last executing test programs: 6m56.736310277s ago: executing program 2 (id=299): r0 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000000040), 0x60a00, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x12, r0, 0x57788000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@ipv4, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000080)=0xe8) mount$binderfs(0x0, &(0x7f0000000040)='./binderfs\x00', &(0x7f00000000c0), 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB='max=00000000000000000000001,stats']) mount$binderfs(0x0, &(0x7f0000000040)='./binderfs\x00', &(0x7f0000000280), 0x4800, &(0x7f0000000100)={[], [{@fowner_lt={'fowner<', r1}}]}) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmsg(r3, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000a0100000005fe060c10880008001e00fff3c00e", 0x24}], 0x1}, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) 6m56.641677024s ago: executing program 2 (id=300): r0 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000001140), 0x60a00, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x12, r0, 0x44da2000) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000001200), 0xffffffffffffffff) madvise(&(0x7f000007d000/0x1000)=nil, 0x1000, 0x16) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 6m56.613668686s ago: executing program 2 (id=301): r0 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000001140), 0x60a00, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x12, r0, 0x8ee49000) openat$kvm(0xffffffffffffff9c, &(0x7f0000004300), 0x40d00, 0x0) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1) mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x280000a) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 6m56.545949752s ago: executing program 2 (id=302): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1380, 0x3}) r2 = syz_usb_connect(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x77, 0x29, 0x4, 0x20, 0x424, 0x9901, 0xc257, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x43, 0x0, 0x2, 0x31, 0x7d, 0x55, 0x0, [], [{{0x9, 0x5, 0x2, 0x2, 0x200, 0x2}}, {{0x9, 0x5, 0x82, 0x2, 0x200}}]}}]}}]}}, 0x0) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r2, 0x0, &(0x7f0000000900)={0x1c, &(0x7f0000000a40)=ANY=[@ANYBLOB="00114f"], 0x0, 0x0}) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$uac1(r2, 0x0, &(0x7f0000000400)={0x44, &(0x7f0000000200)=ANY=[@ANYBLOB="401504"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x14) mount$bind(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000040)='./file0/../file0/file0\x00', 0x0, 0x8b101a, 0x0) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r3, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x103) openat$kvm(0xffffffffffffff9c, 0x0, 0x22300, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r3, 0x4008af7c, &(0x7f0000000080)={0x2, 0xb47}) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000940)={0x4c, 0x0, &(0x7f0000000000)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x7624f2802272dfee, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000280)={@flat=@weak_binder={0x77622a85, 0x1000, 0x980}, @ptr={0x70742a85, 0xfffffffc, 0x0, 0x0, 0x1, 0x14}, @fd={0x66642a85, 0x0, r1}}, &(0x7f0000000180)={0x0, 0x18, 0x40}}, 0x400}], 0x0, 0x0, 0x0}) 6m54.556553682s ago: executing program 2 (id=318): ioperm(0x1, 0x3, 0x163f) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioperm(0x9, 0x7ff, 0x100000000) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1380, 0x3}) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000940)={0x4c, 0x0, &(0x7f0000000000)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x7624f2802272dfee, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000280)={@flat=@weak_binder={0x77622a85, 0x1000, 0x980}, @ptr={0x70742a85, 0xfffffffc, 0x0, 0x0, 0x1, 0x14}, @fd={0x66642a85, 0x0, r1}}, &(0x7f0000000180)={0x0, 0x18, 0x40}}, 0x400}], 0x0, 0x0, 0x0}) 6m54.469615239s ago: executing program 2 (id=319): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000100)) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000280)=[@increfs], 0x0, 0x0, 0x0}) r2 = dup3(r1, r0, 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x10a}) sendmmsg(0xffffffffffffffff, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)="4b354cd535e8c35ca810acd4025107f16b2646", 0x13}], 0x1}}], 0x1, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$netlink(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="180000007600"], 0x1c}], 0x1, 0x0, 0x0, 0x4004000}, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000000)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000300)={0x4c, 0x0, &(0x7f0000000900)=[@transaction_sg={0x40046306, {0x1, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x48, 0x18, &(0x7f00000004c0)={@fd={0x66642a85, 0x0, r0}, @fd={0x66642a85, 0x0, r3}, @flat=@weak_handle={0x77682a85, 0x1001, 0x40}}, &(0x7f0000000200)={0x0, 0x18, 0x30}}}], 0x0, 0x0, 0x0}) 6m54.469092608s ago: executing program 32 (id=319): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000100)) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000280)=[@increfs], 0x0, 0x0, 0x0}) r2 = dup3(r1, r0, 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x10a}) sendmmsg(0xffffffffffffffff, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)="4b354cd535e8c35ca810acd4025107f16b2646", 0x13}], 0x1}}], 0x1, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$netlink(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="180000007600"], 0x1c}], 0x1, 0x0, 0x0, 0x4004000}, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000000)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000300)={0x4c, 0x0, &(0x7f0000000900)=[@transaction_sg={0x40046306, {0x1, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x48, 0x18, &(0x7f00000004c0)={@fd={0x66642a85, 0x0, r0}, @fd={0x66642a85, 0x0, r3}, @flat=@weak_handle={0x77682a85, 0x1001, 0x40}}, &(0x7f0000000200)={0x0, 0x18, 0x30}}}], 0x0, 0x0, 0x0}) 5m8.251999222s ago: executing program 3 (id=1417): socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000380)={0x24, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0022030000000621a31d15e065749fb356ae52c7168a35a434"], 0x0}, 0x0) setxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x1) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1802, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x2, {0x41, 0x0, 0x20000}}, 0x10, 0x0}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) accept4(r2, &(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x80, 0x80800) connect$tipc(r1, &(0x7f0000000200)=@name={0x1e, 0x2, 0x3, {{0x40}, 0x2}}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) connect$pppl2tp(r4, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3, 0x3, {0xa, 0x4e23, 0xa, @private1, 0x4}}}, 0x32) ioprio_set$uid(0x3, 0x0, 0x0) mount(&(0x7f0000000000)=@rnullb, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000100)='afs\x00', 0x8, 0x0) socket$netlink(0x10, 0x3, 0x0) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) (async) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000380)={0x24, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0022030000000621a31d15e065749fb356ae52c7168a35a434"], 0x0}, 0x0) (async) setxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x1) (async) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1802, 0x0) (async) socket$tipc(0x1e, 0x5, 0x0) (async) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x2, {0x41, 0x0, 0x20000}}, 0x10, 0x0}, 0x0) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) accept4(r2, &(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x80, 0x80800) (async) connect$tipc(r1, &(0x7f0000000200)=@name={0x1e, 0x2, 0x3, {{0x40}, 0x2}}, 0x10) (async) close_range(r0, 0xffffffffffffffff, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) fcntl$dupfd(r3, 0x0, r3) (async) connect$pppl2tp(r4, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3, 0x3, {0xa, 0x4e23, 0xa, @private1, 0x4}}}, 0x32) (async) ioprio_set$uid(0x3, 0x0, 0x0) (async) mount(&(0x7f0000000000)=@rnullb, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000100)='afs\x00', 0x8, 0x0) (async) 5m7.697541207s ago: executing program 3 (id=1422): ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1381, 0x3}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x200c0801}, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00'}) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000000)=ANY=[@ANYBLOB="01000000000000000f478ef8"]) r1 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x800, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getpeername$packet(r0, 0x0, &(0x7f0000000140)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x2, 0x9, 0xfffffffffffffffd, 0xffffffffffffffff, 0x2, 0x0, 0x4002004c4, 0x1004, 0x8, 0xc595, 0x7, 0x2, 0xffffffffffffffff, 0x2000000000000000, 0x80000004000000, 0xd], 0x8000000, 0x2010d3}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 5m7.65581975s ago: executing program 3 (id=1423): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = eventfd(0x4) fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x2, r0}) ptrace(0x10, r0) ptrace$setregset(0x4205, r0, 0x1, 0x0) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x7cab6ced6415603, 0x3}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000006c0)={0x4, 0x0, &(0x7f0000000540)=[@enter_looper], 0x50, 0x0, &(0x7f0000000600)="8dcdbd6d42ccdb4d556e7c2df713f0976fa3babb5f759be053e97109c9075d28dd5945ae6cb4e4d7866fe0493fb5c9157fdee7247f8cbf6c4e75526dc08c3ae8609b8760a00535639755c0fd5010ceba"}) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000380)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) (async) syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) eventfd(0x4) (async) fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x2, r0}) (async) ptrace(0x10, r0) (async) ptrace$setregset(0x4205, r0, 0x1, 0x0) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) (async) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x7cab6ced6415603, 0x3}) (async) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000006c0)={0x4, 0x0, &(0x7f0000000540)=[@enter_looper], 0x50, 0x0, &(0x7f0000000600)="8dcdbd6d42ccdb4d556e7c2df713f0976fa3babb5f759be053e97109c9075d28dd5945ae6cb4e4d7866fe0493fb5c9157fdee7247f8cbf6c4e75526dc08c3ae8609b8760a00535639755c0fd5010ceba"}) (async) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) (async) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f0000000380)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) (async) 5m7.53764755s ago: executing program 3 (id=1425): openat$fuse(0xffffffffffffff9c, &(0x7f0000002f40), 0x2, 0x0) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = syz_clone(0x42002100, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_pidfd_open(r0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0xa8780, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000008c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000001f00)=""/4096, 0x1000}], 0x1}, 0x10001}], 0x1, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0xff05, 0x0) 5m7.325532227s ago: executing program 3 (id=1431): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) r2 = syz_open_procfs$pagemap(0x0, &(0x7f0000000000)) ioctl$PAGEMAP_SCAN(r2, 0xc0606610, &(0x7f0000000140)={0x60, 0x1, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x8001, 0x0, 0xe4, 0x7f, 0x10, 0x4, 0x60, 0x8}) clock_getres(0x4531edd1b3b0c2f9, 0x0) close(r1) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) syz_usb_connect$uac1(0x4, 0xb9, &(0x7f0000000200)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xa7, 0x3, 0x1, 0x3, 0x80, 0x8, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x800, 0x8}, [@output_terminal={0x9, 0x24, 0x3, 0x6, 0x100, 0x5, 0x1, 0x96}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0xc, 0x24, 0x2, 0x1, 0x1, 0x3, 0x4, 0x5, "af4750", 'Q'}, @format_type_i_continuous={0xc, 0x24, 0x2, 0x1, 0xb, 0x1, 0x6, 0xf7, "cf", "2cad98"}, @format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x6, 0x1, 0x3, 0x1, "", "65ab"}, @as_header={0x7, 0x24, 0x1, 0x7, 0x7f, 0x1001}]}, {{0x9, 0x5, 0x1, 0x9, 0x20, 0xff, 0xc, 0x1, {0x7, 0x25, 0x1, 0x83, 0x0, 0x1}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0xc, 0x24, 0x2, 0x1, 0x0, 0x2, 0x8, 0x1, '7qU', "82"}, @format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x16, 0x3, 0x0, 0x3b, "f591"}]}, {{0x9, 0x5, 0x82, 0x9, 0x40, 0x5, 0x35, 0x1, {0x7, 0x25, 0x1, 0x1, 0x9, 0x2}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x110, 0x4, 0xe, 0x8, 0x40, 0x1}, 0x1e, &(0x7f00000000c0)={0x5, 0xf, 0x1e, 0x4, [@ext_cap={0x7, 0x10, 0x2, 0x2, 0x3, 0x8, 0x1}, @ptm_cap={0x3}, @ptm_cap={0x3}, @ssp_cap={0xc, 0x10, 0xa, 0x1e, 0x0, 0x4, 0xf0f, 0x9}]}, 0x4, [{0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x3409}}, {0x4, &(0x7f0000000340)=@lang_id={0x4, 0x3, 0x430}}, {0x52, &(0x7f0000000380)=@string={0x52, 0x3, "932958954d2a8450b2fba1f0143794247a30da2cafc0726c10e710bff47d3626bb4bfbd7b213709fafd0dce5bbafaa1474539a60f279518a0d629e2fbfbb4ec2707a15438e9cd32d1af0ac0ef8efbe83"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x81d}}]}) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000002c0)=0x20) ioctl$EVIOCGRAB(r5, 0x40044590, &(0x7f0000000000)=0x8) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1381, 0x3}) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4c, 0x0, &(0x7f0000000500)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000440)={@fd={0x66642a85, 0x0, r4}, @fd={0x66642a85, 0x0, r6}, @fda={0x66646185, 0x8, 0x0, 0x24}}, &(0x7f00000001c0)={0x30, 0x18, 0x38}}, 0x1000}], 0x0, 0x0, 0x0}) 5m6.769142481s ago: executing program 3 (id=1444): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder0\x00', 0x802, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r1, 0x25, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x3}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r2, 0x7, &(0x7f0000000380)={0x1, 0x0, 0x103ff}) close_range(r0, 0xffffffffffffffff, 0x0) 4m51.727502269s ago: executing program 33 (id=1444): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder0\x00', 0x802, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r1, 0x25, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x3}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r2, 0x7, &(0x7f0000000380)={0x1, 0x0, 0x103ff}) close_range(r0, 0xffffffffffffffff, 0x0) 3m15.812613196s ago: executing program 0 (id=3359): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) setsockopt$sock_int(r1, 0x1, 0xb, &(0x7f0000000180)=0x800005, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x89f6, &(0x7f0000001440)={'bridge0\x00', &(0x7f0000000100)=@ethtool_pauseparam={0x12, 0x0, 0x4}}) (async) ioctl$sock_SIOCETHTOOL(r0, 0x89f6, &(0x7f0000001440)={'bridge0\x00', &(0x7f0000000100)=@ethtool_pauseparam={0x12, 0x0, 0x4}}) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000380), 0x1, 0x0) (async) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000380), 0x1, 0x0) r2 = userfaultfd(0x1) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x270}) (async) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x270}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x1}) r3 = userfaultfd(0x80801) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x145}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x1}) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mmap(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x1000007, 0x20031, 0xffffffffffffffff, 0xffffe000) (async) mmap(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x1000007, 0x20031, 0xffffffffffffffff, 0xffffe000) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000140)) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r4, 0x8008f511, &(0x7f00000000c0)) (async) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r4, 0x8008f511, &(0x7f00000000c0)) r5 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_DEL_MIF(r5, 0x29, 0xc8, 0x0, 0xc000000) (async) setsockopt$MRT6_DEL_MIF(r5, 0x29, 0xc8, 0x0, 0xc000000) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) sendto$inet6(r6, &(0x7f0000000300), 0x16, 0x3b00, 0x0, 0xfffffffffffffdfd) (async) sendto$inet6(r6, &(0x7f0000000300), 0x16, 0x3b00, 0x0, 0xfffffffffffffdfd) r7 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r7, 0x6, 0x23, &(0x7f0000006480)={&(0x7f0000c2b000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/256, 0x107f, 0x0, 0x0}, &(0x7f0000000180)=0x8d) r8 = eventfd(0x10) io_cancel(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, r8}, 0x0) mount(&(0x7f0000000000)=@rnullb, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000080)='ext3\x00', 0x2208008, 0x0) (async) mount(&(0x7f0000000000)=@rnullb, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000080)='ext3\x00', 0x2208008, 0x0) 3m15.812144156s ago: executing program 0 (id=3360): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x101040, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0x3000, 0x1000, &(0x7f0000feb000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000080)="36c16a840fd9fdb8030000000f23d00f21f835000000010f23f80f0966b895008ec80fc76d0665f30f09b9410300000f3266b812008ed09a000001007f00", 0x3e}], 0x1, 0xc3, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x40282, 0x0) lseek(r3, 0x4, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000002030102000000000000000001000000080001000100001f0900020080000000010015da05dc0000"], 0x28}, 0x1, 0x0, 0x0, 0x400c010}, 0x0) r5 = syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="01010000000000206a0557000000000000010902240001000000030904000201030001000921270b000122060009058103"], 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) syz_usb_control_io(r5, &(0x7f00000000c0)={0x2c, &(0x7f0000000040)={0x0, 0x21, 0x8, {0x8, 0x5, "81b079d9871f"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r6 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000000040), 0x60a00, 0x0) fcntl$notify(r1, 0x402, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x12, r6, 0x57788000) socket$inet_udp(0x2, 0x2, 0x0) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) r8 = syz_genetlink_get_family_id$smc(&(0x7f0000000140), r3) sendmsg$SMC_PNETID_DEL(r3, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x4c, r8, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0xffffffffffffffa0}, 0x1, 0x0, 0x0, 0x480c5}, 0x10) 3m15.307634617s ago: executing program 0 (id=3362): timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) creat(&(0x7f0000001380)='./file0\x00', 0x4) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="1500000065ffff048000000800395032303030"], 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x10, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[], [], 0x6b}}) chmod(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_ro(r3, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$UHID_INPUT(r4, &(0x7f0000001940)={0x8, {"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", 0x1000}}, 0x1006) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x2c040090) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e22, 0x9, @ipv4={'\x00', '\xff\xff', @loopback}, 0x7}, 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e22, 0x7, @ipv4={'\x00', '\xff\xff', @empty}, 0x106}, 0x1c) r7 = fcntl$dupfd(r6, 0x0, r6) sendmsg$NFT_BATCH(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[], 0x56c}, 0x1, 0x0, 0x0, 0x40000}, 0x8051) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), r7) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)={0x4c, 0x14, 0x905, 0x70bd25, 0x25dfdbfb, {0xa, 0x6, 0x3, 0x0, {0x4e26, 0x4e23, [0x0, 0x2c000000, 0x6, 0x1], [0xfffffffe, 0x5, 0x1, 0x8a67], 0x0, [0x3, 0x1002]}, 0x4, 0xffffffff}}, 0x4c}, 0x1, 0x0, 0x0, 0x26004801}, 0xc810) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000180)={0x4c, 0x0, &(0x7f0000000000)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 3m14.288541628s ago: executing program 0 (id=3386): r0 = socket(0x10, 0x3, 0x0) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpgrp(r1) kcmp(r2, r1, 0x6, r0, r0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) r4 = socket$inet6_icmp(0xa, 0x2, 0x3a) recvfrom$inet6(r4, &(0x7f0000000440)=""/4096, 0x1000, 0x20010162, &(0x7f0000000000)={0xa, 0x4e22, 0xfe2e, @rand_addr=' \x01\x00', 0x800}, 0x1c) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x51) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000080)={0x8}) link(&(0x7f0000000080)='.