last executing test programs: 2.543298402s ago: executing program 4 (id=8936): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="400000001000390400"/20, @ANYRES32=r2, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32=r2], 0x40}, 0x1, 0x0, 0x0, 0x4014}, 0x0) r4 = socket(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x44, 0x24, 0x5820a61ca228659, 0x0, 0xfffffffe, {0x0, 0x0, 0x0, r5, {0x0, 0x9}, {0xffff, 0xffff}, {0x5, 0x7}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_USC={0x10, 0x3, {0x6, 0x2}}}}]}, 0x79}}, 0x800) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001540)=@newtfilter={0x68, 0x28, 0xd27, 0x1004001, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0x2, 0x9}, {}, {0x2, 0xb}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_sample={0x30, 0x21d, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x68}, 0x1, 0x0, 0x0, 0x8810}, 0x400c8b4) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=@delchain={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x24}}, 0x10) 2.404214791s ago: executing program 4 (id=8937): r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, 0x0) sendto$packet(r3, 0x0, 0x0, 0xc040050, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x60, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r2, {0x0, 0xa}, {0xffff, 0xffff}, {0x1a, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0xea, 0x2, 0x0, 0x0, 0x9, 0x5}, {0x12, 0x2, 0x0, 0x401, 0x8001, 0x1400}, 0xa5, 0x5, 0xffffffd}}, @TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x44080) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=@newqdisc={0x50, 0x24, 0xd0f, 0x70bd29, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffe0, 0xa}, {0xf, 0x10}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x1c, 0x2, [@TCA_FQ_CODEL_TARGET={0x8, 0x1, 0xadc0}, @TCA_FQ_CODEL_CE_THRESHOLD={0x8, 0x7, 0x3}, @TCA_FQ_CODEL_CE_THRESHOLD_MASK={0x5, 0xb, 0xf}]}}]}, 0x50}, 0x1, 0x0, 0x0, 0x55}, 0x4000) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x3, 0x7, @loopback, 0x800000}, 0x1c) 2.326855507s ago: executing program 4 (id=8939): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x0) io_uring_setup(0x1de0, &(0x7f00000000c0)={0x0, 0x45d6}) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000c40)={0x0, 0xfe72}) ioctl$MON_IOCX_GETX(r3, 0x80089203, &(0x7f0000000a40)={0x0, 0x0}) close_range(r2, 0xffffffffffffffff, 0x0) 2.237007573s ago: executing program 4 (id=8941): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f0000000100), 0x1, 0x5a6, &(0x7f0000001540)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x70, 0x103301) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 2.166517898s ago: executing program 3 (id=8942): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800b903b4814a9052d5d85c08000000b9a80000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x8}, 0x94) r1 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[], 0x4c}}, 0x0) r2 = socket(0x10, 0x3, 0x6) r3 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newqdisc={0x88, 0x24, 0xf0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x2, [], 0x0, [0x4, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c4, 0x0, 0x0, 0x0, 0x3dc], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}}]}, 0x88}}, 0x20000000) 2.158202178s ago: executing program 4 (id=8943): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f0000003200)='./file2\x00', 0x4204, &(0x7f0000003240)=ANY=[], 0x3, 0x335, &(0x7f0000000a40)="$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") r0 = open(&(0x7f00000006c0)='./file2\x00', 0x105142, 0x120) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) sendfile(r0, r0, 0x0, 0x800000009) 2.12516976s ago: executing program 3 (id=8944): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={0x1, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8912, &(0x7f0000000080)) 2.068519184s ago: executing program 4 (id=8945): bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000540), &(0x7f00000001c0)='./file1\x00', 0x14004, &(0x7f00000005c0)=ANY=[@ANYRES32=0x0], 0x4, 0x70a, &(0x7f00000232c0)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0xd, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0xd, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 1.961508321s ago: executing program 3 (id=8948): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4005, &(0x7f0000000c00)=0xb, 0x6, 0x2) mbind(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4005, &(0x7f0000000c00)=0xc, 0x6, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="87ad33e1bcd3fbedf30807fb47aae6244fc505bf8271a13c1b560c5d04c0514b669ea3447cfa8288166234ca760ed76031ef02f423a9ab06d8b755fc2eb74b1da02ed197789af9c7a70b49933725543d896b32863ab438028ca0275bc00291275cf2b6ac0d350fa4cb3b29af2047ea6c3f25766d05b3dfd9c5dafc65584fa9d1e0f26d5fccca73e45714e7e00ba77545d678a3241b83422ac89d781beb638d31c67a776eea06f7e103dffab9142488661975a394eaa23cb2f48fdf669204cab5ce2b8ab60a521fb93c9a94", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x12, 0xfffffffb}, 0x48) r0 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB='$\x00\x00\x00f\x00'], 0xfe33) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x5e5b) 1.084347528s ago: executing program 3 (id=8970): getpid() r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = epoll_create(0x9) r2 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000240)={0xa0000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000280)={0x2000000}) 1.024849822s ago: executing program 3 (id=8973): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@newqdisc={0x58, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x28, 0x2, {{0xfffffffb, 0x3, 0x8, 0x3, 0xfffffffd, 0x5}, [@TCA_NETEM_REORDER={0xc, 0x3, {0x4, 0x8}}]}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) 548.394534ms ago: executing program 0 (id=8989): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7a, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000340), &(0x7f0000000300)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3) getdents(r3, &(0x7f0000000f40)=""/243, 0xf3) 500.123657ms ago: executing program 0 (id=8991): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/19, @ANYRES32=r5, @ANYBLOB], 0x3c}}, 0x0) 416.876692ms ago: executing program 0 (id=9005): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0500000004000000080000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0xae8}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="b4050000200080066110000000000000c6000000000000009500d800000000009f33ef60916e55893f1eeb0b2ae13d922e6235592ce847e2566c43d72918a897323fd0723043c47c896ce0bce66a245ad9d6817fd98cd824498949714ffaac8a6f77ef0000ca5d82054d54d53cd2b6db714e75d9bdae214fa68a0557eb2c5ca683a4b6fcfcff0bffffffffffd47042eaebfa6fa26fa7a347c7faa8e700458c60897d4a6148a1c11428427c40de60beacf871ab5c2ff88a02084e5b5271e45f00003826fb8579c1fb01d2c5553d2ccb5fc5b51fe6b174ebd9907dcff414ed55b0c20cdbe7009a6fe7cc78762f1d4dcdbca64920db9a50f86c21632f7a4bd344e0bd74ff05d37ef68e3b9db863c758ffffffffabe90ac5d08dd9d4e0359c41cf3626e1230bc1cd4c02c460ceb44276e9bd94d1c2e6d17dc5c2edf332a62f5fe68fbbbbfcfd00000000000fbf940e6652d357474ed5f816f66ac3027460ae66317f83cdd7a7eb2a7003d1a6cf5478533584961c329fcf5a43e05c92bfef0dcd28000000003f2915a3039c9a78f63b8ec7e60a0000fed7d67c440e23d130e51eea1e085bebabe7059de9cbfc5117c024185a062acb6b8eec31c21b3af8b9eedb4660ed2deb7acf2a33a376a5cb7d4266d5b0be14488d14b473502486ad8dd600000000000000000000c7766ea7c581782c0d90f42a85303835fc291c25d29e6bead5d7360f2e1929d7736ebc8558c4506407d3046022bdf25485bd5442169e9b4c1278343581b7a06f65e8ea6b042c4fd08381e5000000000000006398d6480000001a723b91030000006480304c66b217aea0156ce9eef911fe5b7370f79987303ecb3aabc53c60014a0101ab766754f596b41da9534d12b8306a1b36cf3b03f0d790879f523eabfbee83d8bd472ef69660cf6ec897106c51e54a17497f384c4956b41f3843e7c878b1e11316d8ddae1c6c3b85aaf7a9fcaf8f5d6186c42542d68ba72682c938d3c0a2e6e10eed71b1d31c9f300b41745329bf34495c63e43fb896e4903fb0fae54a8f0fe3b48a5b29d279070647e65097c8ecf32a15080000000000000001007ba4a70a084bd994ac5e00000000000000000000000000351a30cd97f83d72631d0fe92efa974a53f4dc1eb9a86df632a6d463688123f64d42a919bcfc44a90ffd680200000091f842a91c977f6075d07e39e669b0713af0498a99bf5261cb3269d499a5202d7a08b33ade7b38829b9bd39619688d5e9af22170ef83e5b92cbb32b655c45de1c154aad81bf64351668a3f76d5afa958aff76249e0ffdf8e45155536a1a44bfcbfbfd232af000052f9002a"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x12, 0x4, 0x4, 0x12}, 0x50) close(r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r3}, &(0x7f0000000500), &(0x7f0000000540)=r2}, 0x20) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) close_range(r5, 0xffffffffffffffff, 0x0) 358.942446ms ago: executing program 2 (id=8996): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000340)) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r2}, 0x10) kexec_load(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x3e00, 0x116094000, 0x41000000}], 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001e80)=@newtaction={0x48, 0x31, 0x1, 0xfffffffd, 0x25dfdbfb, {0x0, 0x0, 0x11}, [{0x34, 0x1, [@m_police={0x30, 0x1, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc, 0x3, {0x1}}, {0xc}}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x8800}, 0x0) 358.626326ms ago: executing program 0 (id=8997): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x102311, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r3, &(0x7f0000000640)=[{&(0x7f0000000400)=""/244, 0xf4}], 0x1) 290.86151ms ago: executing program 2 (id=8998): mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x21c0, 0x103) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="001800"/17, @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x101, 0x0, 0x0, 0x41100, 0xc}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x5, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, [@cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffe}]}, 0x0, 0x2, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000004c0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x0, 0x5, 0x6769}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1ee20dbc}, 0x94) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) lstat(&(0x7f0000000380)='./file0\x00', 0x0) 290.4164ms ago: executing program 1 (id=8999): sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f0000002340)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='kfree\x00', r1, 0x0, 0x20000000002}, 0x18) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_xfrm(r2, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000084}, 0x40044) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0039936da8abb4625380b974"], 0x1, 0x539, &(0x7f00000005c0)="$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") 264.481222ms ago: executing program 2 (id=9000): socket$phonet_pipe(0x23, 0x5, 0x2) syz_open_dev$usbfs(0x0, 0x100000074, 0x101301) r0 = socket$igmp(0x2, 0x3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f00000001c0)='w\xde\xa3\x05\xff\a\x00\x00\x00\x00\x00\x00\x8f\xc0\x9b\x86\xef\\\xc0\x89\av\x9f\xd6\xd1\x98,\xc8\x18E/\x8c\x1a\xe3\xbd') syz_open_dev$tty20(0xc, 0x4, 0x0) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000000), 0x4) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f00000002c0)={0x1, 0x4, 0x10, 0x0, @vifc_lcl_addr=@multicast2, @remote}, 0x10) setsockopt$MRT_FLUSH(r0, 0x0, 0xd4, &(0x7f0000000040)=0x6, 0x4) 217.181705ms ago: executing program 1 (id=9001): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x11, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000ab4000000060a01040000000000000000020000280900010073797a30000000000900020073797a320000000088000480100001800c000100636f756e7465720014000180090001006d6173710000000004000280600001800a0001006c696d6974000000500002800c000140000000000000000808000440000000010c00014000000000000080010c00024000000000000000090800034000000fba0c00024000000000000000000c0001400000000000000007140000001100"], 0xdc}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3, 0x0, 0x7}, 0x18) sendmsg$NFT_MSG_GETRULE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="44000000190a0102"], 0x44}}, 0x0) 216.926965ms ago: executing program 2 (id=9002): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x4004743d, 0x110e22fff6) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000740), 0x1, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='kfree\x00', r1, 0x0, 0x115}, 0x18) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x8081) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f000000000000000002000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4005}, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001f2, 0x0) 216.648465ms ago: executing program 1 (id=9012): sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ptrace(0x10, 0x0) ptrace$peekuser(0x3, 0x0, 0x100) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x9, 0x0, 0x7ffc0002}]}) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff1}, {0x3, 0x6}, {0x0, 0x1}}}, 0x24}, 0x1, 0x0, 0x0, 0x48080}, 0x0) 172.678488ms ago: executing program 0 (id=9003): r0 = socket(0x10, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x5, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x19}}, 0xfffffffe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x304}, "a6341a1a379332f5", "1fd33c81cf7995313c09de00fd6ded74", "62266bd8", "1e00040000000100"}, 0x28) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) write$binfmt_script(r1, &(0x7f0000000500)={'#! ', './file0'}, 0xb) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000140)=0x40) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000a40)="fb", 0x1}], 0x1) close_range(r0, r1, 0x0) 170.255468ms ago: executing program 3 (id=9004): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYRES16=r0, @ANYRESHEX=r1, @ANYBLOB="9a65afee6893085ca8886a127375c62c52ec725e3f2589b8d7dc967e14765474a9650c5f4ba47007423672978328a963093a1ce134d660dccc8e9e7ea63eada8fd75cf9803e5a1fce20fc5df887c42f4cc50e775eef6429c451e670493bc98959f921008fe4bd9916762d8ec24f55705339cedbdc05b5dee65512ad66bbc742c0f6cd3e361b1b9232bd6ea7001297016a84404047b640bc9d291fad7d3e2efb04708e7278f86e45739667b48c5d186b646408457414cedbcfd7beb7eb63ec3a14709e70cd782afaf683e24afd797399c0eccf5fd43781c12b9", @ANYBLOB="6fc17f4f649d651f6fe2a42f7506f9047976beb0a687eaa4fa95631ee97ec4ff937d7897922dbe96c448f57adefcc78f5a9da83ca9e775da4abbb64e3896c4978c4483c9f401ff0b905f9725982d881c2092864a2aad3e922d64d815578283af6cf91ac4c09eca48800dc85994c56ee432b338436719960fe0a8eb35a6958c26be3bcd2422f32d6ec9ae9a8ab925e14089bb439bdaa399302fdfd95d729c70", @ANYBLOB="fd3d5a82f1829dfae07bcd95fc3b78d0123bea1883fc99e5c4ec9e5a9188ca4af01545b84588b980199bff3a03e1cc18b4539a0b863877cfe9796b4e037d42a1ead66b2cef77df98e746cf677a19e414f83180ef7608b236ebbe99abe2f7c84c19e017b9fe795f752cd6bacdd5eac8cd2c6af25fcd82e2d9ec92965ce9f74527930d53dfad93ab8c5dfb03d27dfefcf1199f83ab39732a54830ef559e42ada8105d0bead951f98202dbb9bdcfea08902263728158e66ffebea1c"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800ab7201a522e84bbdde58ec0e00000000000032ec1d3382fab73f91e81a94f4a0eae56bb0012ec41fa42dfd9d1a5c954b5e611ba6cd75741d92a10c79c6e0458b9e5089d0afd9a2dfedc61c1ddcfb0de13f5813729ecf80dffca0d73d8c21bec19fd39a1c154d1064c49cb9c8b70647b886", @ANYRES32=r2, @ANYRES64=r0], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000200)='#$*\x00', r3) clock_adjtime(0x0, &(0x7f0000000480)={0x7fffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}) keyctl$restrict_keyring(0xa, r3, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000000)='id:cb2e') r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000180)={0xffffffffffffffff, 0x1, 0x7, 0x0, 0x800}, 0xc) recvmsg(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000380)=""/75, 0x4b}, {0x0}], 0x2}, 0x0) 150.13301ms ago: executing program 1 (id=9006): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x8, 0x4}}]}}]}, 0x48}}, 0x20040084) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000008c0)=@newqdisc={0x8c, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}, {0x2, 0x1}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x4, [0xc, 0x5, 0x0, 0xf, 0x10, 0x2, 0x4, 0x2, 0xf, 0x6, 0x5, 0x5, 0x8, 0x4, 0x10, 0x4], 0x3, [0xb, 0x101, 0xad1e, 0x2002, 0x1, 0x4, 0x2, 0xd06, 0xff05, 0x2, 0xb, 0x3, 0x5, 0x6, 0xd, 0x100], [0xfff1, 0x5, 0xffff, 0xfff5, 0x4, 0x8, 0x1, 0x9, 0x5, 0x2, 0xc, 0x40, 0xfffc, 0x3, 0x1]}}]}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000f80)=@newqdisc={0x8c, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}, {0x2, 0x1}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x4, [0xa, 0x5, 0x0, 0xf, 0x10, 0x2, 0x4, 0x2, 0xf, 0x6, 0x6, 0x5, 0x8, 0x4, 0x10, 0x4], 0x3, [0xb, 0x101, 0xad1e, 0x2002, 0x1, 0x4, 0x2, 0xd06, 0xff05, 0x2, 0xb, 0x3, 0x5, 0x6, 0xd, 0x100], [0xfff1, 0x5, 0xffff, 0xfff5, 0x4, 0x8, 0x1, 0x9, 0x5, 0x2, 0xc, 0x40, 0x8001, 0x3, 0x1]}}]}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) 121.691072ms ago: executing program 0 (id=9007): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) mlock(&(0x7f00007d8000/0x800000)=nil, 0x800000) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x36e084fcb6392193, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="01000000020000001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5c0100001000130780fffffffcdbdf252001000000000000000000000000000020010000000000000000000000000001000000004e210002000000006c000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="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", @ANYRES32=r2], 0x15c}, 0x1, 0x0, 0x0, 0x880}, 0x2000) 121.320162ms ago: executing program 2 (id=9008): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[], 0x6000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x600, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 5.139039ms ago: executing program 1 (id=9009): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='mm_page_free\x00', r2, 0x0, 0x4}, 0x18) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x42073, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x20000000ec071, 0xffffffffffffffff, 0x0) 4.918029ms ago: executing program 2 (id=9010): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0xfe, 0x7ffc0002}]}) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r1) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x9, 0x48764, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_config_ext={0x8, 0x6}, 0x120, 0x10000, 0x33f8, 0x1, 0x2, 0x20007, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x1, 0x0) fchmodat(r3, &(0x7f0000000000)='.