last executing test programs: 5.501415776s ago: executing program 1 (id=15237): bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x24, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=@newtfilter={0x9c, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r4, {0x0, 0x4}, {}, {0xfff2}}, [@filter_kind_options=@f_matchall={{0x8}, {0x68, 0x2, [@TCA_MATCHALL_ACT={0x64, 0x2, [@m_gact={0x60, 0x1, 0x0, 0x0, {{0x9}, {0x34, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x9, 0x9, 0x1, 0x80000000}}, @TCA_GACT_PARMS={0x18, 0x2, {0xfffffffd, 0x3ff, 0x20000008, 0x6, 0x2}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 5.390829588s ago: executing program 1 (id=15238): socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = syz_io_uring_setup(0x10d2, &(0x7f0000000480)={0x0, 0x7737, 0x80, 0x2, 0x34f}, &(0x7f00000000c0)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0x50, 0x0, 0x0, 0x0, 0x1}) io_uring_enter(r0, 0x47bc, 0x0, 0x0, 0x0, 0x0) 4.723945658s ago: executing program 1 (id=15246): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000013c0)=0x80000000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffcc1, 0x840, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)="e8", 0xfffffffffffffd79, 0x2000c850, 0x0, 0x4d) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000001f00)=""/4106, 0xfffffffffffffccb, 0x0, 0x0}, &(0x7f0000000080)=0x40) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000001400)=""/200, 0xfffffffffffffecd, 0x0, 0x0}, &(0x7f0000001380)=0x40) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0}, &(0x7f0000000000)=0x40) 4.663859289s ago: executing program 1 (id=15249): syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000280)='./file1\x00', 0x808010, &(0x7f0000000640)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000", @ANYRES32], 0x1, 0x2b2, &(0x7f0000001380)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0xa5, 0x11, 0x0, @empty, @empty}, {0x4e21, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x4, "f11ff5388a4296bae69814b8f5cfc1434a73a36f8cef567b", "adc48b1cb967322721132d8710aa133e61724adb62922f9956186a411cc907d0"}}}}}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000000)=""/48, 0x30) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, 0x0) close(r4) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f0000000f80)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 4.426770583s ago: executing program 1 (id=15252): r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='cdg\x00', 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) r2 = syz_open_dev$usbfs(0x0, 0x74, 0x101301) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000340)='dctcp\x00', 0x6) 4.168770776s ago: executing program 1 (id=15255): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x840, &(0x7f0000000080)={[{@test_dummy_encryption_v1}, {@test_dummy_encryption_v1}]}, 0x1, 0x241, &(0x7f0000000540)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 1.99089469s ago: executing program 2 (id=15293): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0xb, 0x0, 0x7ffc0002}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) rseq(&(0x7f0000000300), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x11, &(0x7f0000000440)={[{@noblock_validity}, {@stripe={'stripe', 0x3d, 0x2}}, {@norecovery}, {@min_batch_time={'min_batch_time', 0x3d, 0x71d}}, {@abort}], [{@uid_lt={'uid<', r1}}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@measure}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}, 0x1, 0x610, &(0x7f0000000a40)="$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") bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[], 0x48) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r2, &(0x7f00000006c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000140)=0x1, 0x4) sendmmsg$inet(r2, &(0x7f0000003780)=[{{0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000001280)='<', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001500)='&', 0x1}], 0x1}}], 0x2, 0x24004441) 1.96745698s ago: executing program 2 (id=15294): r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000200)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x1}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x1, 0x5}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000240)={0x42, 0x1}, 0x10) bind$tipc(r0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffd8, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2042, 0x0) ioctl$AUTOFS_IOC_FAIL(r4, 0x4c80, 0x7000000) close(0x3) 1.94849103s ago: executing program 2 (id=15295): syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0x6}, 0x18) socket$can_j1939(0x1d, 0x2, 0x7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0x7, &(0x7f0000000400)=ANY=[@ANYRES8, @ANYRES32, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x40002050, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010000100000002000000000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b"], 0x30}}, 0x0) 1.712178144s ago: executing program 2 (id=15302): prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x8, 0x8031, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000001c0)={0x14, r3, 0x31f, 0xffffffff}, 0x14}, 0x1, 0x0, 0x0, 0x40c0}, 0x0) 1.692632804s ago: executing program 2 (id=15303): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 1.607815125s ago: executing program 2 (id=15305): openat(0xffffffffffffff9c, 0x0, 0x442, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'geneve1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000200)=ANY=[], 0x90}}, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000400)={0xa}) syz_usb_connect(0x4, 0x24, 0x0, 0x0) epoll_pwait(r1, &(0x7f0000000080)=[{}], 0x1, 0x4c6, 0x0, 0x0) 1.443871118s ago: executing program 0 (id=15309): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000240)='kfree\x00', r0}, 0x10) symlink(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000017c0)='./file0\x00') r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e21, 0x7, @local, 0x9}, 0x1c) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x20044e, &(0x7f0000000340)={[{@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1ff}}, {@stripe}, {@noblock_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6}}]}, 0x3, 0x451, &(0x7f0000000f80)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x1a1) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[], 0x2c) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) rename(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') 1.400105669s ago: executing program 0 (id=15310): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002500)={&(0x7f0000000200)={0xc0, r1, 0x1, 0x70bd28, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x94, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x8c, 0x3, 0x0, 0x1, [{0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x84, 0x2, '\x00\x91P{5\x057\x97:\xf1\xa0\x9fj\n\"\xf8\xcf\\\xc6/\xed\xe9\xe3Z\x9c\x8bK(\v|\xc0!\xfe\x04\xa3)\xc2\xb4\xe0j\x9ej)\a\x83~\x0e\x13\xaaF\x00\x00\x00\x00\x00\x00\x00o\xfao\xfe\x18\xe2\xbf\x15Q\xe8W*\x85N\x80\t\xd2n\x87\xf1|%.\x94\xea^[\xf37\xab\x9a\xf0 \xd3\x94H\x05\x1a\n8\xe95w\a0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000e40)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c0, 0x0, 0x18c, 0x203, 0x8000000, 0x19030000, 0x3f0, 0x2e0, 0x2e0, 0x3f0, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x2d8, 0x300, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xe}, {}, {0x0, 0x0, 0x3}, {0x2}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {}, {0x16}, {}, {}, {0x7}, {}, {0x0, 0x0, 0x0, 0x101}, {}, {}, {}, {}, {}, {}, {0xfffe}, {}, {}, {}, {0x0, 0xfd}, {}, {0x7a04}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x800}, {}, {0xb84, 0x0, 0x0, 0xf00}, {0x0, 0x1, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}]}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x4}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xb, 'syz1\x00', {0x6c8}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) 959.160705ms ago: executing program 3 (id=15317): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000019440)={&(0x7f0000000080)='mm_page_free\x00', r0}, 0x18) r1 = gettid() r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000580)=ANY=[@ANYRES8=r1]) read$ptp(r2, 0x0, 0x0) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) memfd_create(0x0, 0x6) 747.833129ms ago: executing program 3 (id=15318): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000008, &(0x7f00000001c0)={[{@grpid}, {@auto_da_alloc}, {@minixdf}, {@noinit_itable}, {@init_itable}]}, 0xff, 0x52e, &(0x7f0000000640)="$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") prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x1, 0x2, 0x7ffc0002}]}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_DESTROY(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x6, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES16, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYRESDEC, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r2, 0x0, 0xd9f}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xa, &(0x7f0000000180), 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00'}, 0x10) 727.803769ms ago: executing program 3 (id=15319): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) getpriority(0x0, 0x1) r1 = creat(0x0, 0x0) fsetxattr$system_posix_acl(r1, 0x0, 0x0, 0xfe44, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000006, 0x4c831, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0xa, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0x541b, 0x0) 628.94406ms ago: executing program 3 (id=15320): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = open(&(0x7f0000000400)='./file0\x00', 0x64842, 0x2) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x76200}], 0x1, 0x7c00, 0x0, 0x3) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x143a82, 0x8) r2 = dup(r1) sendfile(r2, r0, 0x0, 0x8000fffffffc) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$EVIOCGKEY(r1, 0x80404518, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x64048000) 499.790882ms ago: executing program 3 (id=15321): socket$inet6_mptcp(0xa, 0x1, 0x106) socket$inet_mptcp(0x2, 0x1, 0x106) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000f1ffffff0000000000100000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0xb, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) socket$tipc(0x1e, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x8, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000240), &(0x7f00000003c0)=r5}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r4, r1, 0x25, 0x2, @void}, 0x10) syz_emit_ethernet(0x15, &(0x7f0000000300)={@random="6ea88d319b8c", @multicast, @val={@void, {0x8100, 0x0, 0x1, 0x4}}, {@x25={0x805, {0x0, 0x1, 0x5e25ed804c4cd5b4}}}}, 0x0) 433.887343ms ago: executing program 4 (id=15322): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x87) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) timerfd_create(0x8, 0x80800) mkdir(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sync() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 371.912135ms ago: executing program 3 (id=15323): openat$binderfs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) getpid() sched_setaffinity(0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x2000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume', 0x149a82, 0x0) write$cgroup_int(r3, 0x0, 0x0) 219.421217ms ago: executing program 4 (id=15324): r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8000000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff7, 0x4}, 0x0, 0x20000000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x24, 0x4004000, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002980)={&(0x7f0000000180)={0x2, 0xe23, @remote}, 0x10, &(0x7f0000000680)}, 0x448e4) r3 = mq_open(&(0x7f0000000180)='\r\x00elinu\xef\xe3elinux\x00\x96\xf6\x92\n#*\xac\x05\xce\xf8D\\\x9a\xe6[]L+\xf6\v\xe8\xf2\xd3\b\x15\n\xb8F!Q9o\x1f#\xbdt\r\xfb\"\x18%\xfdM\xaf_t\xd2\xdcJ\x10\a\xbab\x1a\xdf\xb1\xbdU\xd7Lo\xe7\xac\x81\x10k\xce-\xf5@\xbb\x9d;\xe8\xf6\xffQ\x04\xaai\x92k\x1b;\xddM\xa2\xe1-\x0e\xd8\xde\x00\xff\x18\xdd\bL\xfb\xa2.\xb6{\xb5\x85#\x88\xdc\xf0\x0f\x05\xf1\xc4 \xdeV\x80q\xf7\x04\xf5\x85T\x1f\xc2S]*\xc9lw\xd3J\xc5\xe8\x02\xcb\xbbAHxr\xac\xb77F\xdf\x1c\xcb\xd4\xce\x88L\xf1\xf9[\x98\xd4+pTx\x95\xb5\x1b]x\x1a\x95\xe1c6\xe7`83\xb7n#\xe0\xc1_\xec\xba\xde\a\x8b\xc5\x86woo\xbc\x1c\xa3r\x82\xf3enq-\x90/\xed\xff\xad+\x03\x10\t\xda\xfd\xa2\xd0\xef4\n%\xf1\xd8', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x4}) mq_getsetattr(r3, &(0x7f0000000700)={0x800, 0x10, 0x9}, 0x0) 184.761857ms ago: executing program 4 (id=15325): recvmsg$can_j1939(0xffffffffffffffff, 0x0, 0x2000) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/disk', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/disk', 0x121a02, 0x0) sendfile(r2, r1, &(0x7f0000002700)=0x23, 0x1c) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0x9f, &(0x7f0000001040), &(0x7f00000000c0)=0x4) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000013c0)=""/102369, 0xda6f, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x3, 0x2) r4 = dup(r3) setsockopt$inet_int(r4, 0x0, 0xce, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='kfree\x00'}, 0x18) socket$netlink(0x10, 0x3, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000640)={0x14, r5, 0xb3d3e8a28760fb9b, 0x70bd27}, 0x14}, 0x1, 0x0, 0x0, 0x2000c804}, 0x20048004) 160.515138ms ago: executing program 0 (id=15326): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000100000000000000", @ANYRES32=0x1], 0x50) socket$kcm(0xa, 0x5, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x2, 0x2, @dev}, 0x10, &(0x7f0000001400)=[{&(0x7f0000001800)='_', 0x1}], 0x1}, 0x64) setsockopt$sock_attach_bpf(r0, 0x84, 0x1e, &(0x7f0000000000), 0x10) socket$kcm(0xa, 0x5, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014001700b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='mm_page_free\x00', r2}, 0x18) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSSOFTCAR(r3, 0x5453, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x18) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000600)={'filter\x00', 0x5, 0x4, 0x3f0, 0x110, 0x220, 0x220, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@arp={@private=0xa010102, @multicast1, 0xff, 0xff, 0x9, 0x4, {@empty, {[0xff, 0x0, 0xff, 0x0, 0xff, 0xff]}}, {@empty, {[0x0, 0x0, 0x0, 0x0, 0xff]}}, 0xfc6, 0x7f, 0xe9b, 0x4, 0x8, 0xe, 'veth1_to_team\x00', 'syz_tun\x00', {0xff}, {0xff}, 0x0, 0x284}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @private, @empty}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local, @empty}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) 145.515498ms ago: executing program 4 (id=15327): socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1e0000000000000005"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) connect$inet6(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000002480)=@raw={'raw\x00', 0x8, 0x3, 0x4e8, 0x0, 0x11, 0x148, 0x340, 0x0, 0x450, 0x2a8, 0x2a8, 0x450, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}, {0x0, 0x0, 0x81}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x4f, 0x7, "72f6daeff0a9c6294e211d2d88fe6dcff5d0e552201da3b7a1fdb30dcb59"}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x548) 119.299048ms ago: executing program 0 (id=15328): setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) umount2(&(0x7f0000000080)='./cgroup\x00', 0x5) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) inotify_init() bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000f80)={{0x14, 0x10, 0x1, 0x0, 0x2000000}, [@NFT_MSG_NEWSET={0x3c, 0x12, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}]}], {0x14}}, 0x64}}, 0x0) 95.071059ms ago: executing program 0 (id=15329): bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1c, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41100, 0x13, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xc8}, 0x94) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) write(r1, &(0x7f0000004200)='t', 0x1) sendfile(r1, r0, 0x0, 0x3ffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x401}, 0x18) sendfile(r1, r0, 0x0, 0x7ffff000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 67.699109ms ago: executing