\x00', &(0x7f00000000c0)='./file0\x00') setsockopt$inet_tcp_int(r5, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r5, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000000), 0x20000328) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000100)={0x8, 0x0, &(0x7f0000000040)=[@request_death], 0x4d, 0x0, 0x0}) 3m13.89169959s ago: executing program 0 (id=3400): r0 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000001140), 0x60a00, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x12, r0, 0xe6683000) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001580), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010025bd7000ffdbdf25020000000c0001800900030007000000495fe193af503cd8fa68c99955692782d1f76475e0bd32528561db2090e8c3d40b123867f4fb40477ffde1b23f1eb6899cf6"], 0x20}, 0x1, 0x0, 0x0, 0x8c1}, 0x4000894) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x0, 0x1800, 0x5, 0x3}, 0x20) futex(&(0x7f000000cffc)=0x1, 0x80000000000b, 0x0, 0x0, &(0x7f0000048000)=0x2, 0x1) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/power/reserved_size', 0x80802, 0x0) futex(&(0x7f0000000000)=0x1, 0x80, 0x2, &(0x7f0000000040)={0x0, 0x989680}, 0x0, 0x1) write$UHID_CREATE2(r3, &(0x7f0000000500)=ANY=[@ANYBLOB='\v\x00'], 0x1c7) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 3m13.849869773s ago: executing program 0 (id=3401): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f0000000200)=[@enter_looper], 0xd8, 0x0, &(0x7f0000000040)="de547e22bade76f1a03b79e954ee20bc43f0fe47218a02ff8ba942478a7b69462fc21aff5500cce25e854564e7d309f20d222f9220c8d9b1b0d196137252587ab17948adf2dcbba03d2f3e0e647c2e70531c1ebe07df31a1376c2f4f57d3efa568881287564ce512ddbf98a7787c6c9d8d81ce50bbc0adc7eac5f8346d258b1980950f2a625419fefecda4567cd2f058a8311976f4b7d4e17ede93cc24a5cdf7c2617f53b08ea44616dcfceac268d673e382ed792acebfccc3077f7339da24e43be8fbae111f4d411712b80b21f39b644290dd392de67e08"}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000400)={'ip_vti0\x00', 0x0, 0x8, 0x10, 0x3, 0x5, {{0x6, 0x4, 0x0, 0x9, 0x18, 0x67, 0x0, 0x8, 0x2f, 0x0, @remote, @empty, {[@timestamp_addr={0x44, 0x4, 0x58, 0x1, 0xd}]}}}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='timerslack_ns\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000dc0)={'filter\x00', 0x7, 0x4, 0x3f0, 0x1f8, 0x1f8, 0x308, 0x308, 0x110, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="58607b1c69cb", @mac, @multicast2}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE2={0x28}}, {{@arp={@multicast2, @local, 0xff000000, 0x0, 0x5, 0x3, {@mac=@local, {[0x0, 0xff, 0x0, 0xff]}}, {@empty, {[0x0, 0x0, 0xff]}}, 0x2, 0x5, 0x8, 0x9, 0xd, 0x6140, '\x00', 'wlan1\x00', {0xff}, {}, 0x0, 0x181}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xf, 0xffffffff}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x4283cafe) r3 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r3, &(0x7f0000000000), 0x10) setsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, &(0x7f00000000c0), 0xf00) close(r3) r4 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000080), 0xc000, 0x40040) pselect6(0x2000, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x300}, 0x0, &(0x7f0000000100)={0x8}, 0x0, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)={0x1c, 0x1d, 0x1, 0x0, 0x25dfdbff, {0x7}, [@typed={0x8, 0x3fff, 0x0, 0x0, @u32=0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) close(r4) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket(0x840000000002, 0x3, 0xff) sendmmsg$inet(r6, &(0x7f0000000440)=[{{&(0x7f00000001c0)={0x2, 0x1800, @empty}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000240)="a90500ff070000007e1c2958fea6465c00e5c01104b61aa67b729380255542ab7d129f62", 0x24}], 0x1}}], 0x1, 0x4048004) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x40, 0x80, 0x1, 0xcc01, {{0x5, 0x4, 0x0, 0x8, 0x14, 0x266, 0x0, 0x6, 0x29, 0x0, @multicast1, @broadcast}}}}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 3m13.821330986s ago: executing program 34 (id=3401): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f0000000200)=[@enter_looper], 0xd8, 0x0, &(0x7f0000000040)="de547e22bade76f1a03b79e954ee20bc43f0fe47218a02ff8ba942478a7b69462fc21aff5500cce25e854564e7d309f20d222f9220c8d9b1b0d196137252587ab17948adf2dcbba03d2f3e0e647c2e70531c1ebe07df31a1376c2f4f57d3efa568881287564ce512ddbf98a7787c6c9d8d81ce50bbc0adc7eac5f8346d258b1980950f2a625419fefecda4567cd2f058a8311976f4b7d4e17ede93cc24a5cdf7c2617f53b08ea44616dcfceac268d673e382ed792acebfccc3077f7339da24e43be8fbae111f4d411712b80b21f39b644290dd392de67e08"}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000400)={'ip_vti0\x00', 0x0, 0x8, 0x10, 0x3, 0x5, {{0x6, 0x4, 0x0, 0x9, 0x18, 0x67, 0x0, 0x8, 0x2f, 0x0, @remote, @empty, {[@timestamp_addr={0x44, 0x4, 0x58, 0x1, 0xd}]}}}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='timerslack_ns\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000dc0)={'filter\x00', 0x7, 0x4, 0x3f0, 0x1f8, 0x1f8, 0x308, 0x308, 0x110, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="58607b1c69cb", @mac, @multicast2}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE2={0x28}}, {{@arp={@multicast2, @local, 0xff000000, 0x0, 0x5, 0x3, {@mac=@local, {[0x0, 0xff, 0x0, 0xff]}}, {@empty, {[0x0, 0x0, 0xff]}}, 0x2, 0x5, 0x8, 0x9, 0xd, 0x6140, '\x00', 'wlan1\x00', {0xff}, {}, 0x0, 0x181}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xf, 0xffffffff}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x4283cafe) r3 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r3, &(0x7f0000000000), 0x10) setsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, &(0x7f00000000c0), 0xf00) close(r3) r4 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000080), 0xc000, 0x40040) pselect6(0x2000, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x300}, 0x0, &(0x7f0000000100)={0x8}, 0x0, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)={0x1c, 0x1d, 0x1, 0x0, 0x25dfdbff, {0x7}, [@typed={0x8, 0x3fff, 0x0, 0x0, @u32=0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) close(r4) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket(0x840000000002, 0x3, 0xff) sendmmsg$inet(r6, &(0x7f0000000440)=[{{&(0x7f00000001c0)={0x2, 0x1800, @empty}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000240)="a90500ff070000007e1c2958fea6465c00e5c01104b61aa67b729380255542ab7d129f62", 0x24}], 0x1}}], 0x1, 0x4048004) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x40, 0x80, 0x1, 0xcc01, {{0x5, 0x4, 0x0, 0x8, 0x14, 0x266, 0x0, 0x6, 0x29, 0x0, @multicast1, @broadcast}}}}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 1m2.163894021s ago: executing program 1 (id=5807): r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001980)=[{{0x0, 0x0, 0x0}, 0x8}], 0x1, 0x0, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) setsockopt(r0, 0x4, 0xfff, 0x0, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000002140)='./file1\x00', 0x42, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x4c, 0x0, &(0x7f0000000fc0)=[@release], 0xc, 0x0, 0x0}) 1m1.837658287s ago: executing program 1 (id=5811): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x189, 0x0) (async) ustat(0x3, &(0x7f0000000000)) (async) read$FUSE(r0, &(0x7f00000005c0)={0x2020}, 0x2020) 1m1.733806646s ago: executing program 1 (id=5813): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000001480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001440)={&(0x7f0000002780)={0x1c, r2, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x4}, @TIPC_NLA_NODE={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0x24040000) r3 = getpid() r4 = syz_pidfd_open(r3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x104000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x1c0) mount$9p_unix(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x121f408, 0x0) setns(r4, 0x24020000) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r5, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, 0x0, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x2) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r6, 0x0, 0x27, &(0x7f0000000180)={@multicast1, @loopback}, 0xc) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x20000000) close_range(r0, 0xffffffffffffffff, 0x0) 1m1.665683471s ago: executing program 6 (id=5814): r0 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000001140), 0x180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000004, 0x12, r0, 0xdc5b7000) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x82000, 0x0) userfaultfd(0x0) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1002, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) r4 = syz_init_net_socket$bt_rfcomm(0x1f, 0x1, 0x3) ioctl$int_in(r4, 0x5421, &(0x7f0000000000)=0x3) connect$bt_rfcomm(r4, &(0x7f00000001c0)={0x1f, @any, 0xb}, 0xa) r5 = memfd_secret(0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa, 0x11, r5, 0x0) syz_io_uring_setup(0x3b48, &(0x7f0000000000)={0x0, 0xc5fa, 0x1, 0x1, 0x294}, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f0000000540)={{r4}, r6, 0x10, @inherit={0x60, &(0x7f0000000100)={0x0, 0x3, 0x9, 0x0, {0x1, 0x14, 0x9, 0x1, 0x1}, [0x4, 0x100000001, 0xb]}}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000000)={"ec4a2a49343eb53cee235f24a10df535", r6, 0x0, {0x6, 0xd4}, {0x0, 0x1}, 0xfffffffffffffffc, [0x6, 0x84, 0x1, 0xfffffffffffffff7, 0x0, 0x1, 0x9, 0x7, 0x5, 0x2, 0xc11c172, 0x3, 0x3, 0xb880, 0x7ff, 0x80]}) pipe2(&(0x7f0000000180), 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 1m1.591684967s ago: executing program 6 (id=5817): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000003) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000003a80)='ns/net\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) mmap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000009, 0x13, r0, 0x4758e000) lseek(r0, 0xe, 0x5) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f0000000040)=0x9d) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f00000000c0)={0x2d, 0x3, 0x0, {0x4, 0xc, 0x0, '/dev/ashmem\x00'}}, 0x2d) 1m1.545638311s ago: executing program 4 (id=5818): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) recvmmsg(r0, &(0x7f0000001340)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000640)=""/39, 0x27}, {&(0x7f0000000840)=""/120, 0x78}, {&(0x7f00000008c0)=""/193, 0xc1}, {&(0x7f0000000a80)=""/68, 0x44}, {&(0x7f0000000b00)=""/154, 0x9a}, {&(0x7f0000001400)=""/152, 0x98}, {&(0x7f0000000c80)=""/137, 0x89}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000000d40)=""/73, 0x49}], 0x9, &(0x7f00000006c0)=""/26, 0x1a}, 0x28d6}], 0x1, 0x40010080, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="030704707900000000000100040004000180"], 0x18}}, 0x0) 1m1.288375792s ago: executing program 6 (id=5820): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1381, 0x3}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f00000002c0)=0x8004004c, 0x4) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4c, 0x0, &(0x7f0000000500)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0xffffffffffffffff, &(0x7f0000000080)={@ptr={0x70742a85, 0x0, &(0x7f0000000280)=""/238, 0xee, 0x2, 0x4}, @ptr={0x70742a85, 0x0, &(0x7f0000000000)=""/122, 0x0, 0x0, 0x20}, @fda={0x66646185, 0x0, 0x0, 0x24}}, &(0x7f00000001c0)={0x0, 0x28, 0x40}}, 0x40}], 0x0, 0x0, 0x0}) 1m1.285559402s ago: executing program 4 (id=5821): sigaltstack(&(0x7f0000000000)={0xffffffffffffffff, 0x0, 0xfffffffffffffefa}, &(0x7f0000000080)={&(0x7f0000000040)}) (async, rerun: 32) sigaltstack(&(0x7f0000000280)={0x0, 0x80000001}, 0x0) (rerun: 32) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) flock(r0, 0x2) r1 = open(&(0x7f0000000300)='.\x00', 0x100000, 0x0) r2 = open(&(0x7f0000000180)='.\x00', 0x10000, 0x0) flock(r2, 0x1) flock(r1, 0x1) (async) flock(r0, 0x1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') (async, rerun: 64) r4 = gettid() (async, rerun: 64) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0xfffffffffffffffb]}, 0x8, 0x0) readv(r5, &(0x7f0000000140)=[{&(0x7f00000003c0)=""/80, 0x50}, {&(0x7f0000000440)=""/117, 0x75}], 0x2) rt_sigqueueinfo(r4, 0x20, &(0x7f0000000180)={0x30, 0x40000020, 0xfffffffe}) (async) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) (async) bind$bt_l2cap(r2, &(0x7f00000021c0)={0x1f, 0xd3, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x3, 0x2}, 0xe) (async) r7 = socket(0x5, 0x2, 0x9) setsockopt$bt_BT_DEFER_SETUP(r6, 0x112, 0x7, &(0x7f0000000000), 0x4) (async) lstat(&(0x7f0000000580)='./file2/file0\x00', &(0x7f0000002600)={0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 64) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) (rerun: 64) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r10, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYRES8=r3], 0x64}, 0x1, 0x0, 0x0, 0x51}, 0x880) (async) sendmsg$IPCTNL_MSG_CT_NEW(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="7c00000000010104000000000000000002000000240001801400018008000100ac14143208000200e00000020c0002800500010000000000000002801400018008000100e000000108000200e00000010c000280050001000000000008000740000000001800068014000380060002004e200000060001004e220000"], 0x7c}}, 0x0) (async) r11 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCETHTOOL(r11, 0x8946, &(0x7f0000000240)={'bridge_slave_0\x00', &(0x7f0000000000)=@ethtool_cmd={0x4, 0x0, 0xa, 0x0, 0x2, 0x7, 0x7f, 0x8, 0x7, 0x10, 0x9, 0x0, 0x5, 0x1, 0x5, 0x7, [0x1, 0x4]}}) (async, rerun: 32) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r7, 0x8983, &(0x7f0000000200)={0x1, 'syzkaller1\x00', {}, 0x7}) (async, rerun: 32) setresuid(r8, 0x0, 0x0) (async) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000380)="15", 0x1, 0xfffffffffffffffc) (async) syz_kvm_setup_cpu$x86(r5, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f0000000500)="666466420feac066baf80cb898127081ef66bafc0cedc422d105e5b9a7030000b809000000ba000000000f300f3266baf80cb80c17ac84ef66bafc0cb880000000ef64660f3882a70030000066baf80cb8537ab88bef66bafc0cec66baf80cb8d6433488ef66bafc0cb0e5eec74424006d000000c74424028c3fb81cff2c24", 0x7f}], 0x1, 0x20, &(0x7f0000000340)=[@vmwrite={0x8, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}], 0x1) (async) lsetxattr$security_capability(&(0x7f0000002680)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v3={0x3000000, [{0x80, 0x3}, {0x5, 0x9}], r8}, 0x18, 0x2) 1m1.1936744s ago: executing program 6 (id=5822): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wake_lock', 0x202, 0x46) copy_file_range(r1, 0x0, r1, &(0x7f0000000040)=0x400, 0x100, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000240)={{}, {}, [], {0x4, 0x1}, [{0x8, 0x3}], {0x10, 0x1}}, 0x2c, 0x3) getxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)=@known='system.posix_acl_access\x00', 0x0, 0xed) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1380, 0x3}) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000940)={0x4c, 0x0, &(0x7f0000000000)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x7624f2802272dfee, 0x0, 0x0, 0x78, 0x18, &(0x7f0000000280)={@ptr={0x70742a85, 0x0, 0x0, 0x0, 0x40000000000000, 0x16}, @ptr={0x70742a85, 0xfffffffc, &(0x7f00000029c0)=""/201, 0xc9, 0x1, 0x14}, @ptr={0x70742a85, 0x1, 0x0, 0x0, 0x1, 0x1d}}, &(0x7f0000000180)={0x0, 0x28, 0x50}}, 0x400}], 0x0, 0x0, 0x0}) openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x0, 0x0) (async) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wake_lock', 0x202, 0x46) (async) copy_file_range(r1, 0x0, r1, &(0x7f0000000040)=0x400, 0x100, 0x0) (async) setxattr$system_posix_acl(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000240)={{}, {}, [], {0x4, 0x1}, [{0x8, 0x3}], {0x10, 0x1}}, 0x2c, 0x3) (async) getxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)=@known='system.posix_acl_access\x00', 0x0, 0xed) (async) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1380, 0x3}) (async) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) (async) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000940)={0x4c, 0x0, &(0x7f0000000000)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x7624f2802272dfee, 0x0, 0x0, 0x78, 0x18, &(0x7f0000000280)={@ptr={0x70742a85, 0x0, 0x0, 0x0, 0x40000000000000, 0x16}, @ptr={0x70742a85, 0xfffffffc, &(0x7f00000029c0)=""/201, 0xc9, 0x1, 0x14}, @ptr={0x70742a85, 0x1, 0x0, 0x0, 0x1, 0x1d}}, &(0x7f0000000180)={0x0, 0x28, 0x50}}, 0x400}], 0x0, 0x0, 0x0}) (async) 1m1.165140282s ago: executing program 6 (id=5823): ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x100000) r0 = syz_usb_connect(0x3, 0x34, &(0x7f00000002c0)=ANY=[@ANYBLOB="1201000092df5510ac05269289b201020301090222000100000000090400000103e900000907000000000000000705d77b5d"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000100)={0x44, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa0090199) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) getresgid(0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1381, 0x3}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c000000180009020000000000000005000000000800000080000000100004800b0020007b26282f283a0000"], 0x2c}}, 0x0) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x8000000000002) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x16) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x400, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='mounts\x00') prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) mount$bind(&(0x7f0000000540)='./file0/file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000100)={0x4c, 0x0, &(0x7f0000000500)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000440)={@ptr={0x70742a85, 0x0, &(0x7f0000000280)=""/238, 0xee, 0x2, 0x4}, @fda={0x66646185, 0x1, 0x0, 0x36}, @fda={0x66646185, 0x8, 0x0, 0x24}}, &(0x7f00000001c0)={0x0, 0x28, 0x48}}, 