\x00', 0x71) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c0000001000850600000000ff6122314a000800", @ANYRES32=r4, @ANYBLOB="00001000252155b21c0012000c000100626f6e64"], 0x3c}}, 0x40000) 0s ago: executing program 1 (id=9011): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001000000", @ANYRES32], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r2 = gettid() timer_create(0x1, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, 0x0) read$msr(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x0) ioctl$MON_IOCX_GETX(r3, 0x80089203, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x3938700}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) kernel console output (not intermixed with test programs): [ 206.703025][T15127] loop2: detected capacity change from 0 to 1024 [ 207.392376][T15121] SELinux: failed to load policy [ 208.297155][T15199] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2186'. [ 208.372755][T15200] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(7) [ 208.379357][T15200] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 208.387551][T15200] vhci_hcd vhci_hcd.0: Device attached [ 208.431482][T15203] vhci_hcd: connection closed [ 208.431652][ T3451] vhci_hcd: stop threads [ 208.440845][ T3451] vhci_hcd: release socket [ 208.445269][ T3451] vhci_hcd: disconnect device [ 208.565784][T15212] netlink: 16 bytes leftover after parsing attributes in process `syz.2.2189'. [ 208.626556][T15220] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 208.643052][ T2964] Process accounting resumed [ 208.699054][T15230] SELinux: Context system_u:object is not valid (left unmapped). [ 208.727027][T15225] loop2: detected capacity change from 0 to 1024 [ 208.729625][T15235] netlink: 'syz.1.2195': attribute type 4 has an invalid length. [ 208.752592][T15225] ext4: Unknown parameter 'uid<00000000000000000000' [ 208.800048][T15241] hub 8-0:1.0: USB hub found [ 208.805233][T15241] hub 8-0:1.0: 8 ports detected [ 208.831230][T15229] process 'syz.4.2191' launched '/dev/fd/10' with NULL argv: empty string added [ 208.860534][T15253] 9pnet_fd: Insufficient options for proto=fd [ 208.956492][T15263] netlink: 'syz.2.2200': attribute type 1 has an invalid length. [ 208.964438][T15263] netlink: 224 bytes leftover after parsing attributes in process `syz.2.2200'. [ 209.056014][T15146] Process accounting resumed [ 209.080070][T15275] $H: (slave dummy0): Releasing backup interface [ 209.086732][T15275] $H: (slave dummy0): the permanent HWaddr of slave - aa:aa:aa:aa:aa:24 - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 209.104110][T15275] dummy0: left promiscuous mode [ 209.111724][T15280] netlink: 'syz.2.2203': attribute type 10 has an invalid length. [ 209.482491][T15287] loop4: detected capacity change from 0 to 512 [ 209.490916][T15287] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 209.562224][T15294] netlink: 'syz.4.2207': attribute type 21 has an invalid length. [ 209.573486][T15302] __nla_validate_parse: 2 callbacks suppressed [ 209.573503][T15302] netlink: 1896 bytes leftover after parsing attributes in process `syz.3.2205'. [ 209.591930][ T3394] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 209.599439][ T3394] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 209.606818][ T3394] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 209.614441][ T3394] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 209.621990][ T3394] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 209.629473][ T3394] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 209.636907][ T3394] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 209.644379][ T3394] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 209.651771][ T3394] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 209.659205][ T3394] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 209.667845][ T3394] hid-generic 0003:0004:0000.0001: hidraw0: USB HID v0.00 Device [syz0] on syz0 [ 209.890044][T15319] 9pnet: p9_errstr2errno: server reported unknown error [ 209.958914][T15321] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2211'. [ 209.984967][T15334] loop2: detected capacity change from 0 to 2048 [ 210.001491][T15334] EXT4-fs: Ignoring removed mblk_io_submit option [ 210.016406][T15336] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2214'. [ 210.030744][T15334] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 210.048544][T15334] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 210.113816][T15347] netlink: 'syz.1.2213': attribute type 4 has an invalid length. [ 210.121878][T15347] netlink: 'syz.1.2213': attribute type 4 has an invalid length. [ 210.259586][T15407] SELinux: ebitmap: truncated map [ 210.274961][T15407] SELinux: failed to load policy [ 210.316568][T15407] infiniband syz!: set down [ 210.321686][T15407] infiniband syz!: added team_slave_0 [ 210.339142][T15407] RDS/IB: syz!: added [ 210.410047][ T29] kauditd_printk_skb: 617 callbacks suppressed [ 210.410060][ T29] audit: type=1326 audit(1759860385.647:557166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15425 comm="syz.4.2220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f955e54eec9 code=0x7ffc0000 [ 210.439983][ T29] audit: type=1326 audit(1759860385.647:557167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15425 comm="syz.4.2220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f955e54eec9 code=0x7ffc0000 [ 210.476304][T15426] loop4: detected capacity change from 0 to 1024 [ 210.498297][ T29] audit: type=1326 audit(1759860385.697:557168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15425 comm="syz.4.2220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f955e54eec9 code=0x7ffc0000 [ 210.499875][T15426] EXT4-fs: Ignoring removed i_version option [ 210.522029][ T29] audit: type=1326 audit(1759860385.697:557169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15425 comm="syz.4.2220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f955e54eec9 code=0x7ffc0000 [ 210.528025][T15426] EXT4-fs: Ignoring removed oldalloc option [ 210.533335][T15426] EXT4-fs (loop4): stripe (3) is not aligned with cluster size (16), stripe is disabled [ 210.551754][ T29] audit: type=1326 audit(1759860385.697:557170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15425 comm="syz.4.2220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f955e54eec9 code=0x7ffc0000 [ 210.591383][ T29] audit: type=1326 audit(1759860385.697:557171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15425 comm="syz.4.2220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f955e54eec9 code=0x7ffc0000 [ 210.593507][T15432] netlink: 32 bytes leftover after parsing attributes in process `syz.3.2221'. [ 210.615323][ T29] audit: type=1326 audit(1759860385.697:557172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15425 comm="syz.4.2220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f955e54eec9 code=0x7ffc0000 [ 210.648151][ T29] audit: type=1326 audit(1759860385.697:557173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15425 comm="syz.4.2220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f955e54eec9 code=0x7ffc0000 [ 210.659708][T15426] EXT4-fs (loop4): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: none. [ 210.671837][ T29] audit: type=1326 audit(1759860385.697:557174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15425 comm="syz.4.2220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f955e54eec9 code=0x7ffc0000 [ 210.671868][ T29] audit: type=1326 audit(1759860385.697:557175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15425 comm="syz.4.2220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f955e54eec9 code=0x7ffc0000 [ 210.733001][T15426] ext4 filesystem being mounted at /438/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 210.760347][T15426] EXT4-fs error (device loop4): ext4_map_blocks:814: inode #15: block 3: comm syz.4.2220: lblock 3 mapped to illegal pblock 3 (length 3) [ 210.785988][T15437] netlink: 3 bytes leftover after parsing attributes in process `syz.2.2222'. [ 210.795114][T15437] 0X: renamed from caif0 [ 210.800761][T15426] EXT4-fs (loop4): Remounting filesystem read-only [ 210.809315][T15437] A link change request failed with some changes committed already. Interface 60X may have been left with an inconsistent configuration, please check. [ 210.852171][T15437] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2222'. [ 210.886110][ T3311] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0006-0000-000000000000. [ 210.903678][T15452] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=51862 sclass=netlink_route_socket pid=15452 comm=syz.2.2222 [ 211.058848][T15464] A link change request failed with some changes committed already. Interface bond0 may have been left with an inconsistent configuration, please check. [ 211.078686][T15464] loop2: detected capacity change from 0 to 512 [ 211.122216][T15480] netlink: 144 bytes leftover after parsing attributes in process `syz.4.2230'. [ 211.139066][T15464] EXT4-fs error (device loop2): __ext4_fill_super:5512: inode #2: comm syz.2.2228: casefold flag without casefold feature [ 211.143329][T15480] loop4: detected capacity change from 0 to 512 [ 211.161717][T15464] EXT4-fs (loop2): get root inode failed [ 211.166230][T15480] EXT4-fs: dax option not supported [ 211.167432][T15464] EXT4-fs (loop2): mount failed [ 211.294108][T15495] random: crng reseeded on system resumption [ 211.300877][T15464] bond3: (slave geneve2): Releasing active interface [ 211.330072][T15001] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 20004 - 0 [ 211.345199][T15464] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15464 comm=syz.2.2228 [ 211.369302][T15001] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 20004 - 0 [ 211.378772][T15001] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 20004 - 0 [ 211.387794][T15001] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 20004 - 0 [ 211.477295][T15504] loop2: detected capacity change from 0 to 512 [ 211.545934][T15506] usb usb8: usbfs: process 15506 (syz.1.2231) did not claim interface 0 before use [ 211.555971][T15504] EXT4-fs: Ignoring removed mblk_io_submit option [ 211.579217][T15504] EXT4-fs (loop2): failed to initialize system zone (-117) [ 211.594936][T15504] EXT4-fs (loop2): mount failed [ 211.653207][T15504] netlink: 'syz.2.2234': attribute type 1 has an invalid length. [ 211.735366][T15504] 8021q: adding VLAN 0 to HW filter on device bond4 [ 211.751026][T15516] bond4: (slave bridge1): making interface the new active one [ 211.760149][T15516] bond4: (slave bridge1): Enslaving as an active interface with an up link [ 211.777717][T15504] bond4: (slave vlan0): the slave hw address is in use by the bond; couldn't find a slave with a free hw address to give it (this should not have happened) [ 212.033257][T15586] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2238'. [ 212.080416][T15583] loop4: detected capacity change from 0 to 2048 [ 212.119980][T15589] random: crng reseeded on system resumption [ 212.188186][ T9733] Alternate GPT is invalid, using primary GPT. [ 212.194820][ T9733] loop4: p2 p3 p7 [ 212.228862][T15583] Alternate GPT is invalid, using primary GPT. [ 212.235370][T15583] loop4: p2 p3 p7 [ 212.254084][T15583] netlink: 'gtp': attribute type 3 has an invalid length. [ 212.284238][T15583] veth0_to_team: left promiscuous mode [ 212.370045][T15611] loop4: detected capacity change from 0 to 1024 [ 212.391200][ T9733] udevd[9733]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 212.391385][ T9735] udevd[9735]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 212.412008][T15611] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 212.412766][ T6843] udevd[6843]: inotify_add_watch(7, /dev/loop4p7, 10) failed: No such file or directory [ 212.497448][T15611] netlink: 'syz.4.2241': attribute type 3 has an invalid length. [ 212.505466][T15611] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2241'. [ 212.575182][T15639] netlink: 'syz.0.2244': attribute type 13 has an invalid length. [ 212.618333][T15639] gretap0: refused to change device tx_queue_len [ 212.635607][T15639] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 212.743900][T15650] $H: (slave batadv_slave_0): Releasing backup interface [ 212.752003][T15650] batadv_slave_0: left promiscuous mode [ 212.758822][T15650] bond0: (slave geneve2): Releasing active interface [ 212.768120][T15652] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2247'. [ 212.796954][ T12] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 20004 - 0 [ 212.815466][ T12] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 20004 - 0 [ 212.844903][T15652] sch_fq: defrate 4294967295 ignored. [ 212.851367][T15652] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15652 comm=syz.4.2247 [ 212.869712][T15658] veth0_to_team: entered promiscuous mode [ 212.889638][ T12] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 20004 - 0 [ 212.899001][ T12] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 20004 - 0 [ 212.977667][T15685] netlink: 'syz.1.2254': attribute type 2 has an invalid length. [ 212.985623][T15685] netlink: 'syz.1.2254': attribute type 3 has an invalid length. [ 213.015201][T15686] serio: Serial port ttyS3 [ 213.160170][T15726] sock: sock_timestamping_bind_phc: sock not bind to device [ 213.221369][T15728] veth0_to_team: entered promiscuous mode [ 213.846179][T15746] syz.0.2266(15746): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 214.288704][T15789] netlink: 'syz.0.2274': attribute type 6 has an invalid length. [ 214.298098][T15787] IPv6: NLM_F_REPLACE set, but no existing node found! [ 215.171803][T15878] __nla_validate_parse: 14 callbacks