program 4 (id=15330): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200000e"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000ec000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xd, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0xa90, 0x2801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000500)="a4", 0x34000, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180), 0x103000) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$HIDIOCSREPORT(0xffffffffffffffff, 0x400c4808, &(0x7f0000000800)={0x1, 0x200, 0x6}) wait4(0x0, 0x0, 0x40000000, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000da16c167d803f1f805000600200000000a00060000000000ff0000000000000000001ffeff0001000003f1dc7f7c6e7c0200010000000000004000020000000005000500000000000a"], 0x80}}, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x400008a, 0x0) 0s ago: executing program 4 (id=15331): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x10000, 0x0, 0x7, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="6000000002060103000000000000000000000004050001000700000013000300686173683a6e65742c696661636500000900020073797a30000000000500040000000000050005000a00000014000780050015000000000008001240"], 0x60}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) r2 = syz_open_pts(0xffffffffffffffff, 0x42) dup3(r2, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): 261] dummy0: entered allmulticast mode [ 504.148090][T32326] bridge: RTM_NEWNEIGH with invalid ether address [ 504.885315][T32415] netlink: 'syz.1.10960': attribute type 12 has an invalid length. [ 506.337866][ T29] kauditd_printk_skb: 1474 callbacks suppressed [ 506.337894][ T29] audit: type=1400 audit(2000000327.203:46948): avc: denied { map_create } for pid=32491 comm="syz.3.10984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 506.388378][ T29] audit: type=1400 audit(2000000327.243:46949): avc: denied { prog_load } for pid=32491 comm="syz.3.10984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 506.407891][ T29] audit: type=1400 audit(2000000327.243:46950): avc: denied { create } for pid=32491 comm="syz.3.10984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 506.428620][ T29] audit: type=1400 audit(2000000327.243:46951): avc: denied { create } for pid=32491 comm="syz.3.10984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 506.448687][ T29] audit: type=1400 audit(2000000327.243:46952): avc: denied { prog_load } for pid=32491 comm="syz.3.10984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 506.468865][ T29] audit: type=1400 audit(2000000327.243:46953): avc: denied { create } for pid=32491 comm="syz.3.10984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 506.568760][ T29] audit: type=1400 audit(2000000327.403:46954): avc: denied { map_create } for pid=32493 comm="syz.0.10985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 506.588311][ T29] audit: type=1400 audit(2000000327.403:46955): avc: denied { prog_load } for pid=32493 comm="syz.0.10985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 506.684621][ T29] audit: type=1400 audit(2000000327.543:46956): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 506.823714][ T29] audit: type=1400 audit(2000000327.683:46957): avc: denied { create } for pid=32496 comm="syz.3.10986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 507.061740][T32499] netlink: 'syz.0.10987': attribute type 10 has an invalid length. [ 507.069815][T32499] netlink: 40 bytes leftover after parsing attributes in process `syz.0.10987'. [ 508.020333][T32517] lo speed is unknown, defaulting to 1000 [ 508.129268][T32524] netlink: 'syz.1.10997': attribute type 21 has an invalid length. [ 508.198793][T32524] netlink: 'syz.1.10997': attribute type 1 has an invalid length. [ 508.211978][T32524] netlink: 144 bytes leftover after parsing attributes in process `syz.1.10997'. [ 508.766057][T32541] dummy0: entered promiscuous mode [ 508.855217][T32541] macsec0: entered allmulticast mode [ 508.885186][T32541] dummy0: entered allmulticast mode [ 509.160475][T32546] netlink: 96 bytes leftover after parsing attributes in process `syz.0.11006'. [ 509.302012][T32561] dummy0: entered promiscuous mode [ 509.430873][T32569] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 509.537846][T32578] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 509.967884][T32561] dummy0: left promiscuous mode [ 510.178024][T32580] netlink: 96 bytes leftover after parsing attributes in process `syz.1.11021'. [ 510.535896][T32610] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 510.706202][T32623] netlink: 4 bytes leftover after parsing attributes in process `syz.1.11040'. [ 511.653270][ T29] kauditd_printk_skb: 268 callbacks suppressed [ 511.653286][ T29] audit: type=1400 audit(2000000332.513:47226): avc: denied { prog_load } for pid=32634 comm="syz.2.11046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 511.707208][ T29] audit: type=1400 audit(2000000332.553:47227): avc: denied { prog_load } for pid=32634 comm="syz.2.11046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 511.726746][ T29] audit: type=1400 audit(2000000332.553:47228): avc: denied { prog_load } for pid=32634 comm="syz.2.11046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 511.746169][ T29] audit: type=1400 audit(2000000332.553:47229): avc: denied { map_create } for pid=32634 comm="syz.2.11046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 511.765786][ T29] audit: type=1400 audit(2000000332.553:47230): avc: denied { prog_load } for pid=32634 comm="syz.2.11046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 511.785190][ T29] audit: type=1400 audit(2000000332.553:47231): avc: denied { prog_load } for pid=32634 comm="syz.2.11046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 511.804736][ T29] audit: type=1400 audit(2000000332.553:47232): avc: denied { map_create } for pid=32634 comm="syz.2.11046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 511.824263][ T29] audit: type=1400 audit(2000000332.553:47233): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 511.860144][ T29] audit: type=1400 audit(2000000332.723:47234): avc: denied { prog_load } for pid=32636 comm="syz.0.11047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 511.887737][T32623] team1: entered promiscuous mode [ 511.893053][T32623] team1: entered allmulticast mode [ 511.905224][T32624] dummy0: entered promiscuous mode [ 511.911620][T32624] dummy0: left promiscuous mode [ 511.944638][ T29] audit: type=1400 audit(2000000332.803:47235): avc: denied { prog_load } for pid=32637 comm="syz.2.11048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 512.222380][T32667] netlink: 4 bytes leftover after parsing attributes in process `syz.0.11061'. [ 512.273743][T32667] team0: entered promiscuous mode [ 512.288269][T32667] team0: entered allmulticast mode [ 512.604386][T32707] netlink: 4 bytes leftover after parsing attributes in process `syz.3.11079'. [ 512.627719][T32707] team1: entered promiscuous mode [ 512.633975][T32707] team1: entered allmulticast mode [ 512.677954][T32714] netlink: 28 bytes leftover after parsing attributes in process `syz.3.11084'. [ 512.687061][T32714] netlink: 28 bytes leftover after parsing attributes in process `syz.3.11084'. [ 512.863293][T32732] dummy0: entered promiscuous mode [ 512.878954][T32732] dummy0: left promiscuous mode [ 512.952163][T32742] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 513.052030][T32745] netlink: 'syz.3.11097': attribute type 7 has an invalid length. [ 513.064470][T32745] netlink: 8 bytes leftover after parsing attributes in process `syz.3.11097'. [ 513.113287][T32761] netlink: 12 bytes leftover after parsing attributes in process `syz.1.11105'. [ 513.388903][T32750] 8021q: VLANs not supported on gre0 [ 513.887385][ T351] netlink: 'syz.1.11128': attribute type 10 has an invalid length. [ 513.895514][ T351] netlink: 40 bytes leftover after parsing attributes in process `syz.1.11128'. [ 513.916138][ T351] A link change request failed with some changes committed already. Interface dummy0 may have been left with an inconsistent configuration, please check. [ 514.249104][ T373] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 514.904493][ T436] netlink: 'syz.2.11168': attribute type 4 has an invalid length. [ 514.927134][ T436] netlink: 'syz.2.11168': attribute type 4 has an invalid length. [ 514.958202][ T438] netlink: 96 bytes leftover after parsing attributes in process `syz.2.11169'. [ 515.777331][ T519] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=519 comm=syz.4.11205 [ 516.158496][ T543] netlink: 96 bytes leftover after parsing attributes in process `syz.1.11216'. [ 516.667740][ T29] kauditd_printk_skb: 832 callbacks suppressed [ 516.667768][ T29] audit: type=1400 audit(2000000337.534:48068): avc: denied { write } for pid=571 comm="syz.2.11230" name="001" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 516.774728][ T29] audit: type=1400 audit(2000000337.614:48069): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 516.799199][ T29] audit: type=1400 audit(2000000337.634:48070): avc: denied { map_create } for pid=573 comm="syz.4.11232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 516.911797][ T29] audit: type=1400 audit(2000000337.644:48071): avc: denied { prog_load } for pid=573 comm="syz.4.11232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 516.931189][ T29] audit: type=1400 audit(2000000337.694:48072): avc: denied { prog_load } for pid=573 comm="syz.4.11232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 516.950424][ T29] audit: type=1400 audit(2000000337.694:48073): avc: denied { create } for pid=573 comm="syz.4.11232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 516.970132][ T29] audit: type=1400 audit(2000000337.694:48074): avc: denied { prog_load } for pid=573 comm="syz.4.11232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 517.094539][ T29] audit: type=1400 audit(2000000337.904:48075): avc: denied { map_create } for pid=576 comm="syz.1.11231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 517.114359][ T29] audit: type=1400 audit(2000000337.904:48076): avc: denied { prog_load } for pid=576 comm="syz.1.11231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 517.133583][ T29] audit: type=1400 audit(2000000337.904:48077): avc: denied { create } for pid=576 comm="syz.1.11231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 517.269414][ T590] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=590 comm=syz.4.11240 [ 517.322045][ T595] ÿÿÿÿÿÿ: renamed from vlan1 [ 517.565556][ T613] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 517.590542][ T626] netlink: 12 bytes leftover after parsing attributes in process `syz.4.11249'. [ 517.874861][ T655] $Hÿ: renamed from íÄ (while UP) [ 517.887205][ T655] $Hÿ: entered promiscuous mode [ 518.554720][ T721] $Hÿ: renamed from bond0 [ 518.562480][ T721] $Hÿ: entered promiscuous mode [ 518.604336][ T722] netlink: 12 bytes leftover after parsing attributes in process `syz.1.11297'. [ 519.197748][ T779] bridge: RTM_NEWNEIGH with invalid ether address [ 519.219246][ T777] bridge: RTM_NEWNEIGH with invalid ether address [ 519.769841][ T850] netlink: 4 bytes leftover after parsing attributes in process `syz.0.11353'. [ 519.817350][ T849] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11346'. [ 520.159582][ T895] netlink: 24 bytes leftover after parsing attributes in process `syz.0.11380'. [ 521.227793][ T946] netlink: 12 bytes leftover after parsing attributes in process `syz.1.11402'. [ 521.571825][ T972] sch_fq: defrate 0 ignored. [ 521.676275][ T29] kauditd_printk_skb: 881 callbacks suppressed [ 521.676289][ T29] audit: type=1400 audit(2000000342.544:48959): avc: denied { map_create } for pid=994 comm="syz.2.11427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 521.721432][ T29] audit: type=1400 audit(2000000342.574:48960): avc: denied { prog_load } for pid=994 comm="syz.2.11427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 521.740685][ T29] audit: type=1400 audit(2000000342.574:48961): avc: denied { prog_load } for pid=994 comm="syz.2.11427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 521.760073][ T29] audit: type=1400 audit(2000000342.574:48962): avc: denied { map_create } for pid=990 comm="syz.4.11425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 521.779422][ T29] audit: type=1400 audit(2000000342.574:48964): avc: denied { prog_load } for pid=994 comm="syz.2.11427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 521.798584][ T29] audit: type=1400 audit(2000000342.574:48963): avc: denied { prog_load } for pid=990 comm="syz.4.11425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 521.817970][ T29] audit: type=1400 audit(2000000342.574:48965): avc: denied { map_create } for pid=990 comm="syz.4.11425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 521.837261][ T29] audit: type=1400 audit(2000000342.574:48966): avc: denied { prog_load } for pid=994 comm="syz.2.11427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 521.856617][ T29] audit: type=1400 audit(2000000342.574:48967): avc: denied { prog_load } for pid=990 comm="syz.4.11425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 521.875926][ T29] audit: type=1400 audit(2000000342.574:48968): avc: denied { prog_load } for pid=990 comm="syz.4.11425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 522.146987][ T1024] pim6reg1: entered promiscuous mode [ 522.152446][ T1024] pim6reg1: entered allmulticast mode [ 522.345731][ T1043] netlink: 12 bytes leftover after parsing attributes in process `syz.4.11444'. [ 522.809994][ T1072] dummy0: left allmulticast mode [ 522.820214][ T1072] macsec0: left allmulticast mode [ 522.992109][ T1081] netlink: 96 bytes leftover after parsing attributes in process `syz.1.11469'. [ 523.088865][ T1089] netlink: 96 bytes leftover after parsing attributes in process `syz.3.11472'. [ 523.269941][ T1101] lo speed is unknown, defaulting to 1000 [ 523.614466][ T1129] netlink: 12 bytes leftover after parsing attributes in process `syz.0.11484'. [ 524.280750][ T1182] pim6reg1: entered promiscuous mode [ 524.286563][ T1182] pim6reg1: entered allmulticast mode [ 524.303530][ T1184] lo speed is unknown, defaulting to 1000 [ 524.329525][ T1186] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1186 comm=syz.4.11515 [ 525.352560][ T1276] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 525.439942][ T1289] netlink: 8 bytes leftover after parsing attributes in process `syz.3.11557'. [ 525.808352][ T1323] netlink: 'syz.2.11572': attribute type 21 has an invalid length. [ 525.816387][ T1323] netlink: 156 bytes leftover after parsing attributes in process `syz.2.11572'. [ 526.353302][ T1337] pim6reg1: entered promiscuous mode [ 526.358703][ T1337] pim6reg1: entered allmulticast mode [ 526.607068][ T1339] netlink: 44 bytes leftover after parsing attributes in process `syz.4.11580'. [ 526.716524][ T29] kauditd_printk_skb: 861 callbacks suppressed [ 526.716538][ T29] audit: type=1400 audit(2000000347.584:49830): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 526.808524][ T29] audit: type=1400 audit(2000000347.674:49831): avc: denied { open } for pid=1342 comm="syz.4.11582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 526.828060][ T29] audit: type=1400 audit(2000000347.674:49832): avc: denied { map_create } for pid=1342 comm="syz.4.11582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 526.847923][ T29] audit: type=1400 audit(2000000347.674:49833): avc: denied { prog_load } for pid=1342 comm="syz.4.11582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 526.868084][ T29] audit: type=1400 audit(2000000347.674:49834): avc: denied { prog_load } for pid=1342 comm="syz.4.11582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 526.887885][ T29] audit: type=1400 audit(2000000347.674:49835): avc: denied { prog_load } for pid=1342 comm="syz.4.11582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 526.907282][ T29] audit: type=1400 audit(2000000347.674:49836): avc: denied { prog_load } for pid=1343 comm="syz.0.11583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 526.950009][ T29] audit: type=1400 audit(2000000347.744:49837): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 