an invalid length. [ 229.584954][T13370] team0: Device wg2 is of different type [ 230.082020][T13414] netlink: 'syz.1.3679': attribute type 1 has an invalid length. [ 230.138965][T13418] netlink: 'syz.1.3679': attribute type 10 has an invalid length. [ 230.233967][T13418] team0: Device wg2 is of different type [ 230.587468][T13441] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3688'. [ 230.752064][T13459] netlink: 'syz.4.3697': attribute type 29 has an invalid length. [ 230.783120][T13459] netlink: 'syz.4.3697': attribute type 29 has an invalid length. [ 231.220908][T13501] syzkaller0: entered promiscuous mode [ 231.229614][ T28] audit: type=1400 audit(1778030681.331:599): avc: denied { ioctl } for pid=13499 comm="syz.4.3713" path="socket:[43554]" dev="sockfs" ino=43554 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 231.272349][T13516] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 231.300342][T13501] syzkaller0: entered allmulticast mode [ 231.320678][ T28] audit: type=1400 audit(1778030681.431:600): avc: denied { write } for pid=13496 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 231.400868][ T28] audit: type=1400 audit(1778030681.501:601): avc: denied { write } for pid=13524 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 231.627421][T13540] netlink: 'syz.2.3723': attribute type 29 has an invalid length. [ 231.863661][T13557] netlink: 824 bytes leftover after parsing attributes in process `syz.3.3732'. [ 232.139843][ T28] audit: type=1400 audit(1778030682.251:602): avc: denied { read } for pid=13573 comm="syz.2.3740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 232.195647][T13582] netlink: 9462 bytes leftover after parsing attributes in process `syz.1.3743'. [ 232.224231][ T28] audit: type=1400 audit(1778030682.331:603): avc: denied { read } for pid=13573 comm="syz.2.3740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 232.609569][ T28] audit: type=1400 audit(1778030682.721:604): avc: denied { write } for pid=13613 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 232.654498][ T28] audit: type=1400 audit(1778030682.761:605): avc: denied { write } for pid=13635 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 233.136935][T13672] netlink: 28 bytes leftover after parsing attributes in process `syz.6.3773'. [ 233.254506][T13687] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 233.396937][T13689] loop1: detected capacity change from 0 to 8192 [ 233.475449][T13689] loop1: p1 < > p3 p4 [ 233.485126][T13689] loop1: p3 start 201326592 is beyond EOD, truncated [ 233.492001][T13689] loop1: p4 size 33554432 extends beyond EOD, truncated [ 234.155653][ T2982] loop1: p1 < > p3 p4 [ 234.162854][ T2982] loop1: p3 start 201326592 is beyond EOD, truncated [ 234.169939][ T2982] loop1: p4 size 33554432 extends beyond EOD, truncated [ 234.263887][T13705] validate_nla: 3 callbacks suppressed [ 234.263911][T13705] netlink: 'syz.6.3786': attribute type 1 has an invalid length. [ 234.318579][T13712] netlink: 8 bytes leftover after parsing attributes in process `syz.6.3786'. [ 234.347656][T13705] netlink: 'syz.6.3786': attribute type 10 has an invalid length. [ 234.366601][T13705] team0: Device wg2 is of different type [ 234.512529][T13722] netlink: 'syz.4.3790': attribute type 21 has an invalid length. [ 234.533530][T13722] netlink: 'syz.4.3790': attribute type 6 has an invalid length. [ 234.568793][T13722] netlink: 132 bytes leftover after parsing attributes in process `syz.4.3790'. [ 235.211299][ T28] audit: type=1400 audit(1778030685.321:606): avc: denied { setopt } for pid=13748 comm="syz.6.3802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 235.211331][T13752] syz.6.3802: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 235.276147][T13752] CPU: 0 UID: 0 PID: 13752 Comm: syz.6.3802 Not tainted syzkaller #0 PREEMPT(full) [ 235.276185][T13752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 235.276279][T13752] Call Trace: [ 235.276288][T13752] [ 235.276296][T13752] __dump_stack+0x1d/0x30 [ 235.276327][T13752] dump_stack_lvl+0x95/0xd0 [ 235.276357][T13752] dump_stack+0x15/0x1b [ 235.276378][T13752] warn_alloc+0x145/0x1c0 [ 235.276426][T13752] __vmalloc_node_range_noprof+0xa5/0x11c0 [ 235.276468][T13752] ? _raw_spin_unlock+0x9/0x30 [ 235.276507][T13752] ? __hrtimer_rearm_deferred+0x58d/0x670 [ 235.276551][T13752] ? lapic_next_event+0x11/0x20 [ 235.276643][T13752] ? clockevents_program_event+0x2fd/0x340 [ 