suppressed [ 215.171817][T15878] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2294'. [ 215.179486][T15874] can0: slcan on ttyS3. [ 215.260389][T15874] can0 (unregistered): slcan off ttyS3. [ 215.318369][T15893] can0: slcan on ttyS3. [ 215.336486][T15902] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2300'. [ 215.346335][T15893] netlink: 'syz.2.2297': attribute type 16 has an invalid length. [ 215.354347][T15893] netlink: 156 bytes leftover after parsing attributes in process `syz.2.2297'. [ 215.365293][T15902] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2300'. [ 215.385264][T15902] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2300'. [ 215.420203][ T29] kauditd_printk_skb: 2998 callbacks suppressed [ 215.420221][ T29] audit: type=1400 audit(1759860390.655:560156): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 215.452267][T15907] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2302'. [ 215.458623][T15902] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2300'. [ 215.475151][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 215.481786][ T3040] audit: audit_lost=37490 audit_rate_limit=0 audit_backlog_limit=64 [ 215.482760][T15908] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=15908 comm=syz.1.2300 [ 215.489827][ T3040] audit: backlog limit exceeded [ 215.510641][T15910] audit: audit_backlog=65 > audit_backlog_limit=64 [ 215.517189][T15910] audit: audit_lost=37491 audit_rate_limit=0 audit_backlog_limit=64 [ 215.522638][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 215.525312][T15910] audit: backlog limit exceeded [ 215.531799][ T3040] audit: audit_lost=37492 audit_rate_limit=0 audit_backlog_limit=64 [ 215.544618][ T3040] audit: backlog limit exceeded [ 215.640779][T15914] netlink: 'syz.4.2304': attribute type 10 has an invalid length. [ 215.695193][T15918] netlink: 14 bytes leftover after parsing attributes in process `syz.1.2306'. [ 215.900371][T15929] can0 (unregistered): slcan off ttyS3. [ 215.916435][T15942] can0: slcan on ttyS3. [ 216.020581][T15929] can0 (unregistered): slcan off ttyS3. [ 216.029883][T15942] can0: slcan on ttyS3. [ 216.420373][T15999] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2320'. [ 216.432568][T16000] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2319'. [ 216.738385][T16074] geneve4: entered promiscuous mode [ 216.743813][T16074] geneve4: entered allmulticast mode [ 216.883623][T16093] netlink: 'syz.3.2326': attribute type 21 has an invalid length. [ 217.831234][T16159] sock: sock_timestamping_bind_phc: sock not bind to device [ 218.199050][T16184] netlink: 'syz.2.2342': attribute type 21 has an invalid length. [ 218.794671][T16225] serio: Serial port ptm0 [ 220.161811][T16307] can0 (unregistered): slcan off ttyS3. [ 220.231886][T16321] Falling back ldisc for ttyS3. [ 220.419908][T16385] __nla_validate_parse: 8 callbacks suppressed [ 220.419925][T16385] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 220.420013][T16385] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 220.427827][T16389] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2373'. [ 220.431793][ T29] kauditd_printk_skb: 32341 callbacks suppressed [ 220.431807][ T29] audit: type=1400 audit(1759860395.653:586876): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 220.451394][ T29] audit: type=1400 audit(1759860395.673:586877): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 220.516295][ T29] audit: type=1400 audit(1759860395.673:586878): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 220.517966][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 220.537547][ T29] audit: type=1400 audit(1759860395.673:586879): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 220.537575][ T29] audit: type=1400 audit(1759860395.673:586880): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 220.537602][ T29] audit: type=1400 audit(1759860395.673:586881): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 220.537697][ T29] audit: type=1400 audit(1759860395.673:586882): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 220.537736][ T29] audit: type=1400 audit(1759860395.673:586883): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 220.537787][ T29] audit: type=1400 audit(1759860395.673:586884): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 221.172892][T16446] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2385'. [ 221.870229][T16481] netlink: 13 bytes leftover after parsing attributes in process `syz.3.2391'. [ 221.932311][T16482] netlink: 13 bytes leftover after parsing attributes in process `syz.3.2391'. [ 222.134059][T16495] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 222.142506][T16495] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 222.166654][T16495] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 222.181692][T16495] block device autoloading is deprecated and will be removed. [ 222.232871][T16505] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16505 comm=syz.2.2393 [ 222.591501][T16543] v: renamed from ip6_vti0 [ 223.966554][T16779] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16779 comm=syz.1.2456 [ 225.465653][ T29] kauditd_printk_skb: 23599 callbacks suppressed [ 225.465670][ T29] audit: type=1400 audit(1759860409.673:607017): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 225.493370][ T29] audit: type=1400 audit(1759860409.673:607018): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 225.514882][ T29] audit: type=1400 audit(1759860409.673:607019): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 225.536239][ T29] audit: type=1400 audit(1759860409.673:607020): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 225.557535][ T29] audit: type=1400 audit(1759860409.673:607021): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 225.578855][ T29] audit: type=1400 audit(1759860409.673:607022): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 225.584095][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 225.600287][ T29] audit: type=1400 audit(1759860409.673:607023): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 225.606663][ T3040] audit: audit_lost=40523 audit_rate_limit=0 audit_backlog_limit=64 [ 225.606678][ T3040] audit: backlog limit exceeded [ 227.701933][T17415] netlink: 'syz.4.2651': attribute type 5 has an invalid length. [ 228.652695][T17604] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(9) [ 228.659313][T17604] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 228.666820][T17604] vhci_hcd vhci_hcd.0: Device attached [ 228.848756][ T3420] vhci_hcd: vhci_device speed not set [ 228.944814][ T3420] usb 1-1: new full-speed USB device number 3 using vhci_hcd [ 229.350273][T17605] vhci_hcd: connection reset by peer [ 229.356243][T15001] vhci_hcd: stop threads [ 229.360574][T15001] vhci_hcd: release socket [ 229.365130][T15001] vhci_hcd: disconnect device [ 229.912498][T17802] netlink: 'syz.3.2741': attribute type 10 has an invalid length. [ 229.920841][T17802] netlink: 'syz.3.2741': attribute type 10 has an invalid length. [ 230.023388][T17810] netlink: 24 bytes leftover after parsing attributes in process `syz.4.2743'. [ 230.241369][T17821] serio: Serial port ptm0 [ 230.556421][T17893] netlink: 'syz.3.2755': attribute type 2 has an invalid length. [ 230.564233][T17893] netlink: 'syz.3.2755': attribute type 3 has an invalid length. [ 230.571995][T17893] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2755'. [ 230.610495][ T29] kauditd_printk_skb: 24810 callbacks suppressed [ 230.610512][ T29] audit: type=1400 audit(1759860414.677:623329): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 230.618269][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 230.638330][ T29] audit: type=1400 audit(1759860414.687:623330): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 230.644843][ T3040] audit: audit_lost=43359 audit_rate_limit=0 audit_backlog_limit=64 [ 230.666056][ T29] audit: type=1400 audit(1759860414.687:623331): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 230.674073][ T3040] audit: backlog limit exceeded [ 230.700418][ T29] audit: type=1400 audit(1759860414.687:623332): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 230.704008][T17901] audit: audit_backlog=65 > audit_backlog_limit=64 [ 230.721699][ T29] audit: type=1400 audit(1759860414.687:623333): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 230.728223][T17901] audit: audit_lost=43360 audit_rate_limit=0 audit_backlog_limit=64 [ 231.041405][T17967] netlink: 'syz.0.2759': attribute type 10 has an invalid length. [ 231.094841][T17962] netlink: 'syz.0.2759': attribute type 10 has an invalid length. [ 231.114129][T17971] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2769'. [ 231.386888][T17962] dummy0: entered promiscuous mode [ 231.392444][T17962] $H: (slave dummy0): Enslaving as an active interface with an up link [ 231.434196][T17966] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(9) [ 231.440798][T17966] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 231.448233][T17966] vhci_hcd vhci_hcd.0: Device attached [ 231.560125][T17996] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2762'. [ 231.632363][ T36] vhci_hcd: vhci_device speed not set [ 231.693703][T17988] serio: Serial port ptm0 [ 231.698433][ T36] usb 3-1: new full-speed USB device number 6 using vhci_hcd [ 231.788781][T17974] vhci_hcd: connection reset by peer [ 231.794174][ T37] vhci_hcd: stop threads [ 231.798580][ T37] vhci_hcd: release socket [ 231.803077][ T37] vhci_hcd: disconnect device [ 232.111654][T18040] netlink: 'syz.0.2773': attribute type 2 has an invalid length. [ 232.119568][T18040] netlink: 'syz.0.2773': attribute type 3 has an invalid length. [ 232.127388][T18040] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2773'. [ 232.263385][T18085] netlink: 'syz.2.2775': attribute type 10 has an invalid length. [ 232.286220][T18085] dummy0: left allmulticast mode [ 232.389366][T18091] 0XD: refused to change device tx_queue_len [ 232.395682][T18091] A link change request failed with some changes committed already. Interface 30XD may have been left with an inconsistent configuration, please check. [ 232.412127][T18093] netlink: 24 bytes leftover after parsing attributes in process `syz.2.2777'. [ 232.661353][T18118] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2780'. [ 233.561091][T18158] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(9) [ 233.567838][T18158] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 233.575393][T18158] vhci_hcd vhci_hcd.0: Device attached [ 233.728557][T18172] serio: Serial port ptm0 [ 233.774865][ T2964] vhci_hcd: vhci_device speed not set [ 233.835610][ T2964] usb 5-1: new full-speed USB device number 3 using vhci_hcd [ 233.890837][T18168] vhci_hcd: connection reset by peer [ 233.896516][ T37] vhci_hcd: stop threads [ 233.900852][ T37] vhci_hcd: release socket [ 233.905273][ T37] vhci_hcd: disconnect device [ 234.110883][ T3420] usb 1-1: enqueue for inactive port 0 [ 234.116402][ T3420] usb 1-1: enqueue for inactive port 0 [ 234.143081][T18245] validate_nla: 2 callbacks suppressed [ 234.143108][T18245] netlink: 'syz.4.2802': attribute type 2 has an invalid length. [ 234.156485][T18245] netlink: 'syz.4.2802': attribute type 3 has an invalid length. [ 234.164345][T18245] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2802'. [ 234.182321][T18248] netlink: 'syz.0.2814': attribute type 6 has an invalid length. [ 234.202262][ T3420] vhci_hcd: vhci_device speed not set [ 234.208589][T18248] netlink: 'syz.0.2814': attribute type 6 has an invalid length. [ 234.750008][T18291] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2809'. [ 235.717938][ T29] kauditd_printk_skb: 21896 callbacks suppressed [ 235.717981][ T29] audit: type=1400 audit(1759860419.699:643201): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 235.789126][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 235.795701][ T3040] audit: audit_lost=44037 audit_rate_limit=0 audit_backlog_limit=64 [ 235.803795][ T3040] audit: backlog limit exceeded [ 235.810195][ T29] audit: type=1326 audit(1759860419.719:643202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18346 comm="syz.0.2830" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f7efd9d5d67 code=0x7ffc0000 [ 235.836918][ T29] audit: type=1326 audit(1759860419.719:643203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18346 comm="syz.0.2830" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f7efd97af79 code=0x7ffc0000 [ 235.860703][ T29] audit: type=1326 audit(1759860419.719:643204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18346 comm="syz.0.2830" exe="/root/syz-executor" sig=0 arch=c000003e syscall=304 compat=0 ip=0x7f7efd9deec9 code=0x7ffc0000 [ 235.884434][ T29] audit: type=1400 audit(1759860419.719:643205): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 235.905805][ T29] audit: type=1400 audit(1759860419.719:643206): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 235.927109][ T29] audit: type=1400 audit(1759860419.719:643207): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 236.252345][T18360] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.264956][T18360] A link change request failed with some changes committed already. Interface 60X may have been left with an inconsistent configuration, please check. [ 236.876086][ T36] usb 3-1: enqueue for inactive port 0 [ 236.883161][ T36] usb 3-1: enqueue for inactive port 0 [ 236.957353][ T36] vhci_hcd: vhci_device speed not set [ 237.417264][T18391] netlink: 'syz.1.2847': attribute type 3 has an invalid length. [ 237.425095][T18391] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2847'. [ 237.507278][T18399] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2842'. [ 237.569546][T18400] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 237.647471][T18405] Falling back ldisc for ttyS3. [ 238.400359][T18447] 8021q: adding VLAN 0 to HW filter on device $H [ 238.408544][T18447] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.432223][T18447] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 239.152652][ T2964] usb 5-1: enqueue for inactive port 0 [ 239.166138][ T2964] usb 5-1: enqueue for inactive port 0 [ 239.239043][ T2964] vhci_hcd: vhci_device speed not set [ 239.919823][T18546] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2903'. [ 240.798259][ T29] kauditd_printk_skb: 29509 callbacks suppressed [ 240.798275][ T29] audit: type=1400 audit(1759860424.709:670665): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 240.929793][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 240.936363][ T3040] audit: audit_lost=44722 audit_rate_limit=0 audit_backlog_limit=64 [ 240.944421][ T3040] audit: backlog limit exceeded [ 240.949424][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 240.955969][ T3040] audit: audit_lost=44723 audit_rate_limit=0 audit_backlog_limit=64 [ 240.964010][ T3040] audit: backlog limit exceeded [ 240.980341][ T29] audit: type=1400 audit(1759860424.729:670666): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 241.001665][ T29] audit: type=1400 audit(1759860424.729:670667): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 241.023054][ T29] audit: type=1400 audit(1759860424.729:670668): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 244.172040][T18654] bond0: (slave dummy0): Releasing backup interface [ 244.359294][T18671] IPv6: Can't replace route, no match found [ 245.230263][T18752] batman_adv: batadv0: Adding interface: dummy0 [ 245.236596][T18752] batman_adv: batadv0: The MTU of interface dummy0 is too small (1536) to handle the transport of batman-adv packets. If you experience problems getting traffic through try increasing the MTU to 1568. [ 245.256247][T18752] batman_adv: batadv0: Not using interface dummy0 (retrying later): interface not active [ 245.373415][T18767] IPv6: Can't replace route, no match found [ 245.480427][T18780] netlink: 'syz.2.2976': attribute type 4 has an invalid length. [ 245.586858][T18797] netlink: 'syz.0.2996': attribute type 4 has an invalid length. [ 245.710453][T18816] netem: change failed [ 245.774756][T18823] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3000'. [ 245.836829][T18828] netlink: 'syz.3.3004': attribute type 4 has an invalid length. [ 245.859300][ T29] kauditd_printk_skb: 28232 callbacks suppressed [ 245.859315][ T29] audit: type=1400 audit(1759860429.718:694746): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 245.878072][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 245.886962][ T29] audit: type=1400 audit(1759860429.718:694747): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 245.893537][ T3040] audit: audit_lost=46109 audit_rate_limit=0 audit_backlog_limit=64 [ 245.922886][ T3040] audit: backlog limit exceeded [ 245.928385][T18835] audit: audit_backlog=65 > audit_backlog_limit=64 [ 245.935102][T18835] audit: audit_lost=46110 audit_rate_limit=0 audit_backlog_limit=64 [ 245.939881][T18837] audit: audit_backlog=65 > audit_backlog_limit=64 [ 245.943296][T18835] audit: backlog limit exceeded [ 245.949679][T18837] audit: audit_lost=46111 audit_rate_limit=0 audit_backlog_limit=64 [ 246.640584][T18873] netlink: 'syz.4.3022': attribute type 4 has an invalid length. [ 246.672747][T18891] netem: change failed [ 247.090198][T18949] IPv6: Can't replace route, no match found [ 247.101791][T18949] bridge0: entered allmulticast mode [ 247.145382][T18952] netlink: 'syz.3.3051': attribute type 21 has an invalid length. [ 247.307433][T18963] IPv6: Can't replace route, no match found [ 247.340265][T18963] bridge0: entered allmulticast mode [ 247.583709][T18987] netlink: 'syz.0.3062': attribute type 21 has an invalid length. [ 247.964904][T19045] IPv6: Can't replace route, no match found [ 247.985902][T19045] bridge0: entered allmulticast mode [ 248.168678][T19075] netlink: 5 bytes leftover after parsing attributes in process `syz.1.3081'. [ 248.178147][T19075] 0XD: renamed from gretap0 (while UP) [ 248.188477][T19075] 0XD: entered allmulticast mode [ 248.193896][T19075] A link change request failed with some changes committed already. Interface 30XD may have been left with an inconsistent configuration, please check. [ 248.364183][T19083] netlink: 'syz.2.3083': attribute type 21 has an invalid length. [ 249.248376][T19178] netlink: 'syz.0.3106': attribute type 4 has an invalid length. [ 249.455132][T19202] netlink: 5 bytes leftover after parsing attributes in process `syz.0.3116'. [ 249.468064][T19202] 0XD: renamed from gretap0 (while UP) [ 249.476084][T19202] 0XD: entered allmulticast mode [ 249.481660][T19202] A link change request failed with some changes committed already. Interface 30XD may have been left with an inconsistent configuration, please check. [ 250.245477][T19263] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3134'. [ 250.367537][T19266] netlink: 1896 bytes leftover after parsing attributes in process `syz.4.3136'. [ 250.591594][T19294] netlink: 1896 bytes leftover after parsing attributes in process `syz.0.3152'. [ 250.905533][ T29] kauditd_printk_skb: 31313 callbacks suppressed [ 250.905553][ T29] audit: type=1400 audit(1759860434.722:722193): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 250.912488][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 250.933425][ T29] audit: type=1400 audit(1759860434.722:722194): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 250.939797][ T3040] audit: audit_lost=47401 audit_rate_limit=0 audit_backlog_limit=64 [ 250.939814][ T3040] audit: backlog limit exceeded [ 250.960996][ T29] audit: type=1400 audit(1759860434.722:722195): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 250.969739][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 250.973806][ T29] audit: type=1400 audit(1759860434.722:722196): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 250.995021][ T3040] audit: audit_lost=47402 audit_rate_limit=0 audit_backlog_limit=64 [ 251.001507][ T29] audit: type=1400 audit(1759860434.722:722197): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 251.121517][T19310] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3147'. [ 251.188077][T19329] netlink: 5 bytes leftover after parsing attributes in process `syz.3.3163'. [ 251.221140][T19329] 0XD: renamed from gretap0 (while UP) [ 251.247023][T19329] 0XD: entered allmulticast mode [ 251.260952][T19329] A link change request failed with some changes committed already. Interface 30XD may have been left with an inconsistent configuration, please check. [ 251.279804][T19341] batman_adv: batadv0: Removing interface: dummy0 [ 251.291551][T19341] bond4: (slave bridge1): Releasing active interface [ 251.340638][T19348] netlink: 'syz.2.3154': attribute type 10 has an invalid length. [ 251.348599][T19348] netlink: 40 bytes leftover after parsing attributes in process `syz.2.3154'. [ 251.378160][T19348] A link change request failed with some changes committed already. Interface geneve1 may have been left with an inconsistent configuration, please check. [ 251.570572][T19363] netlink: 1896 bytes leftover after parsing attributes in process `syz.2.3164'. [ 251.604727][T19368] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3166'. [ 252.387776][T19437] netlink: 830 bytes leftover after parsing attributes in process `syz.3.3193'. [ 252.521259][ T9] Process accounting resumed [ 252.563209][T19450] veth0_to_team: left promiscuous mode [ 252.597381][T19458] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3202'. [ 252.820077][T19499] IPv6: NLM_F_CREATE should be specified when creating new route [ 253.050011][T19517] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3229'. [ 253.111696][T19521] veth0_to_team: left promiscuous mode [ 253.362849][ T36] Process accounting resumed [ 253.637239][ T3420] Process accounting resumed [ 253.673115][T19567] 8021q: adding VLAN 0 to HW filter on device bond4 [ 253.696311][T19567] bond0: (slave bond4): Enslaving as an active interface with a down link [ 253.763514][T19615] bond0: (slave bond4): Releasing active interface [ 253.860785][T19567] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19567 comm=syz.3.3235 [ 254.476533][ T3420] Process accounting resumed [ 254.594229][T19628] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3239'. [ 254.607611][T19638] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3246'. [ 254.684691][ T3420] Process accounting resumed [ 254.913850][T19669] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19669 comm=syz.1.3251 [ 255.229350][T19717] 8021q: adding VLAN 0 to HW filter on device bond4 [ 255.237789][T19717] bond0: (slave bond4): Enslaving as an active interface with a down link [ 255.312086][T19717] $H: (slave dummy0): Releasing backup interface [ 255.338934][T19717] dummy0: left promiscuous mode [ 255.362392][T19769] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19769 comm=syz.0.3265 [ 255.406127][T19717] bond0: (slave bond4): Releasing active interface [ 255.514555][T19667] Process accounting resumed [ 255.869529][T19823] IPv6: NLM_F_REPLACE set, but no existing node found! [ 255.945521][ T29] kauditd_printk_skb: 29118 callbacks suppressed [ 255.945539][ T29] audit: type=1400 audit(1759860439.735:747268): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 256.007037][ T29] audit: type=1400 audit(1759860439.765:747269): avc: denied { create } for pid=19831 comm="syz.4.3293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 256.026742][ T29] audit: type=1400 audit(1759860439.775:747270): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 256.048830][T19826] netlink: 'syz.0.3290': attribute type 1 has an invalid length. [ 256.077095][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 256.079690][ T29] audit: type=1400 audit(1759860439.805:747271): avc: denied { create } for pid=19824 comm="syz.0.3290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 256.083738][ T3040] audit: audit_lost=48752 audit_rate_limit=0 audit_backlog_limit=64 [ 256.083754][ T3040] audit: backlog limit exceeded [ 256.086596][T19826] 8021q: adding VLAN 0 to HW filter on device bond5 [ 256.103626][ T29] audit: type=1400 audit(1759860439.805:747272): avc: denied { map_create } for pid=19824 comm="syz.0.3290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 256.113483][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 256.116460][ T29] audit: type=1400 audit(1759860439.835:747273): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 256.209845][T19826] bond5: (slave bridge1): making interface the new active one [ 256.233941][T19826] bond5: (slave bridge1): Enslaving as an active interface with an up link [ 256.277810][T19830] bond5: (slave vlan0): the slave hw address is in use by the bond; couldn't find a slave with a free hw address to give it (this should not have happened) [ 256.457876][T19905] __nla_validate_parse: 2 callbacks suppressed [ 256.457892][T19905] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3303'. [ 256.473627][T19905] IPv6: NLM_F_REPLACE set, but no existing node found! [ 256.644103][T19924] netlink: 'syz.1.3318': attribute type 1 has an invalid length. [ 256.673715][T19924] 8021q: adding VLAN 0 to HW filter on device bond1 [ 256.697180][T19924] bond1: (slave bridge0): making interface the new active one [ 256.724782][T19924] bond1: (slave bridge0): Enslaving as an active interface with an up link [ 256.822526][T19924] bond1: (slave vlan0): the slave hw address is in use by the bond; couldn't find a slave with a free hw address to give it (this should not have happened) [ 256.913491][T19975] bridge0: entered promiscuous mode [ 256.957514][T19980] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3323'. [ 256.997238][T19980] IPv6: NLM_F_REPLACE set, but no existing node found! [ 257.075820][T19991] netlink: 'syz.4.3326': attribute type 16 has an invalid length. [ 257.083737][T19991] netlink: 156 bytes leftover after parsing attributes in process `syz.4.3326'. [ 257.320568][T19989] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3329'. [ 257.381314][T19996] netlink: 'syz.0.3330': attribute type 3 has an invalid length. [ 257.389097][T19996] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3330'. [ 257.518773][T20010] netlink: 'syz.1.3337': attribute type 39 has an invalid length. [ 257.529711][T20006] netlink: 'syz.0.3333': attribute type 4 has an invalid length. [ 257.532137][T20008] netlink: 'syz.4.3336': attribute type 1 has an invalid length. [ 257.556218][T20008] 8021q: adding VLAN 0 to HW filter on device bond4 [ 257.568324][T20006] netlink: 'syz.0.3333': attribute type 4 has an invalid length. [ 257.580235][T20008] bond4: (slave bridge4): making interface the new active one [ 257.589480][T20008] bond4: (slave bridge4): Enslaving as an active interface with an up link [ 257.616428][T20008] bond4: (slave vlan0): the slave hw address is in use by the bond; couldn't find a slave with a free hw address to give it (this should not have happened) [ 257.862532][T20075] netlink: 'syz.1.3342': attribute type 13 has an invalid length. [ 257.890393][T20075] 0XD: left allmulticast mode [ 257.895749][T20075] 0XD: refused to change device tx_queue_len [ 257.902531][T20075] A link change request failed with some changes committed already. Interface 30XD may have been left with an inconsistent configuration, please check. [ 258.373666][T20094] ip6tnl1: entered promiscuous mode [ 258.378933][T20094] ip6tnl1: entered allmulticast mode [ 258.788982][T20108] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3355'. [ 258.812323][T20108] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3355'. [ 259.160940][T20115] can0: slcan on ttyS3. [ 259.596456][T20135] can0 (unregistered): slcan off ttyS3. [ 260.344072][T20152] netlink: 'syz.0.3371': attribute type 16 has an invalid length. [ 260.351959][T20152] netlink: 156 bytes leftover after parsing attributes in process `syz.0.3371'. [ 260.399225][T20157] netlink: 'syz.4.3361': attribute type 4 has an invalid length. [ 260.970936][ T29] kauditd_printk_skb: 36195 callbacks suppressed [ 260.970952][ T29] audit: type=1400 audit(1759860444.736:778538): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 260.978450][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 260.998745][ T29] audit: type=1400 audit(1759860444.746:778539): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 261.005155][ T3040] audit: audit_lost=50397 audit_rate_limit=0 audit_backlog_limit=64 [ 261.005173][ T3040] audit: backlog limit exceeded [ 261.026386][ T29] audit: type=1400 audit(1759860444.746:778540): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 261.034860][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 261.039242][ T29] audit: type=1400 audit(1759860444.746:778541): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 261.060441][ T3040] audit: audit_lost=50398 audit_rate_limit=0 audit_backlog_limit=64 [ 261.067010][ T29] audit: type=1400 audit(1759860444.746:778542): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 261.207247][T20167] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3363'. [ 261.218843][T20168] 8021q: adding VLAN 0 to HW filter on device bond5 [ 261.313131][T20168] bond5: (slave bridge5): making interface the new active one [ 261.348353][T20168] bond5: (slave bridge5): Enslaving as an active interface with an up link [ 261.389954][T20203] bond5: (slave vlan0): the slave hw address is in use by the bond; couldn't find a slave with a free hw address to give it (this should not have happened) [ 261.532522][T20205] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3365'. [ 263.096006][T20263] validate_nla: 3 callbacks suppressed [ 263.096024][T20263] netlink: 'syz.1.3377': attribute type 16 has an invalid length. [ 263.109471][T20263] netlink: 156 bytes leftover after parsing attributes in process `syz.1.3377'. [ 263.193149][T20268] netlink: 'syz.3.3376': attribute type 4 has an invalid length. [ 263.222346][T20268] netlink: 'syz.3.3376': attribute type 4 has an invalid length. [ 263.318827][T20302] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3382'. [ 263.467688][T20320] netlink: 830 bytes leftover after parsing attributes in process `syz.4.3397'. [ 263.780819][T20381] xt_SECMARK: invalid security context 'system_u:object_r:initctl_t:s0' [ 264.173254][T20461] IPv6: Can't replace route, no match found [ 264.225202][T20464] sock: sock_timestamping_bind_phc: sock not bind to device [ 264.288026][T20492] netlink: 2 bytes leftover after parsing attributes in process `syz.4.3441'. [ 264.288263][T20492] batadv_slave_1: entered promiscuous mode [ 264.429079][T20507] veth0_to_bond: entered allmulticast mode [ 264.718463][T20551] netlink: 'syz.4.3459': attribute type 41 has an invalid length. [ 265.157571][T20620] IPv6: Can't replace route, no match found [ 265.164986][T20618] tc_dump_action: action bad kind [ 265.264859][T20639] netlink: 16 bytes leftover after parsing attributes in process `syz.4.3489'. [ 265.273987][T20639] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3489'. [ 265.387161][T20678] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3495'. [ 265.396215][T20678] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3495'. [ 265.416589][T20680] netlink: 96 bytes leftover after parsing attributes in process `syz.2.3497'. [ 265.509397][T20694] netlink: 'syz.2.3504': attribute type 29 has an invalid length. [ 265.855843][T20772] IPv6: Can't replace route, no match found [ 265.920506][T20785] geneve3: entered promiscuous mode [ 265.925950][T20785] geneve3: entered allmulticast mode [ 265.942392][ T3451] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 20000 - 0 [ 265.962884][ T3451] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 20000 - 0 [ 265.978017][ T3451] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 20000 - 0 [ 265.994958][ T29] kauditd_printk_skb: 26071 callbacks suppressed [ 265.994972][ T29] audit: type=1400 audit(1759860449.752:802330): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.005474][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 266.029221][ T3040] audit: audit_lost=51160 audit_rate_limit=0 audit_backlog_limit=64 [ 266.036017][ T29] audit: type=1400 audit(1759860449.752:802331): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.037284][ T3040] audit: backlog limit exceeded [ 266.058510][ T29] audit: type=1400 audit(1759860449.752:802332): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.084648][ T29] audit: type=1400 audit(1759860449.752:802333): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.095472][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 266.105901][ T29] audit: type=1400 audit(1759860449.752:802334): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.105929][ T29] audit: type=1400 audit(1759860449.752:802335): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.155287][ T3451] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 20000 - 0 [ 266.270173][T20833] netlink: 'syz.1.3548': attribute type 2 has an invalid length. [ 266.561413][T20908] netlink: 'syz.4.3564': attribute type 11 has an invalid length. [ 266.633656][T20926] netlink: 'syz.4.3568': attribute type 8 has an invalid length. [ 266.760614][T20962] __nla_validate_parse: 5 callbacks suppressed [ 266.760630][T20962] netlink: 71 bytes leftover after parsing attributes in process `syz.2.3575'. [ 266.867963][T20976] netlink: 16 bytes leftover after parsing attributes in process `syz.2.3581'. [ 268.262374][T21222] netlink: 40 bytes leftover after parsing attributes in process `syz.1.3660'. [ 268.326622][T21222] netlink: 40 bytes leftover after parsing attributes in process `syz.1.3660'. [ 269.195859][T21372] netlink: 136 bytes leftover after parsing attributes in process `syz.4.3703'. [ 269.574346][T21436] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.3723'. [ 270.082527][T21538] netlink: 'syz.2.3758': attribute type 21 has an invalid length. [ 270.122603][T21538] netlink: 156 bytes leftover after parsing attributes in process `syz.2.3758'. [ 270.131881][T21538] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3758'. [ 270.574286][T21636] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 270.728717][T21659] IPv6: NLM_F_CREATE should be specified when creating new route [ 270.956004][T21708] netlink: 'syz.0.3815': attribute type 10 has an invalid length. [ 270.963883][T21708] netlink: 40 bytes leftover after parsing attributes in process `syz.0.3815'. [ 271.014802][ T29] kauditd_printk_skb: 25547 callbacks suppressed [ 271.014817][ T29] audit: type=1400 audit(1759860454.762:824887): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 271.058562][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 271.062885][T21724] audit: audit_backlog=65 > audit_backlog_limit=64 [ 271.065199][ T3040] audit: audit_lost=52160 audit_rate_limit=0 audit_backlog_limit=64 [ 271.065254][ T3040] audit: backlog limit exceeded [ 271.072404][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 271.079861][T21724] audit: audit_lost=52161 audit_rate_limit=0 audit_backlog_limit=64 [ 271.084675][ T3040] audit: audit_lost=52162 audit_rate_limit=0 audit_backlog_limit=64 [ 271.091238][T21724] audit: backlog limit exceeded [ 271.112196][ T3040] audit: backlog limit exceeded [ 271.684627][T21838] netlink: 'syz.2.3854': attribute type 21 has an invalid length. [ 271.716612][T21838] netlink: 'syz.2.3854': attribute type 1 has an invalid length. [ 271.724374][T21838] netlink: 132 bytes leftover after parsing attributes in process `syz.2.3854'. [ 272.017023][T21907] netlink: 'syz.4.3876': attribute type 4 has an invalid length. [ 272.053489][T21907] netlink: 'syz.4.3876': attribute type 4 has an invalid length. [ 272.256930][T21954] netlink: 36 bytes leftover after parsing attributes in process `syz.1.3897'. [ 272.596061][T22029] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3924'. [ 273.737926][T22247] netlink: 'syz.2.3997': attribute type 6 has an invalid length. [ 276.031991][ T29] kauditd_printk_skb: 24431 callbacks suppressed [ 276.032008][ T29] audit: type=1400 audit(1759860459.775:848881): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 276.039403][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 276.066152][ T3040] audit: audit_lost=52309 audit_rate_limit=0 audit_backlog_limit=64 [ 276.074180][ T3040] audit: backlog limit exceeded [ 276.079665][ T3317] audit: audit_backlog=65 > audit_backlog_limit=64 [ 276.086244][ T3317] audit: audit_lost=52310 audit_rate_limit=0 audit_backlog_limit=64 [ 276.089562][T22686] audit: audit_backlog=65 > audit_backlog_limit=64 [ 276.094296][ T3317] audit: backlog limit exceeded [ 276.105773][T22686] audit: audit_lost=52311 audit_rate_limit=0 audit_backlog_limit=64 [ 276.113819][T22686] audit: backlog limit exceeded [ 276.427890][T22731] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22731 comm=syz.2.4143 [ 278.002818][T23103] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4257'. [ 278.011940][T23103] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4257'. [ 278.685277][T23217] xfrm0: entered allmulticast mode [ 278.814191][T23243] pimreg0: renamed from bridge_slave_1 [ 278.832584][T23243] pimreg0: entered allmulticast mode [ 280.584022][T23556] netlink: 'syz.3.4391': attribute type 3 has an invalid length. [ 280.591836][T23556] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4391'. [ 280.973781][T23560] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4392'. [ 281.047244][ T29] kauditd_printk_skb: 21271 callbacks suppressed [ 281.047262][ T29] audit: type=1400 audit(1759860464.780:869349): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 281.075467][ T29] audit: type=1400 audit(1759860464.790:869350): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 281.087867][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 281.096804][ T29] audit: type=1400 audit(1759860464.790:869351): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 281.103230][ T3040] audit: audit_lost=52580 audit_rate_limit=0 audit_backlog_limit=64 [ 281.103246][ T3040] audit: backlog limit exceeded [ 281.124441][ T29] audit: type=1400 audit(1759860464.790:869352): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 281.133550][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 281.137298][ T29] audit: type=1400 audit(1759860464.790:869353): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 281.158515][ T3040] audit: audit_lost=52581 audit_rate_limit=0 audit_backlog_limit=64 [ 282.086194][T23739] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4442'. [ 282.177078][T23751] netlink: 2 bytes leftover after parsing attributes in process `syz.3.4450'. [ 282.207335][T23751] batadv_slave_1: entered promiscuous mode [ 283.126143][T23913] sock: sock_timestamping_bind_phc: sock not bind to device [ 283.432065][T23944] netlink: 'syz.4.4495': attribute type 9 has an invalid length. [ 283.888859][T23995] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4505'. [ 285.695066][T24349] IPv6: NLM_F_CREATE should be specified when creating new route [ 286.061084][ T29] kauditd_printk_skb: 23814 callbacks suppressed [ 286.061098][ T29] audit: type=1400 audit(1759860469.786:891280): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 286.089029][ T29] audit: type=1400 audit(1759860469.786:891281): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 286.114558][ T29] audit: type=1400 audit(1759860469.796:891282): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 286.135948][ T29] audit: type=1400 audit(1759860469.796:891283): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 286.157308][ T29] audit: type=1400 audit(1759860469.796:891284): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 286.165962][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 286.178649][ T29] audit: type=1400 audit(1759860469.796:891285): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 286.185159][ T3040] audit: audit_lost=53211 audit_rate_limit=0 audit_backlog_limit=64 [ 286.185176][ T3040] audit: backlog limit exceeded [ 286.185407][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 287.737894][T24632] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 287.746237][T24632] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 287.915643][T24657] netlink: 'syz.0.4701': attribute type 13 has an invalid length. [ 287.948590][T24657] 0XD: refused to change device tx_queue_len [ 287.969556][T24657] A link change request failed with some changes committed already. Interface 30XD may have been left with an inconsistent configuration, please check. [ 288.572365][T24712] netlink: 'syz.2.4715': attribute type 13 has an invalid length. [ 288.586381][T24712] gretap0: refused to change device tx_queue_len [ 288.593815][T24712] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 288.880070][T24683] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 288.888306][T24683] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 289.318957][T24768] netlink: 'syz.3.4734': attribute type 13 has an invalid length. [ 289.350670][T24768] 0XD: refused to change device tx_queue_len [ 289.367243][T24768] A link change request failed with some changes committed already. Interface 30XD may have been left with an inconsistent configuration, please check. [ 289.945297][T24871] macvtap1: entered promiscuous mode [ 289.950657][T24871] batadv0: entered promiscuous mode [ 289.961469][T24871] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 289.978723][T24871] batadv0: left promiscuous mode [ 291.033704][T25112] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4832'. [ 291.073826][ T29] kauditd_printk_skb: 29177 callbacks suppressed [ 291.073877][ T29] audit: type=1400 audit(1759860474.793:918607): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 291.074033][ T29] audit: type=1400 audit(1759860474.803:918608): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 291.074143][ T29] audit: type=1400 audit(1759860474.803:918609): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 291.074338][ T29] audit: type=1400 audit(1759860474.803:918610): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 291.074568][ T29] audit: type=1400 audit(1759860474.803:918611): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 291.074662][ T29] audit: type=1400 audit(1759860474.803:918612): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 291.074799][ T29] audit: type=1400 audit(1759860474.803:918613): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 291.074971][ T29] audit: type=1400 audit(1759860474.803:918614): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 291.075123][ T29] audit: type=1400 audit(1759860474.803:918615): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 291.075230][ T29] audit: type=1400 audit(1759860474.803:918616): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 291.127153][T25124] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4837'. [ 291.344910][T25124] netdevsim netdevsim4 netdevsim0: entered allmulticast mode [ 291.381617][T25138] serio: Serial port ttyS3 [ 291.391580][T25136] netlink: 28 bytes leftover after parsing attributes in process `syz.3.4843'. [ 291.391628][T25136] netlink: 28 bytes leftover after parsing attributes in process `syz.3.4843'. [ 291.625345][T25172] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4854'. [ 291.625366][T25172] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4854'. [ 291.654412][T25172] wireguard0: entered promiscuous mode [ 291.654433][T25172] wireguard0: entered allmulticast mode [ 292.873830][T25338] netlink: 20 bytes leftover after parsing attributes in process `syz.1.4904'. [ 293.388595][T25407] netlink: 20 bytes leftover after parsing attributes in process `syz.4.4927'. [ 293.432223][T25407] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 293.439488][T25407] IPv6: NLM_F_CREATE should be set when creating new route [ 293.446705][T25407] IPv6: NLM_F_CREATE should be set when creating new route [ 293.648325][T25417] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25417 comm=syz.4.4930 [ 293.892585][T25449] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25449 comm=syz.0.4950 [ 294.040839][T25511] netlink: 'syz.1.4952': attribute type 13 has an invalid length. [ 294.072254][T25511] 0XD: refused to change device tx_queue_len [ 294.092938][T25511] A link change request failed with some changes committed already. Interface 30XD may have been left with an inconsistent configuration, please check. [ 294.715872][T25586] netlink: 2 bytes leftover after parsing attributes in process `syz.1.4975'. [ 294.739500][T25586] batadv_slave_1: entered promiscuous mode [ 294.977852][T25628] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4986'. [ 295.111934][T25577] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 295.120362][T25577] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 295.934333][T25770] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 296.086618][ T29] kauditd_printk_skb: 24489 callbacks suppressed [ 296.086632][ T29] audit: type=1400 audit(1759860479.811:942005): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 296.109712][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 296.120736][ T3040] audit: audit_lost=54198 audit_rate_limit=0 audit_backlog_limit=64 [ 296.128892][ T3040] audit: backlog limit exceeded [ 296.143717][ T29] audit: type=1400 audit(1759860479.811:942006): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 296.165165][ T29] audit: type=1400 audit(1759860479.811:942007): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 296.165572][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 296.186482][ T29] audit: type=1400 audit(1759860479.811:942008): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 296.193004][ T3040] audit: audit_lost=54199 audit_rate_limit=0 audit_backlog_limit=64 [ 296.214194][ T29] audit: type=1400 audit(1759860479.811:942009): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 298.142028][T25940] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 298.181235][T25943] sock: sock_timestamping_bind_phc: sock not bind to device [ 299.315335][T26014] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5142'. [ 300.152875][T26117] netlink: 24 bytes leftover after parsing attributes in process `syz.3.5177'. [ 301.098284][ T29] kauditd_printk_skb: 32551 callbacks suppressed [ 301.098298][ T29] audit: type=1400 audit(1759860484.830:974137): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 301.125955][ T29] audit: type=1400 audit(1759860484.830:974138): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 301.147197][ T29] audit: type=1400 audit(1759860484.830:974139): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 301.168797][ T29] audit: type=1400 audit(1759860484.830:974140): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 301.183457][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 301.190086][ T29] audit: type=1400 audit(1759860484.830:974141): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 301.190111][ T29] audit: type=1400 audit(1759860484.830:974142): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 301.196617][ T3040] audit: audit_lost=54341 audit_rate_limit=0 audit_backlog_limit=64 [ 301.218035][ T29] audit: type=1400 audit(1759860484.830:974143): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 301.239016][ T3040] audit: backlog limit exceeded [ 301.736728][T26325] netlink: 96 bytes leftover after parsing attributes in process `syz.0.5261'. [ 302.312067][T26367] netlink: 96 bytes leftover after parsing attributes in process `syz.4.5274'. [ 303.011484][T26474] netlink: 24 bytes leftover after parsing attributes in process `syz.4.5301'. [ 303.684272][T26550] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 303.690838][T26550] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 303.698493][T26550] vhci_hcd vhci_hcd.0: Device attached [ 303.722919][T26552] vhci_hcd: cannot find a urb of seqnum 8 max seqnum 1 [ 303.732760][ T37] vhci_hcd: stop threads [ 303.737032][ T37] vhci_hcd: release socket [ 303.741505][ T37] vhci_hcd: disconnect device [ 304.905801][T26710] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=26710 comm=syz.4.5369 [ 305.036155][T26735] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 