526.974587][ T29] audit: type=1400 audit(2000000347.754:49838): avc: denied { prog_load } for pid=1343 comm="syz.0.11583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 526.993915][ T29] audit: type=1400 audit(2000000347.754:49839): avc: denied { prog_load } for pid=1343 comm="syz.0.11583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 527.288806][ T1374] lo speed is unknown, defaulting to 1000 [ 527.386004][ T1378] netlink: 14 bytes leftover after parsing attributes in process `syz.1.11596'. [ 527.514863][ T1378] $Hÿ (unregistering): Released all slaves [ 528.165667][ T1427] netlink: 28 bytes leftover after parsing attributes in process `syz.0.11619'. [ 528.174812][ T1427] netlink: 28 bytes leftover after parsing attributes in process `syz.0.11619'. [ 528.266312][ T1441] bridge: RTM_NEWNEIGH with invalid ether address [ 528.547177][ T1466] lo speed is unknown, defaulting to 1000 [ 528.629450][ T1478] netlink: 3 bytes leftover after parsing attributes in process `syz.0.11642'. [ 528.642039][ T1478] batadv0: entered promiscuous mode [ 528.647310][ T1478] batadv0: entered allmulticast mode [ 530.114286][T27194] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 530.382169][ T1610] bridge: RTM_NEWNEIGH with invalid ether address [ 530.845039][ T9] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 530.953989][ T1657] netlink: 96 bytes leftover after parsing attributes in process `syz.3.11719'. [ 531.023991][ T1672] netem: change failed [ 531.128030][ T1684] netlink: 28 bytes leftover after parsing attributes in process `syz.2.11731'. [ 531.137210][ T1684] netlink: 28 bytes leftover after parsing attributes in process `syz.2.11731'. [ 531.239276][ T1695] netlink: 'syz.3.11736': attribute type 10 has an invalid length. [ 531.247567][ T1695] netlink: 40 bytes leftover after parsing attributes in process `syz.3.11736'. [ 531.270568][ T1694] netlink: 96 bytes leftover after parsing attributes in process `syz.0.11735'. [ 531.282034][ T1695] team0: Port device geneve1 added [ 531.407435][ T1703] netlink: 4 bytes leftover after parsing attributes in process `syz.0.11741'. [ 531.478928][ T1710] netlink: 96 bytes leftover after parsing attributes in process `syz.3.11743'. [ 531.677130][ T1706] lo speed is unknown, defaulting to 1000 [ 531.765235][ T29] kauditd_printk_skb: 871 callbacks suppressed [ 531.765264][ T29] audit: type=1400 audit(2000000352.634:50711): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 531.808192][ T29] audit: type=1400 audit(2000000352.634:50712): avc: denied { prog_load } for pid=1717 comm="syz.2.11749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 531.827547][ T29] audit: type=1400 audit(2000000352.664:50713): avc: denied { map_create } for pid=1717 comm="syz.2.11749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 531.847277][ T29] audit: type=1400 audit(2000000352.664:50714): avc: denied { prog_load } for pid=1717 comm="syz.2.11749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 531.866725][ T29] audit: type=1400 audit(2000000352.664:50715): avc: denied { prog_load } for pid=1717 comm="syz.2.11749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 531.886208][ T29] audit: type=1400 audit(2000000352.664:50716): avc: denied { open } for pid=1717 comm="syz.2.11749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 531.907845][ T29] audit: type=1400 audit(2000000352.674:50717): avc: denied { map_create } for pid=1721 comm="syz.4.11750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 531.927423][ T29] audit: type=1400 audit(2000000352.674:50718): avc: denied { prog_load } for pid=1721 comm="syz.4.11750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 531.946814][ T29] audit: type=1400 audit(2000000352.694:50719): avc: denied { prog_load } for pid=1721 comm="syz.4.11750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 531.966199][ T29] audit: type=1400 audit(2000000352.774:50720): avc: denied { prog_load } for pid=1720 comm="syz.0.11751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 532.192253][ T1741] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 532.401097][ T1761] netlink: 'syz.4.11767': attribute type 21 has an invalid length. [ 532.658089][ T1782] bridge: RTM_NEWNEIGH with invalid ether address [ 532.796761][ T1796] netlink: 'syz.1.11780': attribute type 21 has an invalid length. [ 532.796831][ T1790] bridge: RTM_NEWNEIGH with invalid ether address [ 534.535535][ T1884] netlink: 'syz.1.11824': attribute type 13 has an invalid length. [ 534.550807][ T1884] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 534.584621][ T9] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 535.323814][T27194] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 535.460642][ T1962] netlink: 'syz.3.11861': attribute type 10 has an invalid length. [ 535.468756][ T1962] __nla_validate_parse: 2 callbacks suppressed [ 535.468769][ T1962] netlink: 55 bytes leftover after parsing attributes in process `syz.3.11861'. [ 536.666703][ T2025] netlink: 4 bytes leftover after parsing attributes in process `syz.4.11891'. [ 536.719390][ T2025] team1: entered promiscuous mode [ 536.765546][ T2025] team1: entered allmulticast mode [ 536.793476][ T29] kauditd_printk_skb: 867 callbacks suppressed [ 536.793529][ T29] audit: type=1400 audit(2000000357.655:51588): avc: denied { prog_load } for pid=2031 comm="syz.2.11896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 536.905829][ T29] audit: type=1400 audit(2000000357.695:51589): avc: denied { map_create } for pid=2031 comm="syz.2.11896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 536.925733][ T29] audit: type=1400 audit(2000000357.715:51590): avc: denied { prog_load } for pid=2031 comm="syz.2.11896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 536.945380][ T29] audit: type=1400 audit(2000000357.715:51591): avc: denied { prog_load } for pid=2031 comm="syz.2.11896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 536.964914][ T29] audit: type=1400 audit(2000000357.755:51592): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 536.989362][ T29] audit: type=1400 audit(2000000357.765:51593): avc: denied { prog_load } for pid=2033 comm="syz.3.11898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 537.008802][ T29] audit: type=1400 audit(2000000357.765:51594): avc: denied { read write } for pid=2033 comm="syz.3.11898" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 537.032805][ T29] audit: type=1400 audit(2000000357.765:51595): avc: denied { create } for pid=2033 comm="syz.3.11898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 537.054824][ T29] audit: type=1400 audit(2000000357.765:51596): avc: denied { map_create } for pid=2033 comm="syz.3.11898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 537.074350][ T29] audit: type=1400 audit(2000000357.765:51597): avc: denied { prog_load } for pid=2033 comm="syz.3.11898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 537.137652][ T2040] netlink: 'syz.0.11889': attribute type 10 has an invalid length. [ 537.206611][ T2050] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11904'. [ 537.215692][ T2050] netlink: 4 bytes leftover after parsing attributes in process `syz.0.11904'. [ 537.233435][ T2050] wireguard2: entered promiscuous mode [ 537.239526][ T2050] wireguard2: entered allmulticast mode [ 537.286304][ T2057] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2057 comm=syz.0.11906 [ 538.235231][ T2117] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 538.574398][ T2130] bridge: RTM_NEWNEIGH with invalid ether address [ 538.824989][ T2147] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11946'. [ 538.834122][ T2147] netlink: 28 bytes leftover after parsing attributes in process `syz.3.11946'. [ 538.843297][ T2147] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11946'. [ 538.865994][ T2147] netlink: 28 bytes leftover after parsing attributes in process `syz.3.11946'. [ 538.875168][ T2147] netlink: 'syz.3.11946': attribute type 6 has an invalid length. [ 538.884068][ T2149] netlink: 96 bytes leftover after parsing attributes in process `syz.1.11945'. [ 539.016971][ T2158] netlink: 'syz.3.11953': attribute type 2 has an invalid length. [ 539.024874][ T2158] netlink: 'syz.3.11953': attribute type 8 has an invalid length. [ 539.032688][ T2158] netlink: 132 bytes leftover after parsing attributes in process `syz.3.11953'. [ 539.397692][ T2198] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2198 comm=syz.1.11971 [ 539.660552][ T2225] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 539.725248][ T2229] bridge: RTM_NEWNEIGH with invalid ether address [ 540.288596][ T2263] syzkaller0: entered promiscuous mode [ 540.294235][ T2263] syzkaller0: entered allmulticast mode [ 542.385312][ T29] kauditd_printk_skb: 896 callbacks suppressed [ 542.385324][ T29] audit: type=1400 audit(2000000363.255:52494): avc: denied { prog_load } for pid=2304 comm="syz.0.12020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 542.432605][ T29] audit: type=1400 audit(2000000363.275:52495): avc: denied { map_create } for pid=2304 comm="syz.0.12020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 542.452079][ T29] audit: type=1400 audit(2000000363.275:52496): avc: denied { prog_load } for pid=2304 comm="syz.0.12020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 542.471450][ T29] audit: type=1400 audit(2000000363.275:52497): avc: denied { prog_load } for pid=2304 comm="syz.0.12020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 542.490697][ T29] audit: type=1400 audit(2000000363.285:52498): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 542.515025][ T29] audit: type=1400 audit(2000000363.285:52499): avc: denied { open } for pid=2304 comm="syz.0.12020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 542.555112][ T29] audit: type=1400 audit(2000000363.425:52500): avc: denied { create } for pid=2306 comm="syz.0.12021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 542.574869][ T29] audit: type=1400 audit(2000000363.425:52501): avc: denied { map_create } for pid=2306 comm="syz.0.12021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 542.620778][ T29] audit: type=1400 audit(2000000363.465:52502): avc: denied { prog_load } for pid=2306 comm="syz.0.12021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 542.640207][ T29] audit: type=1400 audit(2000000363.465:52503): avc: denied { prog_load } for pid=2306 comm="syz.0.12021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 543.216372][ T2323] ip6gre5: entered allmulticast mode [ 543.452418][ T2346] __nla_validate_parse: 1 callbacks suppressed [ 543.452431][ T2346] netlink: 4 bytes leftover after parsing attributes in process `syz.4.12039'. [ 543.558863][ T2357] sch_tbf: burst 3298 is lower than device lo mtu (11337746) ! [ 543.669952][ T2370] netlink: 'syz.1.12048': attribute type 10 has an invalid length. [ 543.720562][ T2376] netlink: 4 bytes leftover after parsing attributes in process `syz.1.12048'. [ 544.911421][ T2414] netlink: 2564 bytes leftover after parsing attributes in process `syz.2.12072'. [ 544.937547][ T2417] netlink: 'syz.4.12071': attribute type 1 has an invalid length. [ 544.996537][ T2417] bond0: entered promiscuous mode [ 545.002907][ T2417] 8021q: adding VLAN 0 to HW filter on device bond0 [ 545.037750][ T2417] netlink: 3 bytes leftover after parsing attributes in process `syz.4.12071'. [ 545.051150][ T2417] batadv0: entered promiscuous mode [ 545.056409][ T2417] batadv0: entered allmulticast mode [ 545.063518][ T2417] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 545.071989][ T2417] bond0: (slave batadv0): making interface the new active one [ 545.082930][ T2417] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 545.189866][ T2438] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2438 comm=syz.1.12083 [ 545.231335][ T2440] 8021q: adding VLAN 0 to HW filter on device bond0 [ 545.239508][ T2440] bridge0: port 1(bond0) entered blocking state [ 545.246486][ T2440] bridge0: port 1(bond0) entered disabled state [ 545.253074][ T2440] bond0: entered allmulticast mode [ 545.259804][ T2440] bond0: entered promiscuous mode [ 545.545834][ T2450] lo speed is unknown, defaulting to 1000 [ 546.179607][ T2519] netlink: 'syz.1.12119': attribute type 10 has an invalid length. [ 546.192597][ T2519] netlink: 40 bytes leftover after parsing attributes in process `syz.1.12119'. [ 546.271026][ T2519] A link change request failed with some changes committed already. Interface geneve1 may have been left with an inconsistent configuration, please check. [ 547.042039][ T2609] wg2: entered promiscuous mode [ 547.047511][ T2609] wg2: entered allmulticast mode [ 547.394060][ T29] kauditd_printk_skb: 878 callbacks suppressed [ 547.394075][ T29] audit: type=1400 audit(2000000368.265:53382): avc: denied { create } for pid=2647 comm="syz.4.12183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 547.444525][ T29] audit: type=1400 audit(2000000368.265:53383): avc: denied { prog_load } for pid=2648 comm="syz.1.12182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 547.464010][ T29] audit: type=1400 audit(2000000368.295:53384): avc: denied { create } for pid=2647 comm="syz.4.12183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 547.484740][ T29] audit: type=1400 audit(2000000368.305:53385): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 547.509118][ T29] audit: type=1400 audit(2000000368.305:53386): avc: denied { prog_load } for pid=2652 comm="syz.4.12184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 547.528460][ T29] audit: type=1400 audit(2000000368.305:53387): avc: denied { map_create } for pid=2652 comm="syz.4.12184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 547.547831][ T29] audit: type=1400 audit(2000000368.305:53388): avc: denied { prog_load } for pid=2652 comm="syz.4.12184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 547.567114][ T29] audit: type=1400 audit(2000000368.305:53389): avc: denied { prog_load } for pid=2652 comm="syz.4.12184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 547.586360][ T29] audit: type=1400 audit(2000000368.315:53390): avc: denied { prog_load } for pid=2652 comm="syz.4.12184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 547.616643][ T29] audit: type=1400 audit(2000000368.315:53391): avc: denied { read } for pid=2642 comm="syz.2.12180" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 547.753746][ T2657] pim6reg1: entered promiscuous mode [ 547.759081][ T2657] pim6reg1: entered allmulticast mode [ 547.819425][ T2663] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 548.617218][ T2682] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 548.735140][ T2691] xt_hashlimit: max too large, truncated to 1048576 [ 549.184192][ T2724] xt_hashlimit: max too large, truncated to 1048576 [ 549.730431][ T2774] netlink: 20 bytes leftover after parsing attributes in process `syz.2.12237'. [ 549.749523][ T2774] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 549.757965][ T2774] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 549.766423][ T2774] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 549.774754][ T2774] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 549.786822][ T2774] netdevsim netdevsim2 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 549.795285][ T2774] netdevsim netdevsim2 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 549.803814][ T2774] netdevsim netdevsim2 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 549.812162][ T2774] netdevsim netdevsim2 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 550.105010][ T2801] ÿÿÿÿÿÿ: renamed from vlan1 [ 550.894375][ T2880] bridge0: entered promiscuous mode [ 550.899751][ T2880] macsec0: entered promiscuous mode [ 550.905970][ T2880] bridge0: port 1(macsec0) entered blocking state [ 550.912534][ T2880] bridge0: port 1(macsec0) entered disabled state [ 550.925480][ T2880] macsec0: entered allmulticast mode [ 550.930897][ T2880] bridge0: entered allmulticast mode [ 550.938883][ T2881] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 550.946216][ T2880] macsec0: left allmulticast mode [ 550.951302][ T2880] bridge0: left allmulticast mode [ 550.967570][ T2880] bridge0: left promiscuous mode [ 550.992392][ T2885] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2885 comm=syz.4.12292 [ 552.169666][ T3024] ip6gre2: entered allmulticast mode [ 552.423948][ T29] kauditd_printk_skb: 999 callbacks suppressed [ 552.423962][ T29] audit: type=1400 audit(2000000373.296:54391): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 552.459821][ T29] audit: type=1400 audit(2000000373.306:54392): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 552.485514][ T29] audit: type=1400 audit(2000000373.336:54393): avc: denied { prog_load } for pid=3041 comm="syz.2.12362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 552.504842][ T29] audit: type=1400 audit(2000000373.336:54394): avc: denied { prog_load } for pid=3041 comm="syz.2.12362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 552.524652][ T29] audit: type=1400 audit(2000000373.336:54395): avc: denied { prog_load } for pid=3041 comm="syz.2.12362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 552.544039][ T29] audit: type=1400 audit(2000000373.336:54396): avc: denied { prog_load } for pid=3041 comm="syz.2.12362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 552.563421][ T29] audit: type=1400 audit(2000000373.336:54397): avc: denied { mounton } for pid=3041 comm="syz.2.12362" path="/2269/file0" dev="tmpfs" ino=11873 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 552.617367][ T29] audit: type=1400 audit(2000000373.456:54398): avc: denied { map_create } for pid=3043 comm="syz.4.12363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 552.636762][ T29] audit: type=1400 audit(2000000373.456:54399): avc: denied { prog_load } for pid=3043 comm="syz.4.12363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 552.656380][ T29] audit: type=1400 audit(2000000373.456:54400): avc: denied { prog_load } for pid=3043 comm="syz.4.12363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 553.023424][ T3076] netlink: 12 bytes leftover after parsing attributes in process `syz.2.12376'. [ 553.506695][ T3101] netlink: 'syz.2.12387': attribute type 13 has an invalid length. [ 553.851196][ T3101] 8021q: adding VLAN 0 to HW filter on device team0 [ 553.897898][ T3101] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 553.978022][ T3125] sch_fq: defrate 2048 ignored. [ 554.161156][ T3166] netlink: 4 bytes leftover after parsing attributes in process `syz.4.12414'. [ 554.352195][ T3205] netlink: 'syz.3.12431': attribute type 4 has an invalid length. [ 554.371766][T27194] lo speed is unknown, defaulting to 1000 [ 554.377716][T27194] syz0: Port: 1 Link DOWN [ 554.706526][ T3225] ip6gre2: entered allmulticast mode [ 554.861426][ T3243] netlink: 'syz.0.12449': attribute type 12 has an invalid length. [ 554.946248][ T3253] ip6gre3: entered allmulticast mode [ 555.267276][ T3298] bridge: RTM_NEWNEIGH with invalid ether address [ 555.510446][ T3354] pim6reg1: entered promiscuous mode [ 555.516745][ T3354] pim6reg1: entered allmulticast mode [ 556.100207][ T3479] wireguard1: entered promiscuous mode [ 556.540299][ T3542] netlink: 24 bytes leftover after parsing attributes in process `syz.2.12563'. [ 557.337172][ T3639] netlink: 27 bytes leftover after parsing attributes in process `syz.3.12610'. [ 557.456914][ T29] kauditd_printk_skb: 1321 callbacks suppressed [ 557.456928][ T29] audit: type=1400 audit(557.946:55722): avc: denied { open } for pid=3647 comm="syz.1.12614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 557.507649][ T29] audit: type=1400 audit(557.996:55723): avc: denied { prog_load } for pid=3652 comm="syz.2.12615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 557.564794][ T3656] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 557.573871][ T29] audit: type=1400 audit(558.016:55724): avc: denied { read write } for pid=3652 comm="syz.2.12615" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 557.598503][ T29] audit: type=1400 audit(558.016:55725): avc: denied { create } for pid=3652 comm="syz.2.12615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 557.619408][ T29] audit: type=1400 audit(558.016:55726): avc: denied { map_create } for pid=3652 comm="syz.2.12615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 557.639803][ T29] audit: type=1400 audit(558.016:55727): avc: denied { prog_load } for pid=3652 comm="syz.2.12615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 557.659279][ T29] audit: type=1400 audit(558.016:55728): avc: denied { prog_load } for pid=3652 comm="syz.2.12615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 557.679338][ T29] audit: type=1400 audit(558.016:55729): avc: denied { sys_module } for pid=3652 comm="syz.2.12615" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 557.700821][ T29] audit: type=1400 audit(558.016:55730): avc: denied { create } for pid=3652 comm="syz.2.12615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 557.722108][ T29] audit: type=1400 audit(558.016:55731): avc: denied { create } for pid=3652 comm="syz.2.12615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 558.602411][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 559.557475][ T3748] netlink: 27 bytes leftover after parsing attributes in process `syz.2.12653'. [ 559.595776][ T3753] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3753 comm=syz.1.12655 [ 559.642351][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 559.770785][ T3762] netlink: 4 bytes leftover after parsing attributes in process `syz.4.12659'. [ 560.054232][ T3760] netlink: 96 bytes leftover after parsing attributes in process `syz.0.12658'. [ 560.360532][ T3779] netlink: 'syz.1.12677': attribute type 4 has an invalid length. [ 560.436153][ T3779] netlink: 'syz.1.12677': attribute type 4 has an invalid length. [ 560.525407][ T3793] netlink: 96 bytes leftover after parsing attributes in process `syz.4.12674'. [ 560.629545][ T3800] netlink: 96 bytes leftover after parsing attributes in process `syz.1.12686'. [ 560.865714][ T3825] netlink: 96 bytes leftover after parsing attributes in process `syz.3.12690'. [ 561.873353][ T3873] ip6gre3: entered allmulticast mode [ 562.500074][ T29] kauditd_printk_skb: 546 callbacks suppressed [ 562.500090][ T29] audit: type=1400 audit(562.986:56278): avc: denied { prog_load } for pid=3898 comm="syz.2.12722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 562.543871][ T29] audit: type=1400 audit(563.016:56279): avc: denied { prog_load } for pid=3898 comm="syz.2.12722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 562.564230][ T29] audit: type=1400 audit(563.016:56280): avc: denied { map_create } for pid=3898 comm="syz.2.12722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 562.583643][ T29] audit: type=1400 audit(563.016:56281): avc: denied { prog_load } for pid=3898 comm="syz.2.12722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 562.603785][ T29] audit: type=1400 audit(563.016:56282): avc: denied { prog_load } for pid=3898 comm="syz.2.12722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 562.623066][ T29] audit: type=1400 audit(563.016:56283): avc: denied { prog_load } for pid=3898 comm="syz.2.12722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 562.643147][ T29] audit: type=1400 audit(563.016:56284): avc: denied { prog_load } for pid=3898 comm="syz.2.12722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 562.674625][ T29] audit: type=1400 audit(563.156:56285): avc: denied { prog_load } for pid=3900 comm="syz.2.12723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 562.694084][ T29] audit: type=1400 audit(563.166:56286): avc: denied { map_create } for pid=3900 comm="syz.2.12723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 562.714197][ T29] audit: type=1400 audit(563.166:56287): avc: denied { prog_load } for pid=3900 comm="syz.2.12723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 563.294130][ T3901] netlink: 96 bytes leftover after parsing attributes in process `syz.2.12723'. [ 563.394855][ T3913] netlink: 4 bytes leftover after parsing attributes in process `syz.1.12729'. [ 563.541878][ T3925] netlink: 4 bytes leftover after parsing attributes in process `syz.0.12737'. [ 563.623421][ T3934] netlink: 96 bytes leftover after parsing attributes in process `syz.2.12741'. [ 563.665690][ T3940] sch_tbf: burst 32855 is lower than device lo mtu (11337746) ! [ 564.354400][ T3978] netlink: 96 bytes leftover after parsing attributes in process `syz.0.12756'. [ 564.474785][ T3980] netlink: 4 bytes leftover after parsing attributes in process `syz.3.12758'. [ 565.600159][ T4007] netlink: 52 bytes leftover after parsing attributes in process `syz.4.12771'. [ 565.737435][ T4038] netlink: 4 bytes leftover after parsing attributes in process `syz.4.12781'. [ 565.805214][ T4048] sch_tbf: burst 32855 is lower than device lo mtu (11337746) ! [ 565.834387][ T4050] netlink: 4 bytes leftover after parsing attributes in process `syz.2.12791'. [ 565.925090][ T4062] netlink: 52 bytes leftover after parsing attributes in process `syz.0.12796'. [ 566.074887][ T4083] sch_tbf: burst 32855 is lower than device lo mtu (11337746) ! [ 567.390184][ T4200] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 567.397449][ T4200] IPv6: NLM_F_CREATE should be set when creating new route [ 567.443401][ T4205] tls_set_device_offload_rx: netdev not found [ 567.505211][ T29] kauditd_printk_skb: 726 callbacks suppressed [ 567.505224][ T29] audit: type=1400 audit(567.997:57014): avc: denied { open } for pid=4213 comm="syz.4.12878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 567.560919][ T29] audit: type=1400 audit(568.027:57015): avc: denied { map_create } for pid=4213 comm="syz.4.12878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 567.579815][ T29] audit: type=1400 audit(568.027:57016): avc: denied { prog_load } for pid=4213 comm="syz.4.12878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 567.598607][ T29] audit: type=1400 audit(568.027:57017): avc: denied { prog_load } for pid=4213 comm="syz.4.12878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 567.617313][ T29] audit: type=1400 audit(568.027:57018): avc: denied { prog_load } for pid=4213 comm="syz.4.12878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 567.636079][ T29] audit: type=1400 audit(568.077:57019): avc: denied { read write } for pid=4213 comm="syz.4.12878" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 567.659904][ T29] audit: type=1400 audit(568.107:57020): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 567.914141][ T29] audit: type=1400 audit(568.407:57021): avc: denied { prog_load } for pid=4215 comm="syz.4.12870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 567.951256][ T29] audit: type=1400 audit(568.427:57022): avc: denied { map_create } for pid=4217 comm="syz.1.12880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 567.970302][ T29] audit: type=1400 audit(568.427:57023): avc: denied { prog_load } for pid=4217 comm="syz.1.12880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 569.159321][ T4305] bridge: RTM_NEWNEIGH with invalid ether address [ 569.353032][ T4338] bridge: RTM_NEWNEIGH with invalid ether address [ 569.610977][ T4365] pim6reg1: entered promiscuous mode [ 569.616380][ T4365] pim6reg1: entered allmulticast mode [ 570.577668][ T4392] syzkaller0: entered promiscuous mode [ 570.584759][ T4392] syzkaller0: entered allmulticast mode [ 571.008872][ T4480] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 571.096190][ T4496] netlink: 'syz.4.13004': attribute type 4 has an invalid length. [ 571.210380][ T4517] sch_fq: defrate 2048 ignored. [ 571.396892][ T4556] sch_fq: defrate 2048 ignored. [ 571.519328][ T4578] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 571.519567][ T4580] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 571.558265][ T4581] __nla_validate_parse: 8 callbacks suppressed [ 571.558280][ T4581] netlink: 96 bytes leftover after parsing attributes in process `syz.1.13038'. [ 571.596481][ T4570] lo speed is unknown, defaulting to 1000 [ 571.641290][ T4588] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 571.696308][ T4596] netlink: 44 bytes leftover after parsing attributes in process `syz.2.13047'. [ 571.858676][ T4626] Cannot find add_set index 0 as target [ 571.934638][ T4630] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 571.943547][ T4637] netlink: 12 bytes leftover after parsing attributes in process `syz.2.13066'. [ 571.953491][ T4637] netlink: 28 bytes leftover after parsing attributes in process `syz.2.13066'. [ 571.963376][ T4637] netlink: 12 bytes leftover after parsing attributes in process `syz.2.13066'. [ 571.973389][ T4637] netlink: 28 bytes leftover after parsing attributes in process `syz.2.13066'. [ 571.982630][ T4637] netlink: 'syz.2.13066': attribute type 6 has an invalid length. [ 572.456931][ T4689] macsec1: entered promiscuous mode [ 572.462231][ T4689] bridge0: entered promiscuous mode [ 572.468346][ T4689] bridge0: port 2(macsec1) entered blocking state [ 572.474924][ T4689] bridge0: port 2(macsec1) entered disabled state [ 572.482022][ T4689] macsec1: entered allmulticast mode [ 572.487523][ T4689] bridge0: entered allmulticast mode [ 572.495969][ T4689] macsec1: left allmulticast mode [ 572.501029][ T4689] bridge0: left allmulticast mode [ 572.507898][ T4689] bridge0: left promiscuous mode [ 572.513678][ T29] kauditd_printk_skb: 1561 callbacks suppressed [ 572.513691][ T29] audit: type=1400 audit(573.007:58585): avc: denied { map_create } for pid=4691 comm="syz.4.13096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 572.548990][ T29] audit: type=1400 audit(573.027:58586): avc: denied { prog_load } for pid=4691 comm="syz.4.13096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 572.569049][ T29] audit: type=1400 audit(573.027:58587): avc: denied { prog_load } for pid=4691 comm="syz.4.13096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 572.588416][ T29] audit: type=1400 audit(573.027:58588): avc: denied { sys_module } for pid=4691 comm="syz.4.13096" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 572.610287][ T29] audit: type=1400 audit(573.037:58589): avc: denied { create } for pid=4691 comm="syz.4.13096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 572.630757][ T29] audit: type=1400 audit(573.037:58590): avc: denied { create } for pid=4691 comm="syz.4.13096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 572.652240][ T29] audit: type=1400 audit(573.037:58591): avc: denied { write } for pid=4691 comm="syz.4.13096" name="001" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 572.676057][ T29] audit: type=1400 audit(573.037:58592): avc: denied { read write } for pid=4691 comm="syz.4.13096" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 572.700277][ T29] audit: type=1400 audit(573.037:58593): avc: denied { prog_load } for pid=4691 comm="syz.4.13096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 572.720392][ T29] audit: type=1400 audit(573.037:58594): avc: denied { create } for pid=4693 comm="syz.0.13098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 572.845609][ T4726] netlink: 'syz.1.13111': attribute type 10 has an invalid length. [ 572.854293][ T4726] netlink: 55 bytes leftover after parsing attributes in process `syz.1.13111'. [ 572.901884][ T4730] netlink: 'syz.0.13124': attribute type 10 has an invalid length. [ 572.909933][ T4730] netlink: 55 bytes leftover after parsing attributes in process `syz.0.13124'. [ 572.941778][ T4738] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 573.965139][ T4799] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 573.993866][ T4800] netlink: 12 bytes leftover after parsing attributes in process `syz.0.13139'. [ 574.802222][ T4822] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 575.007753][ T4842] netlink: 12 bytes leftover after parsing attributes in process `syz.3.13160'. [ 575.764709][ T4857] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 575.841644][ T4871] bridge: RTM_NEWNEIGH with invalid ether address [ 575.896318][ T4879] bond_slave_1: mtu less than device minimum [ 576.762201][ T4933] __nla_validate_parse: 2 callbacks suppressed [ 576.762263][ T4933] netlink: 4 bytes leftover after parsing attributes in process `syz.4.13202'. [ 577.521609][ T29] kauditd_printk_skb: 968 callbacks suppressed [ 