0x1000}], 0x0, 0x0, 0x0}) 1m1.158238352s ago: executing program 5 (id=5824): r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001b40)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000780)=""/227, 0xe3}, {&(0x7f0000001a40)=""/217, 0xd9}, {&(0x7f0000002d00)=""/4099, 0x1000}, {&(0x7f0000001d80)=""/161, 0xa1}, {&(0x7f0000000680)=""/134, 0x86}, {&(0x7f0000002c40)=""/146, 0x92}, {&(0x7f0000000280)=""/133, 0x85}, {&(0x7f0000000000)=""/249, 0xf9}, {&(0x7f0000000140)=""/88, 0x58}], 0x9}, 0xc}, {{0x0, 0x0, 0x0}, 0xa}, {{0x0, 0x0, 0x0}, 0x2}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0xfffffffe}, {{0x0, 0x0, 0x0}, 0x8}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xc3}}], 0x2d, 0x40000100, 0x0) 1m1.033708812s ago: executing program 4 (id=5825): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendfile(r2, r1, 0x0, 0x4) (async) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) (async) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000000000)={0x3, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000001040)={0x3, {{0x2, 0x0, @multicast1}}}, 0x88) (async) mount$overlay(0x0, 0x0, &(0x7f0000000000), 0x10000, 0x0) getsockopt$inet_buf(r4, 0x0, 0x30, &(0x7f0000000000)=""/4091, &(0x7f0000001000)=0xffb) (async) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x101400, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffa) (async) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r5, 0x0) (async) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x1f\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\x87\xa3\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b^:4\xeb\xd37\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Hd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84\x1b\xdaR-\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~\x00\x00\x00\x00\x00\x00\x00') sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x2d}, 0x1, 0x0, 0x0, 0x4008040}, 0x448d5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r6, 0x0) (async) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r3, 0xc018620c, &(0x7f0000000180)) (async) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x11, 0xffffffffffffffff, 0x45809000) (async) r7 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000000000), 0x1cbd81, 0x0) ioctl$BLKRRPART(r7, 0x125f, 0x0) 1m1.032188083s ago: executing program 5 (id=5826): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1802, 0x0) (async, rerun: 32) socket$inet6_tcp(0xa, 0x1, 0x0) (async, rerun: 32) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) (async, rerun: 64) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) (async, rerun: 64) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000340)={'syzkaller0\x00', @link_local}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb601288763"], 0xffdd) (async) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, r4, 0x20, 0x70bd27, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x8}, {0x6, 0x11, 0xfff7}, {0x8, 0x13, 0x1}, {0x5, 0x14, 0x1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x4048844}, 0x20004000) (async) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) (async) close_range(r0, 0xffffffffffffffff, 0x0) 1m1.002722704s ago: executing program 5 (id=5827): r0 = socket$netlink(0x10, 0x3, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x200000, 0x0, 0xff, 0x1, 0x0, 0x4}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@mcast2, 0x200000, 0x1, 0x0, 0xb, 0x7, 0x4f2}, 0x20) r2 = socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000000)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@verity_on}]}) chdir(&(0x7f00000000c0)='./bus\x00') mkdir(&(0x7f0000000240)='./bus\x00', 0x0) chdir(&(0x7f0000000080)='./bus\x00') r3 = open(&(0x7f0000000040)='.\x00', 0x20000, 0x0) getdents64(r3, &(0x7f0000000fc0)=""/224, 0xe0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r4, 0x0) ppoll(0x0, 0x0, 0x0, &(0x7f0000001a40)={[0x1a1e]}, 0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[], 0x32600) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r5, 0x0) getsockopt(r2, 0x1, 0x4, 0x0, &(0x7f00000000c0)) writev(r0, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff0600000002000000450000002500000019000400440000000d00000000000006040000000000f93132", 0x39}], 0x1) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r6, 0x29, 0x4e, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000080)='ext3\x00', 0x2208008, 0x0) 1m0.922482341s ago: executing program 5 (id=5828): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff002, 0x0, 0x2000000000032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000636000/0x2000)=nil, 0x2000, 0x8, 0x40010, 0xffffffffffffffff, 0x4aac4000) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, 0x0) 1m0.873703275s ago: executing program 1 (id=5829): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) recvmmsg(r0, &(0x7f0000001340)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000640)=""/39, 0x27}, {&(0x7f0000000840)=""/120, 0x78}, {&(0x7f00000008c0)=""/193, 0xc1}, {0x0}, {&(0x7f0000000a80)=""/68, 0x44}, {&(0x7f0000000b00)=""/154, 0x9a}, {&(0x7f0000001400)=""/152, 0x98}, {&(0x7f0000000c80)=""/137, 0x89}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000000d40)=""/73, 0x49}], 0xa, &(0x7f00000006c0)=""/26, 0x1a}, 0x28d6}], 0x1, 0x40010080, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="030704707900000000000100040004000180"], 0x18}}, 0x0) 1m0.844459098s ago: executing program 4 (id=5830): openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) futex_waitv(&(0x7f0000000ec0)=[{0x0, 0x0, 0x2}], 0x1, 0x0, &(0x7f0000000000)={0x77359400}, 0x0) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000003440)={'tunl0\x00', &(0x7f00000033c0)={'sit0\x00', 0x0, 0x40, 0x8000, 0xf3, 0x3, {{0x6, 0x4, 0x0, 0xe, 0x18, 0x64, 0x0, 0x7, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x2c}, @loopback, {[@ra={0x94, 0x4}]}}}}}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r2) fcntl$setflags(r0, 0x2, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3e, 0x0, 0x0) setsockopt$MRT6_INIT(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 1m0.835128178s ago: executing program 5 (id=5831): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f00000003c0)=[{&(0x7f0000000240)="390000001300034700ab65e1c3e4ffff01000000010000005600000025000000190004000400000007fdd411efc40800040000000000000000", 0x39}], 0x1) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) r5 = syz_pidfd_open(r4, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r5, 0x942e, 0x0) r6 = getpid() r7 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, 0xffffffffffffffff, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000400)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f93132", 0x39}], 0x1) r8 = socket$netlink(0x10, 0x3, 0x0) writev(r8, &(0x7f00000003c0)=[{&(0x7f0000000080)="200000001300034700bb65e1c3e4ffff01000000010000005600000025000000", 0x20}], 0x1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4c504}, 0x0) r9 = userfaultfd(0x801) ioctl$UFFDIO_WRITEPROTECT(r9, 0xc018aa06, &(0x7f00000000c0)={{&(0x7f0000847000/0x1000)=nil, 0x1000}, 0x1}) close_range(r0, 0xffffffffffffffff, 0x0) 1m0.713744608s ago: executing program 4 (id=5832): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x1800, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) 1m0.710458348s ago: executing program 1 (id=5833): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x200000005c832, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000001000)=""/16, 0x1030000, 0x1000, 0x5}, 0x20) socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000180)=0x1000, 0x4) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x2001}, 0x10) (async) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x2001}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), 0xffffffffffffffff) bind$tipc(r1, 0x0, 0x0) open(&(0x7f0000000080)='./cgroup\x00', 0x103002, 0x100) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x30, r3, 0x1, 0x0, 0x100000, {{}, {}, {0x14, 0x19, {0x2, 0x1, 0x0, 0x2000000}}}}, 0x30}, 0x1, 0x0, 0x0, 0x4008000}, 0x1004) setresuid(0x0, 0xffffffffffffffff, 0xee01) mount(&(0x7f0000000000)=@rnullb, &(0x7f00000000c0)='./cgroup\x00', &(0x7f0000000040)='f2fs\x00', 0x0, 0x0) (async) mount(&(0x7f0000000000)=@rnullb, &(0x7f00000000c0)='./cgroup\x00', &(0x7f0000000040)='f2fs\x00', 0x0, 0x0) 1m0.368712336s ago: executing program 4 (id=5834): openat$kvm(0xffffffffffffff9c, &(0x7f0000000740), 0x20001, 0x0) (async) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000740), 0x20001, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x40002, 0x0) (async) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x40002, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) (async) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCFLSH(r1, 0x400455c8, 0x4) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, 0x0, 0x0) r3 = syz_usb_connect(0x0, 0xffffffffffffff54, 0x0, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CAP_EXIT_HYPERCALL(r5, 0x4068aea3, &(0x7f0000000040)={0x79, 0x0, 0xc}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) (async) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000180)="0f01c20f01ca360fc79ed200660f7ec9bad10466edba2100b80080efbad104b80030ef260f541cf466b9800000c00f326635004000000f30", 0x38}], 0x1, 0x1d, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r6, 0x4400ae8f, &(0x7f0000000700)={"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"}) pipe(0x0) ioctl$KVM_X86_SETUP_MCE(r6, 0x4008ae9c, &(0x7f0000000040)={0x1e, 0x4, 0x27}) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x2d) (async) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x2d) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x42, 0x8) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000240), &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000b00)=ANY=[@ANYRES8=r1, @ANYRESDEC=0x0, @ANYRES32=r0, @ANYRES16=0x0, @ANYRESDEC=r1, @ANYBLOB="a77fe61b7c5fcd81c78715d1a95b6f628920086aa269f57dd5038d0d7a8a9822f420c52ba4c2394fba431d150afca241568723fc8c6a457d541e2daf8e7edf11ae700e0688304d92f52a762bdde6612cb53173bee852c6e2608ef3a47ac79c5c70a490258ade21b7900e0362ad5d7a038de29f37eb7a172422171cdd3a093911a73d82d88be8b5c059bfac5466216a765cb2d01539da090420958f4c5825b206e2bd37847d784db6a77e7875037dd8000d7ee6f345fa9337ed644f901d4dca4b9846d90a5439de14fe727410802a89586ff0a4220af95a7c0b8eceb41780a2742dd281d007f5b214f3cef2a7f98e2afbef4a96776f64adf030", @ANYRES32=r3, @ANYRES64=0x0, @ANYRESDEC]) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000200)=0xc) (async) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setgroups(0x1, &(0x7f00000001c0)=[r9]) (async) setgroups(0x1, &(0x7f00000001c0)=[r9]) syz_open_procfs(r8, &(0x7f0000000100)='net/unix\x00') (async) syz_open_procfs(r8, &(0x7f0000000100)='net/unix\x00') r10 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r10, &(0x7f00000000c0)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x8) bind$bt_sco(r10, &(0x7f0000000e40)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0x8) read$FUSE(r7, &(0x7f0000007100)={0x2020}, 0x2020) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000000), r11) 57.659682733s ago: executing program 5 (id=5835): r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001b40)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000780)=""/227, 0xe3}, {&(0x7f0000001a40)=""/217, 0xd9}, {&(0x7f0000002d00)=""/4099, 0x1000}, {&(0x7f0000001d80)=""/161, 0xa1}, {&(0x7f0000000680)=""/134, 0x86}, {&(0x7f0000002c40)=""/146, 0x92}, {&(0x7f0000000280)=""/133, 0x85}, {&(0x7f0000000000)=""/249, 0xf9}, {&(0x7f0000000140)=""/88, 0x58}], 0x9}, 0xc}, {{0x0, 0x0, 0x0}, 0xa}, {{0x0, 0x0, 0x0}, 0x2}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0xfffffffe}, {{0x0, 0x0, 0x0}, 0x8}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xe3}}], 0x2d, 0x40000100, 0x0) 57.114350147s ago: executing program 6 (id=5836): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1381, 0x3}) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, 0x0, &(0x7f0000000200)=""/87, 0x0, 0xeeef0000}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002180), 0xa0002, 0x0) syz_io_uring_setup(0x6042, 0xfffffffffffffffe, 0x0, 0x0) r3 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)=0xa) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)=ANY=[@ANYBLOB="200000005e00010000000000000000000c000000010000001600008004000180"], 0x20}], 0x1}, 0x0) readv(r3, &(0x7f0000000540)=[{&(0x7f0000000300)=""/95, 0x5f}], 0x1) r5 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r5, 0x29, 0x38, 0x0, &(0x7f0000000040)) r6 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = dup(r8) rt_sigaction(0x32, 0x0, &(0x7f0000000380)={&(0x7f0000000180)="f20f8e341b341bf82b7100262a440faeda400f73d0a48f491891c6c4617167302e3e660fe6a30e000000c402c8f3d0426e420f01da", 0x0, 0x0}, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000000840)={0x1fe, 0x2, 0x2000, 0x1000, &(0x7f0000003000/0x1000)=nil}) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r9, r7, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x42, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r10, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x11, 0x0, 0x0) ioctl$KVM_RUN(r10, 0xae80, 0x0) ioctl$KVM_HYPERV_EVENTFD(r6, 0x4020aeb2, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0xfffffffd}) socket$key(0xf, 0x3, 0x2) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4c, 0x0, &(0x7f0000000500)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x70, 0x18, &(0x7f0000002c40)={@ptr={0x70742a85, 0x0, &(0x7f0000000280)=""/227, 0xe3, 0x2, 0x6}, @fda={0x66646185, 0x2, 0x0, 0x10}, @ptr={0x70742a85, 0x0, 0x0, 0x0, 0x1002, 0x37}}, &(0x7f00000001c0)={0x0, 0x28, 0x48}}, 0x1000}], 0x0, 0x0, 0x0}) 51.109464158s ago: executing program 1 (id=5837): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000001480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001440)={&(0x7f0000002780)={0x1c, r2, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x4}, @TIPC_NLA_NODE={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0x24040000) r3 = getpid() r4 = syz_pidfd_open(r3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x104000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x1c0) mount$9p_unix(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x121f408, 0x0) setns(r4, 0x24020000) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r5, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, 0x0, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x2) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r6, 0x0, 0x27, &(0x7f0000000180)={@multicast1, @loopback}, 0xc) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x20000000) close_range(r0, 0xffffffffffffffff, 0x0) 43.516445958s ago: executing program 35 (id=5834): openat$kvm(0xffffffffffffff9c, &(0x7f0000000740), 0x20001, 0x0) (async) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000740), 0x20001, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x40002, 0x0) (async) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x40002, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) (async) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCFLSH(r1, 0x400455c8, 0x4) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, 0x0, 0x0) r3 = syz_usb_connect(0x0, 0xffffffffffffff54, 0x0, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CAP_EXIT_HYPERCALL(r5, 0x4068aea3, &(0x7f0000000040)={0x79, 0x0, 0xc}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) (async) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000180)="0f01c20f01ca360fc79ed200660f7ec9bad10466edba2100b80080efbad104b80030ef260f541cf466b9800000c00f326635004000000f30", 0x38}], 0x1, 0x1d, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r6, 0x4400ae8f, &(0x7f0000000700)={"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"}) pipe(0x0) ioctl$KVM_X86_SETUP_MCE(r6, 0x4008ae9c, &(0x7f0000000040)={0x1e, 0x4, 0x27}) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x2d) (async) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x2d) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x42, 0x8) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000240), &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000b00)=ANY=[@ANYRES8=r1, @ANYRESDEC=0x0, @ANYRES32=r0, @ANYRES16=0x0, @ANYRESDEC=r1, @ANYBLOB="a77fe61b7c5fcd81c78715d1a95b6f628920086aa269f57dd5038d0d7a8a9822f420c52ba4c2394fba431d150afca241568723fc8c6a457d541e2daf8e7edf11ae700e0688304d92f52a762bdde6612cb53173bee852c6e2608ef3a47ac79c5c70a490258ade21b7900e0362ad5d7a038de29f37eb7a172422171cdd3a093911a73d82d88be8b5c059bfac5466216a765cb2d01539da090420958f4c5825b206e2bd37847d784db6a77e7875037dd8000d7ee6f345fa9337ed644f901d4dca4b9846d90a5439de14fe727410802a89586ff0a4220af95a7c0b8eceb41780a2742dd281d007f5b214f3cef2a7f98e2afbef4a96776f64adf030", @ANYRES32=r3, @ANYRES64=0x0, @ANYRESDEC]) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000200)=0xc) (async) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setgroups(0x1, &(0x7f00000001c0)=[r9]) (async) setgroups(0x1, &(0x7f00000001c0)=[r9]) syz_open_procfs(r8, &(0x7f0000000100)='net/unix\x00') (async) syz_open_procfs(r8, &(0x7f0000000100)='net/unix\x00') r10 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r10, &(0x7f00000000c0)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x8) bind$bt_sco(r10, &(0x7f0000000e40)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0x8) read$FUSE(r7, &(0x7f0000007100)={0x2020}, 0x2020) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000000), r11) 34.226049494s ago: executing program 36 (id=5836): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1381, 0x3}) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, 0x0, &(0x7f0000000200)=""/87, 0x0, 0xeeef0000}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002180), 0xa0002, 0x0) syz_io_uring_setup(0x6042, 0xfffffffffffffffe, 0x0, 0x0) r3 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)=0xa) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)=ANY=[@ANYBLOB="200000005e00010000000000000000000c000000010000001600008004000180"], 0x20}], 0x1}, 0x0) readv(r3, &(0x7f0000000540)=[{&(0x7f0000000300)=""/95, 0x5f}], 0x1) r5 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r5, 0x29, 0x38, 0x0, &(0x7f0000000040)) r6 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = dup(r8) rt_sigaction(0x32, 0x0, &(0x7f0000000380)={&(0x7f0000000180)="f20f8e341b341bf82b7100262a440faeda400f73d0a48f491891c6c4617167302e3e660fe6a30e000000c402c8f3d0426e420f01da", 0x0, 0x0}, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000000840)={0x1fe, 0x2, 0x2000, 0x1000, &(0x7f0000003000/0x1000)=nil}) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r9, r7, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x42, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r10, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x11, 0x0, 0x0) ioctl$KVM_RUN(r10, 0xae80, 0x0) ioctl$KVM_HYPERV_EVENTFD(r6, 0x4020aeb2, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0xfffffffd}) socket$key(0xf, 0x3, 0x2) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4c, 0x0, &(0x7f0000000500)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x70, 0x18, &(0x7f0000002c40)={@ptr={0x70742a85, 0x0, &(0x7f0000000280)=""/227, 0xe3, 0x2, 0x6}, @fda={0x66646185, 0x2, 0x0, 0x10}, @ptr={0x70742a85, 0x0, 0x0, 0x0, 0x1002, 0x37}}, &(0x7f00000001c0)={0x0, 0x28, 0x48}}, 0x1000}], 0x0, 0x0, 0x0}) 23.032779662s ago: executing program 37 (id=5837): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000001480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001440)={&(0x7f0000002780)={0x1c, r2, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x4}, @TIPC_NLA_NODE={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0x24040000) r3 = getpid() r4 = syz_pidfd_open(r3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x104000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x1c0) mount$9p_unix(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x121f408, 0x0) setns(r4, 0x24020000) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r5, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, 0x0, 0x0) umount2(&(0x7f0000000040)='.