last executing test programs: 2.930986394s ago: executing program 4 (id=6723): r0 = msgget$private(0x0, 0xfffffffffffffffd) msgrcv(r0, 0x0, 0x0, 0x1, 0x3000) msgrcv(r0, 0x0, 0x0, 0x1, 0x0) msgsnd(r0, &(0x7f0000000000)={0x1}, 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) getresuid(&(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000500)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) lchown(&(0x7f0000000180)='./file0\x00', 0xee00, r1) lstat(&(0x7f0000000600)='./file1\x00', &(0x7f00000003c0)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000dc0)='/proc/tty/drivers\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0xff}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020030000b02d25a806f8c2d94f90224fc602f1a04000a740100073582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x4000}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') 2.076832053s ago: executing program 4 (id=6746): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x4008014, 0x0, 0x0) r2 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r2, &(0x7f0000000040), 0x10) listen(r2, 0x5) r3 = socket(0x28, 0x5, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000340)={0x200000, 0x200000, 0x0, 0x0, 0x5989}) setrlimit(0x40000000000008, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) connect$vsock_stream(r3, &(0x7f0000000080), 0x10) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000024c0)=@newtaction={0x14, 0x30, 0x1, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4004885}, 0x40004) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f00000000c0)={0x1, 0x79e}, 0x8) sendmmsg(r3, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="1b", 0x40000}], 0x1}}], 0x1, 0x24008094) 1.98052336s ago: executing program 4 (id=6748): syz_emit_ethernet(0x66, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="05000000040000000800000044"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1, 0x0, 0x5}, 0x18) timerfd_gettime(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@generic={0x6b, 0x1, 0x1, 0x5d}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) 1.796571895s ago: executing program 2 (id=6753): syz_mount_image$iso9660(&(0x7f0000000dc0), &(0x7f0000002380)='./file1\x00', 0x3a0cc0a, &(0x7f0000000580)={[{@dmode={'dmode', 0x3d, 0x51}}, {@dmode={'dmode', 0x3d, 0x3}}, {@map_normal}, {@map_acorn}, {@session={'session', 0x3d, 0x3f}}, {@overriderock}, {@nocompress}, {@dmode={'dmode', 0x3d, 0x81}}, {@unhide}, {@nojoliet}, {@session={'session', 0x3d, 0x9}}, {}, {@iocharset={'iocharset', 0x3d, 'cp857'}}], [{@uid_eq}], 0x2c}, 0x3, 0x9ea, &(0x7f0000004100)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000001c0)=[{{0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x4008054}}, {{&(0x7f00000000c0)=@file={0x1, './file1\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x40010}}], 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2400, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) getsockopt$IP_SET_OP_GET_FNAME(r4, 0x1, 0x53, 0x0, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', 0xffffffffffffffff, 0x0, 0x5}, 0x18) sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20010814) close(r1) 1.786989716s ago: executing program 4 (id=6754): syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x80040c, &(0x7f0000000580)={[{@orlov}, {@norecovery}]}, 0x1, 0x5e8, &(0x7f0000001200)="$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") bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r1, &(0x7f0000004200)='t', 0x1) sendfile(r1, r0, 0x0, 0x3ffff) sendfile(r1, r0, 0x0, 0x7ffff000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3, 0x0, 0x3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) 1.283086507s ago: executing program 2 (id=6758): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0xfd, 0x7fff0000}]}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x1a3c82) syz_open_dev$sg(&(0x7f0000000280), 0x80000000002, 0x1) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r2, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="16000000000000000400000007"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000000000000081, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x18) socket(0x10, 0x3, 0x0) 1.214768942s ago: executing program 2 (id=6759): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x18) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000140)={0x30, r3, 0x1, 0xea, 0xa6ff, {{}, {0x0, 0x3}, {0x14}}}, 0x30}, 0x1, 0x0, 0x0, 0x4004018}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0xf800, 0x2, 0x84, 0x40}, {0x7, 0x7, 0x4, 0x9}]}) r5 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r5, 0x1, 0x3c, &(0x7f0000000100)={0x200000000000001}, 0x8) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev, 0x5}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000001440)=ANY=[], 0xc0) sendmmsg$inet6(r5, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4000000) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) 1.132944129s ago: executing program 2 (id=6761): r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendto$inet6(r1, &(0x7f0000000000)="8000647dd38061ea", 0x8, 0x24000810, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0x4, &(0x7f00000003c0)=0x6, 0xdc) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0, 0xb4}}, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], &(0x7f0000000200)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x6f}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r6 = socket$netlink(0x10, 0x3, 0x0) writev(r6, &(0x7f00000003c0)=[{&(0x7f0000000240)="3900000013000318680907070000000f0000ff3f04000000170a001700000000040037000f00030001332564aaee7b1d58b9a64411f6bbf44d", 0x39}], 0x1) 960.588332ms ago: executing program 2 (id=6766): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00\x00\v\x00'}) 897.069827ms ago: executing program 2 (id=6769): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95, 0x3}, 0x100002, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0002007fc54379b5394e5cb3fc084d05000000ddfcffff0c1000000000000902000000000000002e0000"], &(0x7f0000002340)=""/4096, 0x2b, 0x1000, 0x1, 0x3}, 0x71) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x5}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_read_part_table(0x618, &(0x7f0000002200)="$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") creat(&(0x7f0000000100)='./bus\x00', 0x8c) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x147842, 0x49) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x1000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)="e72c74080a4b4aadb3463a0b739c3264603520abda8c5bf58ba774e2d23c0a88de08b4e9e7dbd349a9f766610647b038c0e76e082a2e") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="19000000040000000400", @ANYBLOB], 0x48) write$qrtrtun(r0, &(0x7f00000001c0)="1b559ec20c92c82ce917c42f8f201da9b40b42f5cc352de47604589591e6ae13f5ab7b499c6c67b8eb1b20d1a5b9362b5083954edf5a0d03fc79ef73b785798d37d058ce024034b7ea88fa4efe8c623a2e4a7917679408ccf3860fcbc061e543d70763b3db2c6c022d60bd5888829bdaf8838c25f376f1cf60802e7db3ba815122d71ac7137c3d253b2307aef51ac85e2ee525ac0c8c1a87b735155617e83a52448bbca6497f1cdfefd220f149d32ab4b90e0e536203fb0ddf0a6d323b7fb65df70bce0a4727126d51f059433cb99b52c0ead85c765c92d67f0e42fcdd05e29ac0bc5a4b84e8ca3de91852", 0xeb) migrate_pages(0x0, 0x2, 0x0, &(0x7f0000000400)=0x3) preadv2(r0, &(0x7f0000000040)=[{&(0x7f0000001200)=""/4096, 0xfffffdef}], 0x1, 0x2200, 0x0, 0x0) 832.565703ms ago: executing program 4 (id=6770): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200002104000000000000", @ANYRES32, @ANYBLOB], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000240)=""/252, 0x37, 0xfc, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000040)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x14, &(0x7f00000000c0), 0x1, 0x10, &(0x7f0000000000), 0xa, 0x0, 0xffffffffffffffff, 0x4c}, 0x70) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x20600, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f00000004c0)="73c7958c9d94efc82767a936453ddb24a1a5a8d092d6a6412af65f0e60aa6f82df820f668d7cb698d94d6f983fd42c905f08847ebbd543e4b70bfce65bf461a554edb3e733a5aa9d2047dd03168e105463b0a3689ebbf313b7e3e02975cf9d4d3e2dc95bd14a2232a2746d397b68b737dd9d2b9873d5a225d791c48855d6a0f30c") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) 818.126964ms ago: executing program 4 (id=6772): mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000, 0x1) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kmem_cache_free\x00', r0}, 0x18) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000640)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000"], 0x48) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x11c0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) preadv(r2, &(0x7f0000000280)=[{0x0}, {&(0x7f00000002c0)=""/224, 0xe0}], 0x2, 0x14, 0x2) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000180), 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x200000000000000) 686.741444ms ago: executing program 0 (id=6776): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000780)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xfdb}}, @TCA_CT_MARK={0x8, 0x10}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20004000}, 0x10000000) fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') getxattr(&(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket(0x2a, 0x2, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=@newtfilter={0x9c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0xfffa}, {}, {0x5, 0xfff9}}, [@filter_kind_options=@f_flower={{0xb}, {0x6c, 0x2, [@TCA_FLOWER_ACT={0x54, 0x3, [@m_connmark={0x50, 0x1, 0x0, 0x0, {{0xd}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfffffff8, 0xfff, 0x0, 0x5, 0xb}, 0x3}}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x3}}}}]}, @TCA_FLOWER_KEY_ARP_SHA={0xa, 0x3f, @local}, @TCA_FLOWER_KEY_ARP_TIP_MASK={0x8}]}}]}, 0x9c}}, 0x24000000) r4 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r4, &(0x7f00000002c0), 0x40000000000009f, 0x0) 590.317242ms ago: executing program 0 (id=6779): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00\x00\v\x00'}) 515.012138ms ago: executing program 1 (id=6781): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r5, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01dfffffff9a26000000210000000c00018008000100", @ANYRES32=r2], 0x20}, 0x1, 0x0, 0x0, 0x4000c00}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r7, &(0x7f0000000300)={'#! ', '', [{0x20, 'memory.events\x00'}]}, 0x13) 485.9353ms ago: executing program 0 (id=6782): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r5, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01dfffffff9a26000000210000000c00018008000100", @ANYRES32=r2], 0x20}, 0x1, 0x0, 0x0, 0x4000c00}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r7, &(0x7f0000000300)={'#! ', '', [{0x20, 'memory.events\x00'}]}, 0x13) 454.277963ms ago: executing program 3 (id=6783): r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000440), 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) listen(r0, 0x5) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @local}, 0x10) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000180)='u', 0x1}], 0x1) r2 = accept4$unix(r0, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000240)=""/52, 0x34}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) add_key(&(0x7f0000000000)='ceph\x00', 0x0, &(0x7f0000000080)="010000000037a788a11d1f", 0xb, 0xfffffffffffffffb) 434.850395ms ago: executing program 1 (id=6784): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r5, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01dfffffff9a26000000210000000c00018008000100", @ANYRES32=r2], 0x20}, 0x1, 0x0, 0x0, 0x4000c00}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)={'#! ', '', [{0x20, 'memory.events\x00'}]}, 0x13) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x82, 0x500, 0xf2ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000080)}, 0x400, 0x200000000000, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 434.300635ms ago: executing program 0 (id=6785): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0xfc, 0x0, 0x7ffc0002}]}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = gettid() r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) read$ptp(r2, 0x0, 0x0) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x21, 0x4, @tid=r1}, &(0x7f0000bbdffc)=0x0) syz_open_procfs(0x0, 0x0) timer_settime(r3, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x1000000000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000100)={0x0}) 389.222479ms ago: executing program 1 (id=6786): socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) close(r2) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000340)=ANY=[@ANYRES16=r0, @ANYRES32=r0]) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r3) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) close(r5) socket(0x10, 0x803, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) 341.035002ms ago: executing program 3 (id=6787): syz_emit_ethernet(0x66, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="05000000040000000800000044"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1, 0x0, 0x5}, 0x18) timerfd_gettime(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@generic={0x6b, 0x1, 0x1, 0x5d}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) fcntl$setsig(0xffffffffffffffff, 0xa, 0x13) 340.187562ms ago: executing program 0 (id=6788): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='kfree\x00', r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r3}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r4 = syz_io_uring_setup(0x18d6, &(0x7f0000000040)={0x0, 0x3, 0x0, 0x0, 0xad}, &(0x7f0000000440), 0x0) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r4, 0x2, &(0x7f0000000180), 0xfe) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0202000311000000000000000000000005000500000000000a00000000000000fe8000000000000000000000000000bb000000000000000002000100000007000000000b000000000200090000000000000000000000000005000600000000000a00000000000000fe8800000000000000000000000000010000000000000000010018"], 0x88}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r6) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r7, @ANYBLOB='ya\x00\x00\x00\x00\x00\x00\x00\x00~'], 0x1c}}, 0x4000054) 288.548206ms ago: executing program 3 (id=6789): timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x3, 0x60d3, 0xff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000f0000000000000c00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000200b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) r3 = getpid() r4 = syz_pidfd_open(r3, 0x0) r5 = pidfd_getfd(r4, r4, 0x0) setns(r5, 0x66020000) syz_clone(0x50a60080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="00000000010000007f4e980d0000000000000000", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0xfffffff8}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000240), 0x12) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(r0, 0x0, &(0x7f0000000040)={{}, {r6, r7+10000000}}, 0x0) 285.285987ms ago: executing program 0 (id=6790): bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) open(&(0x7f0000000140)='./file0\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5e8, &(0x7f0000001200)="$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") socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) ioctl$sock_inet_SIOCGIFADDR(r3, 0x8915, 0x0) write(r3, &(0x7f0000004200)='t', 0x1) sendfile(r3, r2, 0x0, 0x3ffff) sendfile(r3, r2, 0x0, 0x7ffff000) socket$inet6_tcp(0xa, 0x1, 0x0) 272.945068ms ago: executing program 1 (id=6791): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001000)=ANY=[@ANYBLOB="1000000004000000040000000700000000000000", @ANYRES32, @ANYBLOB="0000000000000000009606000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket(0x29, 0x2, 0x3a) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x7}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xfe, 0x0, 0x7ffc9ffe}]}) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") 237.722401ms ago: executing program 3 (id=6792): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0x5f}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x100, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000780)=[{0x200000000006, 0xf, 0x6, 0x7ffc1ffb}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x18) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x30046, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) 166.915986ms ago: executing program 3 (id=6793): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00\x00\v\x00'}) 150.488238ms ago: executing program 1 (id=6794): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r5, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01dfffffff9a26000000210000000c00018008000100", @ANYRES32=r2], 0x20}, 0x1, 0x0, 0x0, 0x4000c00}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r7, &(0x7f0000000300)={'#! ', '', [{0x20, 'memory.events\x00'}]}, 0x13) 23.993778ms ago: executing program 1 (id=6795): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x81) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f000000000000000002000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4005}, 0x0) sendmmsg(r3, &(0x7f0000000000), 0x4000000000001f2, 0x0) 0s ago: executing program 3 (id=6796): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) write$binfmt_aout(r1, &(0x7f0000000340)={{0x107, 0x3, 0x7, 0x357, 0x85, 0x8, 0x1e8, 0x5}, "78d5c09c9efd4734ee08d1e0172085bead3fc1b5dff8f5d121abadb9f696aeef69665dea3eff792e936277c462e4fb54b5797cb611ca398376e0e6e4950e6ba320be32bb0da1043cec3aac3ad7dc5224626c80de786e7a665b474d379b9be0f1c66410af9ef48ae2edf5cc5cbc7ca41a5baad7ea3a280cd593bc1eaaddbd616b5d3728aa1fc143cdc93ba16993f720d13933e2abbc8a08ed"}, 0xb8) waitid(0x0, r0, 0x0, 0x4, 0x0) r2 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r2, 0x2, 0x0, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000440)=ANY=[@ANYRES8=0x0], 0x1, 0x30e, &(0x7f0000000f00)="$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") ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYRES8=r3], 0x33fe0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x12) write(r5, &(0x7f0000004200)='t', 0x1) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') preadv(r6, &(0x7f0000000140)=[{&(0x7f0000001a80)=""/102387, 0x18ff3}], 0x1, 0x3fe, 0x6) sendfile(r5, r4, 0x0, 0x3ffff) kernel console output (not intermixed with test programs): 67295 subj=root:sysadm_r:sysadm_t pid=14381 comm="syz.1.4470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f04cf24ebe9 code=0x7ffc0000 [ 256.272383][ T29] audit: type=1326 audit(1756369133.879:698752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14381 comm="syz.1.4470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04cf24ebe9 code=0x7ffc0000 [ 256.296707][ T29] audit: type=1326 audit(1756369133.879:698753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14381 comm="syz.1.4470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04cf24ebe9 code=0x7ffc0000 [ 256.320450][ T29] audit: type=1326 audit(1756369133.889:698754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14381 comm="syz.1.4470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f04cf24ebe9 code=0x7ffc0000 [ 256.344159][ T29] audit: type=1326 audit(1756369133.889:698755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14381 comm="syz.1.4470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04cf24ebe9 code=0x7ffc0000 [ 256.510856][T14392] lo speed is unknown, defaulting to 1000 [ 256.998479][T14397] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4474'. [ 257.141663][T14408] validate_nla: 1 callbacks suppressed [ 257.141680][T14408] netlink: 'syz.0.4478': attribute type 4 has an invalid length. [ 257.209950][T14408] netlink: 'syz.0.4478': attribute type 4 has an invalid length. [ 257.617205][T14395] netlink: 'syz.1.4473': attribute type 4 has an invalid length. [ 257.909490][T14418] lo speed is unknown, defaulting to 1000 [ 258.360138][T14425] random: crng reseeded on system resumption [ 258.371750][T14425] Restarting kernel threads ... [ 258.378016][T14425] Done restarting kernel threads. [ 258.472676][T14433] SELinux: ebitmap: truncated map [ 258.597436][T14433] SELinux: failed to load policy [ 259.816053][T14466] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4500'. [ 259.854569][T14468] serio: Serial port ttyS3 [ 259.990629][T14480] C: renamed from team_slave_0 [ 259.998019][T14480] netlink: 164 bytes leftover after parsing attributes in process `syz.1.4506'. [ 260.010416][T14480] can0: slcan on ttyS3. [ 260.046938][T14480] can0 (unregistered): slcan off ttyS3. [ 260.608319][T14505] netlink: 'syz.2.4515': attribute type 1 has an invalid length. [ 260.621306][T14505] 8021q: adding VLAN 0 to HW filter on device bond7 [ 260.633708][T14505] 8021q: adding VLAN 0 to HW filter on device bond7 [ 260.640903][T14505] bond7: (slave vxcan3): The slave device specified does not support setting the MAC address [ 260.652235][T14505] bond7: (slave vxcan3): Error -95 calling set_mac_address [ 260.688030][T14507] bond8: entered promiscuous mode [ 260.694083][T14507] 8021q: adding VLAN 0 to HW filter on device bond8 [ 260.702019][T14507] bond7: (slave bond8): Enslaving as an active interface with a down link [ 260.716345][T14505] macvlan0: entered promiscuous mode [ 260.721672][T14505] macvlan0: entered allmulticast mode [ 260.728400][T14505] bond7: entered promiscuous mode [ 260.733718][T14505] 8021q: adding VLAN 0 to HW filter on device macvlan0 [ 260.745879][T14505] bond7: left promiscuous mode [ 260.756126][T14510] veth0_to_team: left promiscuous mode [ 260.761884][T14510] gretap0: left promiscuous mode [ 260.767746][T14510] veth9: left promiscuous mode [ 260.821672][T14516] netlink: 132 bytes leftover after parsing attributes in process `syz.2.4519'. [ 260.897624][T14514] netlink: 'syz.0.4518': attribute type 4 has an invalid length. [ 260.978026][T14525] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4522'. [ 261.062372][ T29] kauditd_printk_skb: 190 callbacks suppressed [ 261.062390][ T29] audit: type=1400 audit(1756369138.840:698946): avc: denied { create } for pid=14522 comm="syz.0.4521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 261.121769][ T29] audit: type=1400 audit(1756369138.850:698947): avc: denied { prog_load } for pid=14522 comm="syz.0.4521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 261.141276][ T29] audit: type=1400 audit(1756369138.850:698948): avc: denied { create } for pid=14522 comm="syz.0.4521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 261.195418][ T29] audit: type=1400 audit(1756369138.951:698949): avc: denied { open } for pid=14528 comm="syz.1.4523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 261.215207][ T29] audit: type=1400 audit(1756369138.962:698950): avc: denied { map_create } for pid=14528 comm="syz.1.4523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 261.234676][ T29] audit: type=1400 audit(1756369138.972:698951): avc: denied { prog_load } for pid=14528 comm="syz.1.4523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 261.254056][ T29] audit: type=1400 audit(1756369138.972:698952): avc: denied { prog_load } for pid=14528 comm="syz.1.4523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 261.273490][ T29] audit: type=1400 audit(1756369138.972:698953): avc: denied { prog_load } for pid=14528 comm="syz.1.4523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 261.292857][ T29] audit: type=1400 audit(1756369138.972:698954): avc: denied { prog_load } for pid=14528 comm="syz.1.4523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 261.365736][T14531] lo speed is unknown, defaulting to 1000 [ 261.384351][T14535] netlink: 'syz.1.4526': attribute type 10 has an invalid length. [ 261.392312][T14535] netlink: 40 bytes leftover after parsing attributes in process `syz.1.4526'. [ 261.409653][ T29] audit: type=1400 audit(1756369138.972:698955): avc: denied { prog_load } for pid=14528 comm="syz.1.4523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 261.451165][T14535] dummy0: entered promiscuous mode [ 261.471512][T14535] net_ratelimit: 1 callbacks suppressed [ 261.471530][T14535] A link change request failed with some changes committed already. Interface dummy0 may have been left with an inconsistent configuration, please check. [ 261.696614][T14550] team0: Port device dummy0 removed [ 261.719625][T14550] bond0: (slave batadv2): Releasing active interface [ 261.742075][T14550] bond9: (slave veth19): Releasing active interface [ 261.748800][T14550] gretap0: entered promiscuous mode [ 261.755778][T14550] bond9: (slave gretap0): Releasing active interface [ 261.762547][T14550] gretap0: left promiscuous mode [ 261.769289][T14550] batadv3: left allmulticast mode [ 261.774358][T14550] batadv3: left promiscuous mode [ 261.779456][T14550] bridge0: port 1(batadv3) entered disabled state [ 261.820128][T14072] tipc: Resetting bearer [ 262.874838][T14582] serio: Serial port ptm0 [ 263.475484][T14603] pim6reg1: entered promiscuous mode [ 263.480899][T14603] pim6reg1: entered allmulticast mode [ 263.744084][T14622] netlink: 'syz.2.4562': attribute type 10 has an invalid length. [ 264.056534][T14644] syzkaller0: entered promiscuous mode [ 264.062125][T14644] syzkaller0: entered allmulticast mode [ 264.793357][T14034] erspan0: left promiscuous mode [ 264.940662][T14682] syzkaller0: entered promiscuous mode [ 264.946431][T14682] syzkaller0: entered allmulticast mode [ 265.451510][T14701] lo speed is unknown, defaulting to 1000 [ 265.612787][T14709] 8021q: VLANs not supported on sit0 [ 265.973893][T14734] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 265.980492][T14734] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 265.988300][T14734] vhci_hcd vhci_hcd.0: Device attached [ 266.028784][T14736] vhci_hcd: connection closed [ 266.029262][ T29] kauditd_printk_skb: 578 callbacks suppressed [ 266.029279][ T29] audit: type=1400 audit(1756369143.832:699534): avc: denied { write } for pid=14720 comm="syz.1.4607" name="001" dev="devtmpfs" ino=171 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 266.063503][ T29] audit: type=1400 audit(1756369143.832:699535): avc: denied { prog_load } for pid=14720 comm="syz.1.4607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.082994][ T29] audit: type=1400 audit(1756369143.842:699536): avc: denied { create } for pid=14733 comm="syz.0.4613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 266.102947][T14030] vhci_hcd: stop threads [ 266.103554][ T29] audit: type=1400 audit(1756369143.863:699537): avc: denied { prog_load } for pid=14739 comm="syz.4.4614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.107231][T14030] vhci_hcd: release socket [ 266.126639][ T29] audit: type=1400 audit(1756369143.863:699538): avc: denied { map_create } for pid=14739 comm="syz.4.4614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.126659][ T29] audit: type=1400 audit(1756369143.863:699539): avc: denied { prog_load } for pid=14739 comm="syz.4.4614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.126677][ T29] audit: type=1400 audit(1756369143.863:699540): avc: denied { prog_load } for pid=14739 comm="syz.4.4614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.131125][T14030] vhci_hcd: disconnect device [ 266.194110][ T29] audit: type=1400 audit(1756369143.863:699541): avc: denied { open } for pid=14739 comm="syz.4.4614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 266.213818][ T29] audit: type=1400 audit(1756369143.923:699542): avc: denied { create } for pid=14729 comm="syz.2.4611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 266.233693][ T29] audit: type=1400 audit(1756369143.923:699543): avc: denied { prog_load } for pid=14741 comm="syz.4.4615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.266786][T14746] tap0: tun_chr_ioctl cmd 1074025681 [ 266.322812][T14752] syzkaller0: entered promiscuous mode [ 266.328350][T14752] syzkaller0: entered allmulticast mode [ 266.702186][T14788] netlink: 'syz.0.4636': attribute type 1 has an invalid length. [ 266.735031][T14788] 8021q: adding VLAN 0 to HW filter on device bond11 [ 266.779395][T14790] bond11: (slave veth1): Enslaving as an active interface with a down link [ 266.807333][T14788] vlan0: entered allmulticast mode [ 266.813000][T14788] bond11: (slave vlan0): Opening slave failed [ 266.906921][T14800] lo speed is unknown, defaulting to 1000 [ 267.262972][T14835] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4655'. [ 267.294648][T14835] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4655'. [ 267.391171][T14843] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4658'. [ 267.489112][T14850] Falling back ldisc for ttyS3. [ 268.119841][T14877] netlink: 'syz.3.4683': attribute type 13 has an invalid length. [ 268.185266][ T3372] lo speed is unknown, defaulting to 1000 [ 268.191136][ T3372] syz2: Port: 1 Link DOWN [ 268.206790][ T3385] lo speed is unknown, defaulting to 1000 [ 268.274752][T14885] veth0_to_team: entered promiscuous mode [ 268.815890][T14918] netlink: 24 bytes leftover after parsing attributes in process `syz.1.4692'. [ 268.839879][T14918] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4692'. [ 270.792669][T14994] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4734'. [ 270.856584][T15008] netlink: 20 bytes leftover after parsing attributes in process `syz.2.4731'. [ 270.881245][T15010] netlink: 60 bytes leftover after parsing attributes in process `syz.2.4732'. [ 271.042340][ T29] kauditd_printk_skb: 704 callbacks suppressed [ 271.042357][ T29] audit: type=1400 audit(1756369148.911:700248): avc: denied { prog_load } for pid=15019 comm="syz.3.4737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.068246][ T29] audit: type=1400 audit(1756369148.911:700249): avc: denied { read } for pid=15020 comm="syz.2.4747" dev="nsfs" ino=4026532711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 271.090256][ T29] audit: type=1400 audit(1756369148.921:700250): avc: denied { create } for pid=15020 comm="syz.2.4747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 271.094275][T15021] binfmt_misc: register: failed to install interpreter file ./file2 [ 271.110164][ T29] audit: type=1400 audit(1756369148.921:700251): avc: denied { create } for pid=15020 comm="syz.2.4747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 271.110193][ T29] audit: type=1400 audit(1756369148.921:700252): avc: denied { map_create } for pid=15020 comm="syz.2.4747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.110214][ T29] audit: type=1400 audit(1756369148.921:700253): avc: denied { prog_load } for pid=15020 comm="syz.2.4747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.177056][ T29] audit: type=1400 audit(1756369148.921:700254): avc: denied { read write } for pid=15020 comm="syz.2.4747" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 271.201177][ T29] audit: type=1400 audit(1756369148.921:700255): avc: denied { create } for pid=15020 comm="syz.2.4747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 271.221179][ T29] audit: type=1400 audit(1756369148.921:700256): avc: denied { map_create } for pid=15019 comm="syz.3.4737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.240754][ T29] audit: type=1400 audit(1756369148.921:700257): avc: denied { prog_load } for pid=15019 comm="syz.3.4737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.664140][ T9] Process accounting resumed [ 271.704353][T15045] pim6reg1: entered promiscuous mode [ 271.709722][T15045] pim6reg1: entered allmulticast mode [ 271.741872][T15047] binfmt_misc: register: failed to install interpreter file ./file2 [ 272.168455][T15084] netlink: 28 bytes leftover after parsing attributes in process `syz.3.4766'. [ 272.177477][T15084] netlink: 28 bytes leftover after parsing attributes in process `syz.3.4766'. [ 272.413362][T15086] pim6reg1: entered promiscuous mode [ 272.418829][T15086] pim6reg1: entered allmulticast mode [ 273.002357][T15128] lo speed is unknown, defaulting to 1000 [ 273.100024][T15133] lo speed is unknown, defaulting to 1000 [ 273.622761][T15169] netlink: 'syz.0.4802': attribute type 39 has an invalid length. [ 273.635363][T15166] lo speed is unknown, defaulting to 1000 [ 273.693677][T15179] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4806'. [ 273.707874][T15179] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4806'. [ 273.732433][T15179] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4806'. [ 273.751820][T15183] syzkaller0: entered promiscuous mode [ 273.757449][T15183] syzkaller0: entered allmulticast mode [ 273.903298][T15202] netlink: 'syz.1.4818': attribute type 39 has an invalid length. [ 273.920219][T15205] syzkaller0: entered promiscuous mode [ 274.084210][T15218] syzkaller0: entered promiscuous mode [ 274.089760][T15218] syzkaller0: entered allmulticast mode [ 274.125498][T15222] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=15222 comm=]-[} [ 274.250116][T15233] netlink: 14 bytes leftover after parsing attributes in process `syz.1.4832'. [ 274.283113][T15235] lo speed is unknown, defaulting to 1000 [ 274.496356][T15248] syzkaller0: entered promiscuous mode [ 274.525867][T15250] syzkaller0: entered promiscuous mode [ 274.531451][T15250] syzkaller0: entered allmulticast mode [ 274.582938][T15256] lo speed is unknown, defaulting to 1000 [ 274.880911][T15287] netlink: 'syz.3.4855': attribute type 4 has an invalid length. [ 274.895825][T15287] netlink: 'syz.3.4855': attribute type 4 has an invalid length. [ 274.928532][ T3392] lo speed is unknown, defaulting to 1000 [ 274.934479][ T3392] syz2: Port: 1 Link ACTIVE [ 274.943852][ T3392] lo speed is unknown, defaulting to 1000 [ 274.968584][T15296] bridge_slave_0: default FDB implementation only supports local addresses [ 275.024308][T15308] capability: warning: `syz.3.4865' uses 32-bit capabilities (legacy support in use) [ 275.249326][T15345] C: renamed from team_slave_0 [ 275.259864][T15345] netlink: 164 bytes leftover after parsing attributes in process `syz.3.4880'. [ 275.279477][T15340] can0: slcan on ttyS3. [ 275.328680][T15340] can0 (unregistered): slcan off ttyS3. [ 275.356837][T15349] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4883'. [ 275.685147][T15356] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4886'. [ 275.830182][T15369] netlink: 'syz.0.4891': attribute type 4 has an invalid length. [ 275.841107][T15369] netlink: 'syz.0.4891': attribute type 4 has an invalid length. [ 275.909738][T15379] netlink: 'syz.3.4897': attribute type 4 has an invalid length. [ 275.918811][ T1039] lo speed is unknown, defaulting to 1000 [ 275.924497][T15379] netlink: 'syz.3.4897': attribute type 4 has an invalid length. [ 275.924581][ T1039] syz2: Port: 1 Link DOWN [ 275.937424][ T3372] lo speed is unknown, defaulting to 1000 [ 275.943283][ T3372] syz2: Port: 1 Link ACTIVE [ 275.944905][ T9] lo speed is unknown, defaulting to 1000 [ 275.970501][ T29] kauditd_printk_skb: 1360 callbacks suppressed [ 275.970514][ T29] audit: type=1400 audit(1756369153.915:701618): avc: denied { prog_load } for pid=15381 comm="syz.3.4898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.000234][ T29] audit: type=1400 audit(1756369153.915:701619): avc: denied { create } for pid=15381 comm="syz.3.4898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 276.020217][ T29] audit: type=1400 audit(1756369153.915:701620): avc: denied { map_create } for pid=15381 comm="syz.3.4898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.039743][ T29] audit: type=1400 audit(1756369153.915:701621): avc: denied { prog_load } for pid=15381 comm="syz.3.4898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.059415][ T29] audit: type=1400 audit(1756369153.915:701622): avc: denied { map_create } for pid=15381 comm="syz.3.4898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.078955][ T29] audit: type=1400 audit(1756369153.915:701623): avc: denied { prog_load } for pid=15381 comm="syz.3.4898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.098697][ T29] audit: type=1400 audit(1756369153.915:701624): avc: denied { prog_load } for pid=15381 comm="syz.3.4898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.118160][ T29] audit: type=1400 audit(1756369153.915:701625): avc: denied { create } for pid=15381 comm="syz.3.4898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 276.138285][ T29] audit: type=1400 audit(1756369153.946:701626): avc: denied { prog_load } for pid=15382 comm="syz.4.4899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.144298][T15399] netlink: 'syz.3.4906': attribute type 10 has an invalid length. [ 276.157748][ T29] audit: type=1400 audit(1756369153.946:701627): avc: denied { prog_load } for pid=15382 comm="syz.4.4899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.170389][T15399] team0: Port device dummy0 added [ 277.332941][T15436] netlink: 'syz.2.4921': attribute type 4 has an invalid length. [ 277.377777][T15441] bond9: (slave vxcan3): The slave device specified does not support setting the MAC address [ 277.389464][T15441] bond9: (slave vxcan3): Error -95 calling set_mac_address [ 277.432342][T15448] gretap0: entered promiscuous mode [ 277.441248][T15448] bond9: (slave gretap0): making interface the new active one [ 277.450917][T15448] bond9: (slave gretap0): Enslaving as an active interface with an up link [ 277.477617][T15441] macvlan0: entered promiscuous mode [ 277.483026][T15441] macvlan0: entered allmulticast mode [ 277.492990][T15441] bond9: entered promiscuous mode [ 277.498608][T15441] 8021q: adding VLAN 0 to HW filter on device macvlan0 [ 277.509976][T15441] bond9: (slave macvlan0): the slave hw address is in use by the bond; giving it the hw address of gretap0 [ 277.542375][T15441] bond9: left promiscuous mode [ 277.567773][T15459] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4929'. [ 277.608636][T15462] all (unregistering): Released all slaves [ 277.823853][T15496] bond15: (slave vxcan3): The slave device specified does not support setting the MAC address [ 277.837718][T15496] bond15: (slave vxcan3): Error -95 calling set_mac_address [ 277.873607][T15506] gretap0: entered promiscuous mode [ 277.881348][T15506] bond15: (slave gretap0): making interface the new active one [ 277.891894][T15506] bond15: (slave gretap0): Enslaving as an active interface with an up link [ 277.918067][T15496] macvlan0: entered promiscuous mode [ 277.923463][T15496] macvlan0: entered allmulticast mode [ 277.929482][T15496] bond15: entered promiscuous mode [ 277.934970][T15496] 8021q: adding VLAN 0 to HW filter on device macvlan0 [ 277.948002][T15496] bond15: (slave macvlan0): the slave hw address is in use by the bond; giving it the hw address of gretap0 [ 277.960032][T15496] bond15: left promiscuous mode [ 278.071035][T15509] lo speed is unknown, defaulting to 1000 [ 278.254822][T15522] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4957'. [ 278.266388][T15522] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4957'. [ 278.653850][T15537] netlink: 1347 bytes leftover after parsing attributes in process `syz.2.4964'. [ 278.710706][T15545] validate_nla: 3 callbacks suppressed [ 278.710723][T15545] netlink: 'syz.0.4967': attribute type 10 has an invalid length. [ 278.744405][T15545] team0: Port device dummy0 added [ 278.772954][T15552] netlink: 24 bytes leftover after parsing attributes in process `syz.4.4970'. [ 278.819060][T15552] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4970'. [ 278.927105][T15564] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 278.933653][T15564] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 278.941261][T15564] vhci_hcd vhci_hcd.0: Device attached [ 278.978794][T15568] netlink: 'syz.3.4975': attribute type 4 has an invalid length. [ 278.996553][ T3372] lo speed is unknown, defaulting to 1000 [ 279.002353][ T3372] syz2: Port: 1 Link DOWN [ 279.008641][T15568] netlink: 'syz.3.4975': attribute type 4 has an invalid length. [ 279.020497][T15570] vhci_hcd vhci_hcd.0: pdev(4) rhport(2) sockfd(8) [ 279.027021][T15570] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 279.034659][T15570] vhci_hcd vhci_hcd.0: Device attached [ 279.042514][ T3372] lo speed is unknown, defaulting to 1000 [ 279.060536][ T3372] lo speed is unknown, defaulting to 1000 [ 279.066312][ T3372] syz2: Port: 1 Link ACTIVE [ 279.093979][ T3372] lo speed is unknown, defaulting to 1000 [ 279.118827][T15574] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 279.170143][T15570] vhci_hcd vhci_hcd.0: pdev(4) rhport(4) sockfd(12) [ 279.176804][T15570] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 279.184421][T15570] vhci_hcd vhci_hcd.0: Device attached [ 279.216440][T15564] vhci_hcd vhci_hcd.0: pdev(4) rhport(1) sockfd(5) [ 279.223022][T15564] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 279.230536][T15564] vhci_hcd vhci_hcd.0: Device attached [ 279.284178][T15574] vhci_hcd vhci_hcd.0: pdev(4) rhport(5) sockfd(15) [ 279.290877][T15574] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 279.298485][T15574] vhci_hcd vhci_hcd.0: Device attached [ 279.385822][T15583] vhci_hcd: connection closed [ 279.385902][T15571] vhci_hcd: connection closed [ 279.385965][T15569] vhci_hcd: connection closed [ 279.390826][T15576] vhci_hcd: connection closed [ 279.395705][T15565] vhci_hcd: connection closed [ 279.405612][ T41] vhci_hcd: stop threads [ 279.414684][ T41] vhci_hcd: release socket [ 279.419238][ T41] vhci_hcd: disconnect device [ 279.424171][ T1039] usb 9-1: new low-speed USB device number 2 using vhci_hcd [ 279.433563][ T41] vhci_hcd: stop threads [ 279.437830][ T41] vhci_hcd: release socket [ 279.440086][T15566] vhci_hcd: sendmsg failed!, ret=-32 for 48 [ 279.442289][ T41] vhci_hcd: disconnect device [ 279.460005][ T41] vhci_hcd: stop threads [ 279.464311][ T41] vhci_hcd: release socket [ 279.468740][ T41] vhci_hcd: disconnect device [ 279.583206][T15593] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4982'. [ 279.649977][ T41] vhci_hcd: stop threads [ 279.654260][ T41] vhci_hcd: release socket [ 279.658871][ T41] vhci_hcd: disconnect device [ 279.675828][ T41] vhci_hcd: stop threads [ 279.680158][ T41] vhci_hcd: release socket [ 279.684630][ T41] vhci_hcd: disconnect device [ 279.858169][T15601] netlink: 'syz.0.4987': attribute type 1 has an invalid length. [ 279.945162][T15601] 8021q: adding VLAN 0 to HW filter on device bond12 [ 279.989891][T15606] bond13: entered promiscuous mode [ 279.996419][T15606] 8021q: adding VLAN 0 to HW filter on device bond13 [ 280.076374][T15606] bond12: (slave bond13): Enslaving as an active interface with a down link [ 280.149906][T15601] macvlan1: entered promiscuous mode [ 280.155254][T15601] macvlan1: entered allmulticast mode [ 280.194995][T15601] bond12: entered promiscuous mode [ 280.200455][T15601] 8021q: adding VLAN 0 to HW filter on device macvlan1 [ 280.242038][T15601] bond12: (slave macvlan1): the slave hw address is in use by the bond; couldn't find a slave with a free hw address to give it (this should not have happened) [ 280.295049][T15601] bond12: left promiscuous mode [ 280.373425][T15617] lo speed is unknown, defaulting to 1000 [ 280.519280][T15621] lo speed is unknown, defaulting to 1000 [ 280.611386][T15630] netlink: 'syz.3.4998': attribute type 7 has an invalid length. [ 280.619263][T15630] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4998'. [ 280.746570][T15634] bridge: RTM_NEWNEIGH with invalid ether address [ 280.872012][ T29] kauditd_printk_skb: 1144 callbacks suppressed [ 280.872030][ T29] audit: type=1400 audit(1756369158.934:702772): avc: denied { open } for pid=15637 comm="syz.4.5001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 280.897881][ T29] audit: type=1326 audit(1756369158.934:702773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15637 comm="syz.4.5001" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876718ebe9 code=0x7ffc0000 [ 280.921617][ T29] audit: type=1326 audit(1756369158.934:702774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15637 comm="syz.4.5001" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876718ebe9 code=0x7ffc0000 [ 280.972433][T15643] syzkaller0: entered promiscuous mode [ 280.978293][T15643] syzkaller0: entered allmulticast mode [ 281.027715][ T29] audit: type=1400 audit(1756369158.975:702775): avc: denied { map_create } for pid=15639 comm="syz.0.5011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 281.047176][ T29] audit: type=1400 audit(1756369158.975:702776): avc: denied { prog_load } for pid=15639 comm="syz.0.5011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 281.066614][ T29] audit: type=1400 audit(1756369158.975:702777): avc: denied { prog_load } for pid=15639 comm="syz.0.5011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 281.086053][ T29] audit: type=1400 audit(1756369158.975:702778): avc: denied { prog_load } for pid=15639 comm="syz.0.5011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 281.098455][T15650] netlink: 'syz.1.5005': attribute type 1 has an invalid length. [ 281.105506][ T29] audit: type=1400 audit(1756369158.975:702779): avc: denied { prog_load } for pid=15639 comm="syz.0.5011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 281.132478][ T29] audit: type=1400 audit(1756369158.975:702780): avc: denied { mount } for pid=15639 comm="syz.0.5011" name="/" dev="configfs" ino=1139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=0 [ 281.155545][ T29] audit: type=1326 audit(1756369159.006:702781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15637 comm="syz.4.5001" exe="/root/syz-executor" sig=0 arch=c000003e syscall=281 compat=0 ip=0x7f876718ebe9 code=0x7ffc0000 [ 281.200963][T15650] 8021q: adding VLAN 0 to HW filter on device bond11 [ 281.227774][T15651] 8021q: adding VLAN 0 to HW filter on device bond11 [ 281.253124][T15651] bond11: (slave vxcan3): The slave device specified does not support setting the MAC address [ 281.280157][T15651] bond11: (slave vxcan3): Error -95 calling set_mac_address [ 281.305941][T15650] bond12: entered promiscuous mode [ 281.315977][T15650] 8021q: adding VLAN 0 to HW filter on device bond12 [ 281.326472][T15650] bond11: (slave bond12): Enslaving as an active interface with a down link [ 281.345757][T15665] netlink: 'syz.2.5010': attribute type 4 has an invalid length. [ 281.361642][T15650] macvlan0: entered promiscuous mode [ 281.366972][T15650] macvlan0: entered allmulticast mode [ 281.373008][T15650] bond11: entered promiscuous mode [ 281.378331][T15650] 8021q: adding VLAN 0 to HW filter on device macvlan0 [ 281.387167][T15650] bond11: left promiscuous mode [ 281.396017][T15669] netlink: 'syz.2.5010': attribute type 4 has an invalid length. [ 281.401431][T15670] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5013'. [ 281.583640][T15689] netlink: 'syz.2.5021': attribute type 1 has an invalid length. [ 281.629756][T15689] 8021q: adding VLAN 0 to HW filter on device bond10 [ 281.723245][T15692] bond10: (slave ip6gretap1): making interface the new active one [ 281.732480][T15692] bond10: (slave ip6gretap1): Enslaving as an active interface with an up link [ 281.823330][T15689] veth17: entered promiscuous mode [ 281.831301][T15689] bond10: (slave veth17): Enslaving as an active interface with a down link [ 281.862071][T15689] erspan0: entered allmulticast mode [ 281.881499][T15699] netlink: 'syz.3.5024': attribute type 10 has an invalid length. [ 281.889347][T15699] netlink: 40 bytes leftover after parsing attributes in process `syz.3.5024'. [ 281.900182][T15689] bond10: (slave erspan0): Enslaving as an active interface with an up link [ 281.907796][T15703] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5026'. [ 281.969436][T15699] dummy0: entered promiscuous mode [ 281.996744][T15699] team0: Port device dummy0 removed [ 282.008790][T15699] A link change request failed with some changes committed already. Interface dummy0 may have been left with an inconsistent configuration, please check. [ 282.062249][T15710] dummy0: left promiscuous mode [ 282.084634][T15712] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5031'. [ 282.104128][T15714] syzkaller0: entered promiscuous mode [ 282.109773][T15714] syzkaller0: entered allmulticast mode [ 282.309846][T15736] lo speed is unknown, defaulting to 1000 [ 282.357493][T15734] lo speed is unknown, defaulting to 1000 [ 282.715943][T15759] 8021q: adding VLAN 0 to HW filter on device bond13 [ 282.774184][T15759] veth21: entered promiscuous mode [ 282.784076][T15759] bond13: (slave veth21): Enslaving as an active interface with a down link [ 282.815534][T15759] erspan0: entered allmulticast mode [ 282.823027][T15759] bond13: (slave erspan0): making interface the new active one [ 282.832013][T15759] erspan0: entered promiscuous mode [ 282.840479][T15759] bond13: (slave erspan0): Enslaving as an active interface with an up link [ 283.019909][T15781] lo speed is unknown, defaulting to 1000 [ 283.193970][T15795] bond10: entered promiscuous mode [ 283.204106][T15795] 8021q: adding VLAN 0 to HW filter on device bond10 [ 283.223330][T15795] 8021q: adding VLAN 0 to HW filter on device bond10 [ 283.230605][T15795] bond10: (slave vxcan3): The slave device specified does not support setting the MAC address [ 283.240893][T15795] bond10: (slave vxcan3): Setting fail_over_mac to active for active-backup mode [ 283.252818][T15795] bond10: (slave vxcan3): making interface the new active one [ 283.260379][T15795] vxcan3: entered promiscuous mode [ 283.266897][T15795] bond10: (slave vxcan3): Enslaving as an active interface with an up link [ 284.307846][T15832] lo speed is unknown, defaulting to 1000 [ 284.356056][ T1039] usb 9-1: enqueue for inactive port 0 [ 284.364966][ T1039] usb 9-1: enqueue for inactive port 0 [ 284.454414][ T1039] vhci_hcd: vhci_device speed not set [ 284.772203][T15849] serio: Serial port ttyS3 [ 285.745554][T15880] lo speed is unknown, defaulting to 1000 [ 285.801583][ T29] kauditd_printk_skb: 747 callbacks suppressed [ 285.801600][ T29] audit: type=1326 audit(1756369163.951:703529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15879 comm="syz.3.5101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9fc8305ba7 code=0x7ffc0000 [ 285.853800][ T29] audit: type=1326 audit(1756369163.982:703530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15879 comm="syz.3.5101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9fc82aade9 code=0x7ffc0000 [ 285.877494][ T29] audit: type=1326 audit(1756369163.982:703531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15879 comm="syz.3.5101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9fc8305ba7 code=0x7ffc0000 [ 285.901125][ T29] audit: type=1326 audit(1756369163.982:703532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15879 comm="syz.3.5101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9fc82aade9 code=0x7ffc0000 [ 285.924855][ T29] audit: type=1326 audit(1756369163.982:703533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15879 comm="syz.3.5101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7f9fc830ebe9 code=0x7ffc0000 [ 285.948613][ T29] audit: type=1326 audit(1756369163.982:703534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15879 comm="syz.3.5101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9fc8305ba7 code=0x7ffc0000 [ 285.972473][ T29] audit: type=1326 audit(1756369163.982:703535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15879 comm="syz.3.5101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9fc82aade9 code=0x7ffc0000 [ 285.996079][ T29] audit: type=1326 audit(1756369163.982:703536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15879 comm="syz.3.5101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=449 compat=0 ip=0x7f9fc830ebe9 code=0x7ffc0000 [ 286.019903][ T29] audit: type=1326 audit(1756369163.992:703537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15879 comm="syz.3.5101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9fc8305ba7 code=0x7ffc0000 [ 286.043527][ T29] audit: type=1326 audit(1756369163.992:703538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15879 comm="syz.3.5101" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9fc82aade9 code=0x7ffc0000 [ 287.526958][T15936] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5125'. [ 287.843199][T15965] lo speed is unknown, defaulting to 1000 [ 288.424789][T15972] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5148'. [ 288.449864][T15975] validate_nla: 4 callbacks suppressed [ 288.449881][T15975] netlink: 'syz.0.5139': attribute type 1 has an invalid length. [ 288.471928][T15975] 8021q: adding VLAN 0 to HW filter on device bond14 [ 288.501404][T15975] bond14: (slave ip6erspan0): making interface the new active one [ 288.510718][T15975] bond14: (slave ip6erspan0): Enslaving as an active interface with an up link [ 288.550490][T15986] netlink: 164 bytes leftover after parsing attributes in process `syz.3.5145'. [ 288.561836][T15986] can0: slcan on ttyS3. [ 288.627307][T15986] can0 (unregistered): slcan off ttyS3. [ 289.617366][T16048] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5172'. [ 289.654341][T16052] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5174'. [ 290.659575][T16086] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5201'. [ 290.675614][T16086] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5201'. [ 290.800284][ T29] kauditd_printk_skb: 960 callbacks suppressed [ 290.800300][ T29] audit: type=1400 audit(1756369169.015:704499): avc: denied { map_create } for pid=16094 comm="syz.1.5191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.827716][T16095] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5191'. [ 290.828754][ T29] audit: type=1400 audit(1756369169.045:704500): avc: denied { prog_load } for pid=16094 comm="syz.1.5191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.844492][T16095] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5191'. [ 290.890356][ T29] audit: type=1400 audit(1756369169.106:704501): avc: denied { prog_load } for pid=16097 comm="syz.3.5193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.910309][ T29] audit: type=1400 audit(1756369169.126:704502): avc: denied { create } for pid=16097 comm="syz.3.5193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 290.931693][ T29] audit: type=1400 audit(1756369169.146:704503): avc: denied { prog_load } for pid=16097 comm="syz.3.5193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.951204][ T29] audit: type=1400 audit(1756369169.146:704504): avc: denied { prog_load } for pid=16097 comm="syz.3.5193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.971148][ T29] audit: type=1400 audit(1756369169.187:704505): avc: denied { map_create } for pid=16097 comm="syz.3.5193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.990992][ T29] audit: type=1400 audit(1756369169.207:704506): avc: denied { prog_load } for pid=16097 comm="syz.3.5193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 291.011356][ T29] audit: type=1400 audit(1756369169.227:704507): avc: denied { allowed } for pid=16097 comm="syz.3.5193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 291.058407][ T29] audit: type=1400 audit(1756369169.257:704508): avc: denied { write } for pid=16099 comm="syz.1.5195" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 292.397781][T16125] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5207'. [ 292.614162][T16143] netlink: 'syz.4.5214': attribute type 1 has an invalid length. [ 292.631362][T16143] 8021q: adding VLAN 0 to HW filter on device bond11 [ 292.651168][T16143] bond11: (slave ip6erspan0): making interface the new active one [ 292.660161][T16143] bond11: (slave ip6erspan0): Enslaving as an active interface with an up link [ 293.151215][T16164] netlink: 'syz.4.5222': attribute type 13 has an invalid length. [ 293.212431][T16164] tipc: Resetting bearer [ 293.567848][T16171] netlink: 'syz.0.5223': attribute type 10 has an invalid length. [ 293.889563][T14034] erspan0: left promiscuous mode [ 294.032249][T16179] __nla_validate_parse: 1 callbacks suppressed [ 294.032270][T16179] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5228'. [ 294.048435][T16179] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5228'. [ 294.075947][T16182] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5230'. [ 294.100074][T16179] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5228'. [ 294.361604][T16204] syzkaller0: entered promiscuous mode [ 294.367294][T16204] syzkaller0: entered allmulticast mode [ 294.613720][T16208] netlink: 'syz.3.5239': attribute type 10 has an invalid length. [ 294.634503][T16208] team0: Port device dummy0 added [ 294.955863][T16229] netlink: 24 bytes leftover after parsing attributes in process `syz.0.5248'. [ 294.991861][T16229] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5248'. [ 295.116113][T16258] wireguard0: entered promiscuous mode [ 295.121828][T16258] wireguard0: entered allmulticast mode [ 295.178067][T16266] syzkaller0: entered promiscuous mode [ 295.183869][T16266] syzkaller0: entered allmulticast mode [ 295.283087][T16269] netlink: 24 bytes leftover after parsing attributes in process `syz.3.5269'. [ 295.326488][T16269] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5269'. [ 295.366984][T16281] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5273'. [ 295.576232][T16299] lo speed is unknown, defaulting to 1000 [ 295.804879][ T29] kauditd_printk_skb: 592 callbacks suppressed [ 295.804897][ T29] audit: type=1400 audit(1756369174.055:705101): avc: denied { create } for pid=16301 comm="syz.4.5282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 295.914614][ T29] audit: type=1400 audit(1756369174.086:705102): avc: denied { map_create } for pid=16301 comm="syz.4.5282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 295.934165][ T29] audit: type=1400 audit(1756369174.086:705103): avc: denied { prog_load } for pid=16301 comm="syz.4.5282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 295.953518][ T29] audit: type=1400 audit(1756369174.086:705104): avc: denied { prog_load } for pid=16301 comm="syz.4.5282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 295.973017][ T29] audit: type=1400 audit(1756369174.086:705105): avc: denied { prog_load } for pid=16301 comm="syz.4.5282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 296.012589][ T29] audit: type=1400 audit(1756369174.261:705106): avc: denied { allowed } for pid=16292 comm="syz.2.5279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 296.032183][ T29] audit: type=1326 audit(1756369174.272:705107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16292 comm="syz.2.5279" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2242e7ebe9 code=0x0 [ 296.092881][ T29] audit: type=1400 audit(1756369174.354:705108): avc: denied { map_create } for pid=16305 comm="syz.1.5283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 296.112841][T16300] netlink: 'syz.2.5279': attribute type 10 has an invalid length. [ 296.142476][ T29] audit: type=1400 audit(1756369174.375:705109): avc: denied { prog_load } for pid=16305 comm="syz.1.5283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 296.161836][ T29] audit: type=1400 audit(1756369174.385:705110): avc: denied { create } for pid=16305 comm="syz.1.5283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 296.341034][T16318] netlink: 24 bytes leftover after parsing attributes in process `syz.4.5289'. [ 296.358705][T16319] lo speed is unknown, defaulting to 1000 [ 296.481879][T16331] serio: Serial port ttyS3 [ 297.027527][T16353] lo speed is unknown, defaulting to 1000 [ 297.671437][T16359] syzkaller0: entered promiscuous mode [ 297.677065][T16359] syzkaller0: entered allmulticast mode [ 297.859093][T16362] netlink: 'syz.4.5300': attribute type 10 has an invalid length. [ 297.868615][T16362] team0: Port device dummy0 added [ 298.819420][T16418] syzkaller0: entered promiscuous mode [ 298.824984][T16418] syzkaller0: entered allmulticast mode [ 298.966861][T16434] netlink: 'syz.0.5335': attribute type 1 has an invalid length. [ 298.981463][T16436] netlink: 'syz.1.5334': attribute type 4 has an invalid length. [ 299.007560][T16434] 8021q: adding VLAN 0 to HW filter on device bond15 [ 299.017763][T16438] __nla_validate_parse: 8 callbacks suppressed [ 299.017783][T16438] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5335'. [ 299.033631][T16439] netlink: 'syz.1.5334': attribute type 4 has an invalid length. [ 299.077004][T16438] bond15 (unregistering): Released all slaves [ 299.596198][T16462] syzkaller0: entered promiscuous mode [ 299.601733][T16462] syzkaller0: entered allmulticast mode [ 300.505480][T16486] netlink: 'syz.0.5362': attribute type 4 has an invalid length. [ 300.526205][T16486] netlink: 'syz.0.5362': attribute type 4 has an invalid length. [ 300.622605][T16500] syzkaller0: entered promiscuous mode [ 300.628268][T16500] syzkaller0: entered allmulticast mode [ 300.658333][T14024] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 20001 - 0 [ 300.674767][ T29] kauditd_printk_skb: 740 callbacks suppressed [ 300.674785][ T29] audit: type=1400 audit(1756369179.059:705851): avc: denied { create } for pid=16507 comm="syz.2.5359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 300.736025][ T29] audit: type=1400 audit(1756369179.110:705852): avc: denied { create } for pid=16510 comm="syz.2.5365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 300.740780][T14024] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 20001 - 0 [ 300.756822][ T29] audit: type=1400 audit(1756369179.110:705853): avc: denied { create } for pid=16510 comm="syz.2.5365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 300.786347][ T29] audit: type=1400 audit(1756369179.110:705854): avc: denied { create } for pid=16510 comm="syz.2.5365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 300.807080][ T29] audit: type=1400 audit(1756369179.110:705855): avc: denied { append } for pid=16510 comm="syz.2.5365" name="sg0" dev="devtmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 300.831059][ T29] audit: type=1400 audit(1756369179.110:705856): avc: denied { prog_load } for pid=16510 comm="syz.2.5365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 300.850421][ T29] audit: type=1400 audit(1756369179.131:705857): avc: denied { open } for pid=16509 comm="syz.4.5361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 300.871895][ T29] audit: type=1400 audit(1756369179.223:705858): avc: denied { map_create } for pid=16509 comm="syz.4.5361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 300.891365][ T29] audit: type=1400 audit(1756369179.223:705859): avc: denied { read } for pid=16509 comm="syz.4.5361" name="event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 300.914812][ T29] audit: type=1400 audit(1756369179.253:705860): avc: denied { create } for pid=16509 comm="syz.4.5361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 300.942964][T14024] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 20001 - 0 [ 300.972076][T16518] bond13: left promiscuous mode [ 300.996745][T14024] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 20001 - 0 [ 301.057500][T16527] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5371'. [ 301.066488][T16527] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5371'. [ 301.075646][T16527] netlink: 'syz.0.5371': attribute type 18 has an invalid length. [ 301.123409][T16527] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5371'. [ 301.132331][T16527] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5371'. [ 301.141317][T16527] netlink: 'syz.0.5371': attribute type 18 has an invalid length. [ 301.178741][T16522] netlink: 'syz.3.5370': attribute type 13 has an invalid length. [ 301.201075][T16522] 8021q: adding VLAN 0 to HW filter on device bond0 [ 301.212273][T16522] 8021q: adding VLAN 0 to HW filter on device team0 [ 301.222790][T16522] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 301.317199][T16541] netlink: 96 bytes leftover after parsing attributes in process `syz.0.5379'. [ 301.443307][T16558] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5385'. [ 301.452406][T16558] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5385'. [ 301.461679][T16558] netlink: 'syz.1.5385': attribute type 18 has an invalid length. [ 301.525525][T16558] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5385'. [ 301.534428][T16558] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5385'. [ 301.543462][T16558] netlink: 'syz.1.5385': attribute type 18 has an invalid length. [ 301.604324][T16564] lo speed is unknown, defaulting to 1000 [ 301.768052][T16578] binfmt_misc: register: failed to install interpreter file ./file2 [ 302.355261][T16614] lo speed is unknown, defaulting to 1000 [ 303.019226][T16660] lo speed is unknown, defaulting to 1000 [ 303.945754][T16715] C: renamed from team_slave_0 [ 303.952874][T16715] __nla_validate_parse: 4 callbacks suppressed [ 303.952891][T16715] netlink: 164 bytes leftover after parsing attributes in process `syz.0.5451'. [ 304.026311][T16706] can0: slcan on ttyS3. [ 304.093480][T16706] can0 (unregistered): slcan off ttyS3. [ 304.101203][T16720] can0: slcan on ttyS3. [ 304.129343][T16699] netlink: 'syz.4.5448': attribute type 13 has an invalid length. [ 304.147913][T16699] 8021q: adding VLAN 0 to HW filter on device team0 [ 304.163075][T16699] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 304.192227][T16726] lo speed is unknown, defaulting to 1000 [ 304.233305][T16731] can0 (unregistered): slcan off ttyS3. [ 304.401766][T16743] netlink: 'syz.4.5466': attribute type 1 has an invalid length. [ 304.424842][T16743] 8021q: adding VLAN 0 to HW filter on device bond12 [ 304.516062][T16743] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5466'. [ 304.558679][T16743] bond12 (unregistering): Released all slaves [ 304.869087][T16770] netlink: 'syz.1.5478': attribute type 13 has an invalid length. [ 304.888046][T16770] 8021q: adding VLAN 0 to HW filter on device bond0 [ 304.896504][T16770] 8021q: adding VLAN 0 to HW filter on device team0 [ 304.906244][T16770] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 304.961786][T16775] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=16775 comm=syz.2.5479 [ 304.991187][T16777] netlink: 80 bytes leftover after parsing attributes in process `syz.2.5481'. [ 305.434233][T16803] netlink: 80 bytes leftover after parsing attributes in process `syz.1.5494'. [ 305.478909][T16805] lo speed is unknown, defaulting to 1000 [ 305.578712][T16811] bond12: entered promiscuous mode [ 305.590288][T16811] 8021q: adding VLAN 0 to HW filter on device bond12 [ 305.600821][ T29] kauditd_printk_skb: 806 callbacks suppressed [ 305.600838][ T29] audit: type=1326 audit(1756369184.097:706667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16810 comm="syz.4.5497" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876718ebe9 code=0x7ffc0000 [ 305.632325][T16801] netlink: 'syz.2.5493': attribute type 13 has an invalid length. [ 305.652958][T16801] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 305.655393][T16816] netlink: 'syz.4.5498': attribute type 1 has an invalid length. [ 305.675897][ T29] audit: type=1326 audit(1756369184.097:706668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16810 comm="syz.4.5497" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876718ebe9 code=0x7ffc0000 [ 305.700111][ T29] audit: type=1400 audit(1756369184.128:706669): avc: denied { prog_load } for pid=16800 comm="syz.2.5493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 305.719554][ T29] audit: type=1400 audit(1756369184.128:706670): avc: denied { prog_load } for pid=16800 comm="syz.2.5493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 305.738934][ T29] audit: type=1326 audit(1756369184.128:706671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16810 comm="syz.4.5497" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f876718ebe9 code=0x7ffc0000 [ 305.762437][ T29] audit: type=1326 audit(1756369184.128:706672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16810 comm="syz.4.5497" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876718ebe9 