577.521625][ T29] audit: type=1400 audit(578.017:59563): avc: denied { open } for pid=5024 comm="syz.1.13252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 577.576056][ T29] audit: type=1400 audit(578.017:59564): avc: denied { map_create } for pid=5024 comm="syz.1.13252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 577.594860][ T29] audit: type=1400 audit(578.017:59565): avc: denied { prog_load } for pid=5024 comm="syz.1.13252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 577.613823][ T29] audit: type=1400 audit(578.037:59566): avc: denied { prog_load } for pid=5028 comm="syz.1.13254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 577.632556][ T29] audit: type=1400 audit(578.037:59567): avc: denied { create } for pid=5028 comm="syz.1.13254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 577.652869][ T29] audit: type=1400 audit(578.037:59568): avc: denied { map_create } for pid=5028 comm="syz.1.13254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 577.671721][ T29] audit: type=1400 audit(578.037:59569): avc: denied { prog_load } for pid=5028 comm="syz.1.13254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 577.690491][ T29] audit: type=1400 audit(578.037:59570): avc: denied { prog_load } for pid=5028 comm="syz.1.13254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 577.709442][ T29] audit: type=1400 audit(578.037:59571): avc: denied { sys_module } for pid=5028 comm="syz.1.13254" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 577.730132][ T29] audit: type=1400 audit(578.037:59572): avc: denied { create } for pid=5028 comm="syz.1.13254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 577.818196][ T5041] netlink: 4 bytes leftover after parsing attributes in process `syz.3.13258'. [ 577.903187][ T5053] pim6reg1: entered promiscuous mode [ 577.908814][ T5053] pim6reg1: entered allmulticast mode [ 578.025789][ T5074] netlink: 12 bytes leftover after parsing attributes in process `syz.1.13274'. [ 578.390283][ T5083] tls_set_device_offload_rx: netdev not found [ 578.867579][ T5123] netlink: 12 bytes leftover after parsing attributes in process `syz.1.13304'. [ 579.319992][ T5137] sch_fq: defrate 0 ignored. [ 579.434083][ T5163] netlink: 28 bytes leftover after parsing attributes in process `syz.3.13307'. [ 579.443389][ T5163] netlink: 28 bytes leftover after parsing attributes in process `syz.3.13307'. [ 579.850493][ T5229] netlink: 12 bytes leftover after parsing attributes in process `syz.0.13342'. [ 580.292512][ T5255] serio: Serial port ptm0 [ 580.415478][ T5278] netlink: 28 bytes leftover after parsing attributes in process `syz.4.13365'. [ 580.424802][ T5278] netlink: 28 bytes leftover after parsing attributes in process `syz.4.13365'. [ 581.455348][ T5326] netlink: 28 bytes leftover after parsing attributes in process `syz.0.13382'. [ 582.296549][ T5369] __nla_validate_parse: 1 callbacks suppressed [ 582.296631][ T5369] netlink: 24 bytes leftover after parsing attributes in process `syz.4.13409'. [ 582.333076][ T5377] macsec0: entered promiscuous mode [ 582.398711][ T5373] lo speed is unknown, defaulting to 1000 [ 582.456572][ T5393] netlink: 28 bytes leftover after parsing attributes in process `syz.2.13419'. [ 582.466392][ T5393] netlink: 28 bytes leftover after parsing attributes in process `syz.2.13419'. [ 582.515633][ T5398] wg2: left promiscuous mode [ 582.520310][ T5398] wg2: left allmulticast mode [ 582.528697][ T5398] wg2: entered promiscuous mode [ 582.533619][ T5398] wg2: entered allmulticast mode [ 582.539861][ T29] kauditd_printk_skb: 822 callbacks suppressed [ 582.539874][ T29] audit: type=1400 audit(583.018:60395): avc: denied { map_create } for pid=5399 comm="syz.1.13423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 582.565017][ T29] audit: type=1400 audit(583.018:60396): avc: denied { prog_load } for pid=5399 comm="syz.1.13423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 582.583963][ T29] audit: type=1400 audit(583.028:60397): avc: denied { create } for pid=5399 comm="syz.1.13423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 582.602985][ T29] audit: type=1400 audit(583.028:60398): avc: denied { create } for pid=5399 comm="syz.1.13423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 582.622452][ T29] audit: type=1400 audit(583.028:60399): avc: denied { create } for pid=5399 comm="syz.1.13423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 582.643085][ T29] audit: type=1400 audit(583.028:60400): avc: denied { create } for pid=5399 comm="syz.1.13423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 582.668557][ T29] audit: type=1400 audit(583.068:60401): avc: denied { create } for pid=5401 comm="syz.1.13425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 582.687997][ T29] audit: type=1400 audit(583.068:60402): avc: denied { create } for pid=5401 comm="syz.1.13425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 582.707193][ T29] audit: type=1400 audit(583.088:60403): avc: denied { map_create } for pid=5403 comm="syz.1.13426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 582.725913][ T29] audit: type=1400 audit(583.088:60404): avc: denied { prog_load } for pid=5403 comm="syz.1.13426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 582.829824][ T5424] bridge0: port 1(team0) entered blocking state [ 582.837376][ T5424] bridge0: port 1(team0) entered disabled state [ 582.847280][ T5424] team0: entered allmulticast mode [ 582.855553][ T5424] geneve1: entered allmulticast mode [ 582.862087][ T5424] team0: entered promiscuous mode [ 582.867319][ T5424] geneve1: entered promiscuous mode [ 583.017099][ T5453] bridge: RTM_NEWNEIGH with invalid ether address [ 583.069257][ T5459] pim6reg1: entered promiscuous mode [ 583.074826][ T5459] pim6reg1: entered allmulticast mode [ 583.244744][ T5461] netlink: 24 bytes leftover after parsing attributes in process `syz.3.13451'. [ 583.458944][ T5498] syzkaller0: entered promiscuous mode [ 583.464561][ T5498] syzkaller0: entered allmulticast mode [ 583.472951][ T5491] lo speed is unknown, defaulting to 1000 [ 583.551700][ T5512] netlink: 24 bytes leftover after parsing attributes in process `syz.2.13468'. [ 583.565462][ T5513] netlink: 28 bytes leftover after parsing attributes in process `syz.1.13465'. [ 583.575918][ T5513] netlink: 28 bytes leftover after parsing attributes in process `syz.1.13465'. [ 583.805364][ T5530] lo speed is unknown, defaulting to 1000 [ 583.910484][ T5549] netlink: 24 bytes leftover after parsing attributes in process `syz.0.13488'. [ 584.150028][ T5580] gtp0: entered promiscuous mode [ 584.196487][ T5585] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 584.247468][ T5587] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 584.355389][ T5593] dummy0: left allmulticast mode [ 584.360598][ T5593] bridge0: port 1(dummy0) entered disabled state [ 584.371660][ T5592] netlink: 24 bytes leftover after parsing attributes in process `syz.1.13506'. [ 584.375233][ T5593] vlan0: entered promiscuous mode [ 584.444883][ T5601] tls_set_device_offload_rx: netdev not found [ 584.590286][ T5610] netlink: 12 bytes leftover after parsing attributes in process `syz.0.13512'. [ 584.918445][ T5632] bond0: left allmulticast mode [ 584.923378][ T5632] bond0: left promiscuous mode [ 584.928299][ T5632] bridge0: port 1(bond0) entered disabled state [ 584.941703][T27194] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 585.514020][ T5673] bridge: RTM_NEWNEIGH with invalid ether address [ 585.737542][ T5698] lo speed is unknown, defaulting to 1000 [ 585.747981][ T5703] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 585.801235][ T6535] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 586.004765][ T5723] team0 (unregistering): Port device team_slave_0 removed [ 586.019075][ T5723] team0 (unregistering): Port device team_slave_1 removed [ 586.796984][ T5795] lo speed is unknown, defaulting to 1000 [ 587.577713][ T29] kauditd_printk_skb: 946 callbacks suppressed [ 587.577728][ T29] audit: type=1326 audit(588.068:61351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5837 comm="syz.0.13612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79208de929 code=0x7ffc0000 [ 587.610617][ T29] audit: type=1326 audit(588.068:61352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5837 comm="syz.0.13612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79208de929 code=0x7ffc0000 [ 587.634777][ T29] audit: type=1326 audit(588.098:61353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5837 comm="syz.0.13612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f79208de929 code=0x7ffc0000 [ 587.658877][ T29] audit: type=1326 audit(588.098:61354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5837 comm="syz.0.13612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79208de929 code=0x7ffc0000 [ 587.688265][ T29] audit: type=1326 audit(588.098:61355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5837 comm="syz.0.13612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f79208de929 code=0x7ffc0000 [ 587.712817][ T29] audit: type=1400 audit(588.098:61356): avc: denied { prog_load } for pid=5837 comm="syz.0.13612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 587.732342][ T29] audit: type=1326 audit(588.098:61357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5837 comm="syz.0.13612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79208de929 code=0x7ffc0000 [ 587.756744][ T29] audit: type=1326 audit(588.098:61358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5837 comm="syz.0.13612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f79208de929 code=0x7ffc0000 [ 587.780473][ T29] audit: type=1400 audit(588.098:61359): avc: denied { create } for pid=5837 comm="syz.0.13612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 587.802122][ T29] audit: type=1326 audit(588.098:61360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5837 comm="syz.0.13612" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79208de929 code=0x7ffc0000 [ 588.066621][ T5862] __nla_validate_parse: 5 callbacks suppressed [ 588.066638][ T5862] netlink: 12 bytes leftover after parsing attributes in process `syz.3.13618'. [ 588.795599][ T5892] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 588.820161][ T5892] netlink: 'syz.0.13636': attribute type 13 has an invalid length. [ 588.836297][ T5892] netdevsim netdevsim0 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 588.845538][ T5892] netdevsim netdevsim0 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 588.854610][ T5892] netdevsim netdevsim0 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 588.863613][ T5892] netdevsim netdevsim0 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 588.917648][ T5912] bridge: RTM_NEWNEIGH with invalid ether address [ 589.080310][ T5934] netlink: 12 bytes leftover after parsing attributes in process `syz.3.13649'. [ 589.096029][ T5938] netlink: 4 bytes leftover after parsing attributes in process `syz.1.13656'. [ 589.218002][ T5961] x_tables: ip6_tables: mh match: only valid for protocol 135 [ 589.244026][ T5965] netlink: 8 bytes leftover after parsing attributes in process `syz.4.13667'. [ 589.258945][ T5965] netlink: 4 bytes leftover after parsing attributes in process `syz.4.13667'. [ 589.299627][ T5973] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 589.383413][ T5988] bridge: RTM_NEWNEIGH with invalid ether address [ 589.411634][ T5992] pim6reg1: entered promiscuous mode [ 589.417097][ T5992] pim6reg1: entered allmulticast mode [ 589.436857][ T5996] wireguard2: entered promiscuous mode [ 589.442952][ T5996] wireguard2: entered allmulticast mode [ 589.506685][ T6005] netlink: 8 bytes leftover after parsing attributes in process `syz.2.13687'. [ 589.522058][ T6005] netlink: 4 bytes leftover after parsing attributes in process `syz.2.13687'. [ 590.082251][ T6073] netlink: 12 bytes leftover after parsing attributes in process `syz.3.13712'. [ 590.183055][ T6078] netlink: 4 bytes leftover after parsing attributes in process `syz.2.13719'. [ 590.247468][ T6088] tls_set_device_offload_rx: netdev not found [ 590.377237][ T6109] netlink: 4 bytes leftover after parsing attributes in process `syz.4.13733'. [ 591.362199][ T6167] netlink: 'syz.1.13767': attribute type 13 has an invalid length. [ 591.984300][ T6184] lo speed is unknown, defaulting to 1000 [ 592.025537][ T6190] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 592.076222][ T6194] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 592.149887][ T6202] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 592.179876][ T6202] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 592.488990][ T6219] lo speed is unknown, defaulting to 1000 [ 592.581214][ T29] kauditd_printk_skb: 1264 callbacks suppressed [ 592.581228][ T29] audit: type=1400 audit(593.068:62625): avc: denied { prog_load } for pid=6240 comm="syz.0.13789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 592.612333][ T29] audit: type=1400 audit(593.098:62626): avc: denied { map } for pid=6238 comm="syz.4.13788" path="socket:[115335]" dev="sockfs" ino=115335 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=0 [ 592.635861][ T29] audit: type=1400 audit(593.098:62627): avc: denied { open } for pid=6240 comm="syz.0.13789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 592.656170][ T29] audit: type=1400 audit(593.098:62628): avc: denied { open } for pid=6240 comm="syz.0.13789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 592.675851][ T29] audit: type=1400 audit(593.098:62629): avc: denied { prog_load } for pid=6240 comm="syz.0.13789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 592.695992][ T29] audit: type=1400 audit(593.168:62630): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 592.742341][ T29] audit: type=1400 audit(593.238:62631): avc: denied { map_create } for pid=6243 comm="syz.0.13793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 592.828907][ T29] audit: type=1400 audit(593.238:62632): avc: denied { prog_load } for pid=6245 comm="syz.2.13792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 592.848386][ T29] audit: type=1400 audit(593.238:62633): avc: denied { execmem } for pid=6245 comm="syz.2.13792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 592.868634][ T29] audit: type=1400 audit(593.258:62634): avc: denied { prog_load } for pid=6247 comm="syz.4.13790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 593.134506][ T6270] tipc: Resetting bearer [ 593.160681][ T6270] team0 (unregistering): left allmulticast mode [ 593.178015][ T6270] geneve1: left allmulticast mode [ 593.183151][ T6270] team0 (unregistering): left promiscuous mode [ 593.216109][ T6270] geneve1: left promiscuous mode [ 593.221261][ T6270] bridge0: port 1(team0) entered disabled state [ 593.233795][ T6270] tipc: Disabling bearer [ 593.256057][ T6270] team0 (unregistering): Port device geneve1 removed [ 593.569441][ T6279] __nla_validate_parse: 4 callbacks suppressed [ 593.569457][ T6279] netlink: 12 bytes leftover after parsing attributes in process `syz.0.13813'. [ 593.918281][ T6296] netlink: 12 bytes leftover after parsing attributes in process `syz.2.13814'. [ 593.937829][ T6296] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 593.947664][ T6296] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 593.955918][ T6296] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 593.965003][ T6296] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 593.976427][ T6296] netdevsim netdevsim2 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 593.985578][ T6296] netdevsim netdevsim2 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 593.994105][ T6296] netdevsim netdevsim2 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 594.003758][ T6296] netdevsim netdevsim2 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 594.364000][ T6326] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 594.438336][ T6335] vlan0: entered promiscuous mode [ 594.987769][ T6363] bridge0: entered allmulticast mode [ 595.256293][ T6379] netlink: 24 bytes leftover after parsing attributes in process `syz.0.13850'. [ 595.440019][ T6399] netlink: 12 bytes leftover after parsing attributes in process `syz.0.13860'. [ 595.507162][ T6405] netlink: 