\x00', 0x2) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r6, 0x0, 0x27, &(0x7f0000000180)={@multicast1, @loopback}, 0xc) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x20000000) close_range(r0, 0xffffffffffffffff, 0x0) 0s ago: executing program 38 (id=5835): r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001b40)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000780)=""/227, 0xe3}, {&(0x7f0000001a40)=""/217, 0xd9}, {&(0x7f0000002d00)=""/4099, 0x1000}, {&(0x7f0000001d80)=""/161, 0xa1}, {&(0x7f0000000680)=""/134, 0x86}, {&(0x7f0000002c40)=""/146, 0x92}, {&(0x7f0000000280)=""/133, 0x85}, {&(0x7f0000000000)=""/249, 0xf9}, {&(0x7f0000000140)=""/88, 0x58}], 0x9}, 0xc}, {{0x0, 0x0, 0x0}, 0xa}, {{0x0, 0x0, 0x0}, 0x2}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0xfffffffe}, {{0x0, 0x0, 0x0}, 0x8}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xe3}}], 0x2d, 0x40000100, 0x0) kernel console output (not intermixed with test programs): attributes in process `syz.6.4417'. [ 333.511301][ T1130] usb 6-1: new high-speed USB device number 19 using dummy_hcd [ 333.671659][ T1130] usb 6-1: Using ep0 maxpacket: 8 [ 333.681627][ T1130] usb 6-1: unable to get BOS descriptor or descriptor too short [ 333.701820][ T1130] usb 6-1: config 0 has an invalid interface number: 88 but max is 0 [ 333.715272][ T1130] usb 6-1: config 0 has no interface number 0 [ 333.721404][ T1130] usb 6-1: config 0 interface 88 altsetting 8 endpoint 0x86 has an invalid bInterval 0, changing to 7 [ 333.733758][ T1130] usb 6-1: config 0 interface 88 altsetting 8 endpoint 0x86 has invalid wMaxPacketSize 0 [ 333.744456][ T1130] usb 6-1: config 0 interface 88 has no altsetting 0 [ 333.756486][ T1130] usb 6-1: string descriptor 0 read error: -22 [ 333.765384][ T1130] usb 6-1: New USB device found, idVendor=0460, idProduct=0004, bcdDevice=96.31 [ 333.775594][ T1130] usb 6-1: New USB device strings: Mfr=1, Product=84, SerialNumber=3 [ 333.790385][ T1130] usb 6-1: config 0 descriptor?? [ 333.799205][ T1130] input: USB Acecad Flair Tablet 0460:0004 as /devices/platform/dummy_hcd.5/usb6/6-1/6-1:0.88/input/input25 [ 333.924423][T12593] devpts: called with bogus options [ 333.939080][ T9] usb 5-1: new high-speed USB device number 36 using dummy_hcd [ 333.959001][T11223] udevd[11223]: Error opening device "/dev/input/event3": Input/output error [ 333.968326][T11223] udevd[11223]: Unable to EVIOCGABS device "/dev/input/event3" [ 333.976397][T11223] udevd[11223]: Unable to EVIOCGABS device "/dev/input/event3" [ 334.012729][ T4032] usb 6-1: USB disconnect, device number 19 [ 334.128719][ T9] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 334.144362][ T9] usb 5-1: New USB device found, idVendor=046d, idProduct=08c1, bcdDevice=ee.8d [ 334.154486][ T9] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 334.166953][ T9] usb 5-1: config 0 descriptor?? [ 334.181300][ T9156] Bluetooth: hci0: Frame reassembly failed (-84) [ 334.380100][T12606] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4429'. [ 334.394230][ T4032] usb 5-1: USB disconnect, device number 36 [ 335.380818][T12653] netlink: 'syz.1.4447': attribute type 4 has an invalid length. [ 335.686575][T12675] netlink: 'syz.1.4456': attribute type 4 has an invalid length. [ 336.078106][T12690] rust_binder: Error while translating object. [ 336.078147][T12690] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: EINVAL } [ 336.086930][T12690] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:82 [ 336.224936][T12698] netlink: 'syz.4.4465': attribute type 4 has an invalid length. [ 336.324409][ T53] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 336.324414][ T514] Bluetooth: hci0: command 0x1003 tx timeout [ 336.668751][T12717] rust_binder: Error while translating object. [ 336.668787][T12717] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: EINVAL } [ 336.675729][T12717] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:216 [ 336.781553][T12724] netlink: 'syz.1.4475': attribute type 4 has an invalid length. [ 337.041086][ T374] usb 6-1: new full-speed USB device number 20 using dummy_hcd [ 337.203527][ T374] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1023, setting to 64 [ 337.214482][ T374] usb 6-1: New USB device found, idVendor=04f3, idProduct=0755, bcdDevice= 0.00 [ 337.223557][ T374] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 337.232802][ T374] usb 6-1: config 0 descriptor?? [ 337.239328][T12727] raw-gadget.0 gadget.5: fail, usb_ep_enable returned -22 [ 337.689535][ T374] hid-generic 0003:04F3:0755.0022: hidraw0: USB HID v1.01 Device [HID 04f3:0755] on usb-dummy_hcd.5-1/input0 [ 337.890031][T12771] validate_nla: 1 callbacks suppressed [ 337.890052][T12771] netlink: 'syz.4.4491': attribute type 27 has an invalid length. [ 337.979952][T12780] netlink: 'syz.1.4494': attribute type 4 has an invalid length. [ 338.064973][T12785] EXT4-fs: dax option not supported [ 338.333028][ T36] kauditd_printk_skb: 640 callbacks suppressed [ 338.333046][ T36] audit: type=1400 audit(2000004599.664:6018): avc: denied { create } for pid=12800 comm="syz.1.4503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 338.349279][T12802] overlayfs: failed to clone lowerpath [ 338.382084][ T36] audit: type=1400 audit(2000004599.664:6019): avc: denied { create } for pid=12800 comm="syz.1.4503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 338.423590][ T36] audit: type=1400 audit(2000004599.664:6020): avc: denied { create } for pid=12800 comm="syz.1.4503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 338.463538][ T36] audit: type=1400 audit(2000004599.673:6021): avc: denied { mounton } for pid=12800 comm="syz.1.4503" path="/580/file0" dev="tmpfs" ino=3096 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 338.500778][ T36] audit: type=1400 audit(2000004599.673:6022): avc: denied { mount } for pid=12800 comm="syz.1.4503" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 338.538434][ T36] audit: type=1400 audit(2000004599.673:6023): avc: denied { mounton } for pid=12800 comm="syz.1.4503" path="/" dev="tmpfs" ino=3096 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 338.576014][ T36] audit: type=1400 audit(2000004599.711:6024): avc: denied { create } for pid=12799 comm="syz.6.4502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 338.609867][ T36] audit: type=1400 audit(2000004599.711:6025): avc: denied { write } for pid=12799 comm="syz.6.4502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 338.644683][ T36] audit: type=1400 audit(2000004599.711:6026): avc: denied { read } for pid=12799 comm="syz.6.4502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 338.680690][ T36] audit: type=1400 audit(2000004599.711:6027): avc: denied { read } for pid=12799 comm="syz.6.4502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 339.589013][ T1130] usb 6-1: USB disconnect, device number 20 [ 340.593336][T12902] /dev/loop0: Can't lookup blockdev [ 340.599603][T12903] /dev/loop0: Can't lookup blockdev [ 340.992482][T12944] overlayfs: option "uuid=on" requires an upper fs, falling back to uuid=null. [ 341.006243][T12944] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 341.365245][T12984] netlink: 'syz.5.4566': attribute type 4 has an invalid length. [ 341.674504][T13009] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=13009 comm=syz.5.4575 [ 341.704303][ T9156] bridge_slave_1: left allmulticast mode [ 341.732444][ T9156] bridge_slave_1: left promiscuous mode [ 341.739900][ T9156] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.758615][ T9156] bridge_slave_0: left allmulticast mode [ 341.768853][ T9156] bridge_slave_0: left promiscuous mode [ 341.779479][ T9156] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.828417][ T9156] bridge0 (unregistering): left allmulticast mode [ 341.917324][T13021] netlink: 'syz.5.4579': attribute type 4 has an invalid length. [ 341.943331][ T9156] tipc: Disabling bearer [ 341.951004][ T9156] tipc: Left network mode [ 341.984464][ T9156] veth1_macvtap: left promiscuous mode [ 341.990005][ T9156] veth0_vlan: left promiscuous mode [ 342.112709][T13012] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.119777][T13012] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.136753][T13012] bridge_slave_0: entered allmulticast mode [ 342.143133][T13012] bridge_slave_0: entered promiscuous mode [ 342.158911][T13012] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.176054][T13012] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.183257][T13012] bridge_slave_1: entered allmulticast mode [ 342.191469][T13012] bridge_slave_1: entered promiscuous mode [ 342.370499][T13012] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.378237][T13012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.385548][T13012] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.392864][T13012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.490782][ T9156] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.498985][ T9156] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.530558][ T9143] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.537724][ T9143] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.546266][ T9143] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.553336][ T9143] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.645102][T13012] veth0_vlan: entered promiscuous mode [ 342.686898][T13012] veth1_macvtap: entered promiscuous mode [ 342.833966][T13077] rust_binder: Failed to allocate buffer. len:4232, is_oneway:true [ 342.833997][T13077] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: ENOSPC } [ 342.842846][T13077] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOSPC } my_pid:9 [ 342.937886][T13079] bridge0: entered allmulticast mode [ 342.953281][T13079] bridge0: left allmulticast mode [ 343.028853][T13081] netlink: 'syz.4.4594': attribute type 4 has an invalid length. [ 343.068855][T13084] IPv6: NLM_F_CREATE should be specified when creating new route [ 343.223763][ T9] usb 2-1: new high-speed USB device number 63 using dummy_hcd [ 343.354562][T13108] netlink: 'syz.4.4603': attribute type 4 has an invalid length. [ 343.395554][ T9] usb 2-1: Using ep0 maxpacket: 16 [ 343.407417][ T9] usb 2-1: config 1 interface 0 has no altsetting 0 [ 343.430288][ T9] usb 2-1: New USB device found, idVendor=04d8, idProduct=00df, bcdDevice= 0.40 [ 343.449270][ T9] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 343.457314][ T9] usb 2-1: Product: syz [ 343.461525][ T9] usb 2-1: Manufacturer: syz [ 343.469733][ T9] usb 2-1: SerialNumber: syz [ 343.713080][ T9] usbhid 2-1:1.0: can't add hid device: -71 [ 343.723759][ T9] usbhid 2-1:1.0: probe with driver usbhid failed with error -71 [ 343.732432][ T36] kauditd_printk_skb: 643 callbacks suppressed [ 343.732449][ T36] audit: type=1400 audit(2000004604.712:6671): avc: denied { sys_module } for pid=13125 comm="syz.6.4609" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 343.737153][ T9] usb 2-1: USB disconnect, device number 63 [ 343.832002][ T36] audit: type=1400 audit(2000004604.806:6672): avc: denied { create } for pid=13127 comm="syz.6.4610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 343.886898][ T36] audit: type=1400 audit(2000004604.834:6673): avc: denied { create } for pid=13127 comm="syz.6.4610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 343.928541][ T36] audit: type=1400 audit(2000004604.834:6674): avc: denied { write } for pid=13127 comm="syz.6.4610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 343.950168][ T36] audit: type=1400 audit(2000004604.834:6675): avc: denied { read } for pid=13127 comm="syz.6.4610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 343.972730][ T36] audit: type=1400 audit(2000004604.834:6676): avc: denied { read } for pid=13127 comm="syz.6.4610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 343.993359][ T36] audit: type=1400 audit(2000004604.834:6677): avc: denied { write } for pid=13127 comm="syz.6.4610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 344.013856][ T36] audit: type=1400 audit(2000004604.834:6678): avc: denied { create } for pid=13127 comm="syz.6.4610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 344.034716][ T36] audit: type=1400 audit(2000004604.843:6679): avc: denied { create } for pid=13127 comm="syz.6.4610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 344.054334][ T36] audit: type=1400 audit(2000004604.843:6680): avc: denied { write } for pid=13127 comm="syz.6.4610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 344.180111][T13141] netlink: 'syz.4.4613': attribute type 4 has an invalid length. [ 344.521504][T13165] fuse: Unknown parameter 'ÿ00000000000000000004' [ 345.059909][T13189] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4632'. [ 345.693250][T13216] netlink: 'syz.6.4643': attribute type 4 has an invalid length. [ 345.709667][T13216] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23273 sclass=netlink_route_socket pid=13216 comm=syz.6.4643 [ 345.761658][T13222] netlink: 'syz.1.4645': attribute type 4 has an invalid length. [ 345.941270][T13232] overlayfs: failed to clone upperpath [ 345.985477][T13194] netlink: 'syz.4.4634': attribute type 32 has an invalid length. [ 346.368881][T13248] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4655'. [ 346.401991][T13248] overlayfs: failed to clone upperpath [ 346.543227][T13252] netlink: 596 bytes leftover after parsing attributes in process `syz.6.4658'. [ 346.563932][T13194] overlayfs: failed to clone upperpath [ 347.293533][T13287] fuse: Bad value for 'fd' [ 347.296588][T13288] netlink: 'syz.6.4674': attribute type 12 has an invalid length. [ 347.444874][T13298] fuse: Bad value for 'fd' [ 347.450138][T13298] fuse: Bad value for 'fd' [ 347.455459][T13298] fuse: Bad value for 'fd' [ 347.462200][T13298] fuse: Bad value for 'fd' [ 347.467426][T13298] fuse: Bad value for 'fd' [ 347.472362][T13298] fuse: Bad value for 'fd' [ 347.477264][T13298] fuse: Bad value for 'fd' [ 347.482507][T13298] fuse: Bad value for 'fd' [ 347.487503][T13298] fuse: Bad value for 'fd' [ 347.492700][T13298] fuse: Bad value for 'fd' [ 347.497606][T13298] fuse: Bad value for 'fd' [ 347.504147][T13298] fuse: Bad value for 'fd' [ 347.505775][T13297] fuse: Bad value for 'fd' [ 347.950727][T13321] overlayfs: failed to clone upperpath [ 348.033931][T13334] /dev/loop0: Can't lookup blockdev [ 348.071552][T13342] 9pnet_fd: Insufficient options for proto=fd [ 348.320500][T13373] netlink: 'syz.1.4704': attribute type 28 has an invalid length. [ 348.320500][T13374] netlink: 'syz.1.4704': attribute type 28 has an invalid length. [ 348.444842][T13384] fuseblk: Bad value for 'fd' [ 348.683325][T13395] netlink: 'syz.4.4713': attribute type 4 has an invalid length. [ 348.754095][T13401] netlink: 'syz.4.4716': attribute type 4 has an invalid length. [ 348.994706][T13406] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4718'. [ 349.093588][ T36] kauditd_printk_skb: 320 callbacks suppressed [ 349.093605][ T36] audit: type=1400 audit(2000004609.723:7001): avc: denied { nlmsg_write } for pid=13409 comm="syz.1.4720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 349.136612][ T36] audit: type=1400 audit(2000004609.761:7002): avc: denied { create } for pid=13411 comm="syz.1.4721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 349.156379][ T36] audit: type=1400 audit(2000004609.761:7003): avc: denied { setopt } for pid=13411 comm="syz.1.4721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 349.176150][ T36] audit: type=1400 audit(2000004609.770:7004): avc: denied { setopt } for pid=13411 comm="syz.1.4721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 349.196465][ T36] audit: type=1400 audit(2000004609.770:7005): avc: denied { create } for pid=13411 comm="syz.1.4721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 349.216784][ T36] audit: type=1400 audit(2000004609.789:7006): avc: denied { setopt } for pid=13411 comm="syz.1.4721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 349.236935][ T36] audit: type=1400 audit(2000004609.789:7007): avc: denied { ioctl } for pid=13411 comm="syz.1.4721" path="socket:[86686]" dev="sockfs" ino=86686 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 349.262523][ T36] audit: type=1400 audit(2000004609.789:7008): avc: denied { setopt } for pid=13411 comm="syz.1.4721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 349.282691][ T36] audit: type=1400 audit(2000004609.789:7009): avc: denied { bind } for pid=13411 comm="syz.1.4721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 349.302680][ T36] audit: type=1400 audit(2000004609.789:7010): avc: denied { write } for pid=13411 comm="syz.1.4721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 349.320167][T13420] netlink: 'syz.1.4725': attribute type 4 has an invalid length. [ 349.591163][T13447] netlink: 'syz.4.4734': attribute type 4 has an invalid length. [ 349.618623][T13451] netlink: 'syz.5.4735': attribute type 15 has an invalid length. [ 349.626579][T13451] netlink: 24 bytes leftover after parsing attributes in process `syz.5.4735'. [ 349.824828][T13457] overlayfs: failed to clone upperpath [ 350.380463][T13477] netlink: 'syz.1.4744': attribute type 4 has an invalid length. [ 350.720945][T13507] netlink: 'syz.5.4753': attribute type 4 has an invalid length. [ 351.147999][T13541] netlink: 'syz.5.4763': attribute type 4 has an invalid length. [ 351.506629][T13572] netlink: 'syz.1.4775': attribute type 4 has an invalid length. [ 351.530700][T13572] netlink: 3657 bytes leftover after parsing attributes in process `syz.1.4775'. [ 351.545702][T13571] netlink: 'syz.1.4775': attribute type 4 has an invalid length. [ 351.553466][T13571] netlink: 3657 bytes leftover after parsing attributes in process `syz.1.4775'. [ 351.578963][T13572] veth0: entered promiscuous mode [ 351.588272][T13571] veth0: left promiscuous mode [ 351.617548][T13578] fuseblk: Bad value for 'group_id' [ 351.630028][T13578] fuseblk: Bad value for 'group_id' [ 351.639372][T13580] fuseblk: Bad value for 'group_id' [ 351.645669][T13580] fuseblk: Bad value for 'group_id' [ 351.651890][T13581] netlink: 'syz.4.4776': attribute type 4 has an invalid length. [ 351.687132][T13583] overlayfs: failed to clone upperpath [ 351.880439][T13601] netlink: 64086 bytes leftover after parsing attributes in process `syz.5.4787'. [ 351.913352][T13603] 9pnet_fd: Insufficient options for proto=fd [ 352.021634][T13608] 9pnet_fd: Insufficient options for proto=fd [ 352.192343][T13626] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4797'. [ 352.208836][T13626] netlink: 31 bytes leftover after parsing attributes in process `syz.5.4797'. [ 352.217812][T13626] netlink: 31 bytes leftover after parsing attributes in process `syz.5.4797'. [ 353.099528][T13648] overlayfs: failed to clone upperpath [ 354.018722][T13704] netlink: 32 bytes leftover after parsing attributes in process `syz.5.4824'. [ 354.648209][ T36] kauditd_printk_skb: 607 callbacks suppressed [ 354.648227][ T36] audit: type=1400 audit(2000004614.921:7618): avc: denied { create } for pid=13716 comm="syz.5.4830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 354.671933][T13717] validate_nla: 7 callbacks suppressed [ 354.671950][T13717] netlink: 'syz.5.4830': attribute type 4 has an invalid length. [ 354.701010][ T36] audit: type=1400 audit(2000004614.921:7619): avc: denied { create } for pid=13716 comm="syz.5.4830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 354.722670][ T36] audit: type=1400 audit(2000004614.921:7620): avc: denied { write } for pid=13716 comm="syz.5.4830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 354.745029][ T36] audit: type=1400 audit(2000004614.921:7621): avc: denied { read } for pid=13716 comm="syz.5.4830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 354.766194][ T36] audit: type=1400 audit(2000004614.921:7622): avc: denied { read } for pid=13716 comm="syz.5.4830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 354.788214][ T36] audit: type=1400 audit(2000004614.921:7623): avc: denied { write } for pid=13716 comm="syz.5.4830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 354.809741][ T36] audit: type=1400 audit(2000004614.921:7624): avc: denied { mounton } for pid=13716 comm="syz.5.4830" path="/151/file0" dev="tmpfs" ino=842 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 354.854045][ T36] audit: type=1400 audit(2000004614.921:7625): avc: denied { mount } for pid=13716 comm="syz.5.4830" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 354.904360][ T36] audit: type=1400 audit(2000004614.921:7626): avc: denied { mounton } for pid=13716 comm="syz.5.4830" path="/151/file0" dev="tmpfs" ino=842 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 354.957841][ T36] audit: type=1400 audit(2000004614.921:7627): avc: denied { create } for pid=13716 comm="syz.5.4830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 355.137148][T13747] netlink: 'syz.6.4839': attribute type 4 has an invalid length. [ 355.647562][T13782] cgroup2: Unknown parameter 'nsdelegatd' [ 355.704354][T13785] netlink: 'syz.5.4850': attribute type 4 has an invalid length. [ 356.596012][T13818] netlink: 'syz.5.4862': attribute type 4 has an invalid length. [ 356.908215][T13844] netlink: 'syz.5.4872': attribute type 4 has an invalid length. [ 357.291120][T13877] netlink: 'syz.6.4884': attribute type 4 has an invalid length. [ 357.389247][T13897] netlink: 'syz.6.4890': attribute type 2 has an invalid length. [ 357.485510][T13901] sock: sock_timestamping_bind_phc: sock not bind to device [ 357.703245][T13913] netlink: 'syz.4.4899': attribute type 4 has an invalid length. [ 357.846228][T13921] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4901'. [ 357.965296][T13930] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4904'. [ 357.974995][T13929] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4904'. [ 358.044305][T13935] netlink: 164 bytes leftover after parsing attributes in process `syz.1.4906'. [ 358.124900][T13941] overlayfs: failed to clone upperpath [ 358.315092][T13953] netlink: 'syz.6.4911': attribute type 46 has an invalid length. [ 358.323237][T13953] netlink: 44 bytes leftover after parsing attributes in process `syz.6.4911'. [ 358.380209][T13960] netlink: 'syz.6.4913': attribute type 4 has an invalid length. [ 358.751236][T13992] tipc: Started in network mode [ 358.765874][T13992] tipc: Node identity 2d000000400000000000000000000001, cluster identity 4711 [ 358.780533][T13992] tipc: Enabling of bearer rejected, failed to enable media [ 358.822048][T13994] fuse: Bad value for 'fd' [ 358.940980][T14006] incfs: Options parsing error. -22 [ 358.966478][T14006] incfs: mount failed -22 [ 359.674751][T14038] bridge0: entered allmulticast mode [ 359.779846][T14043] fuse: Bad value for 'fd' [ 360.024717][ T36] kauditd_printk_skb: 463 callbacks suppressed [ 360.024736][ T36] audit: type=1400 audit(2000004619.941:8091): avc: denied { execmem } for pid=14051 comm="syz.5.4945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 360.127185][ T36] audit: type=1400 audit(2000004620.044:8092): avc: denied { create } for pid=14056 comm="syz.1.4947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 360.190267][ T36] audit: type=1400 audit(2000004620.100:8093): avc: denied { create } for pid=14061 comm="syz.6.4948" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 360.225300][ T36] audit: type=1400 audit(2000004620.128:8094): avc: denied { create } for pid=14061 comm="syz.6.4948" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 360.260182][ T36] audit: type=1400 audit(2000004620.166:8095): avc: denied { mounton } for pid=14068 comm="syz.4.4949" path="/169/file0" dev="tmpfs" ino=932 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 360.262418][T14073] 9pnet_fd: Insufficient options for proto=fd [ 360.284664][T14070] /dev/loop0: Can't lookup blockdev [ 360.296045][ T36] audit: type=1400 audit(2000004620.166:8096): avc: denied { mounton } for pid=14069 comm="syz.6.4951" path="/334/file0" dev="tmpfs" ino=1843 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 360.318983][ T36] audit: type=1400 audit(2000004620.194:8097): avc: denied { mounton } for pid=14068 comm="syz.4.4949" path="/169/file0" dev="tmpfs" ino=932 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 360.346482][ T36] audit: type=1400 audit(2000004620.203:8098): avc: denied { create } for pid=14069 comm="syz.6.4951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 360.366551][ T36] audit: type=1400 audit(2000004620.203:8099): avc: denied { connect } for pid=14069 comm="syz.6.4951" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 360.387565][ T36] audit: type=1400 audit(2000004620.213:8100): avc: denied { create } for pid=14069 comm="syz.6.4951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 360.417469][T14084] validate_nla: 5 callbacks suppressed [ 360.417486][T14084] netlink: 'syz.4.4954': attribute type 4 has an invalid length. [ 360.451671][T14087] fuse: Bad value for 'group_id' [ 360.456694][T14087] fuse: Bad value for 'group_id' [ 360.544803][T14096] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 360.582901][T14098] EXT4-fs: Value of option "test_dummy_encryption" is unrecognized [ 360.636920][T14106] netlink: 'syz.5.4962': attribute type 4 has an invalid length. [ 360.645725][T14107] netlink: 'syz.4.4963': attribute type 4 has an invalid length. [ 360.851190][T14131] netlink: 'syz.4.4972': attribute type 4 has an invalid length. [ 360.879759][T14136] overlayfs: failed to clone upperpath [ 360.887532][T14136] overlayfs: failed to clone upperpath [ 360.894185][T14136] overlayfs: failed to clone upperpath [ 360.901311][T14136] overlayfs: failed to clone upperpath [ 360.909135][T14136] overlayfs: failed to clone upperpath [ 360.916823][T14136] overlayfs: failed to clone upperpath [ 360.924603][T14136] overlayfs: failed to clone upperpath [ 360.933171][T14136] overlayfs: failed to clone upperpath [ 361.127820][T14156] netlink: 'syz.4.4983': attribute type 4 has an invalid length. [ 361.287460][T14175] overlayfs: failed to clone upperpath [ 361.320326][T14179] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2066 sclass=netlink_route_socket pid=14179 comm=syz.4.4992 [ 361.336297][T14179] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2561 sclass=netlink_route_socket pid=14179 comm=syz.4.4992 [ 361.346483][T14182] netlink: 'syz.6.4993': attribute type 4 has an invalid length. [ 361.505815][T14203] netlink: 'syz.6.5002': attribute type 32 has an invalid length. [ 361.885409][T14218] netlink: 'syz.1.5008': attribute type 4 has an invalid length. [ 362.321071][T14225] 9pnet_fd: Insufficient options for proto=fd [ 362.419203][T14234] netlink: 20 bytes leftover after parsing attributes in process `syz.4.5014'. [ 362.578958][T14241] netlink: 'syz.5.5017': attribute type 4 has an invalid length. [ 362.830915][T14272] /dev/loop0: Can't lookup blockdev [ 362.973244][T14277] netlink: 'syz.5.5029': attribute type 4 has an invalid length. [ 363.019681][T14280] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5030'. [ 363.028765][T14280] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5030'. [ 365.035935][T14368] fuseblk: Bad value for 'fd' [ 365.103047][T14376] fuse: Bad value for 'fd' [ 365.385598][ T36] kauditd_printk_skb: 541 callbacks suppressed [ 365.385616][ T36] audit: type=1400 audit(2000004624.952:8642): avc: denied { mounton } for pid=14384 comm="syz.6.5059" path="/349/file0" dev="tmpfs" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 365.429862][ T36] audit: type=1400 audit(2000004624.990:8643): avc: denied { create } for pid=14386 comm="syz.5.5060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 365.472600][ T36] audit: type=1400 audit(2000004624.990:8644): avc: denied { write } for pid=14386 comm="syz.5.5060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 365.515341][ T36] audit: type=1400 audit(2000004624.990:8645): avc: denied { read } for pid=14386 comm="syz.5.5060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 365.545624][ T36] audit: type=1400 audit(2000004624.990:8646): avc: denied { read } for pid=14386 comm="syz.5.5060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 365.575365][ T36] audit: type=1400 audit(2000004625.037:8647): avc: denied { create } for pid=14386 comm="syz.5.5060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 365.596708][ T36] audit: type=1400 audit(2000004625.037:8648): avc: denied { write } for pid=14386 comm="syz.5.5060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 365.617824][ T36] audit: type=1400 audit(2000004625.037:8649): avc: denied { read } for pid=14386 comm="syz.5.5060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 365.642739][ T36] audit: type=1400 audit(2000004625.037:8650): avc: denied { create } for pid=14386 comm="syz.5.5060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 365.668690][ T36] audit: type=1400 audit(2000004625.037:8651): avc: denied { write } for pid=14386 comm="syz.5.5060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 365.724351][T14399] tipc: MTU too low for tipc bearer [ 366.060643][T14404] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5065'. [ 366.072566][T14405] validate_nla: 7 callbacks suppressed [ 366.072586][T14405] netlink: 'syz.1.5067': attribute type 4 has an invalid length. [ 366.229602][T14421] tipc: Started in network mode [ 366.234710][T14421] tipc: Node identity ac14140f, cluster identity 4711 [ 366.241622][T14421] tipc: New replicast peer: 255.255.255.255 [ 366.247783][T14421] tipc: Enabled bearer , priority 10 [ 366.263174][T14421] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5073'. [ 366.272187][T14421] tipc: Disabling bearer [ 366.375866][T14429] tipc: Enabling of bearer rejected, failed to enable media [ 366.568709][T14437] netlink: 'syz.1.5078': attribute type 4 has an invalid length. [ 366.987734][T14462] netlink: 'syz.6.5089': attribute type 4 has an invalid length. [ 367.384922][T14484] netlink: 'syz.1.5099': attribute type 4 has an invalid length. [ 367.468892][T14489] netlink: 124 bytes leftover after parsing attributes in process `syz.1.5101'. [ 367.561715][ T9156] bridge_slave_1: left allmulticast mode [ 367.569094][ T9156] bridge_slave_1: left promiscuous mode [ 367.579889][ T9156] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.599229][ T9156] bridge_slave_0: left allmulticast mode [ 367.605003][ T9156] bridge_slave_0: left promiscuous mode [ 367.622292][ T9156] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.756349][ T9156] veth1_macvtap: left promiscuous mode [ 367.767684][ T9156] veth0_vlan: left promiscuous mode [ 367.883484][T14516] netlink: 'syz.1.5108': attribute type 4 has an invalid length. [ 368.272662][T14532] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 368.432767][T14543] overlayfs: failed to clone upperpath [ 368.530816][T14547] netlink: 'syz.1.5120': attribute type 4 has an invalid length. [ 368.587611][T14553] netlink: 44 bytes leftover after parsing attributes in process `syz.1.5123'. [ 368.596981][T14554] netlink: 44 bytes leftover after parsing attributes in process `syz.1.5123'. [ 369.053334][T14572] netlink: 'syz.5.5131': attribute type 4 has an invalid length. [ 369.058933][T14578] overlayfs: option "workdir=./bus" is useless in a non-upper mount, ignore [ 369.085467][T14578] overlayfs: missing 'lowerdir' [ 369.598154][T14585] overlayfs: failed to clone upperpath [ 369.988230][T14616] netlink: 'syz.4.5147': attribute type 4 has an invalid length. [ 370.794377][ T36] kauditd_printk_skb: 719 callbacks suppressed [ 370.794395][ T36] audit: type=1400 audit(2000004630.010:9371): avc: denied { create } for pid=14643 comm="syz.5.5158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 370.842231][ T36] audit: type=1400 audit(2000004630.029:9372): avc: denied { create } for pid=14643 comm="syz.5.5158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 370.874144][ T36] audit: type=1400 audit(2000004630.029:9373): avc: denied { write } for pid=14643 comm="syz.5.5158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 370.916245][ T36] audit: type=1400 audit(2000004630.029:9374): avc: denied { mounton } for pid=14643 comm="syz.5.5158" path="/220/file0" dev="tmpfs" ino=1225 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 370.949610][ T36] audit: type=1400 audit(2000004630.029:9375): avc: denied { mount } for pid=14643 comm="syz.5.5158" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 370.959024][T14646] netlink: 'syz.5.5158': attribute type 4 has an invalid length. [ 371.002732][ T36] audit: type=1400 audit(2000004630.029:9376): avc: denied { mounton } for pid=14643 comm="syz.5.5158" path="/220/file0" dev="tmpfs" ino=1225 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 371.046878][ T36] audit: type=1400 audit(2000004630.029:9377): avc: denied { mounton } for pid=14643 comm="syz.5.5158" path="/220/file0/file0" dev="tmpfs" ino=1226 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 371.098943][ T36] audit: type=1400 audit(2000004630.029:9378): avc: denied { create } for pid=14643 comm="syz.5.5158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 371.130965][ T36] audit: type=1400 audit(2000004630.029:9379): avc: denied { sys_admin } for pid=14643 comm="syz.5.5158" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 371.167776][ T36] audit: type=1400 audit(2000004630.150:9380): avc: denied { sys_admin } for pid=14643 comm="syz.5.5158" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 371.603584][T14667] netlink: 'syz.5.5165': attribute type 4 has an invalid length. [ 372.818127][T14721] netlink: 'syz.6.5186': attribute type 4 has an invalid length. [ 373.252627][T14747] tipc: Enabling of bearer rejected, failed to enable media [ 373.290897][T14745] netlink: 'syz.6.5195': attribute type 4 has an invalid length. [ 373.473932][T14765] fuse: Bad value for 'fd' [ 373.797493][T14779] fuse: Unknown parameter 'discard' [ 373.805872][T14779] overlay: ./bus is not a directory [ 373.811643][T14780] overlay: ./bus is not a directory [ 373.984463][T14789] netlink: 'syz.5.5208': attribute type 4 has an invalid length. [ 374.193691][T14794] netlink: 'syz.6.5210': attribute type 4 has an invalid length. [ 374.396314][T14800] netlink: 28 bytes leftover after parsing attributes in process `syz.5.5214'. [ 374.781556][T14810] netlink: 'syz.6.5219': attribute type 4 has an invalid length. [ 374.921600][T14815] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5221'. [ 375.298392][T14822] /dev/loop0: Can't lookup blockdev [ 376.154854][T14833] netlink: 'syz.6.5228': attribute type 4 has an invalid length. [ 376.207837][ T36] kauditd_printk_skb: 319 callbacks suppressed [ 376.207854][ T36] audit: type=1400 audit(2000004635.077:9700): avc: denied { associate } for pid=14832 comm="syz.6.5228" name="core" scontext=root:object_r:etc_runtime_t tcontext=system_u:object_r:root_t tclass=filesystem permissive=1 [ 376.472012][ T36] audit: type=1400 audit(2000004635.320:9701): avc: denied { create } for pid=14837 comm="syz.4.5230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 376.497488][ T36] audit: type=1400 audit(2000004635.348:9702): avc: denied { create } for pid=14837 comm="syz.4.5230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 376.539651][ T36] audit: type=1400 audit(2000004635.348:9703): avc: denied { create } for pid=14837 comm="syz.4.5230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 376.580013][ T36] audit: type=1400 audit(2000004635.348:9704): avc: denied { create } for pid=14837 comm="syz.4.5230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 376.603069][ T36] audit: type=1400 audit(2000004635.348:9705): avc: denied { write } for pid=14837 comm="syz.4.5230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 376.626655][ T36] audit: type=1400 audit(2000004635.348:9706): avc: denied { read } for pid=14837 comm="syz.4.5230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 376.647428][ T36] audit: type=1400 audit(2000004635.358:9707): avc: denied { write } for pid=14837 comm="syz.4.5230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 376.668163][ T36] audit: type=1400 audit(2000004635.358:9708): avc: denied { execmem } for pid=14837 comm="syz.4.5230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 376.692574][ T36] audit: type=1400 audit(2000004635.358:9709): avc: denied { create } for pid=14837 comm="syz.4.5230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 377.341924][T14857] netlink: 'syz.6.5237': attribute type 4 has an invalid length. [ 377.911903][T14879] netlink: 'syz.5.5246': attribute type 4 has an invalid length. [ 378.801605][T14913] netlink: 'syz.1.5258': attribute type 4 has an invalid length. [ 379.329292][T14943] netlink: 'syz.5.5267': attribute type 4 has an invalid length. [ 379.758953][T14971] netlink: 12 bytes