code=0x7ffc0000 [ 305.786151][ T29] audit: type=1326 audit(1756369184.128:706673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16810 comm="syz.4.5497" exe="/root/syz-executor" sig=0 arch=c000003e syscall=6 compat=0 ip=0x7f876718ebe9 code=0x7ffc0000 [ 305.789347][T16820] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5498'. [ 305.809715][ T29] audit: type=1326 audit(1756369184.128:706674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16810 comm="syz.4.5497" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876718ebe9 code=0x7ffc0000 [ 305.842334][ T29] audit: type=1400 audit(1756369184.149:706675): avc: denied { open } for pid=16815 comm="syz.4.5498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 305.861896][ T29] audit: type=1400 audit(1756369184.149:706676): avc: denied { map_create } for pid=16815 comm="syz.4.5498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 305.909782][T16816] 8021q: adding VLAN 0 to HW filter on device bond13 [ 305.919370][T16827] netlink: 24 bytes leftover after parsing attributes in process `syz.2.5502'. [ 305.930461][T16820] bond13 (unregistering): Released all slaves [ 305.958601][T16827] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5502'. [ 306.077864][T16835] netlink: 80 bytes leftover after parsing attributes in process `syz.4.5505'. [ 306.083276][T16834] lo speed is unknown, defaulting to 1000 [ 306.110496][T16837] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=16837 comm=syz.4.5506 [ 306.269791][T16851] lo speed is unknown, defaulting to 1000 [ 306.281193][T16853] syzkaller0: entered promiscuous mode [ 306.286737][T16853] syzkaller0: entered allmulticast mode [ 306.395591][T16859] netlink: 24 bytes leftover after parsing attributes in process `syz.1.5516'. [ 306.430974][T16859] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5516'. [ 306.527555][T16867] IPv6: sit1: Disabled Multicast RS [ 306.539426][T16867] sit1: entered allmulticast mode [ 306.688924][T16889] lo speed is unknown, defaulting to 1000 [ 307.504560][T16911] lo speed is unknown, defaulting to 1000 [ 307.730430][T16918] lo speed is unknown, defaulting to 1000 [ 308.763616][T16953] lo speed is unknown, defaulting to 1000 [ 308.987176][T16975] __nla_validate_parse: 7 callbacks suppressed [ 308.987191][T16975] netlink: 132 bytes leftover after parsing attributes in process `syz.3.5562'. [ 309.025581][T16977] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5561'. [ 309.054413][T16982] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(5) [ 309.061270][T16982] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 309.068731][T16982] vhci_hcd vhci_hcd.0: Device attached [ 309.242637][ T3372] vhci_hcd: vhci_device speed not set [ 309.301268][ T3372] usb 9-1: new full-speed USB device number 3 using vhci_hcd [ 309.567017][T16983] vhci_hcd: connection reset by peer [ 309.579792][ T41] vhci_hcd: stop threads [ 309.584082][ T41] vhci_hcd: release socket [ 309.588546][ T41] vhci_hcd: disconnect device [ 309.961344][T17008] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5574'. [ 310.088286][T17016] lo speed is unknown, defaulting to 1000 [ 310.469955][T17044] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5588'. [ 310.496421][ T29] kauditd_printk_skb: 1041 callbacks suppressed [ 310.496437][ T29] audit: type=1400 audit(1756369189.113:707718): avc: denied { prog_load } for pid=17048 comm="syz.4.5591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.524666][T17049] netlink: 132 bytes leftover after parsing attributes in process `syz.4.5591'. [ 310.539307][ T29] audit: type=1400 audit(1756369189.123:707719): avc: denied { prog_load } for pid=17050 comm="syz.2.5594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.558960][ T29] audit: type=1400 audit(1756369189.123:707720): avc: denied { prog_load } for pid=17050 comm="syz.2.5594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.578389][ T29] audit: type=1400 audit(1756369189.123:707721): avc: denied { map_create } for pid=17050 comm="syz.2.5594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.582875][T17056] geneve4: entered promiscuous mode [ 310.598017][ T29] audit: type=1400 audit(1756369189.123:707722): avc: denied { prog_load } for pid=17050 comm="syz.2.5594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.604229][ T41] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.622599][ T29] audit: type=1400 audit(1756369189.123:707723): avc: denied { prog_load } for pid=17050 comm="syz.2.5594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.622638][ T29] audit: type=1400 audit(1756369189.134:707724): avc: denied { open } for pid=17052 comm="syz.2.5595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 310.670472][ T29] audit: type=1400 audit(1756369189.134:707725): avc: denied { map_create } for pid=17052 comm="syz.2.5595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.689871][ T29] audit: type=1400 audit(1756369189.134:707726): avc: denied { create } for pid=17052 comm="syz.2.5595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 310.698233][ T41] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.710750][ T29] audit: type=1400 audit(1756369189.134:707727): avc: denied { read } for pid=17052 comm="syz.2.5595" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=0 [ 310.748009][ T41] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.757033][ T41] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.809614][T17061] bond10: (slave erspan0): Releasing active interface [ 310.816432][T17061] ip6gretap1: entered promiscuous mode [ 310.832953][T17061] bond6: (slave batadv1): Releasing active interface [ 310.843844][T17061] bond7: (slave bond8): Releasing active interface [ 310.854753][T17061] bond9: (slave gretap0): Releasing active interface [ 310.865657][T17061] bond10: (slave ip6gretap1): Releasing active interface [ 310.872758][T17061] bond10: (slave ip6gretap1): the permanent HWaddr of slave - 7a:06:61:67:be:9f - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 310.893408][T17061] ip6gretap1: left promiscuous mode [ 310.901079][T17061] bond10: (slave veth17): Releasing active interface [ 310.959720][T17067] lo speed is unknown, defaulting to 1000 [ 311.090187][T17080] lo speed is unknown, defaulting to 1000 [ 311.956693][T17106] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5615'. [ 312.283709][T17118] erspan0: entered promiscuous mode [ 312.303054][T17118] lo speed is unknown, defaulting to 1000 [ 313.212927][T17150] erspan0: entered promiscuous mode [ 313.234598][T17150] lo speed is unknown, defaulting to 1000 [ 313.370137][T17159] macvtap0: entered allmulticast mode [ 313.375631][T17159] bridge0: entered allmulticast mode [ 313.396623][T17159] bridge0: port 1(macvtap0) entered blocking state [ 313.403377][T17159] bridge0: port 1(macvtap0) entered disabled state [ 313.439340][T17159] bridge0: left allmulticast mode [ 313.705897][T17171] team0: Port device dummy0 removed [ 313.716102][T17171] bond15: (slave gretap0): Releasing active interface [ 313.769084][T17176] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5643'. [ 314.495818][T17201] syzkaller0: entered promiscuous mode [ 314.501448][T17201] syzkaller0: entered allmulticast mode [ 314.714224][ T3372] usb 9-1: enqueue for inactive port 0 [ 314.724041][ T3372] usb 9-1: enqueue for inactive port 0 [ 314.822461][ T3372] vhci_hcd: vhci_device speed not set [ 315.193910][T17236] netlink: 96 bytes leftover after parsing attributes in process `syz.2.5667'. [ 315.482425][ T29] kauditd_printk_skb: 481 callbacks suppressed [ 315.482442][ T29] audit: type=1400 audit(1756369194.196:708209): avc: denied { prog_load } for pid=17240 comm="syz.0.5668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.483703][T17242] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5669'. [ 315.489593][ T29] audit: type=1400 audit(1756369194.196:708210): avc: denied { prog_load } for pid=17240 comm="syz.0.5668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.514054][T17242] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5669'. [ 315.570142][ T29] audit: type=1400 audit(1756369194.277:708211): avc: denied { open } for pid=17239 comm="syz.2.5669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 315.589703][ T29] audit: type=1400 audit(1756369194.277:708212): avc: denied { map_create } for pid=17239 comm="syz.2.5669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.652050][ T29] audit: type=1400 audit(1756369194.277:708213): avc: denied { map_create } for pid=17243 comm="syz.4.5670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.671621][ T29] audit: type=1400 audit(1756369194.287:708214): avc: denied { prog_load } for pid=17243 comm="syz.4.5670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.691208][ T29] audit: type=1400 audit(1756369194.287:708215): avc: denied { map_create } for pid=17243 comm="syz.4.5670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.710689][ T29] audit: type=1400 audit(1756369194.287:708216): avc: denied { prog_load } for pid=17243 comm="syz.4.5670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.730064][ T29] audit: type=1400 audit(1756369194.287:708217): avc: denied { map_create } for pid=17243 comm="syz.4.5670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.749549][ T29] audit: type=1400 audit(1756369194.287:708218): avc: denied { map_create } for pid=17243 comm="syz.4.5670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 316.079698][T17285] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5688'. [ 316.092657][T17285] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5688'. [ 316.141861][T17287] 8021q: VLANs not supported on sit0 [ 316.631469][T17308] lo speed is unknown, defaulting to 1000 [ 316.856742][T17328] macvtap1: entered allmulticast mode [ 316.862246][T17328] bridge0: entered allmulticast mode [ 316.868342][T17328] bridge0: port 1(macvtap1) entered blocking state [ 316.875005][T17328] bridge0: port 1(macvtap1) entered disabled state [ 316.889109][T17328] bridge0: left allmulticast mode [ 317.514508][T17383] netlink: 'syz.0.5731': attribute type 1 has an invalid length. [ 317.534511][T17383] 8021q: adding VLAN 0 to HW filter on device bond15 [ 317.548742][T17383] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5731'. [ 317.559351][T17383] bond15 (unregistering): Released all slaves [ 317.689311][T17394] netlink: 'syz.0.5736': attribute type 4 has an invalid length. [ 317.708944][T17394] netlink: 'syz.0.5736': attribute type 4 has an invalid length. [ 318.489600][T17413] syzkaller0: entered promiscuous mode [ 318.495112][T17413] syzkaller0: entered allmulticast mode [ 318.631720][T17424] netlink: 'syz.2.5746': attribute type 1 has an invalid length. [ 318.711480][T17424] 8021q: adding VLAN 0 to HW filter on device bond11 [ 318.748567][T17424] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5746'. [ 318.783579][T17424] bond11 (unregistering): Released all slaves [ 319.454820][T17447] IPv6: Can't replace route, no match found [ 320.580434][ T29] kauditd_printk_skb: 875 callbacks suppressed [ 320.580453][ T29] audit: type=1400 audit(1756369199.354:709094): avc: denied { read } for pid=17476 comm="syz.2.5767" name="event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 320.628024][ T29] audit: type=1400 audit(1756369199.354:709095): avc: denied { prog_load } for pid=17478 comm="syz.4.5770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 320.641998][T17486] netlink: 'syz.3.5772': attribute type 10 has an invalid length. [ 320.647400][ T29] audit: type=1400 audit(1756369199.354:709096): avc: denied { name_bind } for pid=17475 comm="syz.1.5778" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 320.677292][ T29] audit: type=1400 audit(1756369199.354:709097): avc: denied { open } for pid=17478 comm="syz.4.5770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 320.697057][ T29] audit: type=1400 audit(1756369199.354:709098): avc: denied { map_create } for pid=17475 comm="syz.1.5778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 320.716725][ T29] audit: type=1400 audit(1756369199.354:709099): avc: denied { prog_load } for pid=17475 comm="syz.1.5778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 320.735698][T17490] netlink: 'syz.3.5772': attribute type 10 has an invalid length. [ 320.736045][ T29] audit: type=1400 audit(1756369199.374:709100): avc: denied { map_create } for pid=17478 comm="syz.4.5770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 320.763255][ T29] audit: type=1400 audit(1756369199.374:709101): avc: denied { prog_load } for pid=17478 comm="syz.4.5770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 320.782721][ T29] audit: type=1400 audit(1756369199.374:709102): avc: denied { create } for pid=17478 comm="syz.4.5770" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 320.804524][ T29] audit: type=1400 audit(1756369199.374:709103): avc: denied { create } for pid=17478 comm="syz.4.5770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 320.827069][T17486] dummy0: left promiscuous mode [ 320.833410][T17486] team0: Port device dummy0 added [ 320.843677][T17490] team0: Port device dummy0 removed [ 320.851912][T17490] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 321.615258][T17532] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5791'. [ 322.313039][T17554] lo speed is unknown, defaulting to 1000 [ 322.604501][T17572] netlink: 'syz.2.5805': attribute type 4 has an invalid length. [ 322.929878][T17576] netlink: 'syz.2.5805': attribute type 4 has an invalid length. [ 323.164690][T17588] lo speed is unknown, defaulting to 1000 [ 323.899947][T17622] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5824'. [ 324.396143][T17641] lo speed is unknown, defaulting to 1000 [ 324.900821][T17652] syzkaller0: entered promiscuous mode [ 324.906405][T17652] syzkaller0: entered allmulticast mode [ 325.347710][T17677] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5846'. [ 325.364637][T17677] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5846'. [ 325.504475][T17685] syzkaller0: entered promiscuous mode [ 325.510142][T17685] syzkaller0: entered allmulticast mode [ 325.600214][ T29] kauditd_printk_skb: 439 callbacks suppressed [ 325.600230][ T29] audit: type=1400 audit(1756369204.422:709543): avc: denied { open } for pid=17686 comm="syz.3.5851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 325.627797][ T29] audit: type=1400 audit(1756369204.452:709544): avc: denied { prog_load } for pid=17686 comm="syz.3.5851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 325.648103][ T29] audit: type=1400 audit(1756369204.472:709545): avc: denied { prog_load } for pid=17686 comm="syz.3.5851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 325.930328][ T29] audit: type=1400 audit(1756369204.754:709546): avc: denied { map_create } for pid=17690 comm="syz.0.5852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 325.949833][ T29] audit: type=1326 audit(1756369204.754:709547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17689 comm="syz.1.5853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04cf24ebe9 code=0x7ffc0000 [ 325.973770][ T29] audit: type=1326 audit(1756369204.754:709548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17689 comm="syz.1.5853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04cf24ebe9 code=0x7ffc0000 [ 325.998121][ T29] audit: type=1400 audit(1756369204.754:709549): avc: denied { prog_load } for pid=17690 comm="syz.0.5852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 326.017447][ T29] audit: type=1326 audit(1756369204.825:709550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17689 comm="syz.1.5853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=28 compat=0 ip=0x7f04cf24ebe9 code=0x7ffc0000 [ 326.041188][ T29] audit: type=1326 audit(1756369204.825:709551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17689 comm="syz.1.5853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04cf24ebe9 code=0x7ffc0000 [ 326.065008][ T29] audit: type=1326 audit(1756369204.835:709552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17689 comm="syz.1.5853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04cf24ebe9 code=0x7ffc0000 [ 326.121276][T17692] lo speed is unknown, defaulting to 1000 [ 326.210247][T17706] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5859'. [ 326.228001][T17706] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5859'. [ 326.499621][T17715] lo speed is unknown, defaulting to 1000 [ 326.529974][T17722] wireguard1: entered promiscuous mode [ 326.535529][T17722] wireguard1: entered allmulticast mode [ 326.689570][T17732] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5868'. [ 326.711513][T17734] netlink: 666 bytes leftover after parsing attributes in process `syz.3.5869'. [ 326.911088][T17741] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5871'. [ 327.057316][T17743] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5871'. [ 327.299478][T17749] netlink: 32 bytes leftover after parsing attributes in process `syz.0.5874'. [ 