last executing test programs: 5.940857973s ago: executing program 1 (id=8061): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) syz_clone(0x10eb22f000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000001c0), 0x12) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB='+cpu'], 0x5) 2.308970085s ago: executing program 1 (id=8130): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = syz_io_uring_setup(0x18b0, &(0x7f0000000280)={0x0, 0x0, 0x10100}, &(0x7f0000000200), &(0x7f0000000340)=0x0) syz_io_uring_setup(0x1868, &(0x7f00000003c0), &(0x7f0000000040)=0x0, &(0x7f0000000240)) syz_io_uring_submit(r3, r2, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) io_uring_enter(r1, 0x184c, 0x0, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000002e00)={0xc, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000218110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000020000850000001700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000086000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 1.770426336s ago: executing program 3 (id=8149): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0x4d, 0xfffffffb, 0x7fffffff}}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040084) sendmsg$nl_route_sched(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000700)=@newqdisc={0x80, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdf8, {0x0, 0x0, 0x0, r5, {0x10}, {}, {0xa, 0x3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x54, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x9, 0x0, 0x1000, 0x10, 0x7635, 0xafb0}, {0x1, 0x0, 0x2, 0x8a, 0x0, 0x6}, 0xfff, 0x9, 0x15b8}}, @TCA_TBF_PARMS={0x28, 0x1, {{0x40, 0x2, 0x6, 0xff, 0xff, 0xfffff801}, {0x8, 0x0, 0x1, 0x0, 0x1000, 0xcd}, 0x5, 0x2, 0x1e86}}]}}]}, 0x80}, 0x1, 0x0, 0x0, 0x40098}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x4000050, &(0x7f00000001c0)={0x11, 0xf7, r6, 0x1, 0xd8, 0x6, @multicast}, 0x14) r7 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmmsg$inet(r0, &(0x7f00000017c0)=[{{&(0x7f0000000040)={0x2, 0x4e1c, @local}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @dev={0xac, 0x14, 0x14, 0x41}, @empty}}}], 0x20}}], 0x1, 0x8000004) 1.71948759s ago: executing program 1 (id=8150): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) socket$nl_xfrm(0x10, 0x3, 0x6) socket$l2tp6(0xa, 0x2, 0x73) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) getpgid(0x0) socket$kcm(0x10, 0x2, 0x0) r2 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket(0x10, 0x803, 0x0) bind$netlink(r4, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfd, 0x400}, 0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x40d, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40040}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) 1.650805783s ago: executing program 3 (id=8152): futimesat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x20071026}, 0x0) socket$unix(0x1, 0x5, 0x0) r0 = socket(0x3, 0x6, 0xb) getsockopt$bt_hci(r0, 0x84, 0x6d, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x9001, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x401, 0x20004, 0x572, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000600)=ANY=[], 0x110) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x1d, &(0x7f0000000180)=0x7, 0x4) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000340)=0x63ba, 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x31, &(0x7f0000000100)=0x8, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000880)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}, 0x1c, 0x0}}], 0x1, 0x60040000) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000011c0)={0x34, 0x0, 0x8, 0x301, 0x0, 0x0, {0x7, 0x0, 0x8}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6555}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @fccp}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x440e0}, 0x48010) 1.589182717s ago: executing program 3 (id=8154): fcntl$lock(0xffffffffffffffff, 0x6, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x9, 0x3}, 0x0, 0xa88, 0x8406, 0x9, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) ioperm(0x0, 0x7, 0x80006) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x11, &(0x7f0000001640)=ANY=[@ANYBLOB="18000000869a000000000000fbffffff18110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b70300000000000085000000830000000000009500000000e5cec94d4f00000018000000010000000000000000000018bf910000000000000000b7000000000000009500000000000000c4d527f9621e3de02a0300c4745b5730f52e202719dc52ad4f1bb017a2819227ccff3391b277ee247192598b11d2ca4d2b791f8e34a7bfecbbdca7dba9abf463aa01dad548dd297065679b4b60b7c4b678e5606f923fd818990b898b8f4b10974320887ad49c3f23fa5b17bf10032fcc84ae1a551c334d734c3f36a7c6f77cd8e06abb8fb3928c945f705f0c1731c3fa6e840dabe3"], 0x0, 0x3, 0x42, &(0x7f0000000580)=""/66, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), 0x0, 0x10, 0xdc3f}, 0x94) r0 = syz_open_dev$mouse(0x0, 0x0, 0x82340) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x18, 0x4, &(0x7f0000001800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x80000001}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, 0x0, 0x3, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001900)=[r0], 0x0, 0x10, 0x2}, 0x94) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x404, &(0x7f0000000340)={[{@errors_remount}, {@nodiscard}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@barrier}, {@jqfmt_vfsold}, {@quota}]}, 0x1, 0x42f, &(0x7f0000000940)="$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") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000400)) prlimit64(0x0, 0x7, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x1008490, &(0x7f0000000a40)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000000a80)="$eJzs3c9vVFsdAPDvnXZoKQMFZaFGBRFFQ5j+ABqCC2GjMYTESFy5gNoOTdMZpum0SCuLsnRvIokr/RPcuTBh5cKdO925wYUJKnkv9CVvMS/3zqUd2g7te7Qd6Hw+ye2955xhvufMcM6Ze2B6AuhZZyNiNSKORMS9iBjO85P8iButI33cq5ePp9ZePp5Kotm8878kK0/zou3PpI7lzzkYET/7ccQvk61xG8src5PVamUhT48s1uZHGssrl2YLec74xNjE6LXLV8f3rK1nan968aPZWz//y5+/8fzvq9//dVqt0m+OZ2Xt7dhLraYXo9SW1x8Rt/YjWJf0539/+PCkve1LEXEu6//D0Ze9mwDAYdZsDkdzuD0NABx26f1/KZJCOV8LKEWhUC631vBOx1ChWm8sXhyuLz2YjmwN62QUC/dnq5XRfK3wZBSTND2WXW+kxzelL0fEqYj47cDRLF2eqlenu/nBBwB62LFN8//HA635HwA45Aa7XQEA4MCZ/wGg95j/AaD3fI7537cDAeCQcP8PAL3H/A8AvWfH+f/JwdQDADgQP719Oz2aa/nvv55+uLz0g9LDS9OVxly5tjRVnqovzJdn6vWZaqU81Wzu9HzVen1+7Mp6srG8crdWX3qweHe2NjlTuVsp7nN7AICdnTrz7J9JRKxeP5od0baXg7kaDrdCtysAdE1ftysAdI3v80Dv2sU9vmUAOOS22aL3DR3/i9BTm7/Ch+rCV63/Q6+y/g+964ut//9wz+sBHDzr/9C7ms3Env8A0GOs8QPv9O//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0KNK2ZEUytle4Kvpz0K5HHE8Ik5GMbk/W62MRsSJiPjHQHEgTY91u9IAwDsq/CfJ9/+6MHy+tLn0SPLJQHaOiF/9/s7vHk0uLi6Mpfn/X89ffJrnjx/pRgMAgHY3tma15un83HYj/+rl46nXx0FW8cXN1uaiady1/GiV9Ed/dh6MYkQMfZTk6Zb080rfHsRffRIRX9lo/6O2CKVsDaS18+nm+Gns4/sQf+P13xy/8Eb8QlaWnovZa/HlPagL9JpnN1vjZN730i6W979CnM3O2/f/wWyEenevx7+1LeNfYX3869sSP8n6/Nn19Ntr8uLKX3+yJbM53Cp7EvG1/u3iJ+vxkw7j7/ldtvFfX//muU5lzT9EXIjt47fUsmF2ZLE2P9JYXrk0W5ucqcxUHoyPT4xNjF67fHV8JFujbv3823Yx/nv94olO8dP2D3WIP7hD+7+zy/b/8dN7v/jWW+J/79vbv/+n3xI/nRO/u8v4k0M3Om7fncaf7tD+nd7/i7uM//zfK9O7fCgAcAAayytzk9VqZWGHi/Sz5k6PcfFhXsRqxHtQDRfv1UW3RyZgv210+m7XBAAAAAAAAAAAAAAA6KSxvDI3EPv7daJutxEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDD67MAAAD//w/PzvM=") syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f00000002c0)={[{@barrier}, {@nodioread_nolock}, {@noquota}, {@barrier}, {@auto_da_alloc}, {@nodioread_nolock}]}, 0x1, 