305.369353][T26790] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 305.375924][T26790] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 305.383546][T26790] vhci_hcd vhci_hcd.0: Device attached [ 305.403344][T26791] vhci_hcd: cannot find a urb of seqnum 8 max seqnum 2 [ 305.410544][T15001] vhci_hcd: stop threads [ 305.414855][T15001] vhci_hcd: release socket [ 305.419319][T15001] vhci_hcd: disconnect device [ 305.718993][T26838] netlink: 'syz.1.5417': attribute type 10 has an invalid length. [ 305.748839][T26838] netlink: 'syz.1.5417': attribute type 10 has an invalid length. [ 306.108071][ T29] kauditd_printk_skb: 29824 callbacks suppressed [ 306.108164][ T29] audit: type=1400 audit(1759860745.834:999741): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 306.116297][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 306.142482][ T3040] audit: audit_lost=55751 audit_rate_limit=0 audit_backlog_limit=64 [ 306.150615][ T3040] audit: backlog limit exceeded [ 306.152683][T26870] audit: audit_backlog=65 > audit_backlog_limit=64 [ 306.159305][T26872] audit: audit_backlog=65 > audit_backlog_limit=64 [ 306.162142][T26870] audit: audit_lost=55752 audit_rate_limit=0 audit_backlog_limit=64 [ 306.168607][T26872] audit: audit_lost=55753 audit_rate_limit=0 audit_backlog_limit=64 [ 306.176572][T26870] audit: backlog limit exceeded [ 306.177351][ T29] audit: type=1400 audit(1759860745.834:999742): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 306.212191][T26866] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 306.218762][T26866] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 306.226460][T26866] vhci_hcd vhci_hcd.0: Device attached [ 306.271280][T26874] vhci_hcd: connection closed [ 306.271594][ T12] vhci_hcd: stop threads [ 306.280690][ T12] vhci_hcd: release socket [ 306.285121][ T12] vhci_hcd: disconnect device [ 308.025975][T27143] netlink: 16 bytes leftover after parsing attributes in process `syz.3.5524'. [ 308.055296][T27143] bond6: option lacp_rate: mode dependency failed, not supported in mode balance-rr(0) [ 308.070110][T27143] bond6 (unregistering): Released all slaves [ 308.845470][T27276] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5554'. [ 308.951066][T27293] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5563'. [ 308.960241][T27293] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5563'. [ 309.181557][T27330] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5581'. [ 309.215695][T27336] netlink: 16 bytes leftover after parsing attributes in process `syz.3.5584'. [ 309.224811][T27336] netlink: 116 bytes leftover after parsing attributes in process `syz.3.5584'. [ 309.316364][T27350] macvlan3: entered promiscuous mode [ 309.321817][T27350] macvlan3: entered allmulticast mode [ 309.533413][T27388] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5609'. [ 309.600364][T27393] bond6: option resend_igmp: invalid value (1024) [ 309.606828][T27393] bond6: option resend_igmp: allowed values 0 - 255 [ 309.651653][T27393] bond6 (unregistering): Released all slaves [ 309.899891][T27484] netlink: 830 bytes leftover after parsing attributes in process `syz.1.5623'. [ 311.117983][ T29] kauditd_printk_skb: 26822 callbacks suppressed [ 311.118000][ T29] audit: type=1400 audit(1759860750.834:1025661): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 311.153171][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 311.159767][ T3040] audit: audit_lost=56055 audit_rate_limit=0 audit_backlog_limit=64 [ 311.167190][T27696] audit: audit_backlog=65 > audit_backlog_limit=64 [ 311.167756][ T3040] audit: backlog limit exceeded [ 311.168359][T27694] audit: audit_backlog=65 > audit_backlog_limit=64 [ 311.174489][T27696] audit: audit_lost=56056 audit_rate_limit=0 audit_backlog_limit=64 [ 311.179384][T27694] audit: audit_lost=56057 audit_rate_limit=0 audit_backlog_limit=64 [ 311.185830][T27696] audit: backlog limit exceeded [ 311.193868][T27694] audit: backlog limit exceeded [ 311.650920][T27764] IPVS: Scheduler module ip_vs_ not found [ 313.522040][T27975] netlink: 'syz.1.5805': attribute type 21 has an invalid length. [ 313.538530][T27975] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5805'. [ 313.547718][T27975] netlink: 'syz.1.5805': attribute type 1 has an invalid length. [ 314.522557][T28090] netdevsim netdevsim0: Direct firmware load for ./file0/file1 failed with error -2 [ 314.625939][T28101] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5842'. [ 314.690300][T28101] bond0: entered promiscuous mode [ 314.696735][T28101] batadv0: entered promiscuous mode [ 314.756221][T28101] hsr0: Slave A (bond0) is not up; please bring it up to get a fully working HSR network [ 314.766151][T28101] hsr0: Slave B (batadv0) is not up; please bring it up to get a fully working HSR network [ 314.776987][T28101] 8021q: adding VLAN 0 to HW filter on device hsr0 [ 315.563730][T28248] netlink: 16 bytes leftover after parsing attributes in process `+}[@'. [ 316.128025][ T29] kauditd_printk_skb: 24779 callbacks suppressed [ 316.128041][ T29] audit: type=1400 audit(1759860755.844:1047045): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 316.156956][ T29] audit: type=1400 audit(1759860755.854:1047046): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 316.178489][ T29] audit: type=1400 audit(1759860755.854:1047047): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 316.197547][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 316.199876][ T29] audit: type=1400 audit(1759860755.854:1047048): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 316.206392][ T3040] audit: audit_lost=57190 audit_rate_limit=0 audit_backlog_limit=64 [ 316.227896][ T29] audit: type=1400 audit(1759860755.854:1047049): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 316.235787][ T3040] audit: backlog limit exceeded [ 316.237042][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 316.257342][ T29] audit: type=1400 audit(1759860755.854:1047050): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 317.026795][T28405] netlink: 96 bytes leftover after parsing attributes in process `syz.2.5942'. [ 317.470621][T28457] batadv_slave_1: left promiscuous mode [ 317.494767][T28457] wireguard1: left promiscuous mode [ 317.500196][T28457] geneve3: left promiscuous mode [ 317.505244][T28457] bridge0: left promiscuous mode [ 318.921857][T28604] macsec0: entered allmulticast mode [ 318.927326][T28604] veth1_macvtap: entered allmulticast mode [ 318.997582][T28614] bridge0: port 1(macsec1) entered blocking state [ 319.004233][T28614] bridge0: port 1(macsec1) entered disabled state [ 319.030674][T28614] macsec1: entered allmulticast mode [ 319.036035][T28614] bridge0: entered allmulticast mode [ 319.052015][T28614] macsec1: left allmulticast mode [ 319.057150][T28614] bridge0: left allmulticast mode [ 319.276457][T28656] netlink: 'syz.4.6053': attribute type 12 has an invalid length. [ 319.665541][T28702] netlink: 96 bytes leftover after parsing attributes in process `syz.0.6075'. [ 320.253570][T28768] netlink: 'syz.3.6107': attribute type 10 has an invalid length. [ 321.125197][T28851] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6145'. [ 321.137987][ T29] kauditd_printk_skb: 28512 callbacks suppressed [ 321.138001][ T29] audit: type=1400 audit(1759860760.844:1072618): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 321.138424][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 321.144524][ T29] audit: type=1400 audit(1759860760.844:1072619): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 321.144552][ T29] audit: type=1400 audit(1759860760.844:1072620): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 321.144592][ T29] audit: type=1400 audit(1759860760.844:1072621): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 321.165870][ T3040] audit: audit_lost=58173 audit_rate_limit=0 audit_backlog_limit=64 [ 321.165890][ T3040] audit: backlog limit exceeded [ 321.166883][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 321.172456][ T29] audit: type=1400 audit(1759860760.844:1072622): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 321.172527][ T29] audit: type=1400 audit(1759860760.844:1072623): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 321.594610][T28889] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6159'. [ 322.353300][T28923] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6175'. [ 322.582782][T28955] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6189'. [ 322.677271][T28972] sch_tbf: burst 127 is lower than device syzkaller0 mtu (1514) ! [ 322.903570][T29026] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6211'. [ 323.944764][T29159] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6255'. [ 323.953799][T29159] netlink: 32 bytes leftover after parsing attributes in process `syz.4.6255'. [ 323.962841][T29159] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6255'. [ 324.812154][T29263] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6280'. [ 325.225416][T29308] bridge0: entered promiscuous mode [ 325.235829][T29308] bridge0: port 1(macsec0) entered blocking state [ 325.242388][T29308] bridge0: port 1(macsec0) entered disabled state [ 325.253659][T29308] macsec0: entered allmulticast mode [ 325.259157][T29308] bridge0: entered allmulticast mode [ 325.274989][T29308] macsec0: left allmulticast mode [ 325.280144][T29308] bridge0: left allmulticast mode [ 325.302409][T29308] bridge0: left promiscuous mode [ 325.428699][T29324] ALSA: seq fatal error: cannot create timer (-22) [ 325.647290][T29358] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6321'. [ 325.656452][T29358] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6321'. [ 325.674261][T29356] bridge0: entered promiscuous mode [ 325.681346][T29356] bridge0: port 1(macsec0) entered blocking state [ 325.688021][T29356] bridge0: port 1(macsec0) entered disabled state [ 325.714126][T29356] macsec0: entered allmulticast mode [ 325.719506][T29356] bridge0: entered allmulticast mode [ 325.735397][T29356] macsec0: left allmulticast mode [ 325.740525][T29356] bridge0: left allmulticast mode [ 325.755635][T29356] bridge0: left promiscuous mode [ 325.771977][T29372] netlink: 'syz.0.6327': attribute type 20 has an invalid length. [ 325.779930][T29372] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6327'. [ 325.797175][T15001] netdevsim netdevsim0 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 325.806480][T29372] netlink: 'syz.0.6327': attribute type 20 has an invalid length. [ 325.814359][T29372] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6327'. [ 325.823780][T15001] netdevsim netdevsim0 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 325.833204][T15001] netdevsim netdevsim0 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 325.842651][T15001] netdevsim netdevsim0 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 326.070677][T29407] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 326.148118][ T29] kauditd_printk_skb: 32268 callbacks suppressed [ 326.148132][ T29] audit: type=1400 audit(1759860765.874:1100414): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 326.175928][ T29] audit: type=1400 audit(1759860765.874:1100415): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 326.187386][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 326.203863][ T3040] audit: audit_lost=59667 audit_rate_limit=0 audit_backlog_limit=64 [ 326.211892][ T3040] audit: backlog limit exceeded [ 326.239480][ T3311] audit: audit_backlog=65 > audit_backlog_limit=64 [ 326.243457][ T29] audit: type=1400 audit(1759860765.874:1100416): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 326.246018][ T3311] audit: audit_lost=59668 audit_rate_limit=0 audit_backlog_limit=64 [ 326.246036][ T3311] audit: backlog limit exceeded [ 326.267340][ T29] audit: type=1400 audit(1759860765.874:1100417): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 326.336851][T29415] bridge0: entered promiscuous mode [ 326.373604][T29415] bridge0: port 1(macsec1) entered blocking state [ 326.380295][T29415] bridge0: port 1(macsec1) entered disabled state [ 326.408662][T29415] macsec1: entered allmulticast mode [ 326.414054][T29415] bridge0: entered allmulticast mode [ 326.436190][T29415] macsec1: left allmulticast mode [ 326.441401][T29415] bridge0: left allmulticast mode [ 326.465081][T29415] bridge0: left promiscuous mode [ 326.694011][T29464] bridge0: entered promiscuous mode [ 326.704060][T29464] bridge0: port 1(macsec0) entered blocking state [ 326.710617][T29464] bridge0: port 1(macsec0) entered disabled state [ 326.723004][T29464] macsec0: entered allmulticast mode [ 326.728423][T29464] bridge0: entered allmulticast mode [ 326.738260][T29464] macsec0: left allmulticast mode [ 326.743337][T29464] bridge0: left allmulticast mode [ 326.756784][T29464] bridge0: left promiscuous mode [ 326.919571][T29500] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6375'. [ 328.458821][T29628] netlink: 'syz.4.6444': attribute type 29 has an invalid length. [ 328.489014][T29628] netlink: 'syz.4.6444': attribute type 29 has an invalid length. [ 329.576777][T29743] netlink: 96 bytes leftover after parsing attributes in process `syz.4.6501'. [ 329.845067][T29759] netlink: 132 bytes leftover after parsing attributes in process `syz.4.6509'. [ 331.157987][ T29] kauditd_printk_skb: 25607 callbacks suppressed [ 331.158002][ T29] audit: type=1400 audit(1759860770.874:1124348): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 331.168923][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 331.192365][ T3040] audit: audit_lost=60228 audit_rate_limit=0 audit_backlog_limit=64 [ 331.200397][ T3040] audit: backlog limit exceeded [ 331.242791][ T29] audit: type=1400 audit(1759860770.884:1124349): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 331.246436][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 331.264189][ T29] audit: type=1400 audit(1759860770.884:1124350): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 331.270710][ T3040] audit: audit_lost=60229 audit_rate_limit=0 audit_backlog_limit=64 [ 331.270728][ T3040] audit: backlog limit exceeded [ 331.305997][ T29] audit: type=1400 audit(1759860770.884:1124351): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 331.594627][T29827] netlink: 'syz.0.6537': attribute type 3 has an invalid length. [ 331.905041][T29862] Falling back ldisc for ptm0. [ 332.132230][T29910] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6575'. [ 332.164077][T29905] Cannot find add_set index 0 as target [ 332.305622][T29930] bond5: ARP target 9.0.0.0 is already present [ 332.311926][T29930] bond5: option arp_ip_target: invalid value (9) [ 332.341809][T29930] bond5 (unregistering): Released all slaves [ 332.728994][T30050] ipvlan2: entered promiscuous mode [ 332.968091][T30088] netlink: 'syz.2.6625': attribute type 6 has an invalid length. [ 333.042552][T30099] bridge0: entered promiscuous mode [ 333.074202][T30099] bridge0: port 1(macsec1) entered blocking state [ 333.080815][T30099] bridge0: port 1(macsec1) entered disabled state [ 333.116551][T30099] macsec1: entered allmulticast mode [ 333.122010][T30099] bridge0: entered allmulticast mode [ 333.158951][T30109] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6636'. [ 333.168001][T30109] netlink: 'syz.1.6636': attribute type 7 has an invalid length. [ 333.175753][T30109] netlink: 'syz.1.6636': attribute type 8 has an invalid length. [ 333.183556][T30109] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6636'. [ 333.195319][T30099] macsec1: left allmulticast mode [ 333.200587][T30099] bridge0: left allmulticast mode [ 333.235312][T30099] bridge0: left promiscuous mode [ 333.458920][T30141] veth0_to_team: entered promiscuous mode [ 333.504730][T30147] netlink: 52 bytes leftover after parsing attributes in process `syz.2.6653'. [ 334.052143][T30195] netlink: 96 bytes leftover after parsing attributes in process `syz.1.6671'. [ 334.335532][T30223] netlink: 3 bytes leftover after parsing attributes in process `syz.1.6686'. [ 