327.403502][T17749] netlink: 32 bytes leftover after parsing attributes in process `syz.0.5874'. [ 327.431958][T17752] netlink: '¬í': attribute type 1 has an invalid length. [ 328.729977][T17803] netlink: 'syz.0.5905': attribute type 10 has an invalid length. [ 328.737087][T17802] syzkaller0: entered promiscuous mode [ 328.743487][T17802] syzkaller0: entered allmulticast mode [ 328.754009][T17803] netlink: 'syz.0.5905': attribute type 10 has an invalid length. [ 328.766362][T17803] team0: Port device dummy0 removed [ 328.790495][T17808] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5896'. [ 328.810142][T17808] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5896'. [ 329.287769][T17840] lo speed is unknown, defaulting to 1000 [ 329.482661][T17859] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 329.489218][T17859] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 329.496730][T17859] vhci_hcd vhci_hcd.0: Device attached [ 329.507426][T17859] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5922'. [ 329.517766][T17860] vhci_hcd: connection closed [ 329.518017][T14030] vhci_hcd: stop threads [ 329.526970][T14030] vhci_hcd: release socket [ 329.531491][T14030] vhci_hcd: disconnect device [ 329.692722][T17863] netlink: 14 bytes leftover after parsing attributes in process `syz.2.5923'. [ 329.777050][T17875] lo speed is unknown, defaulting to 1000 [ 329.892440][T17884] netlink: 'syz.3.5931': attribute type 13 has an invalid length. [ 329.919544][ T9] lo speed is unknown, defaulting to 1000 [ 329.925426][ T9] syz2: Port: 1 Link DOWN [ 329.933148][ T9] lo speed is unknown, defaulting to 1000 [ 330.571859][ T29] kauditd_printk_skb: 605 callbacks suppressed [ 330.571874][ T29] audit: type=1400 audit(1756369209.436:710158): avc: denied { prog_load } for pid=17896 comm="syz.2.5935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.603196][ T29] audit: type=1400 audit(1756369209.466:710159): avc: denied { prog_load } for pid=17896 comm="syz.2.5935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.639747][ T29] audit: type=1400 audit(1756369209.496:710160): avc: denied { prog_load } for pid=17896 comm="syz.2.5935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.659130][ T29] audit: type=1400 audit(1756369209.496:710161): avc: denied { map_create } for pid=17896 comm="syz.2.5935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.678561][ T29] audit: type=1400 audit(1756369209.496:710162): avc: denied { prog_load } for pid=17896 comm="syz.2.5935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.698076][ T29] audit: type=1400 audit(1756369209.496:710163): avc: denied { map_create } for pid=17896 comm="syz.2.5935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.779063][ T29] audit: type=1400 audit(1756369209.496:710164): avc: denied { map_create } for pid=17898 comm="syz.3.5936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.798640][ T29] audit: type=1400 audit(1756369209.496:710165): avc: denied { prog_load } for pid=17898 comm="syz.3.5936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.818204][ T29] audit: type=1400 audit(1756369209.496:710166): avc: denied { prog_load } for pid=17898 comm="syz.3.5936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.837756][ T29] audit: type=1400 audit(1756369209.496:710167): avc: denied { prog_load } for pid=17898 comm="syz.3.5936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 331.158726][T17951] lo speed is unknown, defaulting to 1000 [ 331.292624][T17963] netlink: 'syz.4.5966': attribute type 13 has an invalid length. [ 331.300672][T17963] netlink: 'syz.4.5966': attribute type 17 has an invalid length. [ 331.323745][T17963] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 331.512585][T17974] lo speed is unknown, defaulting to 1000 [ 331.917012][T17982] futex_wake_op: syz.2.5974 tries to shift op by -1; fix this program [ 332.052298][T17996] netlink: 'syz.2.5980': attribute type 13 has an invalid length. [ 332.064108][T17998] can0: slcan on ttyS3. [ 332.232136][T17994] can0 (unregistered): slcan off ttyS3. [ 332.351292][T18005] syzkaller0: entered promiscuous mode [ 332.356925][T18005] syzkaller0: entered allmulticast mode [ 332.467187][T18012] syzkaller0: entered promiscuous mode [ 332.472919][T18012] syzkaller0: entered allmulticast mode [ 332.603813][T18023] syzkaller0: entered promiscuous mode [ 332.609336][T18023] syzkaller0: entered allmulticast mode [ 332.686364][T18027] GUP no longer grows the stack in syz.2.5992 (18027): 200000004000-200000008000 (200000002000) [ 332.696877][T18027] CPU: 1 UID: 0 PID: 18027 Comm: syz.2.5992 Not tainted syzkaller #0 PREEMPT(voluntary) [ 332.696968][T18027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 332.696979][T18027] Call Trace: [ 332.696985][T18027] [ 332.696992][T18027] __dump_stack+0x1d/0x30 [ 332.697016][T18027] dump_stack_lvl+0xe8/0x140 [ 332.697036][T18027] dump_stack+0x15/0x1b [ 332.697053][T18027] __get_user_pages+0x198d/0x1fa0 [ 332.697114][T18027] ? __rcu_read_unlock+0x4f/0x70 [ 332.697140][T18027] get_user_pages_remote+0x1d5/0x6d0 [ 332.697171][T18027] __access_remote_vm+0x15c/0x590 [ 332.697239][T18027] access_remote_vm+0x32/0x40 [ 332.697264][T18027] proc_pid_cmdline_read+0x32b/0x6c0 [ 332.697296][T18027] ? __pfx_proc_pid_cmdline_read+0x10/0x10 [ 332.697438][T18027] vfs_readv+0x3fb/0x690 [ 332.697522][T18027] __x64_sys_preadv+0xfd/0x1c0 [ 332.697549][T18027] x64_sys_call+0x282a/0x2ff0 [ 332.697573][T18027] do_syscall_64+0xd2/0x200 [ 332.697604][T18027] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 332.697644][T18027] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 332.697703][T18027] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 332.697729][T18027] RIP: 0033:0x7f2242e7ebe9 [ 332.697760][T18027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 332.697823][T18027] RSP: 002b:00007f22418df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 332.697846][T18027] RAX: ffffffffffffffda RBX: 00007f22430a5fa0 RCX: 00007f2242e7ebe9 [ 332.697919][T18027] RDX: 0000000000000001 RSI: 0000200000000d00 RDI: 0000000000000004 [ 332.697934][T18027] RBP: 00007f2242f01e19 R08: 0000000000000201 R09: 0000000000000000 [ 332.697949][T18027] R10: 00000000000006cd R11: 0000000000000246 R12: 0000000000000000 [ 332.697963][T18027] R13: 00007f22430a6038 R14: 00007f22430a5fa0 R15: 00007fff8ac17428 [ 332.697983][T18027] [ 332.911242][T18031] syzkaller0: entered promiscuous mode [ 332.916778][T18031] syzkaller0: entered allmulticast mode [ 333.008533][T18043] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 333.015093][T18043] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 333.022569][T18043] vhci_hcd vhci_hcd.0: Device attached [ 333.058809][T18043] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5993'. [ 333.062217][T18049] syzkaller0: entered promiscuous mode [ 333.073691][T18049] syzkaller0: entered allmulticast mode [ 333.148909][T18051] lo speed is unknown, defaulting to 1000 [ 333.187231][T18044] vhci_hcd: connection closed [ 333.190144][T14024] vhci_hcd: stop threads [ 333.199390][T14024] vhci_hcd: release socket [ 333.203817][T14024] vhci_hcd: disconnect device [ 333.227090][T18008] vhci_hcd: vhci_device speed not set [ 333.929838][T18073] syzkaller0: entered promiscuous mode [ 333.935405][T18073] syzkaller0: entered allmulticast mode [ 333.944008][T18077] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6012'. [ 334.007978][T18077] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6012'. [ 334.131039][T18086] netlink: 'syz.0.6015': attribute type 13 has an invalid length. [ 334.177812][T18091] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6018'. [ 334.248497][T18091] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6018'. [ 334.303213][T18100] syzkaller0: entered promiscuous mode [ 334.308742][T18100] syzkaller0: entered allmulticast mode [ 334.659633][T18118] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6029'. [ 334.675323][T18118] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6029'. [ 334.785842][T18124] syzkaller0: entered promiscuous mode [ 334.791404][T18124] syzkaller0: entered allmulticast mode [ 334.848418][T18130] syzkaller0: entered promiscuous mode [ 334.854036][T18130] syzkaller0: entered allmulticast mode [ 335.031421][T18133] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=18133 comm=syz.1.6037 [ 335.124254][T18142] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6042'. [ 335.533335][T18156] syzkaller0: entered promiscuous mode [ 335.538896][T18156] syzkaller0: entered allmulticast mode [ 335.687779][ T29] kauditd_printk_skb: 693 callbacks suppressed [ 335.687805][ T29] audit: type=1400 audit(1756369470.563:710861): avc: denied { map_create } for pid=18157 comm="syz.0.6048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.713389][ T29] audit: type=1400 audit(1756369470.583:710862): avc: denied { prog_load } for pid=18157 comm="syz.0.6048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.732803][ T29] audit: type=1400 audit(1756369470.583:710863): avc: denied { create } for pid=18157 comm="syz.0.6048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 335.753684][ T29] audit: type=1400 audit(1756369470.583:710864): avc: denied { open } for pid=18157 comm="syz.0.6048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 335.773809][ T29] audit: type=1400 audit(1756369470.643:710865): avc: denied { create } for pid=18157 comm="syz.0.6048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 335.798604][ T29] audit: type=1400 audit(1756369470.683:710866): avc: denied { create } for pid=18159 comm="syz.0.6049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 335.821588][ T29] audit: type=1400 audit(1756369470.683:710867): avc: denied { map_create } for pid=18159 comm="syz.0.6049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.841056][ T29] audit: type=1400 audit(1756369470.683:710868): avc: denied { prog_load } for pid=18159 comm="syz.0.6049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.860468][ T29] audit: type=1400 audit(1756369470.683:710869): avc: denied { prog_load } for pid=18159 comm="syz.0.6049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 335.879789][ T29] audit: type=1400 audit(1756369470.683:710870): avc: denied { allowed } for pid=18159 comm="syz.0.6049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 336.048541][T18175] lo speed is unknown, defaulting to 1000 [ 336.324616][T18178] netlink: 'syz.3.6058': attribute type 1 has an invalid length. [ 336.338389][T18178] 8021q: adding VLAN 0 to HW filter on device bond16 [ 336.371871][T18178] vlan0: entered promiscuous mode [ 336.376955][T18178] bond16: entered promiscuous mode [ 336.382210][T18178] vlan0: entered allmulticast mode [ 336.387331][T18178] bond16: entered allmulticast mode [ 336.493895][T18192] netlink: 24 bytes leftover after parsing attributes in process `syz.3.6062'. [ 336.562056][T18192] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=18192 comm=syz.3.6062 [ 336.601436][T18192] lo speed is unknown, defaulting to 1000 [ 336.697479][T18197] syzkaller0: entered promiscuous mode [ 336.703092][T18197] syzkaller0: entered allmulticast mode [ 336.954197][T18215] netlink: 'syz.2.6071': attribute type 30 has an invalid length. [ 337.259305][T18229] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6076'. [ 337.362830][T18235] lo speed is unknown, defaulting to 1000 [ 337.600439][T18238] syzkaller0: entered promiscuous mode [ 337.606008][T18238] syzkaller0: entered allmulticast mode [ 338.080856][T18262] serio: Serial port ptm1 [ 338.155828][T18266] sch_tbf: burst 5 is lower than device syzkaller0 mtu (1514) ! [ 338.286915][T18279] netlink: 'syz.4.6096': attribute type 1 has an invalid length. [ 338.307774][T18279] 8021q: adding VLAN 0 to HW filter on device bond13 [ 338.332437][T18279] vlan0: entered promiscuous mode [ 338.337515][T18279] bond13: entered promiscuous mode [ 338.342837][T18279] vlan0: entered allmulticast mode [ 338.348015][T18279] bond13: entered allmulticast mode [ 338.429005][T18286] syzkaller0: entered promiscuous mode [ 338.434612][T18286] syzkaller0: entered allmulticast mode [ 338.494107][T18292] syzkaller0: entered promiscuous mode [ 338.499622][T18292] syzkaller0: entered allmulticast mode [ 338.544862][T18296] serio: Serial port ptm0 [ 338.558921][T18298] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6105'. [ 338.635633][T18307] lo speed is unknown, defaulting to 1000 [ 338.675707][T18311] netlink: 'syz.1.6112': attribute type 10 has an invalid length. [ 338.709717][T18311] dummy0: left promiscuous mode [ 338.725675][T18311] team0: Port device dummy0 added [ 338.731567][T18319] netlink: 'syz.1.6112': attribute type 10 has an invalid length. [ 338.748425][T18319] team0: Port device dummy0 removed [ 338.762362][T18319] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 338.887035][T18325] netlink: 'syz.4.6117': attribute type 10 has an invalid length. [ 338.897096][ T41] tipc: Resetting bearer [ 338.908746][T18325] netlink: 'syz.4.6117': attribute type 10 has an invalid length. [ 338.936434][T18325] team0: Port device dummy0 removed [ 339.023855][T18331] syzkaller0: entered promiscuous mode [ 339.029432][T18331] syzkaller0: entered allmulticast mode [ 339.235228][T18344] syzkaller0: entered promiscuous mode [ 339.235248][T18344] syzkaller0: entered allmulticast mode [ 340.049659][T18362] netlink: 24 bytes leftover after parsing attributes in process `syz.2.6131'. [ 340.072921][T18362] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=18362 comm=syz.2.6131 [ 340.131688][T18362] lo speed is unknown, defaulting to 1000 [ 340.497048][T18367] syzkaller0: entered promiscuous mode [ 340.502640][T18367] syzkaller0: entered allmulticast mode [ 340.680642][T18372] syzkaller0: entered promiscuous mode [ 340.686170][T18372] syzkaller0: entered allmulticast mode [ 340.711264][ T29] kauditd_printk_skb: 515 callbacks suppressed [ 340.711282][ T29] audit: type=1400 audit(1756369475.593:711386): avc: denied { execmem } for pid=18373 comm="syz.0.6136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 340.790362][ T29] audit: type=1400 audit(1756369475.673:711387): avc: denied { prog_load } for pid=18373 comm="syz.0.6136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 340.822685][ T29] audit: type=1400 audit(1756369475.693:711388): avc: denied { allowed } for pid=18373 comm="syz.0.6136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 340.874226][ T29] audit: type=1400 audit(1756369475.733:711389): avc: denied { prog_load } for pid=18377 comm="syz.2.6137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 340.893707][ T29] audit: type=1400 audit(1756369475.733:711390): avc: denied { allowed } for pid=18377 comm="syz.2.6137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 340.913420][ T29] audit: type=1400 audit(1756369475.733:711391): avc: denied { map_create } for pid=18377 comm="syz.2.6137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 340.932824][ T29] audit: type=1400 audit(1756369475.733:711392): avc: denied { prog_load } for pid=18377 comm="syz.2.6137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 340.952223][ T29] audit: type=1400 audit(1756369475.733:711393): avc: denied { create } for pid=18377 comm="syz.2.6137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 340.973025][ T29] audit: type=1400 audit(1756369475.733:711394): avc: denied { prog_load } for pid=18379 comm="syz.1.6138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 340.992344][ T29] audit: type=1400 audit(1756369475.743:711395): avc: denied { create } for pid=18377 comm="syz.2.6137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 341.139500][T18384] lo speed is unknown, defaulting to 1000 [ 341.369795][T18397] netlink: 'syz.3.6146': attribute type 10 has an invalid length. [ 341.421390][T18404] netlink: 'syz.3.6146': attribute type 10 has an invalid length. [ 341.498670][T18397] bond0: (slave dummy0): Releasing backup interface [ 341.509830][T18397] team0: Port device dummy0 added [ 341.767344][T18420] netlink: 24 bytes leftover after parsing attributes in process `syz.1.6153'. [ 341.898304][T18420] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=18420 comm=syz.1.6153 [ 341.946714][T18420] lo speed is unknown, defaulting to 1000 [ 342.079837][T18437] netlink: 'syz.2.6159': attribute type 10 has an invalid length. [ 342.091600][T18437] netlink: 'syz.2.6159': attribute type 10 has an invalid length. [ 342.217794][T18442] sch_tbf: burst 127 is lower than device syzkaller0 mtu (1514) ! [ 342.225941][T18442] sch_tbf: burst 4 is lower than device syzkaller0 mtu (1514) ! [ 342.326779][T18451] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6164'. [ 342.329587][T18439] lo speed is unknown, defaulting to 1000 [ 342.394771][T18455] syzkaller0: entered promiscuous mode [ 342.400408][T18455] syzkaller0: entered allmulticast mode [ 342.467779][T18466] syzkaller0: entered promiscuous mode [ 342.473344][T18466] syzkaller0: entered allmulticast mode [ 342.494261][T18469] netlink: 