0x59c, &(0x7f0000001e00)="$eJzs3U9oHGUbAPBnZrNN/+T70g++Dz6lh6JChdJN0j9aPbVXsVDoQfCiYbMNJZtsySbahIDpvYg9iEov9aYHj4oHD+LFo1cvimeh2KDQ9KArm51N03S3bmI2W7O/H0z2fWdm93nfmX3e7AwzTAB962j9TxrxVERcTCKGNywbiGzh0cZ6qytLxfsrS8UkarVLvySRRMS9laVic/0kez0UEcsR8f+I+CYfcTxd/8h9zUJ1YXFqvFwuzWb1kbnpqyPVhcUTV6bHJ0uTpZlTL7505uzpM2MnxzY2935tYy2/tb7e+PHmuze+e+X2zU8/O7JcfH88iXMxlC3b2I+d1Ngm+Ti3af7pbgTroaTXDWBbclme11PpfzEcuSzrW6ltHBwGd6V5QBfVBiNq6zYUgT6QSHroU83fAfXj3+a0m78/7pxvHIDU466uLBXfiWb8gca5idi/dmxy8NfkoSOT+vHm4d1sKHvS8vWIGB0YePT7n2Tfv+0b3YkG0lVfn2/sqEf3f7o+/kSL8Weoee70b2qOf6vZ+LfaIn6uzfh3scMYv7/+00dt418fjKdbxk/W4yct4qcR8WaH8W+99uXZdstqH0cci9bxm5LHnx8euXylXBpt/G0Z46tjR15u3/+Ig23iN87Z7l9ryMb+78valHbY/y++/fyZ5cfEf/7Zx+//Vtv/QES812H8/9z75NV2y+5cT+7WfwVsdf8nkY/bHcZ/4dzRH7Kis4YAAAAAAAAAALCD0rVr2ZK0sF5O00KhcQ/vf+NgWq5U545frszPTDSueTsc+bR5pdVwo57U62PZ9bjN+slN9VO5LGDuwFq9UKyUJ3rcdwAAAAAAAAAAAAAAAAAAAHhSHNp0//9vubX7/zc/rhrYq9o/8hvY6+Q/9K+H8z/pWTuA3ef/P/StmvyH/iX/oX/Jf+hf8h/6l/yH/iX/oX/JfwAAAAAAAAAAAAAAAAAAAAAAAAAA6IqLFy7Up9r9laVivT4xsDA/VXnrxESpOlWYni8WipXZq4XJSmWyXCoUK9N/9XlJpXJ1NGbmr43MlapzI9WFxTemK/MzzWeKlvJd7xEAAAAAAAAAAAAAAAAAAAD88wytTUlaiMg36mlaKET8KyIOJ5FcvlIujUbEvyPi+1x+sF4f63WjAQAAAAAAAAAAAAAAAAAAYI+pLixOjZfLpdnuFQayUF0M0XlhYCsrR8Tyzjaj/olbflc+24A93nR7o5B7Mr6HT36hh4MSAAAAAAAAAAAAAAAAAAD0qQc3/Xb6jj+62yAAAAAAAAAAAAAAAAAAAADoS+nPSUTUp2PDzw1tXrovWc2tvUbE27cufXBtfG5udqw+/+76/LkPs/kne9F+oFPNPE0jop7HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwAPVhcWp8XK5NLvNwmAH6/S6jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADb8WcAAAD//y4WzlE=") mq_notify(0xffffffffffffffff, 0x0) socket$packet(0x11, 0xa, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, 0x0, 0x0) sendto$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000002680)) read$msr(0xffffffffffffffff, 0x0, 0x0) 1.514685472s ago: executing program 1 (id=8155): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$setownex(r0, 0xf, &(0x7f0000000140)={0x2}) r1 = socket(0x2, 0x80805, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x84, @rand_addr=0x64010101, 0x4e22, 0x3, 'dh\x00', 0x1, 0x80005, 0x6f}, 0x2c) 1.512030302s ago: executing program 2 (id=8157): r0 = syz_open_dev$loop(&(0x7f0000000200), 0x4, 0x40100) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x275a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000300), 0x8f, 0x40240) ioctl$LOOP_CONFIGURE(r2, 0x4c0a, &(0x7f0000001280)={r1, 0x0, {0x2a12, 0x80010000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x1c, "fee8a2ab78fc179fd1f809000000aca7ca64c6a4b4e00d9683dda1af01000000deff1200100000000000000000000000000800", "2809e8dbe1b22d0000b420a1a93c7540f476779e0117613dd4070000ebff08000000000000000000020000000800000000faffffff00", "e7460000102000000000e4440000002000000000000000000000008bd02800", [0xe0]}}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) 1.483126834s ago: executing program 2 (id=8158): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'veth0_to_team\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000004c0)={r0, r2, 0x25, 0x0, @void}, 0x10) socket$nl_route(0x10, 0x3, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) socket(0x40000000015, 0x805, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$caif_stream(0x25, 0x1, 0x2) socket$packet(0x11, 0x3, 0x300) socket(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1f, 0x10, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000005000000000000008000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003f80000850000008600000018010000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000a600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 1.357459881s ago: executing program 2 (id=8159): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wakeup_count', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000001, 0x12, r1, 0x100000000) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x2f) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr', 0x3) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000140)={0x0, 0x3ff, 0x80, 0xffffffff, 0x4, "8100e1c8070000000000000000eaffffff00"}) r2 = syz_open_pts(0xffffffffffffffff, 0x141601) write(r2, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x2) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000240), 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r3, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r4 = syz_clone(0x0, 0x0, 0x43, 0x0, 0x0, 0x0) process_vm_writev(r4, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x20001c34}], 0x1, 0x0) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) 1.104645616s ago: executing program 2 (id=8160): bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) pipe2$watch_queue(0x0, 0x80) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f0000002340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000480)={@cgroup=r3, 0xffffffffffffffff, 0x2f, 0x2018, 0x4}, 0x20) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 946.275565ms ago: executing program 4 (id=8162): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0x4d, 0xfffffffb, 0x7fffffff}}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040084) sendmsg$nl_route_sched(r4, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001740)=@newqdisc={0x838, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdf8, {0x0, 0x0, 0x0, r6, {0x10}, {}, {0xa, 0x3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x80c, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x1, 0x1, 0x9, 0x8000, 0x3, 0x5, 0x5, 0xb762, 0x4, 0x7, 0x8, 0xf, 0x2, 0x80000001, 0x400, 0x1007fc, 0xffff8000, 0x6, 0x401, 0x9, 0xb89, 0xffffe4f5, 0xd6, 0x4, 0xffff, 0x7, 0x0, 0xfffff4f0, 0x101, 0x1, 0xfffffffc, 0x4, 0x1, 0x1, 0x9, 0xc, 0x20001000, 0x4, 0x2, 0x7, 0x4, 0x99, 0x9, 0x5, 0x6, 0x7, 0xfffffff7, 0x1, 0x2, 0x9, 0x9, 0x44, 0x8, 0x8, 0x1, 0x4, 0x7ff, 0x8, 0x7, 0x80000001, 0x400, 0x8, 0xfffffa72, 0xcd, 0xffffff80, 0x80000000, 0xc, 0x4, 0x65, 0x91, 0x659, 0x9, 0xf, 0x9, 0xc28, 0x9, 0x7, 0x3, 0x401, 0x3, 0x2, 0xfffffffa, 0x1, 0x10001, 0x3, 0x1, 0x4, 0x8, 0x8, 0x7, 0x1, 0x1, 0x1, 0x7, 0x40, 0x7, 0x12, 0x8000, 0x1, 0x4dc, 0x80, 0x3, 0x7fffffff, 0xff, 0x9, 0xa7, 0xf, 0x2, 0x0, 0x3, 0x1000, 0x4, 0x401, 0x7, 0x80000000, 0xffff, 0x6, 0x5, 0x4, 0xffffffff, 0x80000000, 0x1966f9ab, 0x200, 0x20200, 0xed5, 0xfffffc00, 0x6, 0x4, 0x8, 0x485e, 0xa85, 0x80000040, 0x2, 0x7, 0x7, 0x102, 0x2d5421e8, 0x7, 0x10000, 0xffffffff, 0x6, 0x3ff, 0xf04, 0x0, 0x2, 0x5, 0xfffffc00, 0x5, 0x8d, 0x4, 0x401, 0x4, 0x9, 0x3, 0xfffffffb, 0x1, 0x0, 0x0, 0x2, 0x5, 0x8, 0x3, 0x0, 0x800, 0x2, 0x8, 0x7ff, 0x1, 0x9, 0x6, 0x5, 0x5, 0x4d15, 0x1ff, 0xfffff060, 0x3, 0x469, 0x3, 0x0, 0x200, 0x10000005, 0x7, 0x1, 0x8, 0x42ba, 0x4, 0x9, 0x3, 0x8, 0x8, 0x53, 0x6, 0x4, 0x400, 0x8000, 0x0, 0x2c310b18, 0xfff, 0x0, 0x3, 0xcd34, 0x9, 0x81, 0xdf3, 0x2, 0x7, 0x8, 0xfff, 0x1ff, 0x8000, 0x3, 0x8, 0x3, 0x9, 0x9a6, 0xe4cb, 0x402, 0x1, 0x1ff, 0x3e, 0x9b4, 0x1, 0x8, 0x0, 0x8, 0x0, 0x9, 0x0, 0x4, 0x10, 0x901, 0x5, 0x2, 0x7b, 0xfffffeff, 0x6, 0x6, 0xc, 0x1000, 0x9, 0x9, 0xe6, 0xab, 0x400, 0x7fffffff, 0xed, 0x7ff, 0xd83, 0x68, 0x80000001, 0x6, 0x1, 0x6, 0x200, 0x2]}, @TCA_TBF_PTAB={0x404, 0x3, [0x5, 0x200006, 0xd, 0x400, 0x0, 0x3, 0x5, 0x10000, 0x7, 0x4, 0x81, 0x0, 0x8, 0x0, 0x9, 0x5, 0xc0000, 0x8001, 0x1, 0x2000, 0x1, 0x8da5, 0x1, 0x4, 0x2, 0x6, 0x58, 0x7, 0x6f, 0x8, 0x3, 0x4, 0x9, 0x1000, 0x4, 0x9, 0x6, 0x80000001, 0x3, 0x1, 0xd4, 0x100, 0xa, 0xfff, 0x8, 0x9, 0x7, 0x7fffffff, 0xf4b3, 0x1, 0x0, 0x8, 0x8, 0x6, 0xd815, 0xfffffff9, 0x2, 0x401, 0x9, 0x36, 0xf, 0x74, 0xbbc, 0x9, 0x0, 0x6, 0x8, 0x5, 0x6, 0xb, 0x5, 0x5, 0x4e3, 0x200, 0x0, 0x9, 0x8001, 0x2, 0x1000, 0x7fffffff, 0x46a3, 0x6, 0x2, 0x1dd50645, 0x401, 0x5, 0x101, 0xbf, 0x0, 0x9, 0x3, 0x65, 0xffffff13, 0x2, 0x30, 0x1a3f, 0x2, 0x389c, 0x4, 0xffffffff, 0x3ff, 0x4, 0x4, 0x6, 0xf3bb, 0x1ff, 0x8, 0xf, 0xb, 0x401, 0x4, 0x1000, 0x1, 0x8, 0x1, 0x7ff, 0x7fff, 0x8, 0xd, 0x3ff, 0x4, 0x1, 0xffff, 0x7ffc, 0x2, 0x9, 0x1, 0xfff, 0x0, 0xfffffffe, 0x4, 0x0, 0x101, 0x78f0, 0xf, 0x7, 0x0, 0x3, 0xf1c7, 0x100, 0x3, 0x4, 0xfffffffe, 0xffffff7f, 0x3, 0x8, 0x6, 0xd, 0x3, 0xa, 0xd0, 0x200, 0x0, 0x400, 0x9, 0x6, 0xf, 0xaba3, 0x1, 0x3, 0x1, 0x5, 0x6f788000, 0xc, 0x1ff, 0x40, 0x8, 0x3, 0x2, 0x1, 0x0, 0x71, 0xb13, 0x4, 0xbc5, 0x0, 0x7, 0xffff, 0x100, 0x7b58, 0x1, 0x807, 0x1ff, 0x3, 0x400, 0x80000000, 0x103e, 0x3, 0xfffffffa, 0x9a5, 0x8, 0x5, 0x1, 0x9, 0x3, 0x9, 0x7, 0x3, 0x1, 0x101, 0x2, 0x6, 0x598f, 0x5, 0x8e, 0x0, 0xa, 0x9, 0x1000, 0x8, 0xd00f, 0x2, 0x1, 0x6, 0x2a, 0x7, 0x100, 0x24e, 0xbd, 0x2, 