334.390705][T30223] batadv0: entered promiscuous mode [ 334.396019][T30223] batadv0: entered allmulticast mode [ 334.453711][T30227] wg2: entered promiscuous mode [ 334.458654][T30227] wg2: entered allmulticast mode [ 334.576076][T30243] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6690'. [ 334.585117][T30243] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6690'. [ 334.594104][T30243] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6690'. [ 334.606818][T30243] netlink: 'syz.4.6690': attribute type 6 has an invalid length. [ 334.836728][T30281] sch_tbf: burst 2976 is lower than device lo mtu (11337746) ! [ 335.244282][T30364] __nla_validate_parse: 1 callbacks suppressed [ 335.244317][T30364] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6740'. [ 335.259628][T30364] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6740'. [ 335.268735][T30364] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6740'. [ 335.278529][T30364] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6740'. [ 335.287569][T30364] netlink: 'syz.1.6740': attribute type 6 has an invalid length. [ 335.367754][T30384] netlink: 96 bytes leftover after parsing attributes in process `syz.4.6744'. [ 335.602828][T30415] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6758'. [ 335.623263][T30415] veth1_macvtap: left allmulticast mode [ 335.743023][T30433] sch_tbf: burst 2976 is lower than device lo mtu (11337746) ! [ 336.067653][T30463] netlink: 'syz.0.6780': attribute type 12 has an invalid length. [ 336.171655][ T29] kauditd_printk_skb: 19627 callbacks suppressed [ 336.171670][ T29] audit: type=1400 audit(1759860775.894:1140961): avc: denied { prog_load } for pid=30474 comm="syz.2.6785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 336.226071][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 336.232718][ T3040] audit: audit_lost=61236 audit_rate_limit=0 audit_backlog_limit=64 [ 336.240797][ T3040] audit: backlog limit exceeded [ 336.247375][T30484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 336.254072][T30484] audit: audit_lost=61237 audit_rate_limit=0 audit_backlog_limit=64 [ 336.258127][T30487] audit: audit_backlog=65 > audit_backlog_limit=64 [ 336.262272][T30484] audit: backlog limit exceeded [ 336.268696][T30487] audit: audit_lost=61238 audit_rate_limit=0 audit_backlog_limit=64 [ 336.273847][T30486] audit: audit_backlog=65 > audit_backlog_limit=64 [ 336.473491][T30514] netlink: 3 bytes leftover after parsing attributes in process `syz.3.6804'. [ 336.503038][T30514] batadv0: entered promiscuous mode [ 336.508091][T30518] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6805'. [ 336.508431][T30514] batadv0: entered allmulticast mode [ 339.245437][T30883] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6948'. [ 339.260213][T30883] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6948'. [ 341.177955][ T29] kauditd_printk_skb: 22495 callbacks suppressed [ 341.177974][ T29] audit: type=1400 audit(1759860780.894:1161042): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 341.187086][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 341.205865][ T29] audit: type=1400 audit(1759860780.894:1161043): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 341.212406][ T3040] audit: audit_lost=62044 audit_rate_limit=0 audit_backlog_limit=64 [ 341.233673][ T29] audit: type=1400 audit(1759860780.894:1161044): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 341.241686][ T3040] audit: backlog limit exceeded [ 341.267550][T31084] audit: audit_backlog=65 > audit_backlog_limit=64 [ 341.267861][ T29] audit: type=1400 audit(1759860780.894:1161045): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 341.274417][T31084] audit: audit_lost=62045 audit_rate_limit=0 audit_backlog_limit=64 [ 341.295653][ T29] audit: type=1400 audit(1759860780.894:1161046): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 341.563061][T31127] netlink: 'syz.3.7066': attribute type 4 has an invalid length. [ 341.600377][T31127] netlink: 'syz.3.7066': attribute type 4 has an invalid length. [ 342.384496][T31234] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 343.380607][T31397] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 343.387165][T31397] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 343.394746][T31397] vhci_hcd vhci_hcd.0: Device attached [ 343.406472][T31398] vhci_hcd: connection closed [ 343.406645][ T12] vhci_hcd: stop threads [ 343.415665][ T12] vhci_hcd: release socket [ 343.420195][ T12] vhci_hcd: disconnect device [ 344.126532][T31468] netlink: 12 bytes leftover after parsing attributes in process `syz.0.7228'. [ 344.135630][T31468] netlink: 28 bytes leftover after parsing attributes in process `syz.0.7228'. [ 344.144748][T31468] netlink: 12 bytes leftover after parsing attributes in process `syz.0.7228'. [ 344.166547][T31468] netlink: 28 bytes leftover after parsing attributes in process `syz.0.7228'. [ 344.175675][T31468] netlink: 'syz.0.7228': attribute type 6 has an invalid length. [ 344.873999][T31574] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7271'. [ 344.883063][T31574] netlink: 20 bytes leftover after parsing attributes in process `syz.1.7271'. [ 344.892302][T31574] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7271'. [ 344.901240][T31574] netlink: 20 bytes leftover after parsing attributes in process `syz.1.7271'. [ 345.954251][T31678] netlink: 3 bytes leftover after parsing attributes in process `syz.4.7319'. [ 345.999255][T31678] batadv0: entered promiscuous mode [ 346.004540][T31678] batadv0: entered allmulticast mode [ 346.191217][ T29] kauditd_printk_skb: 27055 callbacks suppressed [ 346.191234][ T29] audit: type=1400 audit(1759860785.914:1187448): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 346.199581][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 346.225621][ T3040] audit: audit_lost=62264 audit_rate_limit=0 audit_backlog_limit=64 [ 346.232910][ T29] audit: type=1400 audit(1759860785.914:1187449): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 346.233682][ T3040] audit: backlog limit exceeded [ 346.254929][ T29] audit: type=1400 audit(1759860785.914:1187450): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 346.266964][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 346.281143][ T29] audit: type=1400 audit(1759860785.914:1187451): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 346.287649][ T3040] audit: audit_lost=62265 audit_rate_limit=0 audit_backlog_limit=64 [ 346.308922][ T29] audit: type=1400 audit(1759860785.914:1187452): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 346.983294][T31809] netlink: 3 bytes leftover after parsing attributes in process `syz.0.7380'. [ 347.092357][T31809] batadv0: entered promiscuous mode [ 347.097656][T31809] batadv0: entered allmulticast mode [ 348.603912][T32012] netlink: 'syz.2.7462': attribute type 29 has an invalid length. [ 348.618216][T32012] netlink: 'syz.2.7462': attribute type 29 has an invalid length. [ 348.744418][T32046] sch_tbf: burst 32855 is lower than device lo mtu (11337746) ! [ 350.871687][T32355] netlink: 'syz.3.7577': attribute type 10 has an invalid length. [ 351.077039][T32380] IPv6: NLM_F_CREATE should be specified when creating new route [ 351.198293][ T29] kauditd_printk_skb: 27716 callbacks suppressed [ 351.198312][ T29] audit: type=1400 audit(1759860790.924:1207487): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 351.212403][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 351.232562][ T3040] audit: audit_lost=64826 audit_rate_limit=0 audit_backlog_limit=64 [ 351.238829][ T3311] audit: audit_backlog=65 > audit_backlog_limit=64 [ 351.240573][ T3040] audit: backlog limit exceeded [ 351.247090][ T3311] audit: audit_lost=64827 audit_rate_limit=0 audit_backlog_limit=64 [ 351.256672][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 351.260013][ T3311] audit: backlog limit exceeded [ 351.266491][ T3040] audit: audit_lost=64828 audit_rate_limit=0 audit_backlog_limit=64 [ 351.279664][ T3040] audit: backlog limit exceeded [ 352.786490][T32623] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32623 comm=syz.3.7694 [ 353.356437][T32682] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32682 comm=syz.1.7721 [ 353.543092][T32706] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 353.673995][T32715] netlink: 'syz.4.7736': attribute type 1 has an invalid length. [ 353.696989][T32717] __nla_validate_parse: 4 callbacks suppressed [ 353.697002][T32717] netlink: 8 bytes leftover after parsing attributes in process `syz.0.7737'. [ 353.749484][T32719] netlink: 3 bytes leftover after parsing attributes in process `syz.4.7736'. [ 353.771879][T32715] bond6: entered promiscuous mode [ 353.777114][T32715] 8021q: adding VLAN 0 to HW filter on device bond6 [ 353.853582][T32719] batadv0: entered promiscuous mode [ 353.858921][T32719] batadv0: entered allmulticast mode [ 353.918785][T32719] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 353.926944][T32719] bond6: (slave batadv0): making interface the new active one [ 353.961580][T32719] bond6: (slave batadv0): Enslaving as an active interface with an up link [ 354.234022][ T307] sch_tbf: peakrate 7 is lower than or equals to rate 7 ! [ 354.483353][ T333] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7754'. [ 354.899077][ T384] netlink: 'syz.2.7776': attribute type 1 has an invalid length. [ 354.923830][ T384] bond6: entered promiscuous mode [ 354.938060][ T384] 8021q: adding VLAN 0 to HW filter on device bond6 [ 355.000490][ T384] netlink: 3 bytes leftover after parsing attributes in process `syz.2.7776'. [ 355.015160][ T384] batadv1: entered promiscuous mode [ 355.020636][ T384] batadv1: entered allmulticast mode [ 355.027535][ T384] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 355.036096][ T384] bond6: (slave batadv1): making interface the new active one [ 355.048406][ T384] bond6: (slave batadv1): Enslaving as an active interface with an up link [ 355.151088][ T448] netlink: 'syz.1.7791': attribute type 4 has an invalid length. [ 355.161473][ T448] netlink: 'syz.1.7791': attribute type 4 has an invalid length. [ 355.279868][ T463] netlink: 'syz.0.7797': attribute type 1 has an invalid length. [ 355.324632][ T463] bond6: entered promiscuous mode [ 355.336046][ T500] netlink: 3 bytes leftover after parsing attributes in process `syz.0.7797'. [ 355.337779][ T463] 8021q: adding VLAN 0 to HW filter on device bond6 [ 355.419931][ T500] batadv0: entered promiscuous mode [ 355.425188][ T500] batadv0: entered allmulticast mode [ 355.456439][ T500] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 355.465044][ T500] bond6: (slave batadv0): making interface the new active one [ 355.473543][ T500] bond6: (slave batadv0): Enslaving as an active interface with an up link [ 355.611927][ T528] netlink: 96 bytes leftover after parsing attributes in process `syz.3.7809'. [ 356.210120][ T29] kauditd_printk_skb: 22368 callbacks suppressed [ 356.210140][ T29] audit: type=1400 audit(1759860795.934:1229430): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.210199][ T29] audit: type=1400 audit(1759860795.934:1229431): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.210319][ T29] audit: type=1400 audit(1759860795.934:1229432): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.210348][ T29] audit: type=1400 audit(1759860795.934:1229433): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.210447][ T29] audit: type=1400 audit(1759860795.934:1229434): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.210475][ T29] audit: type=1400 audit(1759860795.934:1229435): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.210548][ T29] audit: type=1400 audit(1759860795.934:1229436): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.210587][ T29] audit: type=1400 audit(1759860795.934:1229437): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.210617][ T29] audit: type=1400 audit(1759860795.934:1229438): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.210658][ T29] audit: type=1400 audit(1759860795.934:1229439): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.241739][ T623] netlink: 'syz.3.7831': attribute type 12 has an invalid length. [ 356.457848][ T629] sch_tbf: burst 3298 is lower than device lo mtu (11337746) ! [ 356.626305][ T651] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.7842'. [ 356.626636][ T648] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.7842'. [ 356.711670][ T661] netlink: 'syz.3.7848': attribute type 7 has an invalid length. [ 356.711705][ T661] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7848'. [ 357.135245][ T715] netlink: 28 bytes leftover after parsing attributes in process `syz.4.7874'. [ 358.875994][ T967] netlink: 'syz.2.7973': attribute type 3 has an invalid length. [ 359.820120][ T1102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=1102 comm=syz.1.8008 [ 360.037429][ T1125] netlink: 'syz.0.8022': attribute type 10 has an invalid length. [ 360.045437][ T1125] __nla_validate_parse: 2 callbacks suppressed [ 360.045455][ T1125] netlink: 40 bytes leftover after parsing attributes in process `syz.0.8022'. [ 360.088278][ T1125] : entered promiscuous mode [ 360.093513][ T1125] : entered allmulticast mode [ 360.098848][ T1125] veth0_vlan: entered allmulticast mode [ 360.104533][ T1125] A link change request failed with some changes committed already. Interface may have been left with an inconsistent configuration, please check. [ 361.223496][ T29] kauditd_printk_skb: 23809 callbacks suppressed [ 361.223514][ T29] audit: type=1400 audit(1759860800.934:1251230): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 361.251388][ T29] audit: type=1400 audit(1759860800.944:1251231): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 361.272722][ T29] audit: type=1400 audit(1759860800.944:1251232): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 361.294150][ T29] audit: type=1400 audit(1759860800.944:1251233): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 361.296455][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 361.315460][ T29] audit: type=1400 audit(1759860800.944:1251234): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 361.315493][ T29] audit: type=1400 audit(1759860800.944:1251235): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 361.322045][ T3040] audit: audit_lost=65644 audit_rate_limit=0 audit_backlog_limit=64 [ 361.322065][ T3040] audit: backlog limit exceeded [ 361.344187][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 361.994567][ T1348] netlink: 40 bytes leftover after parsing attributes in process `syz.3.8099'. [ 362.152755][ T1368] serio: Serial port ptm0 [ 362.749178][ T1439] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8129'. [ 362.758132][ T1439] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8129'. [ 363.745568][ T1522] netlink: 96 bytes leftover after parsing attributes in process `syz.4.8153'. [ 364.489015][ T1630] netlink: 96 bytes leftover after parsing attributes in process `syz.0.8208'. [ 364.529584][ T1634] bond5: (slave bridge5): Releasing active interface [ 365.309341][ T1702] netlink: 'syz.0.8240': attribute type 7 has an invalid length. [ 365.317121][ T1702] netlink: 8 bytes leftover after parsing attributes in process `syz.0.8240'. [ 366.228017][ T29] kauditd_printk_skb: 31928 callbacks suppressed [ 366.228077][ T29] audit: type=1400 audit(1759860805.944:1281026): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 366.270825][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 366.272291][ T1810] audit: audit_backlog=65 > audit_backlog_limit=64 [ 366.277396][ T3040] audit: audit_lost=66358 audit_rate_limit=0 audit_backlog_limit=64 [ 366.283945][ T1810] audit: audit_lost=66359 audit_rate_limit=0 audit_backlog_limit=64 [ 366.291957][ T3040] audit: backlog limit exceeded [ 366.294107][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 366.299994][ T1810] audit: backlog limit exceeded [ 366.308557][ T29] audit: type=1400 audit(1759860805.954:1281027): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 