'syz.4.6172': attribute type 10 has an invalid length. [ 342.503126][T18469] team0: Port device dummy0 added [ 342.513465][T18469] netlink: 'syz.4.6172': attribute type 10 has an invalid length. [ 342.523222][T18469] team0: Port device dummy0 removed [ 342.529650][T14072] tipc: Resetting bearer [ 342.542530][T18473] netlink: 'syz.0.6173': attribute type 10 has an invalid length. [ 342.551527][T18473] team0: Port device dummy0 added [ 342.557969][T18473] netlink: 'syz.0.6173': attribute type 10 has an invalid length. [ 342.567155][T18473] team0: Port device dummy0 removed [ 342.926943][T18505] syzkaller0: entered promiscuous mode [ 342.932559][T18505] syzkaller0: entered allmulticast mode [ 342.984794][T18509] netlink: 92 bytes leftover after parsing attributes in process `syz.1.6190'. [ 343.018123][T18513] sch_tbf: burst 5 is lower than device syzkaller0 mtu (1514) ! [ 343.075970][T18524] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6197'. [ 343.188894][T18530] lo speed is unknown, defaulting to 1000 [ 343.453921][T18545] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6205'. [ 343.476397][T18548] syzkaller0: entered promiscuous mode [ 343.481940][T18548] syzkaller0: entered allmulticast mode [ 343.897014][T18579] syzkaller0: entered promiscuous mode [ 343.902644][T18579] syzkaller0: entered allmulticast mode [ 343.957739][T18584] syzkaller0: entered promiscuous mode [ 343.963297][T18584] syzkaller0: entered allmulticast mode [ 344.473042][T18607] syzkaller0: entered promiscuous mode [ 344.478731][T18607] syzkaller0: entered allmulticast mode [ 344.743057][T18620] sch_tbf: burst 127 is lower than device syzkaller0 mtu (1514) ! [ 344.890423][T18630] netlink: 24 bytes leftover after parsing attributes in process `syz.4.6242'. [ 344.911303][T18630] lo speed is unknown, defaulting to 1000 [ 345.062870][T18633] syzkaller0: entered promiscuous mode [ 345.068419][T18633] syzkaller0: entered allmulticast mode [ 345.078474][T18637] syzkaller0: entered promiscuous mode [ 345.084096][T18637] syzkaller0: entered allmulticast mode [ 345.213857][T18644] syzkaller0: entered promiscuous mode [ 345.219445][T18644] syzkaller0: entered allmulticast mode [ 345.324856][T18650] netlink: 14 bytes leftover after parsing attributes in process `syz.0.6251'. [ 345.357423][T18650] hsr_slave_0: left promiscuous mode [ 345.544809][T18666] syzkaller0: entered promiscuous mode [ 345.550378][T18666] syzkaller0: entered allmulticast mode [ 345.566483][T18668] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6258'. [ 345.584221][T18668] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6258'. [ 345.673220][T18672] syzkaller0: entered promiscuous mode [ 345.678746][T18672] syzkaller0: entered allmulticast mode [ 345.723137][ T29] kauditd_printk_skb: 979 callbacks suppressed [ 345.723149][ T29] audit: type=1326 audit(1756369480.607:712375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18671 comm="syz.3.6270" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9fc8305ba7 code=0x7ffc0000 [ 345.770768][ T29] audit: type=1326 audit(1756369480.607:712376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18671 comm="syz.3.6270" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9fc82aade9 code=0x7ffc0000 [ 345.784942][T18679] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=18679 comm=syz.2.6262 [ 345.794510][ T29] audit: type=1326 audit(1756369480.607:712377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18671 comm="syz.3.6270" exe="/root/syz-executor" sig=0 arch=c000003e syscall=243 compat=0 ip=0x7f9fc830ebe9 code=0x7ffc0000 [ 345.794542][ T29] audit: type=1326 audit(1756369480.617:712378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18671 comm="syz.3.6270" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9fc8305ba7 code=0x7ffc0000 [ 345.855307][ T29] audit: type=1326 audit(1756369480.617:712379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18671 comm="syz.3.6270" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9fc82aade9 code=0x7ffc0000 [ 345.878984][ T29] audit: type=1326 audit(1756369480.617:712380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18671 comm="syz.3.6270" exe="/root/syz-executor" sig=0 arch=c000003e syscall=243 compat=0 ip=0x7f9fc830ebe9 code=0x7ffc0000 [ 345.902811][ T29] audit: type=1326 audit(1756369480.637:712381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18671 comm="syz.3.6270" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9fc8305ba7 code=0x7ffc0000 [ 345.926437][ T29] audit: type=1326 audit(1756369480.637:712382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18671 comm="syz.3.6270" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9fc82aade9 code=0x7ffc0000 [ 345.935630][T18683] audit: audit_backlog=65 > audit_backlog_limit=64 [ 345.950108][ T29] audit: type=1326 audit(1756369480.637:712383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18671 comm="syz.3.6270" exe="/root/syz-executor" sig=0 arch=c000003e syscall=243 compat=0 ip=0x7f9fc830ebe9 code=0x7ffc0000 [ 345.993146][T18683] syzkaller0: entered promiscuous mode [ 345.998868][T18683] syzkaller0: entered allmulticast mode [ 346.162362][T18702] syzkaller0: entered promiscuous mode [ 346.167859][T18702] syzkaller0: entered allmulticast mode [ 346.918840][T18719] lo speed is unknown, defaulting to 1000 [ 346.980730][T18723] netlink: 24 bytes leftover after parsing attributes in process `syz.0.6282'. [ 346.990669][T18719] tipc: Resetting bearer [ 346.997039][T18719] bond10: (slave vxcan3): Releasing backup interface [ 347.004338][T18719] vxcan3: left promiscuous mode [ 347.010873][T18719] bond11: (slave ip6erspan0): Releasing active interface [ 347.215997][T18735] lo speed is unknown, defaulting to 1000 [ 348.055239][T18764] netlink: 'syz.2.6298': attribute type 1 has an invalid length. [ 348.098982][T18764] 8021q: adding VLAN 0 to HW filter on device bond11 [ 348.126995][T18763] bond11: (slave dummy0): making interface the new active one [ 348.135700][T18763] bond11: (slave dummy0): Enslaving as an active interface with an up link [ 348.153214][T18763] netlink: 'syz.2.6298': attribute type 10 has an invalid length. [ 348.161151][T18763] netlink: 40 bytes leftover after parsing attributes in process `syz.2.6298'. [ 348.194175][T18763] dummy0: entered promiscuous mode [ 348.217214][T18763] bond11: (slave dummy0): Releasing active interface [ 348.523187][T18791] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6308'. [ 348.966473][T18797] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6312'. [ 349.179181][T18824] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 349.313302][T18832] lo speed is unknown, defaulting to 1000 [ 349.357837][T18842] netlink: 12 bytes leftover after parsing attributes in process `syz.0.6333'. [ 349.455679][T18850] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6336'. [ 349.474605][T18853] syzkaller0: entered promiscuous mode [ 349.480177][T18853] syzkaller0: entered allmulticast mode [ 350.037150][T18876] lo speed is unknown, defaulting to 1000 [ 350.728579][ T29] kauditd_printk_skb: 1212 callbacks suppressed [ 350.728664][ T29] audit: type=1326 audit(1756369485.617:713594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18924 comm="syz.4.6370" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876718ebe9 code=0x7ffc0000 [ 350.758689][ T29] audit: type=1326 audit(1756369485.617:713595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18924 comm="syz.4.6370" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876718ebe9 code=0x7ffc0000 [ 350.801324][ T29] audit: type=1400 audit(1756369485.647:713596): avc: denied { create } for pid=18926 comm="syz.0.6363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 350.822477][ T29] audit: type=1400 audit(1756369485.647:713597): avc: denied { prog_load } for pid=18926 comm="syz.0.6363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 350.841999][ T29] audit: type=1400 audit(1756369485.647:713598): avc: denied { prog_load } for pid=18926 comm="syz.0.6363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 350.861435][ T29] audit: type=1400 audit(1756369485.647:713599): avc: denied { prog_load } for pid=18924 comm="syz.4.6370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 350.871374][T18932] sch_tbf: burst 127 is lower than device syzkaller0 mtu (1514) ! [ 350.881089][ T29] audit: type=1400 audit(1756369485.667:713600): avc: denied { mounton } for pid=18924 comm="syz.4.6370" path="/1276/file0" dev="tmpfs" ino=6694 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 350.911848][ T29] audit: type=1400 audit(1756369485.667:713601): avc: denied { read } for pid=18924 comm="syz.4.6370" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=0 [ 350.935326][ T29] audit: type=1326 audit(1756369485.677:713602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18924 comm="syz.4.6370" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f876718ebe9 code=0x7ffc0000 [ 350.959616][ T29] audit: type=1400 audit(1756369485.677:713603): avc: denied { map_create } for pid=18924 comm="syz.4.6370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 351.240300][T18960] netlink: 'syz.3.6380': attribute type 1 has an invalid length. [ 351.257036][T18960] 8021q: adding VLAN 0 to HW filter on device bond17 [ 351.279990][T18960] team0: Port device dummy0 removed [ 351.288434][T18960] bond17: (slave dummy0): making interface the new active one [ 351.297714][T18960] bond17: (slave dummy0): Enslaving as an active interface with an up link [ 351.313477][T18960] netlink: 'syz.3.6380': attribute type 10 has an invalid length. [ 351.321452][T18960] netlink: 40 bytes leftover after parsing attributes in process `syz.3.6380'. [ 351.330644][T18960] dummy0: entered promiscuous mode [ 351.336713][T18960] bond17: (slave dummy0): Releasing active interface [ 351.519541][T18967] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6383'. [ 351.590009][T18974] lo speed is unknown, defaulting to 1000 [ 351.633914][T18975] bond13: (slave erspan0): Releasing active interface [ 351.647050][T18975] bond0: (slave dummy0): Releasing backup interface [ 351.656508][T18975] bond11: (slave bond12): Releasing active interface [ 351.676055][T18975] bond13: (slave veth21): Releasing active interface [ 352.759640][T19028] netlink: 12 bytes leftover after parsing attributes in process `syz.0.6409'. [ 352.792743][T19028] 8021q: VLANs not supported on vcan0 [ 352.819734][T19036] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6414'. [ 352.893188][T19042] netlink: 'syz.2.6417': attribute type 10 has an invalid length. [ 352.976505][T19048] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 352.983090][T19048] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 352.990655][T19048] vhci_hcd vhci_hcd.0: Device attached [ 353.030043][T19048] vhci_hcd vhci_hcd.0: pdev(0) rhport(1) sockfd(5) [ 353.036656][T19048] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 353.044257][T19048] vhci_hcd vhci_hcd.0: Device attached [ 353.056895][T19048] vhci_hcd vhci_hcd.0: pdev(0) rhport(2) sockfd(7) [ 353.063406][T19048] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 353.071072][T19048] vhci_hcd vhci_hcd.0: Device attached [ 353.082906][T19057] vhci_hcd: connection closed [ 353.083004][T19049] vhci_hcd: connection closed [ 353.087219][T19062] vhci_hcd: connection closed [ 353.092434][T14024] vhci_hcd: stop threads [ 353.101437][T14024] vhci_hcd: release socket [ 353.105846][T14024] vhci_hcd: disconnect device [ 353.110847][T14024] vhci_hcd: stop threads [ 353.115094][T14024] vhci_hcd: release socket [ 353.119654][T14024] vhci_hcd: disconnect device [ 353.126997][T14024] vhci_hcd: stop threads [ 353.131281][T14024] vhci_hcd: release socket [ 353.135711][T14024] vhci_hcd: disconnect device [ 353.208762][T19070] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6428'. [ 353.219539][T19070] 8021q: VLANs not supported on vcan0 [ 353.894177][T19092] syzkaller0: entered promiscuous mode [ 353.899760][T19092] syzkaller0: entered allmulticast mode [ 355.276605][T19137] netlink: 48 bytes leftover after parsing attributes in process `syz.0.6452'. [ 355.335674][T19141] lo speed is unknown, defaulting to 1000 [ 355.440890][T19149] lo speed is unknown, defaulting to 1000 [ 355.605497][T19160] netlink: 180 bytes leftover after parsing attributes in process `syz.4.6460'. [ 355.630096][T19154] netlink: 180 bytes leftover after parsing attributes in process `syz.4.6460'. [ 355.752556][ T29] kauditd_printk_skb: 728 callbacks suppressed [ 355.752571][ T29] audit: type=1400 audit(1756369490.637:714332): avc: denied { prog_load } for pid=19167 comm="syz.3.6467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.800809][ T29] audit: type=1400 audit(1756369490.647:714333): avc: denied { create } for pid=19167 comm=77DEA305FF07 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 355.821699][ T29] audit: type=1400 audit(1756369490.647:714334): avc: denied { prog_load } for pid=19167 comm=77DEA305FF07 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.841201][ T29] audit: type=1400 audit(1756369490.647:714335): avc: denied { prog_load } for pid=19167 comm=77DEA305FF07 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.860711][ T29] audit: type=1400 audit(1756369490.647:714336): avc: denied { allowed } for pid=19167 comm=77DEA305FF07 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 355.880546][ T29] audit: type=1400 audit(1756369490.677:714337): avc: denied { map_create } for pid=19165 comm="syz.0.6466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.900077][ T29] audit: type=1400 audit(1756369490.677:714338): avc: denied { create } for pid=19165 comm="syz.0.6466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 355.919840][ T29] audit: type=1400 audit(1756369490.677:714339): avc: denied { block_suspend } for pid=19165 comm="syz.0.6466" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 355.930904][T19176] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6469'. [ 355.941615][ T29] audit: type=1400 audit(1756369490.677:714340): avc: denied { open } for pid=19165 comm="syz.0.6466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 355.970127][ T29] audit: type=1400 audit(1756369490.687:714341): avc: denied { create } for pid=19169 comm="syz.2.6468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 356.196487][T19188] lo speed is unknown, defaulting to 1000 [ 356.482963][T19206] syzkaller0: entered promiscuous mode [ 356.488522][T19206] syzkaller0: entered allmulticast mode [ 357.394299][T19225] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=235 sclass=netlink_audit_socket pid=19225 comm=syz.4.6489 [ 357.800277][T19239] binfmt_misc: register: failed to install interpreter file ./file0 [ 358.177829][T19263] lo speed is unknown, defaulting to 1000 [ 358.305770][T19270] serio: Serial port ptm0 [ 358.363488][T19276] lo speed is unknown, defaulting to 1000 [ 358.405817][T19269] futex_wake_op: syz.4.6509 tries to shift op by -1; fix this program [ 358.752776][T19301] sch_tbf: burst 127 is lower than device syzkaller0 mtu (1514) ! [ 359.326882][T19315] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 359.333467][T19315] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 359.341016][T19315] vhci_hcd vhci_hcd.0: Device attached [ 359.353853][T19315] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 359.365018][T19315] vhci_hcd vhci_hcd.0: pdev(1) rhport(2) sockfd(7) [ 359.371543][T19315] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 359.379157][T19315] vhci_hcd vhci_hcd.0: Device attached [ 359.414429][T19322] netlink: 14 bytes leftover after parsing attributes in process `syz.3.6527'. [ 359.426416][T19323] vhci_hcd vhci_hcd.0: pdev(1) rhport(3) sockfd(10) [ 359.433032][T19323] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 359.440638][T19323] vhci_hcd vhci_hcd.0: Device attached [ 359.449394][T19322] bond0 (unregistering): Released all slaves [ 359.464599][T19323] vhci_hcd vhci_hcd.0: pdev(1) rhport(4) sockfd(12) [ 359.471252][T19323] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 359.478910][T19323] vhci_hcd vhci_hcd.0: Device attached [ 359.489757][T19315] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 359.501217][T19315] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 359.518296][T18008] vhci_hcd: vhci_device speed not set [ 359.545782][T19326] vhci_hcd: connection closed [ 359.545999][T14072] vhci_hcd: stop threads [ 359.554977][T14072] vhci_hcd: release socket [ 359.559465][T14072] vhci_hcd: disconnect device [ 359.570907][T19324] vhci_hcd: connection closed [ 359.571018][T19316] vhci_hcd: connection closed [ 359.575849][T19319] vhci_hcd: connection closed [ 359.580699][T18008] usb 3-1: new full-speed USB device number 3 using vhci_hcd [ 359.602262][T19317] vhci_hcd: sendmsg failed!, ret=-32 for 48 [ 359.608292][T14072] vhci_hcd: stop threads [ 359.612563][T14072] vhci_hcd: release socket [ 359.617064][T14072] vhci_hcd: disconnect device [ 359.625112][T14072] vhci_hcd: stop threads [ 359.629445][T14072] vhci_hcd: release socket [ 359.633871][T14072] vhci_hcd: disconnect device [ 359.638976][T14072] vhci_hcd: stop threads [ 359.643227][T14072] vhci_hcd: release socket [ 359.647773][T14072] vhci_hcd: disconnect device [ 359.812812][T19342] lo speed is unknown, defaulting to 1000 [ 360.353619][T19370] macvlan0: entered promiscuous mode [ 360.359134][T19370] macvlan0: entered allmulticast mode [ 360.757068][T19390] netlink: 'syz.1.6554': attribute type 3 has an invalid length. [ 360.776944][ T29] kauditd_printk_skb: 642 callbacks suppressed [ 360.776988][ T29] audit: type=1400 audit(1756369495.657:714984): avc: denied { create } for pid=19389 comm="syz.1.6554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 360.854902][ T29] audit: type=1400 audit(1756369495.687:714985): avc: denied { prog_load } for pid=19389 comm="syz.1.6554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.874340][ T29] audit: type=1400 audit(1756369495.697:714986): avc: denied { create } for pid=19377 comm="syz.2.6550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 360.894859][ T29] audit: type=1400 audit(1756369495.697:714987): avc: denied { lock } for pid=19389 comm="syz.1.6554" path="socket:[61732]" dev="sockfs" ino=61732 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=0 [ 360.923055][ T29] audit: type=1400 audit(1756369495.767:714988): avc: denied { map_create } for pid=19391 comm="syz.1.6555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.942704][ T29] audit: type=1400 audit(1756369495.767:714989): avc: denied { prog_load } for pid=19391 comm="syz.1.6555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.962062][ T29] audit: type=1400 audit(1756369495.767:714990): avc: denied { prog_load } for pid=19391 comm="syz.1.6555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.981492][ T29] audit: type=1400 audit(1756369495.767:714991): avc: denied { create } for pid=19391 comm="syz.1.6555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=0 [ 361.007077][ T29] audit: type=1400 audit(1756369495.887:714992): avc: denied { map_create } for pid=19392 comm="syz.2.6556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 361.026561][ T29] audit: type=1400 audit(1756369495.887:714993): avc: denied { map_create } for pid=19392 comm="syz.2.6556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 361.137148][T19405] bridge0: entered allmulticast mode [ 361.171130][T19407] netlink: 'syz.1.6562': attribute type 10 has an invalid length. [ 361.210305][T19407] team0: Port device dummy0 added [ 361.274319][T19414] netlink: 'syz.1.6562': attribute type 10 has an invalid length. [ 361.284719][T19414] team0: Port device dummy0 removed [ 361.293031][T19414] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 362.618171][T19477] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19477 comm=syz.0.6592 [ 362.635326][T19477] netlink: 12 bytes leftover after parsing attributes in process `syz.0.6592'. [ 362.808767][ T9] IPVS: starting estimator thread 0... [ 362.898288][T19495] IPVS: using max 2448 ests per chain, 122400 per kthread [ 363.626778][T19518] lo speed is unknown, defaulting to 1000 [ 363.813543][T19530] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=235 sclass=netlink_audit_socket pid=19530 comm=syz.3.6615 [ 364.443984][T19548] netlink: 20 bytes leftover after parsing attributes in process `syz.2.6622'. [ 364.638598][T18008] usb 3-1: enqueue for inactive port 0 [ 364.644921][T18008] usb 3-1: enqueue for inactive port 0 [ 364.738635][T18008] vhci_hcd: vhci_device speed not set [ 364.775890][T19559] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6627'. [ 364.816248][T19559] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6627'. [ 365.786176][ T29] kauditd_printk_skb: 490 callbacks suppressed [ 365.786197][ T29] audit: type=1400 audit(1756369500.667:715484): avc: denied { create } for pid=19573 comm="syz.3.6632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 366.028352][ T29] audit: type=1400 audit(1756369500.697:715485): avc: denied { create } for pid=19573 comm="syz.3.6632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 366.049287][ T29] audit: type=1326 audit(1756369500.847:715486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19575 comm="syz.3.6633" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fc830ebe9 code=0x7ffc0000 [ 366.073016][ T29] audit: type=1326 audit(1756369500.857:715487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19575 comm="syz.3.6633" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f9fc830ebe9 code=0x7ffc0000 [ 366.097079][ T29] audit: type=1400 audit(1756369500.857:715488): avc: denied { open } for pid=19575 comm="syz.3.6633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 366.116575][ T29] audit: type=1326 audit(1756369500.857:715489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19575 comm="syz.3.6633" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fc830ebe9 code=0x7ffc0000 [ 366.140249][ T29] audit: type=1326 audit(1756369500.857:715490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19575 comm="syz.3.6633" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fc830ebe9 code=0x7ffc0000 [ 366.164328][ T29] audit: type=1326 audit(1756369500.867:715491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19575 comm="syz.3.6633" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f9fc830ebe9 code=0x7ffc0000 [ 366.188096][ T29] audit: type=1326 audit(1756369500.867:715492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19575 comm="syz.3.6633" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fc830ebe9 code=0x7ffc0000 [ 366.212224][ T29] audit: type=1326 audit(1756369500.867:715493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19575 comm="syz.3.6633" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fc830ebe9 code=0x7ffc0000 [ 366.487905][T19586] lo speed is unknown, defaulting to 1000 [ 367.917383][T19603] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 367.924018][T19603] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 367.931606][T19603] vhci_hcd vhci_hcd.0: Device attached [ 367.981233][T19603] vhci_hcd vhci_hcd.0: pdev(2) rhport(1) sockfd(5) [ 367.987799][T19603] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 367.995342][T19603] vhci_hcd vhci_hcd.0: Device attached [ 368.008374][T19603] vhci_hcd vhci_hcd.0: pdev(2) rhport(2) sockfd(7) [ 368.014926][T19603] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 368.022638][T19603] vhci_hcd vhci_hcd.0: Device attached [ 368.072366][T19612] vhci_hcd: connection closed [ 368.072581][T19606] vhci_hcd: connection closed [ 368.072936][T19609] vhci_hcd: connection closed [ 368.077431][T14072] vhci_hcd: stop threads [ 368.091174][T14072] vhci_hcd: release socket [ 368.095607][T14072] vhci_hcd: disconnect device [ 368.108264][T18008] vhci_hcd: vhci_device speed not set [ 368.128306][T14072] vhci_hcd: stop threads [ 368.132577][T14072] vhci_hcd: release socket [ 368.137042][T14072] vhci_hcd: disconnect device [ 368.161112][T14072] vhci_hcd: stop threads [ 368.165448][T14072] vhci_hcd: release socket [ 368.169990][T14072] vhci_hcd: disconnect device [ 368.174735][T18008] usb 5-1: new full-speed USB device number 2 using vhci_hcd [ 368.192904][T18008] usb 5-1: enqueue for inactive port 0 [ 368.198598][T18008] usb 5-1: enqueue for inactive port 0 [ 368.204174][T18008] usb 5-1: enqueue for inactive port 0 [ 368.280052][T18008] vhci_hcd: vhci_device speed not set [ 368.580313][T19636] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 368.684089][T19641] lo speed is unknown, defaulting to 1000 [ 368.955236][T19651] lo speed is unknown, defaulting to 1000 [ 368.967020][T19653] netlink: 20 bytes leftover after parsing attributes in process `syz.1.6661'. [ 369.353310][T19668] lo speed is unknown, defaulting to 1000 [ 370.444380][T19717] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 370.450939][T19717] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 370.458432][T19717] vhci_hcd vhci_hcd.0: Device attached [ 370.469605][T19717] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 370.495852][T19717] vhci_hcd vhci_hcd.0: pdev(3) rhport(2) sockfd(7) [ 370.502388][T19717] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 370.509846][T19717] vhci_hcd vhci_hcd.0: Device attached [ 370.525485][T19717] vhci_hcd vhci_hcd.0: pdev(3) rhport(3) sockfd(9) [ 370.532013][T19717] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 370.539659][T19717] vhci_hcd vhci_hcd.0: Device attached [ 370.556266][T19717] vhci_hcd vhci_hcd.0: pdev(3) rhport(4) sockfd(11) [ 370.563011][T19717] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 370.570708][T19717] vhci_hcd vhci_hcd.0: Device attached [ 370.599064][T19717] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 370.617433][T19717] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 370.648422][T18336] vhci_hcd: vhci_device speed not set [ 370.656643][T19731] vhci_hcd: connection closed [ 370.656669][T19718] vhci_hcd: connection closed [ 370.656803][T19723] vhci_hcd: connection closed [ 370.661538][T19726] vhci_hcd: connection closed [ 370.671316][T14072] vhci_hcd: stop threads [ 370.680329][T14072] vhci_hcd: release socket [ 370.684885][T14072] vhci_hcd: disconnect device [ 370.691625][T14072] vhci_hcd: stop threads [ 370.695894][T14072] vhci_hcd: release socket [ 370.700371][T14072] vhci_hcd: disconnect device [ 370.708421][T14072] vhci_hcd: stop threads [ 370.710604][T18336] usb 7-1: new full-speed USB device number 2 using vhci_hcd [ 370.712736][T14072] vhci_hcd: release socket [ 370.712749][T14072] vhci_hcd: disconnect device [ 370.729595][T14072] vhci_hcd: stop threads [ 370.732771][T18336] usb 7-1: enqueue for inactive port 0 [ 370.733908][T14072] vhci_hcd: release socket [ 370.739387][T18336] usb 7-1: enqueue for inactive port 0 [ 370.739405][T18336] usb 7-1: enqueue for inactive port 0 [ 370.755602][T14072] vhci_hcd: disconnect device [ 370.790678][ T29] kauditd_printk_skb: 488 callbacks suppressed [ 370.790695][ T29] audit: type=1400 audit(1756369505.677:715982): avc: denied { map_create } for pid=19736 comm="syz.2.6695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.825082][T19737] lo speed is unknown, defaulting to 1000 [ 370.850431][ T29] audit: type=1400 audit(1756369505.677:715983): avc: denied { prog_load } for pid=19736 comm="syz.2.6695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.869860][ T29] audit: type=1400 audit(1756369505.677:715984): avc: denied { prog_load } for pid=19736 comm="syz.2.6695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.889252][ T29] audit: type=1400 audit(1756369505.727:715985): avc: denied { map_create } for pid=19738 comm="syz.0.6696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.908804][ T29] audit: type=1400 audit(1756369505.727:715986): avc: denied { map_create } for pid=19738 comm="syz.0.6696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.928208][ T29] audit: type=1400 audit(1756369505.727:715987): avc: denied { prog_load } for pid=19738 comm="syz.0.6696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.947644][ T29] audit: type=1400 audit(1756369505.727:715988): avc: denied { prog_load } for pid=19738 comm="syz.0.6696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.967169][ T29] audit: type=1400 audit(1756369505.727:715989): avc: denied { map_create } for pid=19738 comm="syz.0.6696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.986609][ T29] audit: type=1400 audit(1756369505.727:715990): avc: denied { prog_load } for pid=19738 comm="syz.0.6696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 371.006019][ T29] audit: type=1400 audit(1756369505.727:715991): avc: denied { prog_load } for pid=19738 comm="syz.0.6696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 371.028221][T18336] vhci_hcd: vhci_device speed not set [ 371.053246][T19744] netlink: 32 bytes leftover after parsing attributes in process `syz.0.6697'. [ 372.414791][T19781] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6712'. [ 373.232248][T19815] netlink: 'syz.3.6726': attribute type 10 has an invalid length. [ 373.388891][T19817] binfmt_misc: register: failed to install interpreter file ./file0 [ 373.582847][T19837] syzkaller0: entered promiscuous mode [ 373.588395][T19837] syzkaller0: entered allmulticast mode [ 374.057592][T19868] syzkaller0: entered promiscuous mode [ 374.063310][T19868] syzkaller0: entered allmulticast mode [ 374.802139][T19892] netlink: 5 bytes leftover after parsing attributes in process `syz.2.6761'. [ 374.825921][T19892] 0ªî{X¹¦: renamed from 31ªî{X¹¦ [ 374.839528][T19892] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 374.937944][T19901] netlink: 44 bytes leftover after parsing attributes in process `syz.3.6763'. [ 374.970976][T19896] netlink: 44 bytes leftover after parsing attributes in process `syz.3.6763'. [ 375.001730][T19905] netlink: 'syz.0.6767': attribute type 10 has an invalid length. [ 375.157484][T19919] netlink: 'syz.1.6773': attribute type 10 has an invalid length. [ 375.177627][T19919] 8021q: adding VLAN 0 to HW filter on device bond0 [ 375.186716][T19919] team0: Port device bond0 added [ 375.783461][T19964] syzkaller0: entered promiscuous mode [ 375.789128][T19964] syzkaller0: entered allmulticast mode [ 375.802922][ T29] kauditd_printk_skb: 855 callbacks suppressed [ 375.802937][ T29] audit: type=1326 audit(1756369510.677:716847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19915 comm="syz.4.6772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f876712ade9 code=0x7ffc0000 [ 375.832739][ T29] audit: type=1326 audit(1756369510.677:716848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19915 comm="syz.4.6772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=304 compat=0 ip=0x7f876718ebe9 code=0x7ffc0000 [ 376.098350][T19961] ================================================================== [ 376.106464][T19961] BUG: KCSAN: data-race in atime_needs_update / touch_atime [ 376.113872][T19961] [ 376.116220][T19961] read to 0xffff88812c2869a0 of 4 bytes by task 19958 on cpu 1: [ 376.123861][T19961] atime_needs_update+0x25f/0x3e0 [ 376.128921][T19961] touch_atime+0x4a/0x340 [ 376.133263][T19961] shmem_file_read_iter+0x477/0x540 [ 376.138485][T19961] copy_splice_read+0x442/0x660 [ 376.143358][T19961] splice_direct_to_actor+0x290/0x680 [ 376.148736][T19961] do_splice_direct+0xda/0x150 [ 376.153513][T19961] do_sendfile+0x380/0x650 [ 376.157939][T19961] __x64_sys_sendfile64+0x105/0x150 [ 376.163144][T19961] x64_sys_call+0x2bb0/0x2ff0 [ 376.167998][T19961] do_syscall_64+0xd2/0x200 [ 376.172511][T19961] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 376.178491][T19961] [ 376.180809][T19961] write to 0xffff88812c2869a0 of 4 bytes by task 19961 on cpu 0: [ 376.188519][T19961] touch_atime+0x1e8/0x340 [ 376.192945][T19961] shmem_file_read_iter+0x477/0x540 [ 376.198142][T19961] copy_splice_read+0x442/0x660 [ 376.202987][T19961] splice_direct_to_actor+0x290/0x680 [ 376.208364][T19961] do_splice_direct+0xda/0x150 [ 376.213124][T19961] do_sendfile+0x380/0x650 [ 376.217542][T19961] __x64_sys_sendfile64+0x105/0x150 [ 376.222742][T19961] x64_sys_call+0x2bb0/0x2ff0 [ 376.227417][T19961] do_syscall_64+0xd2/0x200 [ 376.231923][T19961] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 376.237817][T19961] [ 376.240141][T19961] value changed: 0x3a3f25d8 -> 0x3ad7bc58 [ 376.245850][T19961] [ 376.248254][T19961] Reported by Kernel Concurrency Sanitizer on: [ 376.254442][T19961] CPU: 0 UID: 0 PID: 19961 Comm: syz.0.6790 Not tainted syzkaller #0 PREEMPT(voluntary) [ 376.264244][T19961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 376.274311][T19961] ================================================================== [ 376.348850][T19975] audit: audit_backlog=65 > audit_backlog_limit=64 [ 376.355407][T19975] audit: audit_lost=67227 audit_rate_limit=0 audit_backlog_limit=64 [ 376.363434][T19975] audit: backlog limit exceeded [ 376.368363][ T29] audit: type=1326 audit(1756369510.687:716849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19915 comm="syz.4.6772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f8767185ba7 code=0x7ffc0000 [ 376.391958][ T29] audit: type=1326 audit(1756369510.687:716850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19915 comm="syz.4.6772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f876712ade9 code=0x7ffc0000 [ 376.415527][ T29] audit: type=1326 audit(1756369510.687:716851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19915 comm="syz.4.6772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=304 compat=0 ip=0x7f876718ebe9 code=0x7ffc0000 [ 376.439272][ T29] audit: type=1326 audit(1756369510.697:716852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19915 comm="syz.4.6772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f8767185ba7 code=0x7ffc0000 [ 376.462999][ T29] audit: type=1326 audit(1756369510.697:716853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19915 comm="syz.4.6772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f876712ade9 code=0x7ffc0000