0x2800000, 0x807, 0x0, 0x401, 0x6, 0x2, 0x9, 0x7039, 0x4, 0x1, 0x9, 0x1, 0xb18, 0x2, 0xfffffffe, 0x26e, 0x6, 0x5c, 0x8, 0x100, 0x3ff, 0x1, 0x0, 0xb, 0x10000, 0x8, 0x6, 0x2, 0x6, 0x7, 0x6, 0x7ff, 0x1, 0x4, 0x8001, 0x3]}]}}]}, 0x838}, 0x1, 0x0, 0x0, 0x40098}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r8 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r8, &(0x7f0000000200)="2478546ca4fa3b0bfe4ddf30cc5a", 0xe, 0x4000050, &(0x7f00000001c0)={0x11, 0xf7, r7, 0x1, 0xd8, 0x6, @multicast}, 0x14) r9 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmmsg$inet(r0, &(0x7f00000017c0)=[{{&(0x7f0000000040)={0x2, 0x4e1c, @local}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @dev={0xac, 0x14, 0x14, 0x41}, @empty}}}], 0x20}}], 0x1, 0x8000004) 942.024335ms ago: executing program 1 (id=8163): perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x600000000000000, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xffffffffffffffff, 0x8000000000000000}, 0x0, 0x10000, 0x4, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd29, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000740)=@newtfilter={0x84, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r3, {0x0, 0x4}, {}, {0x8, 0xf}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x6, 0x1000, 0x1, 0xfffffffc, 0x8}}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x3}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) 902.201998ms ago: executing program 4 (id=8165): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) listen(r0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x5, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x10000, 0x4000, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f00000001c0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x4}}, {@debug}, {@journal_dev={'journal_dev', 0x3d, 0x7}}]}, 0x1, 0x5fd, &(0x7f00000006c0)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x4040, 0x0) r3 = socket$key(0xf, 0x3, 0x2) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, 0x0, &(0x7f0000000000)) sendmsg$key(r3, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020100030a0000000000000000000000030006002b20000002004e24ac1414aa0000000000000000030005000000000002000a01000000000000000000000000020013"], 0x50}, 0x1, 0x7}, 0x20000000) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000380)=ANY=[@ANYBLOB="b00f00000000000007100031a3d689df605c173c06b725000022020000e0060000000000009b63337eed2ddf344e597a6dbe74cf127d41f9fd6c7909b633864836c60fba2d50849e7fe725bcf11b6fac398f2b37cbb2c110772107180000b847fff604000000000000000000ff07000000000000c910fe8000000000000000000000000042"], 0x88) r4 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r4, &(0x7f0000004200)='t', 0x1) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xffffffff, 0xfd}, 0x0, 0x0, 0x1, 0x0, 0x2, 0xff, 0xffff, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xfff8000000000001, 0xffffffffffffffff, 0x9) sendfile(r4, r2, 0x0, 0x3ffff) sendfile(r4, r2, 0x0, 0x7ffff000) 854.77986ms ago: executing program 3 (id=8166): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) sendmmsg(r0, &(0x7f00000008c0)=[{{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000000)="bf", 0x1}], 0x1, &(0x7f0000000680)=ANY=[], 0xc}}], 0x1, 0x4044044) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r1, 0xffffffffffffffff, 0x0) 767.728236ms ago: executing program 4 (id=8167): socket$xdp(0x2c, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x400000000000004) read(r0, &(0x7f0000000300)=""/250, 0xfa) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000c40)=ANY=[], 0x8) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, 0xffffffffffffffff, &(0x7f00000000c0)=0xfffffffffffffcba) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="480000001400190d7ebdeb75fd0d8c562c84d8c0a2bc000000000000800100000020000000040000000000000078581acb6cc5dcfa094eb3a410545b99935500ffffffff00000053", 0x48}], 0x1) r4 = socket(0x2a, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)) ioctl$SIOCSIFMTU(r4, 0x8922, &(0x7f0000000080)={'dummy0\x00', 0x3}) 617.490594ms ago: executing program 4 (id=8169): r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x40080) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000f80)={0x5, 0x1, 0x0, 'queue1\x00', 0x6}) syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), r0) r2 = memfd_create(&(0x7f0000000b40)='\x00\xc7\x8c\xa3I6\xbe\x91\x8d\x182)!\x9a%\xd9\x19\x17\xb0\xed|\xb3\xc2\x017h\xe9kL\xa2\xd28\xd6\x06\a\x0e\xfc\xfe\x12\x8f&\x13\xae%@T\xa3\xb0>\xa9\\\xec\xa9\xf9Q@6A\x10\x8cn|\x00\x00\x00\x00\x00\x00\x00\x00\xeb0\xdd\xe8\x87\x05=\xfb\x8b$\xdc\xcc\xf8\xc5\x1f\x8bQ\xf7fo\"i\xa1hk\x1d\xf5z\xc1\b\x00\\]\xc4\xbe3\xf9\xa8\t?:\xd8\xda\x84\xeepI[\t\x00\x00\x00\x00\xf9v\x00\x00\x00\x00\x00T\xb6\xbe\x0f~\xc0\x92\xe9O{\xa8\x81(\x01\x14\xfc\x83\xf9\xfb\x05\x94Tr@Lq]\xf9\x15zj\x87\xc4\x8e\xe8/\xb9-&R:\xf6\xff\xff\xff\xff\xff\xff\x18\x8f3\xf7]#\xed,\xc7\x03\x00\x00\x00\xa3\xee\xcb\xaf\xb3\xe3\'}\x18\xe8O\xa8\'K\xb6o\x9a\x9e~\xf0|\xe6\xe4ZW\xbe2\xc9\xe4R$nvU\x92\xd2\x99\xb8\x00Q\xe6\f\b\xcf\xdd\xdc+]\xe7\x87H\xcb\x9f\x91=\xe4K\xaf\xea\x14G\x19\r\xec6\xd4\xd0L\xb1UH_\xe8m\nP\x0f\xdcP\xcb\xd9\x0592\xcae\xec$gy!9\xf08\xf1V\x1a\xae\xbe\xb1\xc9\x9bB\x05\xcd\xc7\x9f\xe8\x19\x93\x87\xf4\n\x8e\x919\x9e\x15\x18\xb1\v\x81\x89\x17\x993>\x8d\xfd\xa3\x10\xb0\xcaRGTZS\x167.\x17\xcc\xc0P\xeb\x94fz\xfe\xf0\xdb\xa5x&\xff\f\xdc\xe0\x89|\xdaB\xc6Kp\xc0\xad\'\v\"V\x89I\xee\xef<\x17Z\xaf\xb4\x11\xf9\a\xfa\x9a\x97\x90\xf2\x01\'\xecCh\xd1g=\x96\x9f\xafk\x02\xd7\xb8\x8e\x81\xae(\xe6HNx\xedD\x9b\xc4\xc2\xe7&\xdb\x05\xac\xd5\x99?B~\xd2\xc5\xb7\xa7ej\x90\xbb\x84\x12\xedT\x99\x1d\xeca\xa8\x02\x8e\xe3\x03\xdd\xc5\xd7&\xf0\x1a|\x8a\xda\xc2\xbf\x93\x04\xda\xbc\xc7>\xcb\xddPS\xf4\xb5Vt\x9d\xe2\x855c\x8a\xb7\xb2\xa5B\xf04%\x1fgqHX\xd4\xe2J\x95\x06\xdd\xf8p#d\xeff-\xc7\x12\x12g\xde\x04\xf3\x8f&\x878-R\xe4\xc4\x8e\xb8\xe1\xa6\xf5?\xe3\xa2\x7f@\x17x\xb7\x00\x93\b\xf7#\xc2g\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00^\x16\x8c$N\xcd\x803\x17`6lV\xe1^D\xd4\xec\r\t\x84\t\xb3\xac{\x10\xe29s\xfa\x9c:\xed\x9c\xb5\xa3\xd7\x92\xfbAvf>s\xf0\xcb\xb0Q\f r\xf4x\xac\xc4\xc8y3\xd1Q\x0f\x04\xe3^\x8f\x94\x8e\x8bY\xb2vy\x06c\xa3a\x12\xbbR1', 0x7) fsetxattr$security_selinux(r2, &(0x7f0000000480), &(0x7f00000004c0)='system_u:object_r:hwdata_t:s0\x00', 0x1a, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x2, 0xfffffffc, @empty, 0x80000001}, 0x1c) setsockopt$inet6_tcp_int(r3, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r3, &(0x7f0000000680)="d9", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r4 = dup(r3) sendto$packet(r4, &(0x7f00000003c0)='(', 0x1, 0x24004090, 0x0, 0x0) connect$unix(r4, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e22}, 0x6e) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000040)=0x95, 0x4) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) fchdir(0xffffffffffffffff) write$binfmt_aout(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="1b86a0fa", @ANYRES8], 0x20) r5 = socket$inet(0xa, 0x801, 0x84) connect$inet(r5, 0x0, 0x0) listen(r5, 0x8) accept4(r5, 0x0, 0x0, 0x0) 616.432814ms ago: executing program 3 (id=8172): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x0, 0x0}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40840) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x6000000000000000, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x7, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = syz_open_procfs(0x0, 0x0) pread64(r3, &(0x7f0000003200)=""/4140, 0x102c, 0x59) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1018e58, &(0x7f00000001c0), 0x1, 0x64f, &(0x7f0000000c40)="$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") 539.663349ms ago: executing program 4 (id=8175): r0 = socket$nl_generic(0x10, 0x3, 0x10) flistxattr(r0, &(0x7f0000000280)=""/183, 0xb7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) bind$netlink(r5, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfd, 0x400}, 