3 bytes leftover after parsing attributes in process `syz.0.13863'. [ 595.521754][ T6405] batadv0: entered promiscuous mode [ 595.527109][ T6405] batadv0: entered allmulticast mode [ 595.863205][ T6417] lo speed is unknown, defaulting to 1000 [ 595.908559][ T6426] netlink: 12 bytes leftover after parsing attributes in process `syz.0.13877'. [ 596.030087][ T6429] netlink: 12 bytes leftover after parsing attributes in process `syz.3.13873'. [ 596.142884][ T6434] xt_l2tp: v2 doesn't support IP mode [ 596.228934][ T6438] sch_fq: defrate 0 ignored. [ 596.767207][ T6455] bridge0: entered allmulticast mode [ 597.024811][ T6473] netlink: 24 bytes leftover after parsing attributes in process `syz.0.13892'. [ 597.035931][ T6470] netlink: 24 bytes leftover after parsing attributes in process `syz.3.13891'. [ 597.118949][ T6480] netlink: 24 bytes leftover after parsing attributes in process `syz.0.13905'. [ 597.125393][ T6484] bridge0: entered allmulticast mode [ 597.217091][ T6490] pim6reg1: entered promiscuous mode [ 597.222466][ T6490] pim6reg1: entered allmulticast mode [ 597.279603][ T6495] xt_l2tp: v2 doesn't support IP mode [ 597.391597][ T6502] pim6reg1: entered promiscuous mode [ 597.396945][ T6502] pim6reg1: entered allmulticast mode [ 597.596733][ T29] kauditd_printk_skb: 1245 callbacks suppressed [ 597.596752][ T29] audit: type=1400 audit(598.088:63880): avc: denied { read write } for pid=6530 comm="syz.3.13917" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 597.647278][ T6519] lo speed is unknown, defaulting to 1000 [ 597.678758][ T29] audit: type=1400 audit(598.138:63881): avc: denied { prog_load } for pid=6530 comm="syz.3.13917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 597.698711][ T29] audit: type=1400 audit(598.138:63882): avc: denied { prog_load } for pid=6530 comm="syz.3.13917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 597.718044][ T29] audit: type=1400 audit(598.138:63883): avc: denied { prog_load } for pid=6530 comm="syz.3.13917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 597.846152][ T29] audit: type=1400 audit(598.338:63884): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 597.883507][ T29] audit: type=1400 audit(598.378:63885): avc: denied { map_create } for pid=6533 comm="syz.4.13918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 597.903799][ T29] audit: type=1400 audit(598.378:63886): avc: denied { open } for pid=6536 comm="syz.0.13929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 597.923495][ T29] audit: type=1400 audit(598.398:63887): avc: denied { map_create } for pid=6533 comm="syz.4.13918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 597.942288][ T29] audit: type=1400 audit(598.398:63888): avc: denied { prog_load } for pid=6536 comm="syz.0.13929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 597.961634][ T29] audit: type=1400 audit(598.418:63889): avc: denied { open } for pid=6536 comm="syz.0.13929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 597.991662][ T6534] batadv1: entered promiscuous mode [ 597.996893][ T6534] batadv1: entered allmulticast mode [ 598.161842][ T6555] netlink: 'syz.2.13928': attribute type 1 has an invalid length. [ 598.194100][ T6555] bond2: entered promiscuous mode [ 598.199595][ T6555] 8021q: adding VLAN 0 to HW filter on device bond2 [ 598.218063][ T6555] 8021q: adding VLAN 0 to HW filter on device bond2 [ 598.229251][ T6555] bond2: (slave ip6gre2): The slave device specified does not support setting the MAC address [ 598.239674][ T6555] bond2: (slave ip6gre2): Setting fail_over_mac to active for active-backup mode [ 598.261424][ T6555] bond2: (slave ip6gre2): making interface the new active one [ 598.269081][ T6555] ip6gre2: entered promiscuous mode [ 598.282825][ T6555] bond2: (slave ip6gre2): Enslaving as an active interface with an up link [ 599.432500][ T6632] lo speed is unknown, defaulting to 1000 [ 601.017711][ T6748] __nla_validate_parse: 3 callbacks suppressed [ 601.017757][ T6748] netlink: 96 bytes leftover after parsing attributes in process `syz.1.14012'. [ 601.491972][ T6797] netlink: 'syz.2.14035': attribute type 10 has an invalid length. [ 601.629376][ T6818] netlink: 'syz.4.14045': attribute type 13 has an invalid length. [ 601.649518][ T6818] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 601.668694][ T6818] x_tables: ip6_tables: mh match: only valid for protocol 135 [ 602.189539][ T6835] bridge: RTM_NEWNEIGH with invalid ether address [ 602.601475][ T29] kauditd_printk_skb: 1001 callbacks suppressed [ 602.601489][ T29] audit: type=1400 audit(603.099:64891): avc: denied { map_create } for pid=6884 comm="syz.3.14079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 602.660416][ T29] audit: type=1400 audit(603.099:64892): avc: denied { prog_load } for pid=6884 comm="syz.3.14079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 602.679177][ T29] audit: type=1400 audit(603.099:64893): avc: denied { prog_load } for pid=6884 comm="syz.3.14079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 602.697955][ T29] audit: type=1400 audit(603.099:64894): avc: denied { prog_load } for pid=6884 comm="syz.3.14079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 602.716609][ T29] audit: type=1400 audit(603.099:64895): avc: denied { prog_load } for pid=6884 comm="syz.3.14079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 602.735404][ T29] audit: type=1400 audit(603.099:64896): avc: denied { map_create } for pid=6884 comm="syz.3.14079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 602.754195][ T29] audit: type=1400 audit(603.099:64897): avc: denied { prog_load } for pid=6884 comm="syz.3.14079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 602.772848][ T29] audit: type=1400 audit(603.099:64898): avc: denied { prog_load } for pid=6884 comm="syz.3.14079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 602.791565][ T29] audit: type=1400 audit(603.109:64899): avc: denied { prog_load } for pid=6885 comm="syz.1.14078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 602.810316][ T29] audit: type=1400 audit(603.129:64900): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 603.314425][ T6933] serio: Serial port ptm1 [ 603.851889][ T6990] lo speed is unknown, defaulting to 1000 [ 604.145093][ T7034] bridge0: entered allmulticast mode [ 604.145705][ T7035] xt_TPROXY: Can be used only with -p tcp or -p udp [ 605.015994][ T7067] netlink: 'syz.2.14161': attribute type 13 has an invalid length. [ 605.030586][ T7067] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 605.249578][ T7083] serio: Serial port ptm0 [ 605.460867][ T7110] serio: Serial port ptm0 [ 605.667777][ T7132] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14191'. [ 605.678988][ T7132] netlink: 12 bytes leftover after parsing attributes in process `syz.0.14191'. [ 605.997019][ T7164] lo speed is unknown, defaulting to 1000 [ 606.657318][ T7212] syzkaller0: entered promiscuous mode [ 606.663352][ T7212] syzkaller0: entered allmulticast mode [ 606.863671][ T7234] policy can only be matched on NF_INET_PRE_ROUTING [ 606.863683][ T7234] unable to load match [ 606.889435][ T7238] netlink: 4 bytes leftover after parsing attributes in process `syz.3.14241'. [ 607.021889][ T7250] syzkaller0: entered promiscuous mode [ 607.027416][ T7250] syzkaller0: entered allmulticast mode [ 607.610271][ T29] kauditd_printk_skb: 1067 callbacks suppressed [ 607.610341][ T29] audit: type=1400 audit(608.089:65968): avc: denied { map_create } for pid=7286 comm="syz.1.14263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 607.635427][ T29] audit: type=1400 audit(608.089:65969): avc: denied { prog_load } for pid=7286 comm="syz.1.14263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 607.654089][ T29] audit: type=1400 audit(608.089:65970): avc: denied { prog_load } for pid=7286 comm="syz.1.14263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 607.667409][ T7289] syzkaller0: entered promiscuous mode [ 607.673030][ T29] audit: type=1400 audit(608.089:65971): avc: denied { prog_load } for pid=7286 comm="syz.1.14263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 607.678236][ T7289] syzkaller0: entered allmulticast mode [ 607.696908][ T29] audit: type=1400 audit(608.089:65972): avc: denied { create } for pid=7286 comm="syz.1.14263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 607.696946][ T29] audit: type=1400 audit(608.089:65973): avc: denied { create } for pid=7286 comm="syz.1.14263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 607.696977][ T29] audit: type=1400 audit(608.089:65974): avc: denied { create } for pid=7286 comm="syz.1.14263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 607.712050][ T29] audit: type=1400 audit(608.139:65975): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 607.787611][ T29] audit: type=1400 audit(608.219:65976): avc: denied { prog_load } for pid=7292 comm="syz.1.14265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 607.806425][ T29] audit: type=1400 audit(608.219:65977): avc: denied { prog_load } for pid=7292 comm="syz.1.14265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 608.403395][ T7330] netlink: 'syz.4.14282': attribute type 27 has an invalid length. [ 608.606052][ T7330] wg2: left promiscuous mode [ 608.610768][ T7330] wg2: left allmulticast mode [ 608.618598][ T7330] ip6tnl1: left allmulticast mode [ 608.624969][ T7330] geneve2: left promiscuous mode [ 608.630732][ T7330] bridge0: left allmulticast mode [ 608.636731][ T7330] ip6gre1: left allmulticast mode [ 608.649198][ T7330] netdevsim netdevsim4 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 608.657808][ T7330] netdevsim netdevsim4 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 608.666318][ T7330] netdevsim netdevsim4 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 608.674721][ T7330] netdevsim netdevsim4 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 608.683399][ T7330] geneve3: left promiscuous mode [ 608.688488][ T7330] geneve3: left allmulticast mode [ 608.695540][ T7330] team1: left promiscuous mode [ 608.700420][ T7330] team1: left allmulticast mode [ 608.705784][ T7330] bond0: left promiscuous mode [ 608.713899][ T7330] batadv0: left promiscuous mode [ 608.718946][ T7330] batadv0: left allmulticast mode [ 608.724604][ T7330] ip6gre2: left allmulticast mode [ 608.731582][ T7330] ip6gre3: left allmulticast mode [ 608.742037][ T7344] pim6reg1: entered promiscuous mode [ 608.747473][ T7344] pim6reg1: entered allmulticast mode [ 609.012447][ T7393] sch_fq: defrate 0 ignored. [ 609.353655][ T7441] netlink: 'syz.2.14335': attribute type 27 has an invalid length. [ 609.550492][ T7441] wg2: left promiscuous mode [ 609.555163][ T7441] wg2: left allmulticast mode [ 609.566112][ T7441] bridge0: left allmulticast mode [ 609.611440][ T7441] ip6gre1: left allmulticast mode [ 609.638003][ T7441] bond2: left promiscuous mode [ 609.642863][ T7441] ip6gre2: left promiscuous mode [ 609.687670][ T7453] netlink: 'syz.0.14339': attribute type 6 has an invalid length. [ 609.715712][ T7451] wg2: left promiscuous mode [ 609.720654][ T7451] wg2: left allmulticast mode [ 609.726919][ T7451] wg2: entered promiscuous mode [ 609.731900][ T7451] wg2: entered allmulticast mode [ 609.782456][ T7465] netlink: 8 bytes leftover after parsing attributes in process `syz.2.14346'. [ 609.857953][ T7479] netlink: 'syz.0.14353': attribute type 27 has an invalid length. [ 609.867309][ T7479] $Hÿ: left promiscuous mode [ 609.872280][ T7479] dummy0: left promiscuous mode [ 609.877568][ T7479] wg2: left promiscuous mode [ 609.882395][ T7479] wg2: left allmulticast mode [ 609.888613][ T7479] batadv_slave_1: left promiscuous mode [ 609.894814][ T7479] vlan0: left promiscuous mode [ 609.900207][ T7479] ipvlan0: left allmulticast mode [ 609.905379][ T7479] veth0_vlan: left allmulticast mode [ 609.911508][ T7479] wireguard0: left promiscuous mode [ 609.916914][ T7479] wireguard0: left allmulticast mode [ 609.925698][ T7479] ip6tnl1: left allmulticast mode [ 609.930995][ T7479] geneve2: left promiscuous mode [ 609.935952][ T7479] geneve2: left allmulticast mode [ 609.941182][ T7479] wireguard1: left promiscuous mode [ 609.946461][ T7479] ip6gre1: left allmulticast mode [ 609.951894][ T7479] ip6gre2: left allmulticast mode [ 609.957070][ T7479] ip6gre3: left allmulticast mode [ 609.962282][ T7479] ip6gre4: left allmulticast mode [ 609.968702][ T7479] team0: left promiscuous mode [ 609.973780][ T7479] team0: left allmulticast mode [ 609.979210][ T7479] wireguard2: left promiscuous mode [ 609.984712][ T7479] wireguard2: left allmulticast mode [ 609.990235][ T7479] ip6gre5: left allmulticast mode [ 609.995527][ T7479] gtp0: left promiscuous mode [ 610.016582][ T7487] netlink: 16 bytes leftover after parsing attributes in process `syz.1.14357'. [ 610.080307][ T7494] netlink: 8 bytes leftover after parsing attributes in process `syz.0.14360'. [ 610.337540][ T7530] wg2: entered promiscuous mode [ 610.342470][ T7530] wg2: entered allmulticast mode [ 610.373305][ T7534] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14379'. [ 611.075395][ T7573] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14397'. [ 611.241692][ T7602] ip6t_rpfilter: unknown options [ 611.242364][ T7604] netlink: 4 bytes leftover after parsing attributes in process `syz.1.14412'. [ 611.259713][ T7604] netlink: 12 bytes leftover after parsing attributes in process `syz.1.14412'. [ 612.435809][ T7725] netlink: 4 bytes leftover after parsing attributes in process `syz.3.14467'. [ 612.623109][ T29] kauditd_printk_skb: 1223 callbacks suppressed [ 612.623123][ T29] audit: type=1400 audit(2000000000.740:67201): avc: denied { read write } for pid=7734 comm="syz.3.14472" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 612.654968][ T29] audit: type=1400 audit(2000000000.740:67202): avc: denied { allowed } for pid=7734 comm="syz.3.14472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 612.675149][ T29] audit: type=1400 audit(2000000000.740:67203): avc: denied { read write } for pid=7734 comm="syz.3.14472" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 612.700754][ T29] audit: type=1400 audit(2000000000.750:67204): avc: denied { create } for pid=7734 comm="syz.3.14472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=0 [ 612.730325][ T29] audit: type=1400 audit(2000000000.780:67205): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 612.755334][ T29] audit: type=1400 audit(2000000000.800:67206): avc: denied { create } for pid=7736 comm="syz.3.14473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 612.776522][ T29] audit: type=1400 audit(2000000000.800:67207): avc: denied { create } for pid=7736 comm="syz.3.14473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 612.796860][ T29] audit: type=1400 audit(2000000000.800:67208): avc: denied { prog_load } for pid=7736 comm="syz.3.14473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 612.817397][ T29] audit: type=1400 audit(2000000000.800:67209): avc: denied { map_create } for pid=7736 comm="syz.3.14473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 612.837397][ T29] audit: type=1400 audit(2000000000.800:67210): avc: denied { prog_load } for pid=7736 comm="syz.3.14473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 612.928518][ T7754] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 613.036530][ T7770] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 613.136756][ T7778] lo speed is unknown, defaulting to 1000 [ 613.592175][ T7788] netlink: 'syz.0.14496': attribute type 10 has an invalid length. [ 613.600192][ T7788] netlink: 40 bytes leftover after parsing attributes in process `syz.0.14496'. [ 614.039892][ T7879] pim6reg1: entered promiscuous mode [ 614.045330][ T7879] pim6reg1: entered allmulticast mode [ 614.051724][ T7878] netlink: 'syz.2.14510': attribute type 10 has an invalid length. [ 614.059938][ T7878] netlink: 40 bytes leftover after parsing attributes in process `syz.2.14510'. [ 614.074018][ T7878] team0: entered promiscuous mode [ 614.079932][ T7878] team0: entered allmulticast mode [ 614.085668][ T7878] 8021q: adding VLAN 0 to HW filter on device team0 [ 614.095689][ T7878] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 614.227907][ T7892] bridge: RTM_NEWNEIGH with invalid ether address [ 614.613563][ T7897] netlink: 'syz.0.14528': attribute type 4 has an invalid length. [ 614.691854][ T7908] netlink: 'syz.3.14524': attribute type 10 has an invalid length. [ 614.700811][ T7908] netlink: 40 bytes leftover after parsing attributes in process `syz.3.14524'. [ 614.955425][ T7930] lo speed is unknown, defaulting to 1000 [ 615.009665][ T7931] lo speed is unknown, defaulting to 1000 [ 615.229764][ T7950] bridge: RTM_NEWNEIGH with invalid ether address [ 615.261455][ T7954] netlink: 'syz.1.14541': attribute type 4 has an invalid length. [ 615.364538][ T7967] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14550'. [ 615.383089][ T7967] netlink: 12 bytes leftover after parsing attributes in process `syz.4.14550'. [ 615.390014][ T7958] xt_HMARK: spi-set and port-set can't be combined [ 615.488121][ T7980] netlink: 'syz.4.14557': attribute type 4 has an invalid length. [ 615.591405][ T7993] xt_HMARK: spi-set and port-set can't be combined [ 615.742756][ T8006] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14568'. [ 615.752592][ T8006] netlink: 12 bytes leftover after parsing attributes in process `syz.0.14568'. [ 615.766872][ T8003] lo speed is unknown, defaulting to 1000 [ 615.877482][ T7848] syzkaller0: tun_net_xmit 76 [ 615.882892][ T7848] syzkaller0: tun_net_xmit 48 [ 616.017729][ T8017] lo speed is unknown, defaulting to 1000 [ 616.055185][ T8020] netlink: 'syz.0.14573': attribute type 10 has an invalid length. [ 616.078226][ T8020] netlink: 'syz.0.14573': attribute type 10 has an invalid length. [ 616.086369][ T8020] netlink: 40 bytes leftover after parsing attributes in process `syz.0.14573'. [ 616.436117][ T8038] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 616.453293][ T8040] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=8040 comm=syz.3.14583 [ 616.505873][ T8050] pim6reg1: entered promiscuous mode [ 616.512731][ T8050] pim6reg1: entered allmulticast mode [ 616.638280][ T8067] netlink: 4 bytes leftover after parsing attributes in process `syz.1.14602'. [ 617.600943][ T8102] __nla_validate_parse: 1 callbacks suppressed [ 617.601006][ T8102] netlink: 12 bytes leftover after parsing attributes in process `syz.1.14600'. [ 617.640373][ T29] kauditd_printk_skb: 800 callbacks suppressed [ 617.640386][ T29] audit: type=1400 audit(2000000005.760:68011): avc: denied { prog_load } for pid=8103 comm="syz.2.14608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 617.666572][ T29] audit: type=1400 audit(2000000005.760:68012): avc: denied { create } for pid=8103 comm="syz.2.14608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 617.688699][ T29] audit: type=1400 audit(2000000005.770:68013): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 617.714319][ T29] audit: type=1400 audit(2000000005.790:68014): avc: denied { prog_load } for pid=8107 comm="syz.4.14610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 617.734497][ T29] audit: type=1400 audit(2000000005.790:68015): avc: denied { map_create } for pid=8107 comm="syz.4.14610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 617.755325][ T29] audit: type=1400 audit(2000000005.790:68016): avc: denied { prog_load } for pid=8107 comm="syz.4.14610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 617.775293][ T29] audit: type=1400 audit(2000000005.790:68017): avc: denied { prog_load } for pid=8107 comm="syz.4.14610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 617.795849][ T29] audit: type=1400 audit(2000000005.790:68018): avc: denied { prog_load } for pid=8107 comm="syz.4.14610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 617.815742][ T29] audit: type=1400 audit(2000000005.790:68019): avc: denied { prog_load } for pid=8107 comm="syz.4.14610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 617.836160][ T8116] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14615'. [ 617.845311][ T29] audit: type=1400 audit(2000000005.790:68020): avc: denied { prog_load } for pid=8107 comm="syz.4.14610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 617.917074][ T8087] vlan0: entered allmulticast mode [ 617.922976][ T8087] bond2: entered allmulticast mode [ 617.956689][ T8126] xt_HMARK: spi-set and port-set can't be combined [ 618.639751][ T8167] netlink: 12 bytes leftover after parsing attributes in process `syz.0.14637'. [ 618.697101][ T8166] vlan0: entered allmulticast mode [ 618.703696][ T8166] bond0: entered allmulticast mode [ 619.008780][ T8192] lo speed is unknown, defaulting to 1000 [ 619.312679][ T8207] lo speed is unknown, defaulting to 1000 [ 619.494240][ T8218] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14657'. [ 619.921552][ T8221] netlink: 12 bytes leftover after parsing attributes in process `syz.2.14659'. [ 619.950278][ T8221] vlan0: entered allmulticast mode [ 619.955461][ T8221] bond3: entered allmulticast mode [ 620.927547][ T8276] xt_CT: You must specify a L4 protocol and not use inversions on it [ 621.667715][ T8297] lo speed is unknown, defaulting to 1000 [ 621.800741][ T8303] xt_CT: You must specify a L4 protocol and not use inversions on it [ 622.498111][ T8321] syzkaller0: entered promiscuous mode [ 622.503773][ T8321] syzkaller0: entered allmulticast mode [ 622.634040][ T8334] lo speed is unknown, defaulting to 1000 [ 622.663494][ T29] kauditd_printk_skb: 574 callbacks suppressed [ 622.663508][ T29] audit: type=1400 audit(2000000010.780:68595): avc: denied { map_create } for pid=8337 comm="syz.0.14707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 622.714475][ T29] audit: type=1400 audit(2000000010.810:68596): avc: denied { prog_load } for pid=8337 comm="syz.0.14707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 622.720621][ T8341] bridge: RTM_NEWNEIGH with invalid ether address [ 622.733869][ T29] audit: type=1400 audit(2000000010.810:68597): avc: denied { prog_load } for pid=8337 comm="syz.0.14707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 622.733978][ T29] audit: type=1400 audit(2000000010.810:68598): avc: denied { create } for pid=8337 comm="syz.0.14707" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=0 [ 622.754295][ T29] audit: type=1400 audit(2000000010.830:68599): avc: denied { map_create } for pid=8340 comm="syz.0.14708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 622.801119][ T29] audit: type=1400 audit(2000000010.830:68600): avc: denied { prog_load } for pid=8340 comm="syz.0.14708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 622.820705][ T29] audit: type=1400 audit(2000000010.830:68601): avc: denied { prog_load } for pid=8340 comm="syz.0.14708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 622.840147][ T29] audit: type=1400 audit(2000000010.830:68602): avc: denied { prog_load } for pid=8340 comm="syz.0.14708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 622.859767][ T29] audit: type=1400 audit(2000000010.830:68603): avc: denied { map_create } for pid=8340 comm="syz.0.14708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 622.879179][ T29] audit: type=1400 audit(2000000010.830:68604): avc: denied { prog_load } for pid=8340 comm="syz.0.14708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 623.616070][ T8371] netlink: 'syz.2.14720': attribute type 3 has an invalid length. [ 623.625538][ T8371] netlink: 'syz.2.14720': attribute type 3 has an invalid length. [ 623.746979][ T8392] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=8392 comm=syz.2.14730 [ 623.890948][ T8408] netlink: 'syz.0.14737': attribute type 3 has an invalid length. [ 623.899582][ T8408] netlink: 'syz.0.14737': attribute type 3 has an invalid length. [ 623.921433][ T8380] netlink: 12 bytes leftover after parsing attributes in process `syz.4.14724'. [ 623.959906][ T8380] vlan0: entered allmulticast mode [ 623.965077][ T8380] bond1: entered allmulticast mode [ 624.273761][ T8443] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14753'. [ 624.441381][ T8457] syzkaller0: entered promiscuous mode [ 624.446911][ T8457] syzkaller0: entered allmulticast mode [ 624.680361][ T8472] lo speed is unknown, defaulting to 1000 [ 624.996847][ T8483] netlink: 'syz.0.14769': attribute type 10 has an invalid length. [ 625.005021][ T8483] netlink: 40 bytes leftover after parsing attributes in process `syz.0.14769'. [ 625.014816][ T8483] A link change request failed with some changes committed already. Interface geneve1 may have been left with an inconsistent configuration, please check. [ 625.774745][ T8523] wireguard3: entered promiscuous mode [ 625.781137][ T8523] wireguard3: entered allmulticast mode [ 625.850809][ T8530] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=8530 comm=syz.1.14790 [ 626.097679][ T8560] lo speed is unknown, defaulting to 1000 [ 626.142424][ T8574] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14813'. [ 626.182606][ T8574] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14813'. [ 626.219597][ T8582] netlink: 'syz.1.14816': attribute type 10 has an invalid length. [ 626.232496][ T8584] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14817'. [ 626.247207][ T8582] dummy0: left promiscuous mode [ 626.253546][ T8582] netlink: 'syz.1.14816': attribute type 10 has an invalid length. [ 626.263265][ T8584] netlink: 12 bytes leftover after parsing attributes in process `syz.2.14817'. [ 626.569299][ T8603] lo speed is unknown, defaulting to 1000 [ 626.586792][ T7352] Process accounting resumed [ 627.203060][ T8624] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14834'. [ 627.410246][ T8643] lo speed is unknown, defaulting to 1000 [ 627.606429][ T8649] wireguard0: entered promiscuous mode [ 627.691390][ T29] kauditd_printk_skb: 769 callbacks suppressed [ 627.691449][ T29] audit: type=1400 audit(2000000015.810:69374): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 627.723290][ T29] audit: type=1400 audit(2000000015.810:69375): avc: denied { map_create } for pid=8651 comm="syz.3.14845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 627.743354][ T29] audit: type=1400 audit(2000000015.810:69376): avc: denied { prog_load } for pid=8651 comm="syz.3.14845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 627.764318][ T29] audit: type=1400 audit(2000000015.810:69377): avc: denied { create } for pid=8651 comm="syz.3.14845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 627.784680][ T29] audit: type=1400 audit(2000000015.810:69378): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 627.809985][ T29] audit: type=1400 audit(2000000015.810:69379): avc: denied { create } for pid=8653 comm="syz.3.14846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 627.831040][ T29] audit: type=1400 audit(2000000015.810:69380): avc: denied { create } for pid=8653 comm="syz.3.14846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 627.852487][ T29] audit: type=1400 audit(2000000015.810:69381): avc: denied { create } for pid=8653 comm="syz.3.14846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 627.873556][ T29] audit: type=1400 audit(2000000015.840:69382): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 627.898928][ T29] audit: type=1400 audit(2000000015.840:69383): avc: denied { create } for pid=8655 comm="syz.3.14847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 628.040200][ T8667] netlink: 24 bytes leftover after parsing attributes in process `syz.4.14861'. [ 628.050444][ T8667] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14861'. [ 628.284653][ T8710] 8021q: adding VLAN 0 to HW filter on device $Hÿ [ 628.294401][ T8710] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 628.754711][ T8714] lo speed is unknown, defaulting to 1000 [ 629.074984][ T8752] netlink: 'syz.4.14891': attribute type 4 has an invalid length. [ 629.084797][ T8752] netlink: 'syz.4.14891': attribute type 4 has an invalid length. [ 629.181846][ T8769] __nla_validate_parse: 3 callbacks suppressed [ 629.181862][ T8769] netlink: 8 bytes leftover after parsing attributes in process `syz.4.14900'. [ 629.201704][ T8769] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 629.210224][ T8769] bond2: (slave batadv1): Enslaving as an active interface with an up link [ 629.225245][ T8769] bond2 (unregistering): (slave batadv1): Releasing backup interface [ 629.234546][ T8769] bond2 (unregistering): Released all slaves [ 629.247557][ T8774] wireguard3: entered promiscuous mode [ 629.253093][ T8774] wireguard3: entered allmulticast mode [ 629.274752][ T8772] lo speed is unknown, defaulting to 1000 [ 629.309999][ T8779] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14913'. [ 629.446772][ T8793] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 629.462646][ T8797] sch_fq: defrate 0 ignored. [ 629.513423][ T8801] wireguard1: entered promiscuous mode [ 629.518975][ T8801] wireguard1: entered allmulticast mode [ 629.603712][ T8812] netlink: 'syz.2.14917': attribute type 1 has an invalid length. [ 629.625619][ T8812] 8021q: adding VLAN 0 to HW filter on device bond4 [ 629.660229][ T8812] 8021q: adding VLAN 0 to HW filter on device bond4 [ 629.673258][ T8812] bond4: (slave vxcan1): The slave device specified does not support setting the MAC address [ 629.690693][ T8812] bond4: (slave vxcan1): Error -95 calling set_mac_address [ 630.297664][ T8853] xt_hashlimit: max too large, truncated to 1048576 [ 631.144962][ T8877] bridge0: left allmulticast mode [ 631.154149][ T8877] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 631.177222][ T7352] lo speed is unknown, defaulting to 1000 [ 631.183251][ T7352] syz0: Port: 1 Link ACTIVE [ 631.219904][ T8887] pim6reg1: entered promiscuous mode [ 631.225239][ T8887] pim6reg1: entered allmulticast mode [ 631.267992][ T8890] syzkaller0: entered promiscuous mode [ 631.273645][ T8890] syzkaller0: entered allmulticast mode [ 631.325088][ T8898] netlink: 'syz.2.14966': attribute type 4 has an invalid length. [ 631.325619][ T8899] netlink: 'syz.4.14955': attribute type 1 has an invalid length. [ 631.335570][ T8898] netlink: 'syz.2.14966': attribute type 4 has an invalid length. [ 631.348588][ T8899] 8021q: adding VLAN 0 to HW filter on device bond2 [ 631.384180][ T8899] 8021q: adding VLAN 0 to HW filter on device bond2 [ 631.393734][ T8899] bond2: (slave vxcan3): The slave device specified does not support setting the MAC address [ 631.406635][ T8899] bond2: (slave vxcan3): Error -95 calling set_mac_address [ 631.914578][ T8926] pim6reg1: entered promiscuous mode [ 631.920190][ T8926] pim6reg1: entered allmulticast mode [ 632.037031][ T8938] netlink: 'syz.3.14974': attribute type 1 has an invalid length. [ 632.084351][ T8938] 8021q: adding VLAN 0 to HW filter on device bond1 [ 632.099711][ T8942] netlink: 8 bytes leftover after parsing attributes in process `syz.1.14973'. [ 632.114088][ T8942] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 632.122301][ T8942] bond3: (slave batadv0): Enslaving as an active interface with an up link [ 632.147606][ T8938] 8021q: adding VLAN 0 to HW filter on device bond1 [ 632.165639][ T8938] bond1: (slave vxcan3): The slave device specified does not support setting the MAC address [ 632.178455][ T8938] bond1: (slave vxcan3): Error -95 calling set_mac_address [ 632.250431][ T8942] bond3 (unregistering): (slave batadv0): Releasing backup interface [ 632.303026][ T8953] netlink: 12 bytes leftover after parsing attributes in process `syz.3.14980'. [ 632.312948][ T8942] bond3 (unregistering): Released all slaves [ 632.345717][ T8955] bridge0: entered allmulticast mode [ 632.404669][ T8964] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14969'. [ 632.471827][ T8969] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 632.506268][ T8965] lo speed is unknown, defaulting to 1000 [ 632.514966][ T8967] pim6reg1: entered promiscuous mode [ 632.520319][ T8967] pim6reg1: entered allmulticast mode [ 632.620052][ T8979] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14992'. [ 632.667534][ T8988] netlink: 12 bytes leftover after parsing attributes in process `syz.2.14995'. [ 632.704986][ T29] kauditd_printk_skb: 901 callbacks suppressed [ 632.705001][ T29] audit: type=1400 audit(2000000020.821:70285): avc: denied { prog_load } for pid=8989 comm="syz.2.14997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 632.761903][ T29] audit: type=1400 audit(2000000020.831:70286): avc: denied { allowed } for pid=8985 comm="syz.3.14996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 632.782172][ T29] audit: type=1400 audit(2000000020.851:70287): avc: denied { create } for pid=8989 comm="syz.2.14997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 632.804124][ T29] audit: type=1400 audit(2000000020.851:70288): avc: denied { create } for pid=8989 comm="syz.2.14997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 632.806764][ T8996] bridge0: entered allmulticast mode [ 632.826321][ T29] audit: type=1400 audit(2000000020.851:70289): avc: denied { create } for pid=8989 comm="syz.2.14997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 632.852659][ T29] audit: type=1326 audit(2000000020.851:70290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8989 comm="syz.2.14997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cb483e929 code=0x7ffc0000 [ 632.856090][ T8997] netlink: 'syz.2.15000': attribute type 39 has an invalid length. [ 632.877584][ T29] audit: type=1326 audit(2000000020.851:70291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8989 comm="syz.2.14997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cb483e929 code=0x7ffc0000 [ 632.909252][ T29] audit: type=1326 audit(2000000020.851:70292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8989 comm="syz.2.14997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3cb483e929 code=0x7ffc0000 [ 632.933756][ T29] audit: type=1400 audit(2000000020.851:70293): avc: denied { map_create } for pid=8989 comm="syz.2.14997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 632.954583][ T29] audit: type=1326 audit(2000000020.851:70294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8989 comm="syz.2.14997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cb483e929 code=0x7ffc0000 [ 633.081128][ T9002] netlink: 8 bytes leftover after parsing attributes in process `syz.2.15002'. [ 633.433898][ T9016] netlink: 'syz.0.15007': attribute type 4 has an invalid length. [ 633.444145][ T9016] netlink: 'syz.0.15007': attribute type 4 has an invalid length. [ 633.531452][ T9029] lo speed is unknown, defaulting to 1000 [ 633.630706][ T9035] bridge: RTM_NEWNEIGH with invalid ether address [ 633.656835][ T9037] netlink: 4 bytes leftover after parsing attributes in process `syz.1.15017'. [ 634.326589][ T9065] bridge: RTM_NEWNEIGH with invalid ether address [ 634.377443][ T9063] lo speed is unknown, defaulting to 1000 [ 634.444781][ T9079] netlink: 'syz.0.15035': attribute type 4 has an invalid length. [ 636.119233][ T9162] netlink: 4 bytes leftover after parsing attributes in process `syz.2.15071'. [ 636.161454][ T9162] netlink: 4 bytes leftover after parsing attributes in process `syz.2.15071'. [ 636.272908][ T9170] netlink: 87 bytes leftover after parsing attributes in process `syz.4.15075'. [ 636.383027][ T9186] netlink: 4 bytes leftover after parsing attributes in process `syz.2.15083'. [ 636.392891][ T9186] hsr_slave_0: left promiscuous mode [ 636.401129][ T9186] hsr_slave_1: left promiscuous mode [ 636.430562][ T9194] netlink: 4 bytes leftover after parsing attributes in process `syz.4.15087'. [ 637.254770][ T9235] bridge0: entered allmulticast mode [ 637.349392][ T9237] ip6gre4: entered allmulticast mode [ 637.394154][ T9243] bridge0: entered allmulticast mode [ 637.466594][ T9249] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 637.590141][ T9260] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=9260 comm=syz.2.15117 [ 638.137423][ T29] kauditd_printk_skb: 846 callbacks suppressed [ 638.137439][ T29] audit: type=1400 audit(2000000026.251:71141): avc: denied { prog_load } for pid=9268 comm="syz.1.15120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 638.165214][ T29] audit: type=1400 audit(2000000026.281:71142): avc: denied { module_request } for pid=9268 comm="syz.1.15120" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 638.188062][ T29] audit: type=1400 audit(2000000026.281:71143): avc: denied { sys_module } for pid=9268 comm="syz.1.15120" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 638.227397][ T29] audit: type=1400 audit(2000000026.341:71144): avc: denied { map_create } for pid=9270 comm="syz.1.15121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 638.248414][ T29] audit: type=1400 audit(2000000026.371:71145): avc: denied { prog_load } for pid=9270 comm="syz.1.15121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 638.268836][ T29] audit: type=1400 audit(2000000026.391:71146): avc: denied { create } for pid=9270 comm="syz.1.15121" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=0 [ 638.291701][ T29] audit: type=1400 audit(2000000026.411:71147): avc: denied { prog_load } for pid=9270 comm="syz.1.15121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 638.324810][ T29] audit: type=1400 audit(2000000026.441:71148): avc: denied { prog_load } for pid=9270 comm="syz.1.15121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 638.415457][ T29] audit: type=1400 audit(2000000026.531:71149): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 638.469053][ T29] audit: type=1400 audit(2000000026.581:71150): avc: denied { create } for pid=9273 comm="syz.3.15124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 639.897054][ T9333] netlink: 'syz.1.15145': attribute type 21 has an invalid length. [ 639.904029][ T9352] gtp0: entered promiscuous mode [ 639.930264][ T9343] lo speed is unknown, defaulting to 1000 [ 639.941738][ T9333] netlink: 132 bytes leftover after parsing attributes in process `syz.1.15145'. [ 640.771744][ T9375] netlink: 'syz.3.15167': attribute type 27 has an invalid length. [ 641.102421][ T9375] wg2: left promiscuous mode [ 641.107158][ T9375] wg2: left allmulticast mode [ 641.124882][ T9375] macsec0: left promiscuous mode [ 641.139111][ T9375] ip6gretap1: left promiscuous mode [ 641.144367][ T9375] ip6gretap1: left allmulticast mode [ 641.171563][ T9375] bridge4: left promiscuous mode [ 641.176563][ T9375] bridge4: left allmulticast mode [ 641.216322][ T9375] netdevsim netdevsim3 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 641.224841][ T9375] netdevsim netdevsim3 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 641.233315][ T9375] netdevsim netdevsim3 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 641.241754][ T9375] netdevsim netdevsim3 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 641.301064][ T9375] ip6gre1: left allmulticast mode [ 641.319304][ T9375] team1: left promiscuous mode [ 641.329039][ T9375] team1: left allmulticast mode [ 641.354816][ T9375] ip6gre2: left allmulticast mode [ 641.368583][ T9375] ip6gre3: left allmulticast mode [ 641.436566][ T6535] lo speed is unknown, defaulting to 1000 [ 641.442427][ T6535] syz0: Port: 1 Link DOWN [ 641.487625][ T9387] netlink: 4 bytes leftover after parsing attributes in process `syz.3.15172'. [ 641.520035][ T9387] hsr_slave_0: left promiscuous mode [ 641.656074][ T9399] netlink: 4 bytes leftover after parsing attributes in process `syz.4.15175'. [ 641.779645][ T9412] bridge0: entered allmulticast mode [ 642.959186][ T9445] netlink: 'syz.3.15196': attribute type 21 has an invalid length. [ 642.969442][ T9445] netlink: 132 bytes leftover after parsing attributes in process `syz.3.15196'. [ 643.144604][ T29] kauditd_printk_skb: 1219 callbacks suppressed [ 643.144632][ T29] audit: type=1326 audit(2000000031.261:72370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9433 comm="syz.0.15190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f79208d58e7 code=0x7ffc0000 [ 643.209115][ T29] audit: type=1326 audit(2000000031.261:72371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9435 comm="syz.4.15192" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa979d2ab19 code=0x7ffc0000 [ 643.233498][ T29] audit: type=1326 audit(2000000031.261:72372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9435 comm="syz.4.15192" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa979d8e929 code=0x7ffc0000 [ 643.258507][ T29] audit: type=1326 audit(2000000031.271:72373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9435 comm="syz.4.15192" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa979d2ab19 code=0x7ffc0000 [ 643.282749][ T29] audit: type=1326 audit(2000000031.271:72374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9435 comm="syz.4.15192" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa979d8e929 code=0x7ffc0000 [ 643.308045][ T29] audit: type=1326 audit(2000000031.271:72375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9435 comm="syz.4.15192" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa979d2ab19 code=0x7ffc0000 [ 643.332911][ T29] audit: type=1326 audit(2000000031.271:72376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9435 comm="syz.4.15192" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa979d8e929 code=0x7ffc0000 [ 643.357161][ T29] audit: type=1326 audit(2000000031.301:72377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9433 comm="syz.0.15190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f792087ab19 code=0x7ffc0000 [ 643.382042][ T29] audit: type=1326 audit(2000000031.301:72378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9433 comm="syz.0.15190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f79208d58e7 code=0x7ffc0000 [ 643.406365][ T29] audit: type=1326 audit(2000000031.301:72379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9433 comm="syz.0.15190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f792087ab19 code=0x7ffc0000 [ 643.565483][ T9461] lo speed is unknown, defaulting to 1000 [ 643.573444][ T9463] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 643.919894][ T9479] lo speed is unknown, defaulting to 1000 [ 644.395630][ T9504] netlink: 24 bytes leftover after parsing attributes in process `syz.3.15219'. [ 644.405470][ T9504] netlink: 4 bytes leftover after parsing attributes in process `syz.3.15219'. [ 644.541924][ T9510] gtp0: entered promiscuous mode [ 644.682392][ T9518] netlink: 12 bytes leftover after parsing attributes in process `syz.4.15226'. [ 645.057310][ T9544] syzkaller0: entered promiscuous mode [ 645.062886][ T9544] syzkaller0: entered allmulticast mode [ 645.100381][ T9546] syzkaller0: entered promiscuous mode [ 645.105931][ T9546] syzkaller0: entered allmulticast mode [ 645.119122][ T9548] netlink: 112 bytes leftover after parsing attributes in process `syz.1.15237'. [ 645.835921][ T9572] x_tables: ip_tables: ah match: only valid for protocol 51 [ 645.939659][ T9577] syzkaller0: entered promiscuous mode [ 645.945216][ T9577] syzkaller0: entered allmulticast mode [ 646.889487][ T9619] netlink: 4 bytes leftover after parsing attributes in process `syz.4.15268'. [ 647.833226][ T9642] netlink: 4 bytes leftover after parsing attributes in process `syz.3.15278'. [ 647.862241][ T9644] netlink: 24 bytes leftover after parsing attributes in process `syz.2.15279'. [ 647.882124][ T9644] netlink: 4 bytes leftover after parsing attributes in process `syz.2.15279'. [ 647.902807][ T9650] 8021q: VLANs not supported on ip6_vti0 [ 647.975352][ T9657] bridge0: port 1(gretap0) entered blocking state [ 647.981925][ T9657] bridge0: port 1(gretap0) entered disabled state [ 648.003137][ T9657] gretap0: entered allmulticast mode [ 648.014941][ T9657] gretap0: entered promiscuous mode [ 648.204268][ T29] kauditd_printk_skb: 769 callbacks suppressed [ 648.204282][ T29] audit: type=1400 audit(2000000036.322:73149): avc: denied { map_create } for pid=9665 comm="syz.2.15288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 648.251580][ T29] audit: type=1400 audit(2000000036.352:73150): avc: denied { prog_load } for pid=9665 comm="syz.2.15288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 648.271081][ T29] audit: type=1400 audit(2000000036.352:73151): avc: denied { prog_load } for pid=9665 comm="syz.2.15288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 648.290485][ T29] audit: type=1400 audit(2000000036.352:73152): avc: denied { prog_load } for pid=9665 comm="syz.2.15288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 648.309904][ T29] audit: type=1326 audit(2000000036.352:73153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9665 comm="syz.2.15288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cb483e929 code=0x7ffc0000 [ 648.333650][ T29] audit: type=1326 audit(2000000036.352:73154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9665 comm="syz.2.15288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cb483e929 code=0x7ffc0000 [ 648.357445][ T29] audit: type=1326 audit(2000000036.352:73155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9665 comm="syz.2.15288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=94 compat=0 ip=0x7f3cb483e929 code=0x7ffc0000 [ 648.381119][ T29] audit: type=1326 audit(2000000036.352:73156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9665 comm="syz.2.15288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cb483e929 code=0x7ffc0000 [ 648.405321][ T29] audit: type=1326 audit(2000000036.352:73157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9665 comm="syz.2.15288" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3cb483e929 code=0x7ffc0000 [ 648.430845][ T29] audit: type=1400 audit(2000000036.392:73158): avc: denied { map_create } for pid=9668 comm="syz.2.15289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 648.682655][ T9681] lo speed is unknown, defaulting to 1000 [ 648.704046][ T9684] bond0: (slave gretap1): Releasing active interface [ 648.729417][ T9684] bond1: (slave ip6gretap1): Releasing active interface [ 648.729874][ T9690] netlink: 12 bytes leftover after parsing attributes in process `syz.3.15299'. [ 648.748209][ T9684] bond2: (slave ip6gre2): Releasing backup interface [ 648.818612][ T9689] lo speed is unknown, defaulting to 1000 [ 648.929397][ T9696] lo speed is unknown, defaulting to 1000 [ 649.231666][ T9712] lo speed is unknown, defaulting to 1000 [ 649.378349][ T9726] netlink: 2556 bytes leftover after parsing attributes in process `syz.3.15314'. [ 649.487393][ T9729] xt_hashlimit: max too large, truncated to 1048576 [ 650.441016][ T9756] x_tables: duplicate underflow at hook 2 [ 650.485435][ T9758] xt_hashlimit: max too large, truncated to 1048576 [ 650.747460][ T9767] ================================================================== [ 650.755573][ T9767] BUG: KCSAN: data-race in atime_needs_update / touch_atime [ 650.762871][ T9767] [ 650.765200][ T9767] write to 0xffff88811a698c90 of 4 bytes by task 9762 on cpu 0: [ 650.772833][ T9767] touch_atime+0x1e8/0x340 [ 650.777258][ T9767] shmem_file_read_iter+0x477/0x540 [ 650.782460][ T9767] copy_splice_read+0x3c4/0x5f0 [ 650.787333][ T9767] splice_direct_to_actor+0x290/0x680 [ 650.792719][ T9767] do_splice_direct+0xda/0x150 [ 650.797492][ T9767] do_sendfile+0x380/0x650 [ 650.802159][ T9767] __x64_sys_sendfile64+0x105/0x150 [ 650.807371][ T9767] x64_sys_call+0xb39/0x2fb0 [ 650.811991][ T9767] do_syscall_64+0xd2/0x200 [ 650.816496][ T9767] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 650.822401][ T9767] [ 650.824725][ T9767] read to 0xffff88811a698c90 of 4 bytes by task 9767 on cpu 1: [ 650.832281][ T9767] atime_needs_update+0x25f/0x3e0 [ 650.837316][ T9767] touch_atime+0x4a/0x340 [ 650.841648][ T9767] shmem_file_read_iter+0x477/0x540 [ 650.846852][ T9767] copy_splice_read+0x3c4/0x5f0 [ 650.851726][ T9767] splice_direct_to_actor+0x290/0x680 [ 650.857112][ T9767] do_splice_direct+0xda/0x150 [ 650.861893][ T9767] do_sendfile+0x380/0x650 [ 650.866315][ T9767] __x64_sys_sendfile64+0x105/0x150 [ 650.871865][ T9767] x64_sys_call+0xb39/0x2fb0 [ 650.876467][ T9767] do_syscall_64+0xd2/0x200 [ 650.880984][ T9767] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 650.886878][ T9767] [ 650.889198][ T9767] value changed: 0x3363cea9 -> 0x33fc675b [ 650.894904][ T9767] [ 650.897217][ T9767] Reported by Kernel Concurrency Sanitizer on: [ 650.903382][ T9767] CPU: 1 UID: 0 PID: 9767 Comm: syz.0.15329 Not tainted 6.16.0-rc3-syzkaller-00072-gee88bddf7f2f #0 PREEMPT(voluntary) [ 650.915903][ T9767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 650.925982][ T9767] ==================================================================