235.276672][T13752] ? irqentry_exit+0x527/0x5b0 [ 235.276693][T13752] ? _raw_spin_unlock+0x9/0x30 [ 235.276760][T13752] ? __hrtimer_rearm_deferred+0x58d/0x670 [ 235.276793][T13752] ? should_fail_ex+0x30/0x280 [ 235.276825][T13752] vmalloc_user_noprof+0x7d/0xb0 [ 235.276844][T13752] ? xskq_create+0x80/0xe0 [ 235.276883][T13752] xskq_create+0x80/0xe0 [ 235.276922][T13752] xsk_init_queue+0x70/0xb0 [ 235.276951][T13752] xsk_setsockopt+0x477/0x640 [ 235.276980][T13752] ? __pfx_xsk_setsockopt+0x10/0x10 [ 235.277037][T13752] __sys_setsockopt+0x184/0x200 [ 235.277061][T13752] __x64_sys_setsockopt+0x64/0x80 [ 235.277080][T13752] x64_sys_call+0x2327/0x3020 [ 235.277133][T13752] do_syscall_64+0x12c/0x3b0 [ 235.277164][T13752] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 235.277194][T13752] RIP: 0033:0x7fd106c7cdd9 [ 235.277212][T13752] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 235.277230][T13752] RSP: 002b:00007fd1056b6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 235.277259][T13752] RAX: ffffffffffffffda RBX: 00007fd106ef6090 RCX: 00007fd106c7cdd9 [ 235.277276][T13752] RDX: 0000000000000002 RSI: 000000000000011b RDI: 000000000000000f [ 235.277291][T13752] RBP: 00007fd106d12d69 R08: 0000000000000004 R09: 0000000000000000 [ 235.277307][T13752] R10: 0000200000000900 R11: 0000000000000246 R12: 0000000000000000 [ 235.277322][T13752] R13: 00007fd106ef6128 R14: 00007fd106ef6090 R15: 00007fff518ce568 [ 235.277414][T13752] [ 235.500631][T13752] Mem-Info: [ 235.505454][T13752] active_anon:11277 inactive_anon:0 isolated_anon:0 [ 235.505454][T13752] active_file:23210 inactive_file:2379 isolated_file:0 [ 235.505454][T13752] unevictable:0 dirty:204 writeback:0 [ 235.505454][T13752] slab_reclaimable:3345 slab_unreclaimable:21213 [ 235.505454][T13752] mapped:29373 shmem:286 pagetables:1302 [ 235.505454][T13752] sec_pagetables:0 bounce:0 [ 235.505454][T13752] kernel_misc_reclaimable:0 [ 235.505454][T13752] free:1872690 free_pcp:6284 free_cma:0 [ 235.554692][T13752] Node 0 active_anon:45108kB inactive_anon:0kB active_file:92840kB inactive_file:9516kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:117492kB dirty:816kB writeback:0kB shmem:1144kB kernel_stack:3888kB pagetables:5208kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB gpu_active:0kB gpu_reclaim:0kB [ 235.586193][T13752] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 235.588066][T13757] netlink: 824 bytes leftover after parsing attributes in process `syz.1.3804'. [ 235.618582][T13752] lowmem_reserve[]: 0 2878 7857 7857 [ 235.632546][T13752] Node 0 DMA32 free:2944548kB boost:0kB min:4128kB low:7052kB high:9976kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:3129332kB managed:2948072kB mlocked:0kB bounce:0kB free_pcp:3524kB local_pcp:3524kB free_cma:0kB [ 235.668583][T13752] lowmem_reserve[]: 0 0 4978 4978 [ 235.673955][T13752] Node 0 Normal free:4530852kB boost:0kB min:7188kB low:12284kB high:17380kB reserved_highatomic:0KB free_highatomic:0KB active_anon:45224kB inactive_anon:0kB active_file:92840kB inactive_file:9516kB unevictable:0kB writepending:816kB zspages:0kB present:5242880kB managed:5098236kB mlocked:0kB bounce:0kB free_pcp:21576kB local_pcp:6820kB free_cma:0kB [ 235.708251][T13752] lowmem_reserve[]: 0 0 0 0 [ 235.713359][T13752] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 235.728653][T13752] Node 0 DMA32: 3*4kB (M) 3*8kB (M) 2*16kB (M) 5*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 3*2048kB (M) 716*4096kB (M) = 2944548kB [ 235.745832][T13752] Node 0 Normal: 675*4kB (UME) 426*8kB (UME) 353*16kB (ME) 216*32kB (UME) 110*64kB (UME) 154*128kB (UME) 71*256kB (UME) 45*512kB (UM) 30*1024kB (UM) 15*2048kB (UME) 1070*4096kB (UM) = 4530796kB [ 235.766314][T13752] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 235.778832][T13752] 25857 total pagecache pages [ 235.787508][T13752] 0 pages in swap cache [ 235.791843][T13752] Free swap = 124996kB [ 235.796413][T13752] Total swap = 124996kB [ 235.818214][T13752] 2097051 pages RAM [ 235.839610][T13752] 0 pages HighMem/MovableOnly [ 235.844906][T13752] 81634 pages reserved [ 236.665121][T13840] netlink: 'syz.2.3837': attribute type 21 has an invalid length. [ 236.673501][T13840] netlink: 'syz.2.3837': attribute type 6 has an invalid length. [ 236.681801][T13840] netlink: 132 bytes leftover after parsing attributes in process `syz.2.3837'. [ 236.747069][T13842] netlink: 824 bytes leftover after parsing attributes in process `syz.4.3838'. [ 236.807832][T13852] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3843'. [ 237.123152][T13875] netlink: 824 bytes leftover after parsing attributes in process `syz.6.3853'. [ 237.156278][T13885] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3858'. [ 239.388330][T13920] netlink: 824 bytes leftover after parsing attributes in process `syz.3.3871'. [ 239.947728][T13977] netlink: 824 bytes leftover after parsing attributes in process `syz.6.3896'. [ 240.085509][T13990] syzkaller0: entered promiscuous mode [ 240.093221][T13990] syzkaller0: entered allmulticast mode [ 240.328308][T14017] netlink: 824 bytes leftover after parsing attributes in process `syz.3.3914'. [ 240.471386][T14037] netlink: 12 bytes leftover after parsing attributes in process `syz.6.3924'. [ 240.587975][T14051] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3921'. [ 240.654347][T14047] syzkaller0: entered promiscuous mode [ 240.659986][T14047] syzkaller0: entered allmulticast mode [ 240.789220][T14062] netlink: 'syz.6.3935': attribute type 1 has an invalid length. [ 241.171306][T14098] netlink: 'syz.2.3952': attribute type 1 has an invalid length. [ 241.198968][T14098] netlink: 'syz.2.3952': attribute type 2 has an invalid length. [ 241.233212][T14098] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=260 sclass=netlink_route_socket pid=14098 comm=syz.2.3952 [ 241.540342][T14149] netlink: 'syz.1.3974': attribute type 29 has an invalid length. [ 241.568050][T14149] netlink: 'syz.1.3974': attribute type 29 has an invalid length. [ 241.784665][T14169] netlink: 'syz.3.3984': attribute type 1 has an invalid length. [ 241.808562][T14169] netlink: 'syz.3.3984': attribute type 4 has an invalid length. [ 241.832138][T14169] __nla_validate_parse: 6 callbacks suppressed [ 241.832231][T14169] netlink: 9462 bytes leftover after parsing attributes in process `syz.3.3984'. [ 242.374970][T14205] netlink: 'syz.3.4002': attribute type 1 has an invalid length. [ 242.392052][T14205] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4002'. [ 242.413196][T14205] netlink: 'syz.3.4002': attribute type 10 has an invalid length. [ 242.780922][T14205] team0: Device wg2 is of different type [ 242.846941][T14216] netlink: 'syz.4.4006': attribute type 1 has an invalid length. [ 242.872916][T14216] netlink: 9462 bytes leftover after parsing attributes in process `syz.4.4006'. [ 242.893359][T14223] netlink: 44 bytes leftover after parsing attributes in process `syz.3.4009'. [ 242.903578][T14220] netlink: 824 bytes leftover after parsing attributes in process `syz.2.4007'. [ 243.209904][ T2982] ================================================================== [ 243.218072][ T2982] BUG: KCSAN: data-race in dentry_unlink_inode / step_into_slowpath [ 243.226093][ T2982] [ 243.228439][ T2982] write to 0xffff888107a139f0 of 8 bytes by task 3286 on cpu 1: [ 243.236105][ T2982] dentry_unlink_inode+0x6a/0x290 [ 243.241177][ T2982] d_delete+0xc8/0xe0 [ 243.245207][ T2982] d_delete_notify+0x32/0x100 [ 243.249937][ T2982] vfs_unlink+0x289/0x490 [ 243.254312][ T2982] filename_unlinkat+0x1e2/0x410 [ 243.256691][T14257] netlink: 824 bytes leftover after parsing attributes in process `syz.3.4023'. [ 243.259383][ T2982] __se_sys_unlink+0x2b/0xe0 [ 243.259428][ T2982] __x64_sys_unlink+0x1f/0x30 [ 243.277813][ T2982] x64_sys_call+0x2eb6/0x3020 [ 243.282523][ T2982] do_syscall_64+0x12c/0x3b0 [ 243.287150][ T2982] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 243.293089][ T2982] [ 243.295436][ T2982] read to 0xffff888107a139f0 of 8 bytes by task 2982 on cpu 0: [ 243.303054][ T2982] step_into_slowpath+0x12c/0x4c0 [ 243.308144][ T2982] path_lookupat+0x330/0x500 [ 243.312768][ T2982] filename_lookup+0x190/0x390 [ 243.317590][ T2982] do_readlinkat+0x74/0x2f0 [ 243.322120][ T2982] __x64_sys_readlink+0x47/0x60 [ 243.326992][ T2982] x64_sys_call+0x2b51/0x3020 [ 243.331729][ T2982] do_syscall_64+0x12c/0x3b0 [ 243.336372][ T2982] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 243.342293][ T2982] [ 243.344630][ T2982] value changed: 0xffff88811b5a0888 -> 0x0000000000000000 [ 243.351751][ T2982] [ 243.354108][ T2982] Reported by Kernel Concurrency Sanitizer on: [ 243.360268][ T2982] CPU: 0 UID: 0 PID: 2982 Comm: udevd Not tainted syzkaller #0 PREEMPT(full) [ 243.369138][ T2982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 243.379212][ T2982] ==================================================================