0xc) getsockname$packet(r5, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000024c80)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000024d40)=ANY=[@ANYBLOB="4400000010000d042abd7000077bf70000000000", @ANYRES32=r6, @ANYBLOB="01000000000000002400128009000100626f6e6400000000140002800500010006"], 0x44}, 0x1, 0x0, 0x0, 0x40040}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000e00)=ANY=[@ANYBLOB="44000000100001042abd70000000000000000000", @ANYRES32=r3, @ANYBLOB="0028000000000000140012800c0001006d6163766c616e00", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r9], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) r10 = socket(0x10, 0x3, 0x0) sendmsg$kcm(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8480d0000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x404c080) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) ioctl$sock_SIOCBRDELBR(r11, 0x89a2, &(0x7f0000000000)='bridge0\x00') r12 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r12, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000000314230c2abd7000ff05df250900020073797a310000000008004100727865001400330073797a5f74756e"], 0x38}, 0x1, 0x0, 0x0, 0x48845}, 0x4000) listen(r1, 0x4) 410.453736ms ago: executing program 0 (id=8177): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1a, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x14, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffe}, 0x94) r1 = add_key$user(&(0x7f0000000040), &(0x7f0000000700)={'syz', 0x1}, &(0x7f0000000680)="ff37", 0x2, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000340)=@chain={'key_or_keyring:', r1}) timer_create(0xfffffffffffffffc, 0x0, &(0x7f0000001400)) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x24, 0x39, 0x9, 0x70bd2c, 0x0, {0x4}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x6, 0x6, 0x0, 0x0, @str='\b\x00'}]}]}, 0x24}}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="09000000010000000400000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = socket$igmp(0x2, 0x3, 0x2) ioctl$SIOCGETSGCNT_IN6(r6, 0x89e1, 0x0) getrlimit(0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f0000000300)={[{@grpid}, {@mblk_io_submit}, {@nodioread_nolock}, {@test_dummy_encryption}, {@inode_readahead_blks}, {@nodelalloc}, {@noblock_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x40}}]}, 0x4, 0xbaf, &(0x7f00000017c0)="$eJzs3M1rXFUbAPDn3ny2zftO+vIi1k0jIi2o07SSYotgKxU3LgTdCg3ppIRMP0giNWkWE/0HRF0LbgS1KF3YdTcKbt1o3VpcCEVioyCikTsfSWxmkrSd5Ibk94Mz95w5d+Z5nrlM7j0wNwHsWgPZQxpxICLOJhGF+vNpRHRXe70Rldp+C/OzI7/Pz44ksbj42i9JJBFxd352pPFeSX27rz7ojYhvX0zif++sjjs5PTM+XC6XJurjI1MXLh+ZnJ55ZuzC8PnS+dLFo8efGzo2dHzwxFDbav3jx1M3fnv85Z8qf37617Vf3/84iVPRV59bWUe7DMTA0meyUmdEDLc7WE466vWsrDPpXOdF6SYnBQBAS+mKa7hHohAdsXzxVoivvss1OQAAAKAtFjsiFgEAAIAdLrH+BwAAgB2u8TuAu/OzI42W7y8Sttad0xHRX6t/od5qM51RqW57oysi9t5NYuVtrUntZQ9tICJu/3Dii6zFJt2HvJbKXEQ82uz4J9X6+6t3ca+uP42IwTbEH7hnvN3qf7q7df2n2hA/7/oB2J1unq6dyFaf/9Kl659ocv7rbHLuehB5n/8a138Lq67/luvvaHH99+oGY1z95MMrreay+p+/8dLnjZbFz7YPVdR9uDMX8Vhns/qTpfqTFvWf3WCMwt9XSq3m8q5/8aOIQ9G8/oZk7f9PdGR0rFwarD02jTH3zdBnreLnXX92/Pe2qH+94395gzHeOHPmequ59etPf+5OXq/2uuvPvDU8NTVxNKI7eWX188fqN7S30Nin8R5Z/YefWPv736z+LESl/jlka4G5+jYbv31PzBeuXf1yrfqztV+ex//cAx7/dzcY48mv3zvcam7l+jdrWfzbSW0tDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANaUT0RZIWl/ppWixG7IuI/8fetHxpcuqp0UtvXjyXzUX0R1c6OlYuDUZEoTZOsvHRan95fOye8bMRsT8iPijsqY6LI5fK5/IuHgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgCX7IqIvkrQYEWlELBTStFjMOysAAACg7frzTgAAAADYdNb/AAAAsPNZ/wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALDJ9h+8eSuJiMrJPdWW6a7PdeWaGbDZ0rwTAHLTkXcCQG46804AyM19rvFdLsAOlKwz39typqftuQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwfR06cPNWEhGVk3uqLdNdn+tq+oqDW5gdsJnSvBMActOx1mTn1uUBbD1fcdi9mq/xgd0kWWe+d3mfyr9nejYtJwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC2n75qS9JiRKTVfpoWixH/iYj+6EpGx8qlwYj4b0R8X+jqycY9eScNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABA201Oz4wPl8ulCR0dnXw7yfZIo9bJ+y8TAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB5mJyeGR8ul0sTk3lnAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAORtcnpmfLhcLk1soHP9fnZe0cm7RgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8vNPAAAA///5ZQ4Q") r7 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x862b01) ioctl$EVIOCSFF(r5, 0x40304580, &(0x7f00000003c0)={0x56, 0x8000, 0xfffd, {0x0, 0x1}, {0x50, 0x2}, @cond=[{0x1ff, 0x5388, 0x6f5, 0x800, 0xc7, 0x2}, {0x5, 0x5, 0x1, 0x46, 0x3, 0xfd}]}) write$char_usb(r7, &(0x7f0000000040)="e2", 0x2250) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000400)={'ip6tnl0\x00', &(0x7f0000000800)={'ip6tnl0\x00', 0x0, 0x4, 0x10, 0x0, 0x10000, 0x20, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8, 0x188, 0x7}}) setsockopt$MRT_DEL_VIF(r6, 0x0, 0xcb, &(0x7f00000005c0)={0x1, 0x8, 0x3, 0x1, @vifc_lcl_ifindex=r8, @multicast2}, 0x10) keyctl$KEYCTL_MOVE(0x1e, r1, 0xffffffffffffffff, r2, 0x0) keyctl$instantiate_iov(0x14, r2, &(0x7f0000000600)=[{&(0x7f00000001c0)="8393391d831443e6c21ceff5709d677d61a117ea0f2a", 0x16}, {&(0x7f0000000400)}, {&(0x7f0000000440)="2c52ff7d1c444376d5fc574af02a69d953d78fc2010e35ce7e79e032fe576dd4df23548139d31d56edf4e5e3d37edd0dd00ca436ee5cea918c8ce5b092baca74b63f34e8c3c0f829ffe35d82a6b80fb21244b691727d2aa6feb304df3fed7b25f89140ba6522ada5df6a592e6af358a49a0d6c9a696eba41cbeea23887c5a3fc57fc877d626882a749674961d14c9018842a970d58c332f59d3b68024f3ac73e889d2d686564b18488f4dda0a783abc0e162bb4df115a317ba033f30f03b245aa3a6abefd8f502546cf9ac237e23824b577f052a994fe2ed5f4982b6253f27021a8c8e236701f8e99389f98a", 0xec}, {&(0x7f0000000580)="8f0d93a9190660d73e0ab846b686b6e2b86a0bf579f76caa60163d1d9e6a81e87c3c776250225692886b7b3284b917f6cef0512ba1f3bbc50ed8511393a6", 0x3e}, {&(0x7f00000005c0)}, {&(0x7f0000002380)="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", 0x1000}], 0x6, r1) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='#\x00', r2) 400.254967ms ago: executing program 4 (id=8178): syz_usb_control_io$sierra_net(0xffffffffffffffff, &(0x7f0000000180)={0x14, &(0x7f0000000540)={0x0, 0x24, 0x8f, {0x8f, 0x23, "e5ca33fbd0dd5c927f5dfeca4e03aa924c4befd31b5c99c6b99e50dd6f9ce861f456f77cb3cefbf2b6d377a4534f8a7ef5ecc6ec6edf99515ef3be85ab0a477cdb7550939573d6b9ff9659428e1fe91230e98823858d12e02220b8fa64a34d5a038de5419adbeff3a307eaf232f64326dd587a00b474849b0df26d24835e1938521b9462cad552c19261a6a3d7"}}, &(0x7f0000000600)={0x0, 0x3, 0x82, @string={0x82, 0x3, "7de208c753da74cbedf2acae6659457b6d5d3f6bf666bacc10f576d49247dbc6ea0e3a7f807d73eb271f65789b519e9f3974c80d392ad2d7ad3326ae4fd8fcc3157592f171a22ffef25e33409ad61d654ffeb4641adcee673ba65e15bc7de721a447e9e5a7edceee132163eda6b0e9168286e2e3c2a65006f1806facb12776de"}}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) utimes(&(0x7f0000000480)='./file0\x00', 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) r1 = memfd_create(&(0x7f0000000200)='\x00\xc76\xbe\x91\x8d\x182)!\x9a%\xd9\x19\x17\xb0\xed|\xb3\xc2\x017h\xe9{L\xa2\xd28\xd6\x06\a\x0e\xfd\xfe\x12\x8f&\x13\xae%@T\xa3\xb0>\\\xec\xa9\xf9Q@6A\x10\x8cn|\x00\x00\x00\x00\x00\x00\x00\x00\xeb0\xdd\xe8\x87\x05=\xfb\x8b$\xdcQ\xee\xc5\x1f\x8bQ\xf7fo\"i\xa1hk\x1d\xf5z\xc1\x7f\xa4\\]\xc4\xbe3\xf9\xa8\t?:\xd8\xda\x84\xeepI[\x1c\x00\x00\x00\x00\xf9v\x00\x00\x00\x00\x00T\xb6\xbe\x0f~\xc0\x92\xe9Or\xa8\x81(\x01\x14\xfc\x83\xf9\xfb\x05\x94Tr@Lq]\xf9\x15zj\x87\xc4\x8e\xe8\xf0_o\x16Oy\x00\x16h\xcc\x81.F/\xb9-&R\x8e\xb2\xb3bBx\x1e1\x18\x8f2\xf7]#\xed,\xc7\x03\x00\x00\x00\xa3\xee\xcb\xaf\xb3\xe3\'}\x18\xe8O\xa8#K\xb6\xe4R$\xaa\x00U\x92\xd2\x99\xb8\xde\xf9s\xcb\x89\xf2\xf6a\xcb[\xcc+\x1a`.