366.311419][ T3040] audit: audit_lost=66360 audit_rate_limit=0 audit_backlog_limit=64 [ 366.386147][ T1818] netlink: 96 bytes leftover after parsing attributes in process `syz.4.8263'. [ 366.693013][ T1879] Q6\bY4: entered promiscuous mode [ 366.699047][ T1879] Q6\bY4: entered allmulticast mode [ 366.722759][ T1879] tunl0: entered promiscuous mode [ 366.728140][ T1879] tunl0: entered allmulticast mode [ 366.736870][ T1879] gre0: entered promiscuous mode [ 366.742146][ T1879] gre0: entered allmulticast mode [ 366.749044][ T1879] gretap0: entered promiscuous mode [ 366.754303][ T1879] gretap0: entered allmulticast mode [ 366.773311][ T1879] erspan0: entered promiscuous mode [ 366.798352][ T1879] ip_vti0: entered promiscuous mode [ 366.816195][ T1879] ip6_vti0: entered promiscuous mode [ 367.002517][ T1910] netlink: 28 bytes leftover after parsing attributes in process `syz.0.8292'. [ 367.011708][ T1910] netlink: 28 bytes leftover after parsing attributes in process `syz.0.8292'. [ 368.563144][ T2037] pim6reg1: entered promiscuous mode [ 368.568636][ T2037] pim6reg1: entered allmulticast mode [ 368.692386][ T2053] netlink: 14 bytes leftover after parsing attributes in process `syz.4.8351'. [ 369.351453][ T2154] netlink: 168 bytes leftover after parsing attributes in process `syz.4.8388'. [ 369.876489][ T2218] netlink: 'syz.4.8414': attribute type 4 has an invalid length. [ 369.888061][ T2218] netlink: 'syz.4.8414': attribute type 4 has an invalid length. [ 370.260274][ T2241] netlink: 1276 bytes leftover after parsing attributes in process `syz.4.8421'. [ 370.352685][ T2247] netlink: 'syz.1.8422': attribute type 17 has an invalid length. [ 370.368938][ T2247] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 370.542054][ T2269] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8424'. [ 370.874805][ T2313] Cannot find add_set index 0 as target [ 371.066171][ T2329] bridge: RTM_NEWNEIGH with invalid ether address [ 371.218331][ T2354] netlink: 'syz.3.8447': attribute type 17 has an invalid length. [ 371.237955][ T29] kauditd_printk_skb: 27683 callbacks suppressed [ 371.237973][ T29] audit: type=1400 audit(1759860810.954:1308302): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 371.258174][ T2354] A link change request failed with some changes committed already. Interface Q6\bY4 may have been left with an inconsistent configuration, please check. [ 371.303295][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 371.303857][ T2366] audit: audit_backlog=65 > audit_backlog_limit=64 [ 371.309950][ T3040] audit: audit_lost=66497 audit_rate_limit=0 audit_backlog_limit=64 [ 371.316587][ T2366] audit: audit_lost=66498 audit_rate_limit=0 audit_backlog_limit=64 [ 371.324534][ T3040] audit: backlog limit exceeded [ 371.332521][ T2366] audit: backlog limit exceeded [ 371.342253][ T29] audit: type=1400 audit(1759860810.974:1308303): avc: denied { map_create } for pid=2356 comm="syz.0.8453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 371.348187][ T2369] audit: audit_backlog=65 > audit_backlog_limit=64 [ 371.361772][ T29] audit: type=1400 audit(1759860810.974:1308304): avc: denied { prog_load } for pid=2356 comm="syz.0.8453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 371.412201][ T2380] netlink: 'syz.2.8455': attribute type 5 has an invalid length. [ 371.462850][T15001] Bluetooth: hci0: Frame reassembly failed (-84) [ 371.584409][ T2402] syzkaller0: entered promiscuous mode [ 371.590241][ T2402] syzkaller0: entered allmulticast mode [ 372.338177][ T2513] netlink: 'syz.3.8487': attribute type 4 has an invalid length. [ 373.407601][ T2670] netlink: 1363 bytes leftover after parsing attributes in process `syz.3.8533'. [ 373.507936][ T8152] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 373.514096][ T3618] Bluetooth: hci0: command 0x1003 tx timeout [ 373.686457][ T2720] netlink: 'syz.3.8553': attribute type 21 has an invalid length. [ 374.013251][ T2773] netlink: 40 bytes leftover after parsing attributes in process `syz.3.8574'. [ 374.013742][ T3420] Process accounting resumed [ 374.366202][ T2834] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8588'. [ 374.462345][ T2841] netlink: 14593 bytes leftover after parsing attributes in process `syz.2.8590'. [ 374.572952][ T2853] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8595'. [ 374.779962][ T2869] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8602'. [ 374.820792][ T2869] team0: entered promiscuous mode [ 374.825889][ T2869] team0: entered allmulticast mode [ 374.844258][ T2869] 8021q: adding VLAN 0 to HW filter on device team0 [ 375.618270][ T2937] netlink: 156 bytes leftover after parsing attributes in process `syz.4.8617'. [ 375.908109][ T3008] netlink: 'syz.3.8631': attribute type 10 has an invalid length. [ 376.247891][ T29] kauditd_printk_skb: 25403 callbacks suppressed [ 376.254402][ T29] audit: type=1400 audit(1759860815.964:1333223): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 376.262822][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 376.276062][ T3065] audit: audit_backlog=65 > audit_backlog_limit=64 [ 376.282613][ T3040] audit: audit_lost=66661 audit_rate_limit=0 audit_backlog_limit=64 [ 376.288920][ T3065] audit: audit_lost=66662 audit_rate_limit=0 audit_backlog_limit=64 [ 376.288937][ T3065] audit: backlog limit exceeded [ 376.291786][ T29] audit: type=1400 audit(1759860815.974:1333224): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 376.297000][ T3040] audit: backlog limit exceeded [ 376.304995][ T29] audit: type=1400 audit(1759860815.974:1333225): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 376.331786][ T3066] audit: audit_backlog=65 > audit_backlog_limit=64 [ 377.035952][ T3104] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8659'. [ 377.252265][ T3130] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8668'. [ 378.296316][ T3282] netlink: 'syz.4.8704': attribute type 39 has an invalid length. [ 378.546451][ T3333] veth0_to_team: entered promiscuous mode [ 378.714479][ T3368] netlink: 'syz.4.8723': attribute type 8 has an invalid length. [ 379.389178][ T3435] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8739'. [ 379.505688][ T3461] syzkaller0: entered promiscuous mode [ 379.511302][ T3461] syzkaller0: entered allmulticast mode [ 379.877029][ T3482] syzkaller0: entered promiscuous mode [ 379.882605][ T3482] syzkaller0: entered allmulticast mode [ 380.342489][ T3535] serio: Serial port ptm0 [ 380.390822][ T3540] netlink: 28 bytes leftover after parsing attributes in process `syz.1.8769'. [ 380.405898][ T3540] netem: change failed [ 380.595217][ T3548] syzkaller0: entered promiscuous mode [ 380.600865][ T3548] syzkaller0: entered allmulticast mode [ 380.685004][ T3562] netlink: 'syz.3.8776': attribute type 4 has an invalid length. [ 380.698560][ T3562] netlink: 'syz.3.8776': attribute type 4 has an invalid length. [ 380.780816][ T3571] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8779'. [ 380.911500][ T3578] syzkaller0: entered promiscuous mode [ 380.917014][ T3578] syzkaller0: entered allmulticast mode [ 381.095077][ T3598] syzkaller0: entered promiscuous mode [ 381.100638][ T3598] syzkaller0: entered allmulticast mode [ 381.257994][ T29] kauditd_printk_skb: 25535 callbacks suppressed [ 381.258011][ T29] audit: type=1400 audit(1759860820.974:1351628): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 381.286003][ T29] audit: type=1400 audit(1759860820.974:1351629): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 381.307766][ T29] audit: type=1400 audit(1759860820.974:1351630): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 381.314665][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 381.329117][ T29] audit: type=1400 audit(1759860820.974:1351631): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 381.335614][ T3040] audit: audit_lost=69041 audit_rate_limit=0 audit_backlog_limit=64 [ 381.356944][ T29] audit: type=1400 audit(1759860820.974:1351632): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 381.356973][ T29] audit: type=1400 audit(1759860820.974:1351633): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 381.365009][ T3040] audit: backlog limit exceeded [ 381.368521][ T3636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 381.701657][ T3694] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8813'. [ 381.710686][ T3694] netlink: 'syz.3.8813': attribute type 30 has an invalid length. [ 381.733168][T15001] netdevsim netdevsim3 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 381.755013][T15001] netdevsim netdevsim3 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 381.778001][T15001] netdevsim netdevsim3 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 381.801236][T15001] netdevsim netdevsim3 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 381.833053][ T3718] netlink: 'syz.3.8822': attribute type 12 has an invalid length. [ 381.930286][ T3732] netlink: 24 bytes leftover after parsing attributes in process `syz.2.8827'. [ 381.951342][ T3732] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8827'. [ 382.780676][ T3799] netlink: 'syz.0.8847': attribute type 4 has an invalid length. [ 382.798306][ T3799] netlink: 'syz.0.8847': attribute type 4 has an invalid length. [ 382.821247][ T3803] netlink: 24 bytes leftover after parsing attributes in process `syz.2.8849'. [ 383.064759][ T3834] netlink: 'syz.2.8862': attribute type 4 has an invalid length. [ 383.083998][ T3834] netlink: 'syz.2.8862': attribute type 4 has an invalid length. [ 383.159450][ T3844] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8865'. [ 383.889961][ T3908] syzkaller0: entered promiscuous mode [ 383.895513][ T3908] syzkaller0: entered allmulticast mode [ 383.975016][ T3923] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8890'. [ 384.014911][ T3929] netlink: 'syz.0.8891': attribute type 10 has an invalid length. [ 384.022812][ T3929] netlink: 40 bytes leftover after parsing attributes in process `syz.0.8891'. [ 384.052782][ T3929] dummy0: entered promiscuous mode [ 384.068471][ T3929] A link change request failed with some changes committed already. Interface dummy0 may have been left with an inconsistent configuration, please check. [ 384.128888][ T3935] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8895'. [ 384.274362][ T3956] Process accounting resumed [ 384.398751][ T3967] bridge: RTM_NEWNEIGH with invalid ether address [ 384.784996][ T4027] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8923'. [ 385.651638][ T4096] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 386.144392][ T4129] __nla_validate_parse: 4 callbacks suppressed [ 386.144484][ T4129] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8950'. [ 386.267966][ T29] kauditd_printk_skb: 25379 callbacks suppressed [ 386.267984][ T29] audit: type=1400 audit(1759860825.984:1374062): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 386.282236][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 386.302416][ T3040] audit: audit_lost=70026 audit_rate_limit=0 audit_backlog_limit=64 [ 386.310635][ T3040] audit: backlog limit exceeded [ 386.322892][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 386.324484][ T4149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 386.329573][ T3040] audit: audit_lost=70027 audit_rate_limit=0 audit_backlog_limit=64 [ 386.336065][ T4149] audit: audit_lost=70028 audit_rate_limit=0 audit_backlog_limit=64 [ 386.344048][ T3040] audit: backlog limit exceeded [ 386.344595][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 386.824619][ T4180] netlink: '+}[@': attribute type 10 has an invalid length. [ 386.853061][ T4180] netlink: '+}[@': attribute type 10 has an invalid length. [ 387.199560][ T4232] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4232 comm=syz.0.8977 [ 387.319568][ T4243] netlink: 'syz.2.8982': attribute type 4 has an invalid length. [ 387.559504][ T4266] netlink: 28 bytes leftover after parsing attributes in process `syz.0.8991'. [ 387.666095][ T4276] netlink: 'syz.2.8996': attribute type 3 has an invalid length. [ 387.835807][ T4294] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9012'. [ 388.019256][ T4313] netlink: 12 bytes leftover after parsing attributes in process `syz.2.9010'. [ 388.058547][ T4307] netlink: 12 bytes leftover after parsing attributes in process `syz.0.9007'. [ 388.094420][ T3451] ================================================================== [ 388.102569][ T3451] BUG: KCSAN: data-race in alloc_pid / copy_process [ 388.109165][ T3451] [ 388.111477][ T3451] read-write to 0xffffffff8685feb8 of 4 bytes by task 37 on cpu 0: [ 388.119357][ T3451] alloc_pid+0x539/0x720 [ 388.123602][ T3451] copy_process+0xe25/0x2000 [ 388.128202][ T3451] kernel_clone+0x16c/0x5c0 [ 388.132706][ T3451] user_mode_thread+0x7d/0xb0 [ 388.137390][ T3451] call_usermodehelper_exec_work+0x41/0x160 [ 388.143313][ T3451] process_scheduled_works+0x4ce/0x9d0 [ 388.148776][ T3451] worker_thread+0x582/0x770 [ 388.153362][ T3451] kthread+0x489/0x510 [ 388.157431][ T3451] ret_from_fork+0x122/0x1b0 [ 388.162017][ T3451] ret_from_fork_asm+0x1a/0x30 [ 388.166800][ T3451] [ 388.169114][ T3451] read to 0xffffffff8685feb8 of 4 bytes by task 3451 on cpu 1: [ 388.176644][ T3451] copy_process+0x17fc/0x2000 [ 388.181319][ T3451] kernel_clone+0x16c/0x5c0 [ 388.185826][ T3451] user_mode_thread+0x7d/0xb0 [ 388.190516][ T3451] call_usermodehelper_exec_work+0x41/0x160 [ 388.196426][ T3451] process_scheduled_works+0x4ce/0x9d0 [ 388.201908][ T3451] worker_thread+0x582/0x770 [ 388.206495][ T3451] kthread+0x489/0x510 [ 388.210561][ T3451] ret_from_fork+0x122/0x1b0 [ 388.215144][ T3451] ret_from_fork_asm+0x1a/0x30 [ 388.219906][ T3451] [ 388.222221][ T3451] value changed: 0x80000177 -> 0x80000178 [ 388.227926][ T3451] [ 388.230239][ T3451] Reported by Kernel Concurrency Sanitizer on: [ 388.236394][ T3451] CPU: 1 UID: 0 PID: 3451 Comm: kworker/u8:7 Not tainted syzkaller #0 PREEMPT(voluntary) [ 388.246298][ T3451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 388.256353][ T3451] Workqueue: events_unbound call_usermodehelper_exec_work [ 388.263498][ T3451] ================================================================== [ 391.277993][ T29] kauditd_printk_skb: 37558 callbacks suppressed [ 391.278007][ T29] audit: type=1400 audit(1759861087.006:1410289): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 391.286316][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 391.306018][ T29] audit: type=1400 audit(1759861087.006:1410290): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 391.312418][ T3040] audit: audit_lost=70473 audit_rate_limit=0 audit_backlog_limit=64 [ 391.312454][ T3040] audit: backlog limit exceeded [ 391.312726][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 391.333732][ T29] audit: type=1400 audit(1759861087.006:1410291): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 391.341782][ T3040] audit: audit_lost=70474 audit_rate_limit=0 audit_backlog_limit=64 [ 391.341799][ T3040] audit: backlog limit exceeded [ 391.342628][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 396.288132][ T29] kauditd_printk_skb: 51640 callbacks suppressed [ 396.288149][ T29] audit: type=1400 audit(1759861092.006:1461930): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 396.301149][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 396.315880][ T29] audit: type=1400 audit(1759861092.016:1461931): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 396.322364][ T3040] audit: audit_lost=70476 audit_rate_limit=0 audit_backlog_limit=64 [ 396.343941][ T29] audit: type=1400 audit(1759861092.016:1461932): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 396.351623][ T3040] audit: backlog limit exceeded [ 396.352318][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 396.373030][ T29] audit: type=1400 audit(1759861092.016:1461933): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 396.377908][ T3040] audit: audit_lost=70477 audit_rate_limit=0 audit_backlog_limit=64 [ 396.377925][ T3040] audit: backlog limit exceeded