leftover after parsing attributes in process `syz.5.5276'. [ 379.970845][T14981] netlink: 'syz.5.5281': attribute type 4 has an invalid length. [ 379.980516][T14986] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5279'. [ 380.000870][T14986] netlink: 'syz.6.5279': attribute type 3 has an invalid length. [ 380.568114][T14994] netlink: 'syz.1.5284': attribute type 6 has an invalid length. [ 380.575946][T14994] netlink: 'syz.1.5284': attribute type 4 has an invalid length. [ 380.583908][T14994] netlink: 'syz.1.5284': attribute type 6 has an invalid length. [ 380.591746][T14994] netlink: 'syz.1.5284': attribute type 13 has an invalid length. [ 380.600632][T14994] netlink: 3684 bytes leftover after parsing attributes in process `syz.1.5284'. [ 381.033739][T15025] overlayfs: failed to clone upperpath [ 381.039466][T15024] overlayfs: failed to clone upperpath [ 381.353075][T15039] x_tables: unsorted underflow at hook 2 [ 381.607435][ T36] kauditd_printk_skb: 314 callbacks suppressed [ 381.607454][ T36] audit: type=1400 audit(2000004640.125:10024): avc: denied { associate } for pid=15043 comm="syz.5.5302" name="core" scontext=root:object_r:etc_runtime_t tcontext=system_u:object_r:root_t tclass=filesystem permissive=1 [ 381.729389][ T36] audit: type=1400 audit(2000004640.238:10025): avc: denied { create } for pid=15048 comm="syz.6.5304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 381.755761][ T36] audit: type=1400 audit(2000004640.238:10026): avc: denied { nlmsg_write } for pid=15050 comm="syz.1.5306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 381.795564][ T36] audit: type=1400 audit(2000004640.266:10027): avc: denied { create } for pid=15048 comm="syz.6.5304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 381.881073][ T36] audit: type=1400 audit(2000004640.378:10028): avc: denied { create } for pid=15059 comm="syz.5.5308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 381.943038][ T36] audit: type=1400 audit(2000004640.434:10029): avc: denied { create } for pid=15064 comm="syz.4.5312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 381.966656][ T36] audit: type=1400 audit(2000004640.434:10030): avc: denied { create } for pid=15063 comm="syz.5.5311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 382.008164][ T36] audit: type=1400 audit(2000004640.434:10031): avc: denied { create } for pid=15063 comm="syz.5.5311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 382.062923][ T36] audit: type=1400 audit(2000004640.434:10032): avc: denied { write } for pid=15063 comm="syz.5.5311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 382.101259][T15072] audit: audit_backlog=65 > audit_backlog_limit=64 [ 382.357311][T15095] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5320'. [ 382.629061][T15111] overlayfs: failed to clone upperpath [ 382.643167][T15111] overlayfs: failed to clone upperpath [ 382.899345][T15126] validate_nla: 7 callbacks suppressed [ 382.899365][T15126] netlink: 'syz.4.5332': attribute type 4 has an invalid length. [ 383.138879][T15150] netlink: 'syz.4.5343': attribute type 4 has an invalid length. [ 383.360095][T15167] netlink: 'syz.4.5349': attribute type 4 has an invalid length. [ 383.438349][T15164] netlink: 'syz.5.5348': attribute type 4 has an invalid length. [ 384.136400][T15209] netlink: 'syz.4.5364': attribute type 4 has an invalid length. [ 384.432236][T15248] veth0_to_team: entered promiscuous mode [ 384.449396][T15248] veth0_to_team: entered allmulticast mode [ 384.706162][T15261] netlink: 'syz.1.5383': attribute type 4 has an invalid length. [ 385.205060][T15292] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=63 sclass=netlink_route_socket pid=15292 comm=syz.6.5392 [ 385.454634][T15301] netlink: 'syz.6.5396': attribute type 4 has an invalid length. [ 385.822817][T15327] overlayfs: failed to clone upperpath [ 386.256821][T15352] netlink: 'syz.6.5414': attribute type 4 has an invalid length. [ 386.470335][T15378] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=25 sclass=netlink_tcpdiag_socket pid=15378 comm=syz.4.5422 [ 387.008994][ T36] kauditd_printk_skb: 457 callbacks suppressed [ 387.009011][ T36] audit: type=1326 audit(2000004645.174:10488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15356 comm="syz.5.5415" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa4478ebe9 code=0x7fc00000 [ 387.040225][ T36] audit: type=1400 audit(2000004645.202:10489): avc: denied { create } for pid=15387 comm="syz.5.5426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 387.061651][ T36] audit: type=1400 audit(2000004645.202:10490): avc: denied { write } for pid=15387 comm="syz.5.5426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 387.083073][ T36] audit: type=1400 audit(2000004645.202:10491): avc: denied { read } for pid=15387 comm="syz.5.5426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 387.104240][ T36] audit: type=1400 audit(2000004645.202:10492): avc: denied { read } for pid=15387 comm="syz.5.5426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 387.124889][ T36] audit: type=1400 audit(2000004645.202:10493): avc: denied { write } for pid=15387 comm="syz.5.5426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 387.145419][ T36] audit: type=1400 audit(2000004645.258:10494): avc: denied { create } for pid=15391 comm="syz.5.5428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 387.165770][ T36] audit: type=1400 audit(2000004645.258:10495): avc: denied { write } for pid=15391 comm="syz.5.5428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 387.186039][ T36] audit: type=1400 audit(2000004645.258:10496): avc: denied { nlmsg_write } for pid=15391 comm="syz.5.5428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 387.206915][ T36] audit: type=1400 audit(2000004645.267:10497): avc: denied { create } for pid=15391 comm="syz.5.5428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 387.637885][T15399] netlink: 'syz.6.5431': attribute type 4 has an invalid length. [ 388.390575][T15432] netlink: 20 bytes leftover after parsing attributes in process `syz.5.5445'. [ 388.599719][T15446] netlink: 'syz.6.5449': attribute type 4 has an invalid length. [ 388.945487][T15479] 9pnet: p9_errstr2errno: server reported unknown error 184467440737 [ 389.047148][T15490] 9pnet: Limiting 'msize' to 1048576 as this is the maximum supported by transport fd [ 389.180802][T15504] netlink: 'syz.6.5461': attribute type 4 has an invalid length. [ 389.264967][T15509] netlink: 76 bytes leftover after parsing attributes in process `syz.5.5467'. [ 389.835752][T15553] fuse: Bad value for 'fd' [ 389.885011][T15555] /dev/loop0: Can't lookup blockdev [ 390.120156][T15568] netlink: 'syz.6.5486': attribute type 4 has an invalid length. [ 390.400222][T15596] IPv6: NLM_F_CREATE should be specified when creating new route [ 390.502875][T15607] bridge0: port 3(veth0_to_bridge) entered blocking state [ 390.521135][T15607] bridge0: port 3(veth0_to_bridge) entered disabled state [ 390.566745][T15607] veth0_to_bridge: entered allmulticast mode [ 390.588520][T15607] veth0_to_bridge: entered promiscuous mode [ 390.594767][T15607] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 390.630873][T15607] bridge0: port 3(veth0_to_bridge) entered blocking state [ 390.638035][T15607] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 390.684870][T15614] netlink: 'syz.4.5496': attribute type 4 has an invalid length. [ 391.363845][T15645] netlink: 'syz.5.5511': attribute type 4 has an invalid length. [ 391.878952][T15694] veth1_macvtap: left promiscuous mode [ 391.884938][T15694] macsec0: entered promiscuous mode [ 391.896386][T15694] veth1_macvtap: entered promiscuous mode [ 391.913093][T15694] macsec0: left promiscuous mode [ 391.930951][T15687] netlink: 'syz.4.5526': attribute type 4 has an invalid length. [ 392.363698][ T36] kauditd_printk_skb: 2253 callbacks suppressed [ 392.363715][ T36] audit: type=1326 audit(2000004650.175:12751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15701 comm="syz.4.5531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0cabb8ebe9 code=0x7fc00000 [ 392.389172][T15713] audit: audit_backlog=65 > audit_backlog_limit=64 [ 392.394832][ T36] audit: type=1326 audit(2000004650.185:12752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15701 comm="syz.4.5531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0cabb8ebe9 code=0x7fc00000 [ 392.400639][T15713] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 392.425263][T15714] audit: audit_backlog=65 > audit_backlog_limit=64 [ 392.446380][T15713] audit: backlog limit exceeded [ 392.446532][T15714] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 392.451840][T15713] audit: audit_backlog=65 > audit_backlog_limit=64 [ 392.478272][ T36] audit: type=1326 audit(2000004650.185:12753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15701 comm="syz.4.5531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0cabb8ebe9 code=0x7fc00000 [ 392.482502][T15713] audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 [ 392.901110][T15733] netlink: 'syz.1.5538': attribute type 4 has an invalid length. [ 392.906724][T15738] overlayfs: option "workdir=./bus" is useless in a non-upper mount, ignore [ 392.940589][T15738] overlayfs: NFS export requires "redirect_dir=nofollow" on non-upper mount, falling back to nfs_export=off. [ 392.960513][T15738] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 393.215416][T15740] overlayfs: option "workdir=./bus" is useless in a non-upper mount, ignore [ 393.240302][T15740] overlayfs: NFS export requires "redirect_dir=nofollow" on non-upper mount, falling back to nfs_export=off. [ 393.268650][T15740] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 393.359589][T15771] veth1: entered allmulticast mode [ 393.376606][T15769] veth1: left allmulticast mode [ 393.797885][T15796] netlink: 'syz.4.5561': attribute type 4 has an invalid length. [ 394.377141][T15842] netlink: 'syz.1.5575': attribute type 4 has an invalid length. [ 395.035763][T15885] fuse: Bad value for 'fd' [ 395.040972][T15885] fuseblk: Bad value for 'user_id' [ 395.046105][T15885] fuseblk: Bad value for 'user_id' [ 395.144043][T15880] netlink: 'syz.4.5592': attribute type 4 has an invalid length. [ 396.140977][T15913] netlink: 'syz.4.5603': attribute type 4 has an invalid length. [ 396.789123][T15947] netlink: 'syz.5.5612': attribute type 4 has an invalid length. [ 396.826261][T15949] netlink: 'syz.1.5614': attribute type 4 has an invalid length. [ 396.847158][T15952] netlink: 25 bytes leftover after parsing attributes in process `syz.1.5614'. [ 397.113894][T15970] fuse: Bad value for 'user_id' [ 397.129785][T15970] fuse: Bad value for 'user_id' [ 397.145964][T15970] overlayfs: failed to clone upperpath [ 397.338294][T15992] netlink: 'syz.1.5627': attribute type 30 has an invalid length. [ 397.457139][T16000] netlink: 'syz.4.5628': attribute type 4 has an invalid length. [ 397.739234][ T36] kauditd_printk_skb: 3867 callbacks suppressed [ 397.739252][ T36] audit: type=1400 audit(2000004655.205:16577): avc: denied { execmem } for pid=16021 comm="syz.1.5636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 397.773978][ T36] audit: type=1400 audit(2000004655.233:16578): avc: denied { execute } for pid=16021 comm="syz.1.5636" path="/dev/rnullb0" dev="tmpfs" ino=542 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 397.798137][ T36] audit: type=1400 audit(2000004655.252:16579): avc: denied { create } for pid=16023 comm="syz.6.5637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 397.824011][ T36] audit: type=1400 audit(2000004655.252:16580): avc: denied { accept } for pid=16023 comm="syz.6.5637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 397.878552][ T36] audit: type=1400 audit(2000004655.252:16581): avc: denied { create } for pid=16023 comm="syz.6.5637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 397.941930][ T36] audit: type=1400 audit(2000004655.252:16582): avc: denied { setopt } for pid=16023 comm="syz.6.5637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 397.996244][ T36] audit: type=1400 audit(2000004655.252:16583): avc: denied { watch watch_reads } for pid=16023 comm="syz.6.5637" path="/510" dev="tmpfs" ino=2807 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 398.054275][ T36] audit: type=1400 audit(2000004655.252:16584): avc: denied { create } for pid=16023 comm="syz.6.5637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 398.086350][ T36] audit: type=1400 audit(2000004655.261:16585): avc: denied { getopt } for pid=16023 comm="syz.6.5637" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 398.135017][ T36] audit: type=1400 audit(2000004655.504:16586): avc: denied { create } for pid=16032 comm="syz.1.5641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 398.510382][T16069] overlayfs: conflicting options: metacopy=off,verity=require [ 398.527365][T16070] netlink: 'syz.5.5648': attribute type 4 has an invalid length. [ 399.273102][T16106] netlink: 'syz.6.5666': attribute type 2 has an invalid length. [ 399.281588][T16108] netlink: 'syz.6.5666': attribute type 2 has an invalid length. [ 399.340172][T16115] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5668'. [ 399.525439][T16125] fuse: Bad value for 'fd' [ 399.741249][T16142] netlink: 24 bytes leftover after parsing attributes in process `syz.1.5677'. [ 399.965611][T16150] validate_nla: 1 callbacks suppressed [ 399.965634][T16150] netlink: 'syz.1.5681': attribute type 4 has an invalid length. [ 400.703036][T16182] netlink: 'syz.6.5691': attribute type 4 has an invalid length. [ 401.192321][T16190] overlayfs: failed to clone upperpath [ 401.320014][T16198] netlink: 4432 bytes leftover after parsing attributes in process `syz.1.5697'. [ 401.387453][T16200] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5698'. [ 401.532857][T16214] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5703'. [ 401.597294][T16208] netlink: 'syz.1.5701': attribute type 4 has an invalid length. [ 401.824206][T16227] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5708'. [ 401.982654][T16233] netlink: 'syz.6.5711': attribute type 4 has an invalid length. [ 402.283608][T16243] netlink: 'syz.6.5716': attribute type 4 has an invalid length. [ 402.594706][T16263] overlayfs: failed to clone upperpath [ 402.611755][T16264] overlayfs: failed to clone upperpath [ 402.674911][T16268] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5724'. [ 403.272432][ T36] kauditd_printk_skb: 424 callbacks suppressed [ 403.272465][ T36] audit: type=1400 audit(2000004660.375:17011): avc: denied { mounton } for pid=16280 comm="syz.1.5730" path="/288/file0" dev="tmpfs" ino=1582 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 403.328333][ T36] audit: type=1400 audit(2000004660.384:17012): avc: denied { create } for pid=16282 comm="syz.6.5731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 403.349727][ T36] audit: type=1400 audit(2000004660.384:17013): avc: denied { create } for pid=16282 comm="syz.6.5731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 403.371709][ T36] audit: type=1400 audit(2000004660.384:17014): avc: denied { write } for pid=16282 comm="syz.6.5731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 403.403703][ T36] audit: type=1400 audit(2000004660.384:17015): avc: denied { read } for pid=16282 comm="syz.6.5731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 403.434628][ T36] audit: type=1400 audit(2000004660.384:17016): avc: denied { read } for pid=16282 comm="syz.6.5731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 403.463681][T16283] netlink: 'syz.6.5731': attribute type 4 has an invalid length. [ 403.476543][ T36] audit: type=1400 audit(2000004660.384:17017): avc: denied { write } for pid=16282 comm="syz.6.5731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 403.504443][ T36] audit: type=1400 audit(2000004660.394:17018): avc: denied { mounton } for pid=16282 comm="syz.6.5731" path="/548/file0" dev="tmpfs" ino=3024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 403.539666][ T36] audit: type=1400 audit(2000004660.394:17019): avc: denied { mount } for pid=16282 comm="syz.6.5731" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 403.584412][ T36] audit: type=1400 audit(2000004660.394:17020): avc: denied { mounton } for pid=16282 comm="syz.6.5731" path="/548/file0" dev="tmpfs" ino=3024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 403.820690][T16310] 9pnet_fd: Insufficient options for proto=fd [ 404.060923][T16332] x_tables: duplicate underflow at hook 2 [ 404.094422][T16333] netlink: 'syz.1.5747': attribute type 39 has an invalid length. [ 404.157093][T16337] /dev/loop0: Can't lookup blockdev [ 404.475796][T16357] overlayfs: failed to clone upperpath [ 404.475800][T16356] overlayfs: failed to clone upperpath [ 404.519903][T16359] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 405.087141][T16386] /dev/loop0: Can't lookup blockdev [ 405.158269][T16393] netlink: 188 bytes leftover after parsing attributes in process `syz.4.5772'. [ 405.895292][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 405.907507][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 405.919692][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 405.931859][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 405.944027][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 405.956202][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 405.968390][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 405.980570][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 405.993004][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 406.005179][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 406.175581][T16437] netlink: 'syz.6.5785': attribute type 4 has an invalid length. [ 407.339950][T16451] netlink: 68 bytes leftover after parsing attributes in process `syz.1.5792'. [ 408.060241][T16481] netlink: 'syz.1.5799': attribute type 4 has an invalid length. [ 409.277298][ T36] kauditd_printk_skb: 1485 callbacks suppressed [ 409.277316][ T36] audit: type=1400 audit(2000004665.994:18506): avc: denied { create } for pid=16488 comm="syz.6.5803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 409.355855][ T36] audit: type=1400 audit(2000004666.022:18507): avc: denied { connect } for pid=16488 comm="syz.6.5803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 409.490757][ T36] audit: type=1400 audit(2000004666.022:18508): avc: denied { create } for pid=16488 comm="syz.6.5803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 409.585442][ T36] audit: type=1400 audit(2000004666.031:18509): avc: denied { execmem } for pid=16488 comm="syz.6.5803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 409.655565][ T36] audit: type=1400 audit(2000004666.031:18510): avc: denied { execute } for pid=16488 comm="syz.6.5803" path="/dev/rnullb0" dev="tmpfs" ino=239 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 409.728422][ T36] audit: type=1400 audit(2000004666.050:18511): avc: denied { create } for pid=16488 comm="syz.6.5803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 409.802999][ T36] audit: type=1400 audit(2000004666.050:18512): avc: denied { create } for pid=16488 comm="syz.6.5803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 409.873943][ T36] audit: type=1400 audit(2000004666.050:18513): avc: denied { name_bind } for pid=16488 comm="syz.6.5803" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 409.979688][ T36] audit: type=1400 audit(2000004666.050:18514): avc: denied { node_bind } for pid=16488 comm="syz.6.5803" saddr=::1 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 410.092653][ T36] audit: type=1400 audit(2000004666.545:18515): avc: denied { create } for pid=16496 comm="syz.6.5806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 410.508196][T16525] netlink: 'syz.1.5813': attribute type 4 has an invalid length. [ 410.865410][T16545] futex_wake_op: syz.6.5823 tries to shift op by 144; fix this program [ 410.985076][T16559] overlayfs: failed to clone upperpath [ 411.253793][ C1] net_ratelimit: 75367 callbacks suppressed [ 411.253815][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 411.271899][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 411.284210][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 411.296400][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 411.308650][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 411.320819][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 411.333078][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 411.345229][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 411.357391][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 411.369577][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 416.612763][ C0] net_ratelimit: 148633 callbacks suppressed [ 416.612785][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.612789][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 416.612848][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 416.618889][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.630799][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 416.642739][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.654651][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 416.666650][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.678588][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 416.690485][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.436891][ C0] sched: DL replenish lagged too much [ 421.971764][ C1] net_ratelimit: 110498 callbacks suppressed [ 421.971786][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 421.971925][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.977889][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 421.989753][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.001947][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 422.014075][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.025793][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 422.037626][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.049603][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 422.061858][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.330760][ C1] net_ratelimit: 110293 callbacks suppressed [ 427.330783][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 427.330885][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.336870][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 427.348844][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.360865][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 427.372921][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.384668][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 427.396710][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.408673][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 427.420711][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.689656][ C1] net_ratelimit: 109764 callbacks suppressed [ 432.689679][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 432.689704][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.695781][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 432.707653][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.719706][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 432.731859][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.743571][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 432.755423][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.767394][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 432.779550][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.048685][ C1] net_ratelimit: 106524 callbacks suppressed [ 438.048707][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 438.048758][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.054851][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 438.066715][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.078880][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 438.091128][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.102950][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 438.114972][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.126967][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 438.139196][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.463157][ T36] kauditd_printk_skb: 73 callbacks suppressed [ 438.463176][ T36] audit: type=1400 audit(2000004693.273:18589): avc: denied { execmem } for pid=16577 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 443.407607][ C1] net_ratelimit: 148904 callbacks suppressed [ 443.407629][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 443.407630][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.407677][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.413737][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 443.425772][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.437670][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 443.449573][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.461554][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 443.473629][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.485460][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 448.766554][ C0] net_ratelimit: 157198 callbacks suppressed [ 448.766577][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.766586][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 448.766656][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 448.772781][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.784631][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 448.796526][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.808620][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 448.820726][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.832443][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 448.844314][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 454.125540][ C1] net_ratelimit: 156678 callbacks suppressed [ 454.125562][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 454.125599][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 454.131629][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 454.143862][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 454.155861][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 454.167937][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 454.179675][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 454.191662][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 454.203626][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 454.215633][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 459.484505][ C0] net_ratelimit: 155314 callbacks suppressed [ 459.484527][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 459.484547][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 459.490597][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 459.502602][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 459.514655][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 459.526347][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 459.538578][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 459.550575][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 459.562595][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 459.574305][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 464.843474][ C0] net_ratelimit: 155777 callbacks suppressed [ 464.843495][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 464.843510][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 464.843582][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 464.849642][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 464.861650][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 464.873759][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 464.885878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 464.897873][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 464.909755][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 464.921944][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.044270][ T36] audit: type=1400 audit(2000004719.011:18590): avc: denied { execmem } for pid=16578 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 470.202425][ C1] net_ratelimit: 151780 callbacks suppressed [ 470.202446][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 470.202597][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 470.208498][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 470.220493][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 470.232499][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 470.244522][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 470.256255][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 470.268223][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 470.280244][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 470.292342][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 475.561370][ C1] net_ratelimit: 148303 callbacks suppressed [ 475.561392][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 475.561496][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 475.567568][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 475.579460][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 475.591431][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 475.603554][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 475.615311][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 475.627234][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 475.639289][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 475.651416][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.749207][ T36] audit: type=1400 audit(2000004728.705:18591): avc: denied { execmem } for pid=16580 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 480.920329][ C1] net_ratelimit: 150732 callbacks suppressed [ 480.920351][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 480.920422][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.926434][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 480.938310][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.950460][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 480.962574][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.974315][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 480.986172][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.998133][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 481.010337][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.279317][ C1] net_ratelimit: 158389 callbacks suppressed [ 486.279339][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 486.279395][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.285402][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 486.297387][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.309411][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 486.321399][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.333233][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 486.345184][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.357217][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 486.369238][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.638260][ C1] net_ratelimit: 157553 callbacks suppressed [ 491.638283][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 491.638338][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.644636][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 491.656818][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.668911][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 491.681098][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.692789][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 491.704853][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.716924][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 491.728900][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.976602][ T36] audit: type=1400 audit(2000004743.308:18592): avc: denied { execmem } for pid=16581 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 496.997216][ C1] net_ratelimit: 153688 callbacks suppressed [ 496.997238][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 496.997260][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.997464][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.003592][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 497.015421][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.027305][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 497.039383][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.051213][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 497.063116][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.075318][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 501.533926][ T36] audit: type=1400 audit(2000004752.236:18593): avc: denied { read } for pid=16582 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 502.356196][ C1] net_ratelimit: 155115 callbacks suppressed [ 502.356218][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 502.356246][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.362316][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 502.374298][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.386299][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 502.398319][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.410042][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 502.422013][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.434021][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 502.446070][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.876646][ T36] audit: type=1400 audit(2000004752.236:18594): avc: denied { read open } for pid=16582 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 507.715123][ C1] net_ratelimit: 149265 callbacks suppressed [ 507.715145][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 507.715196][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.721213][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 507.733306][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.745379][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 507.757570][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.769269][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 507.781247][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.793253][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 507.805284][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 510.271713][ T36] audit: type=1400 audit(2000004760.407:18595): avc: denied { execmem } for pid=16583 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 513.074082][ C1] net_ratelimit: 154057 callbacks suppressed [ 513.074104][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 513.074246][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.080198][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 513.092079][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.104061][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 513.116426][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.128227][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 513.140090][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.152084][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 513.164218][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.433048][ C1] net_ratelimit: 158570 callbacks suppressed [ 518.433071][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 518.433115][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.439168][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 518.451132][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.463111][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 518.475122][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.486838][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 518.498829][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.510836][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 518.522833][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.791977][ C1] net_ratelimit: 157429 callbacks suppressed [ 523.792001][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 523.792110][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.798075][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 523.809964][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.821987][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 523.834115][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.845819][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 523.857696][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.869879][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 523.882026][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 525.901721][ T36] audit: type=1400 audit(2000004774.973:18596): avc: denied { read } for pid=16585 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 527.161640][ T36] audit: type=1400 audit(2000004774.973:18597): avc: denied { read open } for pid=16585 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 529.150947][ C1] net_ratelimit: 155090 callbacks suppressed [ 529.150967][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 529.151022][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.157054][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 529.169038][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.181050][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 529.193071][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.204768][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 529.216746][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.228756][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 529.240726][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 530.456048][ T36] audit: type=1400 audit(2000004778.254:18598): avc: denied { read } for pid=16586 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 532.168744][ T36] audit: type=1400 audit(2000004778.254:18599): avc: denied { read open } for pid=16586 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 532.221396][ T36] audit: type=1400 audit(2000004780.320:18600): avc: denied { mounton } for pid=16585 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 534.509900][ C1] net_ratelimit: 149092 callbacks suppressed [ 534.509921][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 534.510033][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 534.515997][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 534.527867][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 534.539852][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 534.551965][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 534.563823][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 534.575793][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 534.587795][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 534.599851][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 537.084338][ T36] audit: type=1400 audit(2000004785.472:18601): avc: denied { sys_module } for pid=16585 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 539.645875][ T36] audit: type=1400 audit(2000004787.856:18602): avc: denied { mounton } for pid=16586 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 539.868859][ C1] net_ratelimit: 154995 callbacks suppressed [ 539.868881][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 539.869063][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.875018][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 539.887021][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.899097][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 539.911153][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.922849][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 539.934784][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.946749][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 539.958903][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 545.227793][ C1] net_ratelimit: 155380 callbacks suppressed [ 545.227814][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 545.227895][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 545.233891][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 545.245747][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 545.245957][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 545.257815][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 545.269752][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 545.281709][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 545.293828][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 545.305903][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 550.586762][ C0] net_ratelimit: 166905 callbacks suppressed [ 550.586783][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 550.586785][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 550.586846][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 550.593013][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 550.604928][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 550.616780][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 550.628702][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 550.640748][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 550.652662][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 550.664571][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 552.623770][ T36] audit: type=1400 audit(2000004799.925:18603): avc: denied { execmem } for pid=16587 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 553.498924][ T36] audit: type=1400 audit(2000004800.065:18604): avc: denied { sys_module } for pid=16586 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 555.555362][ T36] audit: type=1400 audit(2000004802.748:18605): avc: denied { execmem } for pid=16588 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 555.945677][ C0] net_ratelimit: 169997 callbacks suppressed [ 555.945699][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.945724][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 555.951753][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.963864][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 555.975903][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.987715][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 555.999629][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.011668][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 556.023541][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.035485][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 561.304644][ C0] net_ratelimit: 161926 callbacks suppressed [ 561.304667][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.304709][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 561.310795][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.322776][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 561.334864][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.346645][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 561.358796][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.370906][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 561.382934][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.394745][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 566.663593][ C1] net_ratelimit: 155950 callbacks suppressed [ 566.663617][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.663631][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.663737][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.669698][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 566.681683][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.693549][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 566.705570][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.717401][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.729394][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.741362][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 572.022547][ C1] net_ratelimit: 158703 callbacks suppressed [ 572.022569][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 572.022677][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.028613][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 572.040697][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.052657][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 572.064638][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.076629][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 572.088474][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.100509][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 572.112627][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.273459][ T36] audit: type=1400 audit(2000004818.370:18606): avc: denied { execmem } for pid=16589 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 573.875926][ T36] audit: type=1400 audit(2000004819.866:18607): avc: denied { execmem } for pid=16590 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 574.170842][ T36] audit: type=1400 audit(2000004820.146:18608): avc: denied { read } for pid=16591 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 574.379515][ T36] audit: type=1400 audit(2000004820.203:18609): avc: denied { read open } for pid=16591 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 575.499791][ T9146] bridge_slave_1: left allmulticast mode [ 575.541804][ T36] audit: type=1400 audit(2000004820.820:18610): avc: denied { mounton } for pid=16591 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 575.565148][ T9146] bridge_slave_1: left promiscuous mode [ 575.597802][ T9146] bridge0: port 2(bridge_slave_1) entered disabled state [ 575.949558][ T9146] bridge_slave_0: left allmulticast mode [ 576.419042][ T36] audit: type=1400 audit(2000004820.820:18611): avc: denied { sys_module } for pid=16591 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 576.442208][ T9146] bridge_slave_0: left promiscuous mode [ 576.568607][ T9146] bridge0: port 1(bridge_slave_0) entered disabled state [ 577.381459][ C0] net_ratelimit: 130918 callbacks suppressed [ 577.381514][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.381550][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 577.387755][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.399748][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 577.411792][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.423615][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 577.435515][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.447417][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 577.459424][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.471325][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 582.175166][ T36] audit: type=1400 audit(2000004821.409:18612): avc: denied { read } for pid=16592 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 582.740419][ C1] net_ratelimit: 162427 callbacks suppressed [ 582.740442][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 582.740605][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.746531][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 582.758390][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.770385][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 582.782404][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.794271][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 582.806282][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.818124][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 582.830253][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.099361][ C0] net_ratelimit: 161852 callbacks suppressed [ 588.099384][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.099408][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 588.105445][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.117467][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 588.129441][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.141202][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 588.153190][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.165297][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 588.177413][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.189239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 588.657744][ T36] audit: type=1400 audit(2000004821.409:18613): avc: denied { read open } for pid=16592 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 592.689355][ T36] audit: type=1400 audit(2000004821.511:18614): avc: denied { mounton } for pid=16592 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 593.458318][ C1] net_ratelimit: 158549 callbacks suppressed [ 593.458343][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 593.458429][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.464482][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 593.476431][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.488660][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 593.500726][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.512523][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 593.524444][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.536491][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 593.548513][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 594.689749][ T36] audit: type=1400 audit(2000004821.511:18615): avc: denied { sys_module } for pid=16592 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 594.780387][ T36] audit: type=1400 audit(2000004822.315:18616): avc: denied { read } for pid=16593 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 594.935843][ T36] audit: type=1400 audit(2000004822.315:18617): avc: denied { read open } for pid=16593 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 595.064133][ T36] audit: type=1400 audit(2000004833.562:18618): avc: denied { read } for pid=16594 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 595.175683][ T36] audit: type=1400 audit(2000004833.562:18619): avc: denied { read open } for pid=16594 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 595.342247][ T36] audit: type=1400 audit(2000004839.302:18620): avc: denied { mounton } for pid=16593 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 595.448221][ T36] audit: type=1400 audit(2000004839.732:18621): avc: denied { mounton } for pid=16594 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 595.619684][ T36] audit: type=1400 audit(2000004840.069:18622): avc: denied { sys_module } for pid=16594 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 595.662116][ T36] audit: type=1400 audit(2000004840.097:18623): avc: denied { sys_module } for pid=16593 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 598.817243][ C1] net_ratelimit: 159949 callbacks suppressed [ 598.817264][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.817329][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.823340][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.835231][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.847320][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 598.859251][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.871149][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 598.891612][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.895236][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 598.907419][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 601.634568][ T36] audit: type=1400 audit(2000004845.828:18624): avc: denied { execmem } for pid=16596 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 602.039441][ T36] audit: type=1400 audit(2000004846.202:18625): avc: denied { read } for pid=16597 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 602.134688][ T36] audit: type=1400 audit(2000004846.230:18626): avc: denied { read open } for pid=16597 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 602.186905][ T36] audit: type=1400 audit(2000004846.230:18627): avc: denied { mounton } for pid=16597 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 602.240647][ T36] audit: type=1400 audit(2000004846.230:18628): avc: denied { sys_module } for pid=16597 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 604.176174][ C1] net_ratelimit: 161274 callbacks suppressed [ 604.176197][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 604.176300][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 604.182272][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 604.194364][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 604.206222][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 604.218289][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 604.230178][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 604.242032][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 604.254054][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 604.266056][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 609.535147][ C1] net_ratelimit: 159899 callbacks suppressed [ 609.535169][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 609.535262][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 609.541299][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 609.553269][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 609.565444][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 609.577481][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 609.589276][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 609.601174][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 609.613050][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 609.625093][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 614.894086][ C1] net_ratelimit: 158997 callbacks suppressed [ 614.894108][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 614.894146][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 614.900423][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 614.912559][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 614.924388][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 614.936234][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 614.948242][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 614.960694][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 614.972604][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 614.984580][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.201681][ T37] INFO: task syz.4.5643:16044 blocked for more than 123 seconds. [ 619.076748][ T37] Not tainted syzkaller #0 [ 619.081725][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 620.253033][ C1] net_ratelimit: 161888 callbacks suppressed [ 620.253055][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 620.253090][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.259160][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 620.271354][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.283158][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 620.295087][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.307087][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 620.319320][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.331090][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 620.343146][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.403624][ T37] task:syz.4.5643 state:D stack:0 pid:16044 tgid:16044 ppid:12024 flags:0x00004006 [ 620.446916][ T37] Call Trace: [ 620.450239][ T37] [ 620.453172][ T37] __schedule+0x1322/0x1df0 [ 622.854923][ T37] ? __sched_text_start+0x10/0x10 [ 622.860014][ T37] ? __kasan_check_write+0x18/0x20 [ 624.885641][ T37] schedule+0xc6/0x240 [ 624.889764][ T37] schedule_timeout+0xb2/0x3a0 [ 625.611941][ C1] net_ratelimit: 158926 callbacks suppressed [ 625.611962][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 625.612014][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.618044][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 625.630166][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.641959][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:06:2c:5f:4d:7d, vlan:0) [ 625.653929][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.665879][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 625.678105][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.689907][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 625.701893][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.949084][ T37] ? __cfi_schedule_timeout+0x10/0x10 [ 626.265737][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 626.271376][ T37] ? __smp_call_single_queue+0xd8/0x390 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 626.833492][ T36] audit: type=1400 audit(2000004869.312:18629): avc: denied { write } for pid=281 comm="syz-executor" path="pipe:[1532]" dev="pipefs" ino=1532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 627.453171][ T37] ? generic_exec_single+0x201/0x500 [ 627.458512][ T37] wait_for_common+0x359/0x630