\x00\xcf\x1c\x14\x1d$\x98\xf3\xed\x1cA\xc1+0\x87\xd1\xf2\xc6\x8fs>\x16\x8b\xdeV\b$e\xe5\x8d/\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\xe1\xa3\xe0\x18\xe5\xee\xb0\x93\xfe\xac\x98m\xaf\xb9K\xac\xa0\x1a\xe2\xb4\xfd\x1cO5\xce9\xf9\x02h\x0e%\xa1\x11COf\xed[z\xc6\xc1:L\xdb\xac\x84Ru=E\xf7\x94\xae\x18v\v\xcc\xcd\b\xa5\x19\xb5idBc\xf1S\x93\x0f\x82me\x9a\xb8\a\xff\x91\xed\x9d|\xa7D\xf1\xb2\x14\xff\xc5\xaf[\x86\xca!E\x9a<\x00', 0x5) fsetxattr$security_selinux(r1, &(0x7f0000000480), &(0x7f0000000080)='system_u:object_r:initrc_var_run_t:s0\x00', 0x26, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x3, &(0x7f00000011c0)=[{0x44}, {0x44}, {0x6}]}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) socket$packet(0x11, 0x3, 0x300) r2 = socket(0x2, 0x80805, 0x0) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000280)='./file0\x00', 0x1200000, &(0x7f0000006940)=ANY=[@ANYBLOB='flush,nocase,discard,dots,fmask=00000000000000000000177,dots,nodots,nodots,dots,\x00', @ANYRESDEC=0x0, @ANYRESOCT=0x0, @ANYRES16, @ANYRES16], 0x1, 0x15e, &(0x7f00000003c0)="$eJzs27/K01AYB+C39q+6dBaHgItTUa9AkQpiQFE66KRQXVop2CU69VK8QUE6dTtSI62WOvSjacrX51nywo8czjskJyck7+9+noxn80+zV8voNRrRehxZrBrRjxvRjNIiAIDrZJVS/Ewppe4ibn6PlFLdMwIAqnbF9b9b+cQAgMrY/wPA5bH+A8DlefP23YsneT58nWW9iB+LYlSMymOZP3ueDx9kv/W3Zy2LYtTc5A/LPPs3b8etP/mjvXkn7t8r83X29GW+k9+OcfXtAwAAwEUYZBt79/eDwf/ysvrr/cDO/r0Vd1onawMAOMD867fJh+n04xfFEYt2HGnA9UNY/e2cqojjjBP9iHNo56CiE2cxjW1R950JqNrmok8+/QMAAAAAAAAAAAAAgHN1it+J6u4RAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdv0KAAD//zVIUEo=") mount$nfs(&(0x7f0000000100)='.5.', 0x0, 0x0, 0x230000, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r3 = timerfd_create(0x7, 0x80000) clock_gettime(0x0, 0x0) timerfd_settime(r3, 0x2, &(0x7f0000000840)={{0x77359400}}, &(0x7f0000000880)) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f00000000c0)={0x0, 0xe}, 0x8) 378.529548ms ago: executing program 0 (id=8179): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket(0x2, 0x80805, 0x0) r0 = socket$netlink(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) open(&(0x7f0000000280)='.\x00', 0x20000, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_trace', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000540)={0x0, 0x1f, &(0x7f0000000500)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000001400000008000200fc00000018000180140002006e657464657673696d300000000000000800050000fcffff08000900fc000000080011000700000008000e00800000000800", @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x0) 352.14645ms ago: executing program 3 (id=8180): r0 = inotify_init1(0x80000) pwritev2(r0, &(0x7f0000000100)=[{&(0x7f0000000480)="3200b679689cb60f126ff9a45e9450f967600611be5b7bd48f2fba8429da82201a20649adf15ffb9ba758bac11b6f9de0e777b36f941d8c9a763b9d1d385b1645e2618bdd8e2ad90e18b8a0d0da3753bb7ec7e003a58971751966f488fcf3664ba2a93c5ff7ac0cb9a", 0x69}], 0x1, 0xfffffff5, 0xf, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = syz_io_uring_setup(0x49a, &(0x7f0000000400)={0x0, 0x1277, 0x3380, 0x1, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x58, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0xfffffffd}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x58}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)={0x50, 0x9, 0x6, 0x201, 0x0, 0x0, {0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x28, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010101}}]}]}, 0x50}, 0x1, 0x0, 0x0, 0xd24f4d5778621d46}, 0x4) set_mempolicy(0x6, 0x0, 0xe0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) close(r6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="120000000d000000040000000200000000000000"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r9}, &(0x7f0000000040), &(0x7f0000000140)=r6}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r9, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000380)=r7}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r10}, &(0x7f00000001c0), &(0x7f0000000280)=r5}, 0x20) close(r8) fcntl$setpipe(r5, 0x407, 0xffffffff80000000) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x102800, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r1, 0x627, 0xc1040000, 0x43, 0x0, 0x0) 306.719272ms ago: executing program 0 (id=8181): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000200)={0x0, 0x11000, 0x1800, 0xfffffff8, 0x2}, 0x20) dup(0xffffffffffffffff) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000140)=0x40, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000280)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000010400"/20, @ANYRES32=0x0], 0x48}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000005c0), r5) sendmsg$IEEE802154_ADD_IFACE(r5, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000002c0)=ANY=[@ANYBLOB='4', @ANYRES16=r6, @ANYBLOB="010025bd7000fddbdf25210000000c0005000202aaaaaaaaaaaa09001f007068793100000000050020"], 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) setsockopt$XDP_UMEM_COMPLETION_RING(r7, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r7, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r7, 0x11b, 0x5, &(0x7f0000000300)=0x1, 0x4) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x0, r9}, 0x10) bind$xdp(r2, &(0x7f0000000240)={0x2c, 0x1, r4, 0x0, r7}, 0x60) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0xe}, {}, {0x7}}}, 0x24}}, 0x0) 298.474373ms ago: executing program 0 (id=8182): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x11, &(0x7f0000001a80)={[{@orlov}, {@norecovery}, {@inlinecrypt}, {@resuid}]}, 0x8, 0x617, &(0x7f0000001100)="$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") quotactl$Q_QUOTAON(0xffffffff80000200, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x7, 0x4, 0x3f8, 0x210, 0x100, 0x100, 0x310, 0x310, 0x310, 0x4, 0x0, {[{{@arp={@dev, @multicast1, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_hsr\x00', 'syz_tun\x00', {}, {}, 0x2}, 0xc0, 0x100}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "e22a239a6bb651a9837df08bc7f880efe7126f5d56b33dd54f5db150ee26"}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@broadcast, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@arp={@local, @local, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv_slave_1\x00', 'erspan0\x00'}, 0xc0, 0x100}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "9695d92849c79fac2d070731112f73924a493f1567e5d8b4cd2c5f35f67b"}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x448) socket$inet(0x2, 0x3, 0x2) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x22, 0x6}, 0x4) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x8, &(0x7f0000000540)=0xa4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, 0x0) r5 = open_tree(0xffffffffffffff9c, 0x0, 0x0) faccessat(r5, 0x0, 0x1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xee00}}, {}, {@grpquota}, {@nobarrier}, {@test_dummy_encryption_v1}, {@nombcache}, {@nogrpid}, {@noauto_da_alloc}, {@stripe={'stripe', 0x3d, 0x2}}], [{@subj_role={'subj_role', 0x3d, 'ext4\x00'}}, {@fsname={'fsname', 0x3d, '\x14})#$'}}, {@subj_user={'subj_user', 0x3d, 'grpquota'}}, {@fsmagic={'fsmagic', 0x3d, 0xf}}]}, 0x3, 0x572, &(0x7f00000006c0)="$eJzs3c9rHFUcAPDvbJL+1qZQinqQQA9WajdN4o8KQutRtFjQe12SaSjZdEt2U5pYaHuwIF6kCCIWxD/Au8fiH6B/RUELRUrQg5fIbGbbbZLNJunWbJ3PB6Z9b2ayb96++b79zs4uG0BhjWT/lCJejoivk4iDbdsGI984srLf0sNrk9mSxPLyJ38mkeTrWvsn+f/788pLEfHLFxHHS2vbrS8szlSq1XQur482Zi+P1hcWT1ycrUyn0+ml8YmJU29NjL/7zts96+vr5/7+7uO7H5z66ujStz/dP3Q7iTNxIN/W3o+ncKO9MhIj+XMyFGdW7TjWg8b6SbLTB8C2DORxPhTZHHAwBvKoB/7/rkfEMlBQifiHgmrlAa1r+x5dBz83Hry/cgG0tv+DK++NxJ7mtdG+peSJK6Psene4B+1nbfz8x53b2RJd3oe43oP2AFpu3IyIk4ODa+e/JJ//tu9k883jja1uo2ivP7CT7mb5zxvr5T+lR/lPrJP/7F8ndreje/yX7vegmY6y/O+9dfPfR1PX8EBee6GZ8w0lFy5W05MR8WJEHIuh3Vl9o/s5p5buLXfa1p7/ZUvWfisXzI/j/uDuJ/9mqtKoPE2f2z24GfHK4/w3iTXz/55mrrt6/LPn41xW+PXLrm0cSe+82mlb9/63630GvPxjxGvrjv/jO1rJxvcnR5vnw2jrrFjrr1tHfuvU/tb633vZ+O/buP/DSfv92vrW2/hhzz9pp23bPf93JZ82y7vydVcrjcbcWMSu5KO168cf/22r3to/6/+xoxvPf+ud/3sj4rNN9v/W4Vsdd+2H8Z/a0vhvvXDvw8+/79T+5sb/zWbpWL5mM/PfZg/waZ47AAAAAAAA6DeliDgQSan8qFwqlcsrn+84HPtK1Vq9cfxCbf7SVDS/KzscQ6XWne6DbZ+HGMs/D9uqj6+qT0TEoYj4ZmBvs16erFWndrrzAAAAAAAAAAAAAAAAAAAA0Cf2d/j+f+b3gZ0+OuCZ85PfUFxd478Xv/QE9CWv/1Bc4h+KS/xDcYl/KC7xD8Ul/qG4xD8Ul/gHAAAAAAAAAAAAAAAAAAAAAAAAAACAnjp39my2LC89vDaZ1aeuLMzP1K6cmErrM+XZ+cnyZG3ucnm6VpuupuXJ2my3x6vWapfHxmP+6mgjrTdG6wuL52dr85ca5y/OVqbT8+nQf9IrAAAAAAAAAAAAAAAAAAAAeL7UFxZnKtVqOqfQsXA6+uIwtl1Iuo3y6fxk2NIjR14Y3PkOKjyDwg5PTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADQ5t8AAAD//8nLNLM=") 222.929607ms ago: executing program 2 (id=8183): r0 = syz_io_uring_setup(0x1108, &(0x7f0000000300)={0x0, 0x995a, 0x400, 0x0, 0x8000021e}, &(0x7f00000001c0)=0x0, &(0x7f0000000480)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x800000, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) alarm(0x1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'dummy0\x00'}) sendmsg$nl_route_sched(r2, 0x0, 0x3000c81c) getpid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_setup(0x5c8, &(0x7f0000000140)={0x0, 0x80001021, 0x40, 0x8, 0x110}, 0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, 0x0) mount_setattr(r5, &(0x7f00000002c0)='./file0\x00', 0x8100, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt(r6, 0x1, 0x4c, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) select(0x40, &(0x7f0000000080)={0xd, 0x4, 0x0, 0x0, 0x0, 0x2e787ec3, 0x0, 0xffffefffffffffff}, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x47fa, 0x0, 0x0, 0x0, 0x0) 178.699549ms ago: executing program 1 (id=8184): syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x12) r2 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$sock_int(r2, 0x1, 0x29, &(0x7f0000000100)=0x3ff, 0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000040), 0x4) bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r3 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r3, 0x0, 0x0) getpeername$packet(r0, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newqdisc={0x78, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffe0}, {0x0, 0xd}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x48, 0x2, {{0x0, 0x10001}, [@TCA_NETEM_SLOT={0x2c, 0xc, {0x0, 0x0, 0x4000000, 0xf1}}]}}}]}, 0x78}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000013c0)={'macvlan0\x00'}) write(r1, &(0x7f0000000a00)="c7885a8f24f458bed7211672288cfc5eb3", 0x11) sendfile(r1, r0, 0x0, 0x3ffff) sendfile(r1, r0, 0x0, 0x7ffff000) 178.26331ms ago: executing program 0 (id=8185): r0 = inotify_init1(0x80000) pwritev2(r0, &(0x7f0000000100)=[{&(0x7f0000000480)="3200b679689cb60f126ff9a45e9450f967600611be5b7bd48f2fba8429da82201a20649adf15ffb9ba758bac11b6f9de0e777b36f941d8c9a763b9d1d385b1645e2618bdd8e2ad90e18b8a0d0da3753bb7ec7e003a58971751966f488fcf3664ba2a93c5ff7ac0cb9a", 0x69}], 0x1, 0xfffffff5, 0xf, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = syz_io_uring_setup(0x49a, &(0x7f0000000400)={0x0, 0x1277, 0x3380, 0x1, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x58, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0xfffffffd}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x58}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)={0x50, 0x9, 0x6, 0x201, 0x0, 0x0, {0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x28, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010101}}]}]}, 0x50}, 0x1, 0x0, 0x0, 0xd24f4d5778621d46}, 0x4) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x118) set_mempolicy(0x6, &(0x7f00000003c0)=0x8000000000000001, 0xe0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) close(r6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="120000000d000000040000000200000000000000"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r9}, &(0x7f0000000040), &(0x7f0000000140)=r6}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r9, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000380)=r7}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r10}, &(0x7f00000001c0), &(0x7f0000000280)=r5}, 0x20) close(r8) fcntl$setpipe(r5, 0x407, 0xffffffff80000000) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x102800, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r1, 0x627, 0xc1040000, 0x43, 0x0, 0x0) 167.284891ms ago: executing program 0 (id=8186): syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x20) madvise(&(0x7f0000000000/0x2000)=nil, 0x8000000, 0x19) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./file0\x00', 0x880, &(0x7f00000001c0)=ANY=[@ANYBLOB='shortname=lower,iocharset=iso8859-1,fmask=00000000000000000000066,uni_xlate=1,uni_xlate=0,fmask=00000000000000000000003,uid=', @ANYRESHEX=0x0, @ANYBLOB=',uni_xlate=0,utf8=1,check=strict,nonumtail=0,rodir,errors=continue,shortname=lower,umaQk=00000000000000000000007,rodir,sys_immutable,\x00'], 0x4, 0x2dc, &(0x7f0000000bc0)="$eJzs3c1uG1UfBvBnEsf221fCXrBCSIwEC1ZV0ytwhFIJkRVVFsACIppKKI6QWikSH8Ltii0bFiy4AiQkLoQNd8AFILGjlSoNmvE4toubj6pu+fj9Nj45c54z/zMZJ5NFjj969fjoVpnb97/8Nf1+kY1RRnlQZJiNzNzLktE3AQD+yR5UVX6vplYdL+6tzhVJ+muuDQBYj/N+/7deOm391L52114aALAmN997/52dvb3dd8uynxvHX5/s13/Z16/T4zu380nGOcy1DPIoaR4UttI8LdTNG1VVTTrlw7Ish3njeHKyXyePP/y5nX/nt6TJb2eQYdN1+rTR5N/e290upxbyk7qOK+35R3X+egZ5+TS8lL++Ip/9bt58faH+qxnkl4/zaca51RQxzfeyt/vVdlm+VX37xxcf1OXV+WJyst9rxs1Vm8/5WwMAAAAAAAAAAAAAAAAAAAAAwL/Y1XbvnF6a/Xvqrnb/nc1H9RdbKWeGy/vzTPPFbKLF/YGqqppU+X62P8+1siyrduA838krnXRezKoBAAAAAAAAAAAAAAAAAADg7+XuZ58fHYzHh3eeSaPYmM7aSfLwZvK084wWel7L8phRstTTa1dyMB63Z8/4cLgwYafpaePZnI0pkjPLqBfxjC7LeY3/LVa42Pjhx8tO2D9/zNbqcz1V48rqazi7u44OitXXsJdZT7+9Sb7rJvMx3VywjO6TDlW5zO3XXVFhMrhIfLbW6Tz/bw5NzkileHJhm6fvy7aneHwV3eaqroxvtY089gaZ3xsXup/Tn8b/+rOisFsHAAAAAAAAAAAAAAAAAACs1fy/f1ccvH9mdKPqra0sAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHiu5p//f4nGpA1fYHA3d+6+4CUCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwH/BnAAAA//+lXFN6") madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000410, &(0x7f0000000000)={[{@bsdgroups}, {@nouid32}]}, 0xc1, 0x7e9, &(0x7f00000017c0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.stat\x00', 0x275a, 0x0) 0s ago: executing program 2 (id=8187): syz_open_dev$tty20(0xc, 0x4, 0x1) openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x10, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/unix\x00') unlink(0x0) close_range(r0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): 9:2808): avc: denied { create } for pid=6623 comm="syz.3.1021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 121.185280][ T29] audit: type=1400 audit(1769065751.449:2809): avc: denied { create } for pid=6623 comm="syz.3.1021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 121.205848][ T29] audit: type=1400 audit(1769065751.449:2810): avc: denied { create } for pid=6623 comm="syz.3.1021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 121.240197][ T29] audit: type=1400 audit(1769065751.529:2811): avc: denied { read write } for pid=3325 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.271145][ T29] audit: type=1400 audit(1769065751.559:2812): avc: denied { create } for pid=6630 comm="syz.1.1022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 121.296274][ T29] audit: type=1400 audit(1769065751.589:2813): avc: denied { create } for pid=6630 comm="syz.1.1022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 121.316537][ T29] audit: type=1400 audit(1769065751.589:2814): avc: denied { create } for pid=6630 comm="syz.1.1022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 121.337972][ T29] audit: type=1400 audit(1769065751.589:2815): avc: denied { create } for pid=6630 comm="syz.1.1022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 121.358854][ T29] audit: type=1400 audit(1769065751.589:2816): avc: denied { create } for pid=6630 comm="syz.1.1022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 121.452622][ T6644] validate_nla: 10 callbacks suppressed [ 121.452642][ T6644] netlink: 'syz.1.1028': attribute type 4 has an invalid length. [ 121.473516][ T6644] netlink: 'syz.1.1028': attribute type 4 has an invalid length. [ 121.494205][ T6644] IPv6: Can't replace route, no match found [ 121.536183][ T6655] ip6t_srh: unknown srh match flags 4000 [ 121.570700][ T6660] netlink: 'syz.0.1035': attribute type 39 has an invalid length. [ 121.739110][ T6677] netlink: 'syz.1.1042': attribute type 1 has an invalid length. [ 121.753596][ T6677] 8021q: adding VLAN 0 to HW filter on device bond3 [ 121.769930][ T6677] macvlan1: entered promiscuous mode [ 121.775390][ T6677] macvlan1: entered allmulticast mode [ 121.782111][ T6677] bond3: entered promiscuous mode [ 121.787441][ T6677] 8021q: adding VLAN 0 to HW filter on device macvlan1 [ 121.795282][ T6677] bond3: left promiscuous mode [ 121.823763][ T6679] bond3: (slave ip6gretap1): making interface the new active one [ 121.832346][ T6679] bond3: (slave ip6gretap1): Enslaving as an active interface with an up link [ 121.849923][ T6679] macvlan1: entered promiscuous mode [ 121.855382][ T6679] macvlan1: entered allmulticast mode [ 121.861611][ T6679] bond3: entered promiscuous mode [ 121.866806][ T6679] ip6gretap1: entered promiscuous mode [ 121.882285][ T6679] 8021q: adding VLAN 0 to HW filter on device macvlan1 [ 121.890050][ T6679] bond3: (slave macvlan1): the slave hw address is in use by the bond; giving it the hw address of ip6gretap1 [ 121.904669][ T6679] bond3: left promiscuous mode [ 121.909674][ T6679] ip6gretap1: left promiscuous mode [ 121.977739][ T6687] ip6t_srh: unknown srh match flags 4000 [ 122.009744][ T6689] netlink: 'syz.2.1047': attribute type 39 has an invalid length. [ 122.132017][ T6708] ip6t_srh: unknown srh match flags 4000 [ 122.474435][ T6721] netlink: 'syz.0.1061': attribute type 39 has an invalid length. [ 122.488443][ T6721] __nla_validate_parse: 3 callbacks suppressed [ 122.488463][ T6721] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1061'. [ 123.025999][ T6734] ip6t_srh: unknown srh match flags 4000 [ 123.476542][ T6752] netlink: 48 bytes leftover after parsing attributes in process `syz.2.1072'. [ 123.488709][ T6751] netlink: 'syz.3.1073': attribute type 39 has an invalid length. [ 123.525936][ T6751] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1073'. [ 123.654141][ T6764] ip6t_srh: unknown srh match flags 4000 [ 123.693602][ T6771] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1082'. [ 123.727375][ T6771] 8021q: adding VLAN 0 to HW filter on device bond4 [ 123.734409][ T6777] netlink: 48 bytes leftover after parsing attributes in process `syz.4.1085'. [ 123.756296][ T6771] netlink: 'syz.1.1082': attribute type 10 has an invalid length. [ 123.780223][ T6782] netlink: 'syz.4.1087': attribute type 39 has an invalid length. [ 123.788482][ T6782] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1087'. [ 123.930556][ T6810] netlink: 48 bytes leftover after parsing attributes in process `syz.1.1098'. [ 124.097419][ T6841] ip6t_srh: unknown srh match flags 4000 [ 124.187522][ T6856] netlink: 'syz.2.1118': attribute type 13 has an invalid length. [ 124.270262][ T6864] ip6t_srh: unknown srh match flags 4000 [ 124.348450][ T3512] lo speed is unknown, defaulting to 1000 [ 124.348740][ T4626] netdevsim netdevsim2 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 124.354555][ T3512] syz1: Port: 1 Link DOWN [ 124.367580][ T3527] lo speed is unknown, defaulting to 1000 [ 124.374035][ T4626] netdevsim netdevsim2 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 124.382660][ T4626] netdevsim netdevsim2 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 124.391082][ T4626] netdevsim netdevsim2 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 124.467842][ T6874] ip6t_srh: unknown srh match flags 4000 [ 124.565534][ T6879] netlink: 176 bytes leftover after parsing attributes in process `syz.1.1125'. [ 124.653008][ T6891] ip6t_srh: unknown srh match flags 4000 [ 124.782331][ T6906] ip6t_srh: unknown srh match flags 4000 [ 125.226702][ T6928] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1145'. [ 125.253054][ T6931] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 125.253054][ T6931] The task syz.0.1144 (6931) triggered the difference, watch for misbehavior. [ 125.297086][ T6935] ip6t_srh: unknown srh match flags 4000 [ 125.343234][ T6938] netlink: 16 bytes leftover after parsing attributes in process `syz.3.1149'. [ 125.667375][ T6967] ip6t_srh: unknown srh match flags 4000 [ 126.004519][ T23] IPVS: starting estimator thread 0... [ 126.007659][ T6977] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 126.112033][ T6980] IPVS: using max 2256 ests per chain, 112800 per kthread [ 126.156144][ T29] kauditd_printk_skb: 1383 callbacks suppressed [ 126.156265][ T29] audit: type=1400 audit(1769065756.449:4200): avc: denied { read write } for pid=3325 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 126.212986][ T4626] netdevsim netdevsim1 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 126.228303][ T4626] netdevsim netdevsim1 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 126.241857][ T29] audit: type=1400 audit(1769065756.479:4201): avc: denied { create } for pid=6987 comm="syz.1.1168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 126.261506][ T29] audit: type=1400 audit(1769065756.519:4202): avc: denied { open } for pid=6987 comm="syz.1.1168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 126.281220][ T29] audit: type=1400 audit(1769065756.519:4203): avc: denied { create } for pid=6987 comm="syz.1.1168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 126.302061][ T29] audit: type=1326 audit(1769065756.519:4204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6987 comm="syz.1.1168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff73fa4acb9 code=0x7ffc0000 [ 126.325835][ T29] audit: type=1326 audit(1769065756.519:4205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6987 comm="syz.1.1168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff73fa4acb9 code=0x7ffc0000 [ 126.326322][ T6988] xt_NFQUEUE: number of total queues is 0 [ 126.349482][ T29] audit: type=1326 audit(1769065756.529:4206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6987 comm="syz.1.1168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff73fa4acb9 code=0x7ffc0000 [ 126.379007][ T29] audit: type=1400 audit(1769065756.529:4207): avc: denied { prog_load } for pid=6987 comm="syz.1.1168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 126.398669][ T29] audit: type=1326 audit(1769065756.529:4208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6987 comm="syz.1.1168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff73fa4acb9 code=0x7ffc0000 [ 126.422311][ T29] audit: type=1326 audit(1769065756.529:4209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6987 comm="syz.1.1168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff73fa4acb9 code=0x7ffc0000 [ 126.446349][ T4626] netdevsim netdevsim1 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 126.454792][ T4626] netdevsim netdevsim1 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 126.521419][ T6996] ip6t_srh: unknown srh match flags 4000 [ 126.654147][ T7011] xt_NFQUEUE: number of total queues is 0 [ 127.345438][ T7044] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 127.554074][ T7052] __nla_validate_parse: 5 callbacks suppressed [ 127.554107][ T7052] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1191'. [ 127.572999][ T52] netdevsim netdevsim0 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 127.581330][ T7052] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1191'. [ 127.600693][ T52] netdevsim netdevsim0 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 127.613035][ T7052] xt_NFQUEUE: number of total queues is 0 [ 127.619214][ T52] netdevsim netdevsim0 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 127.637284][ T52] netdevsim netdevsim0 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 127.758070][ T7066] netlink: 16 bytes leftover after parsing attributes in process `syz.3.1198'. [ 127.777937][ T7068] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 127.779352][ T7066] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7066 comm=syz.3.1198 [ 127.812996][ T7070] ip6t_srh: unknown srh match flags 4000 [ 127.862606][ T7075] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1203'. [ 127.886873][ T7075] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1203'. [ 127.899850][ T7075] ip6gretap0 (unregistering): left promiscuous mode [ 127.947557][ T7089] bridge1: entered promiscuous mode [ 127.952899][ T7089] bridge1: entered allmulticast mode [ 128.272598][ T7131] netlink: 48 bytes leftover after parsing attributes in process `syz.4.1226'. [ 128.418514][ T7143] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 128.533558][ T7154] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1235'. [ 128.848025][ T7186] validate_nla: 2 callbacks suppressed [ 128.848045][ T7186] netlink: 'syz.3.1247': attribute type 39 has an invalid length. [ 128.882063][ T7188] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1248'. [ 128.898325][ T7188] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1248'. [ 128.898382][ T4626] netdevsim netdevsim3 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 128.921287][ T7188] xt_NFQUEUE: number of total queues is 0 [ 128.946785][ T4626] netdevsim netdevsim3 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 128.973933][ T4626] netdevsim netdevsim3 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 129.000023][ T4626] netdevsim netdevsim3 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 129.527542][ T7201] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1252'. [ 129.590035][ T7203] xt_NFQUEUE: number of total queues is 0 [ 129.652749][ T7205] IPv6: NLM_F_CREATE should be specified when creating new route [ 129.756240][ T7210] netlink: 'syz.4.1258': attribute type 39 has an invalid length. [ 129.794013][ T7213] srh1_mt6_check: 2 callbacks suppressed [ 129.794034][ T7213] ip6t_srh: unknown srh match flags 4000 [ 130.025122][ T7231] xt_NFQUEUE: number of total queues is 0 [ 130.253891][ T7245] ip6_vti0 speed is unknown, defaulting to 1000 [ 130.272231][ T7248] ip6t_srh: unknown srh match flags 4000 [ 130.300761][ T7245] lo speed is unknown, defaulting to 1000 [ 130.329442][ T7253] netlink: 'syz.1.1272': attribute type 39 has an invalid length. [ 130.492659][ T7266] ip6t_srh: unknown srh match flags 4000 [ 130.558041][ T7276] ip6t_srh: unknown srh match flags 4000 [ 130.603235][ T7283] netlink: 'syz.0.1283': attribute type 39 has an invalid length. [ 130.704284][ T7295] ip6t_srh: unknown srh match flags 4000 [ 130.747131][ T7302] xt_NFQUEUE: number of total queues is 0 [ 130.827937][ T7313] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 131.022402][ T7346] ip6t_srh: unknown srh match flags 4000 [ 131.164280][ T29] kauditd_printk_skb: 1769 callbacks suppressed [ 131.164299][ T29] audit: type=1400 audit(1769065761.459:5979): avc: denied { create } for pid=7374 comm="syz.0.1327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=0 [ 131.166763][ T7375] netlink: 'syz.0.1327': attribute type 39 has an invalid length. [ 131.170862][ T29] audit: type=1400 audit(1769065761.459:5980): avc: denied { create } for pid=7374 comm="syz.0.1327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 131.221610][ T29] audit: type=1400 audit(1769065761.459:5981): avc: denied { map_create } for pid=7374 comm="syz.0.1327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 131.257962][ T29] audit: type=1400 audit(1769065761.549:5982): avc: denied { read write } for pid=3325 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 131.282531][ T29] audit: type=1400 audit(1769065761.549:5983): avc: denied { append } for pid=7356 comm="syz.3.1319" name="sg0" dev="devtmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 131.306651][ T29] audit: type=1400 audit(1769065761.549:5984): avc: denied { execmem } for pid=7356 comm="syz.3.1319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 131.326115][ T29] audit: type=1400 audit(1769065761.549:5985): avc: denied { read } for pid=7356 comm="syz.3.1319" dev="nsfs" ino=4026532752 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 131.347359][ T29] audit: type=1400 audit(1769065761.549:5986): avc: denied { create } for pid=7356 comm="syz.3.1319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 131.367942][ T29] audit: type=1400 audit(1769065761.549:5987): avc: denied { create } for pid=7356 comm="syz.3.1319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 131.389559][ T29] audit: type=1400 audit(1769065761.559:5988): avc: denied { mount } for pid=7380 comm="syz.1.1329" name="/" dev="ramfs" ino=18780 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=0 [ 131.436363][ T7390] xt_NFQUEUE: number of total queues is 0 [ 131.531347][ T7395] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 131.599555][ T7409] erspan0: left promiscuous mode [ 131.621081][ T7409] veth2: left promiscuous mode [ 131.626157][ T7409] veth2: left allmulticast mode [ 131.659016][ T7409] bridge1: left promiscuous mode [ 131.664294][ T7409] bridge1: left allmulticast mode [ 131.670031][ T52] netdevsim netdevsim4 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 131.679819][ T7411] netlink: 'syz.3.1338': attribute type 39 has an invalid length. [ 131.688897][ T52] netdevsim netdevsim4 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 131.711068][ T52] netdevsim netdevsim4 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 131.746378][ T52] netdevsim netdevsim4 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 131.896607][ T7407] ip6_vti0 speed is unknown, defaulting to 1000 [ 131.945444][ T7407] lo speed is unknown, defaulting to 1000 [ 132.026462][ T7432] netlink: 'syz.3.1348': attribute type 39 has an invalid length. [ 132.102971][ T7434] netlink: 'syz.3.1350': attribute type 39 has an invalid length. [ 132.214744][ T7448] xt_NFQUEUE: number of total queues is 0 [ 132.392437][ T7465] ip6t_srh: unknown srh match flags 4000 [ 132.647283][ T7500] __nla_validate_parse: 19 callbacks suppressed [ 132.647298][ T7500] netlink: 48 bytes leftover after parsing attributes in process `syz.3.1381'. [ 132.678257][ T7502] ip6t_srh: unknown srh match flags 4000 [ 132.719277][ T7509] netlink: 'syz.0.1385': attribute type 39 has an invalid length. [ 132.736976][ T7511] ip6t_srh: unknown srh match flags 4000 [ 132.748163][ T7509] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1385'. [ 132.783867][ T7517] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1388'. [ 132.807798][ T7517] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1388'. [ 132.829944][ T7517] xt_NFQUEUE: number of total queues is 0 [ 132.857437][ T7529] netlink: 48 bytes leftover after parsing attributes in process `syz.1.1394'. [ 132.957650][ T7547] ip6t_srh: unknown srh match flags 4000 [ 133.035668][ T7555] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1406'. [ 133.131260][ T7575] xt_NFQUEUE: number of total queues is 0 [ 133.167851][ T4635] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 133.176762][ T4635] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 133.186372][ T4635] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 133.196104][ T4635] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 133.206827][ T7555] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1406'. [ 133.215891][ T7555] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1406'. [ 133.441392][ T7638] netlink: 48 bytes leftover after parsing attributes in process `syz.1.1446'. [ 133.568753][ T7663] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1458'. [ 133.612436][ T7668] xt_NFQUEUE: number of total queues is 0 [ 133.912285][ T7731] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 134.482003][ T7841] netlink: 'syz.3.1546': attribute type 39 has an invalid length. [ 134.491602][ T7841] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 134.655512][ T7875] netlink: 'syz.3.1562': attribute type 39 has an invalid length. [ 134.668585][ T7875] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 134.826658][ T7906] netlink: 'syz.1.1577': attribute type 39 has an invalid length. [ 134.888733][ T7906] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 135.038319][ T7943] netlink: 'syz.1.1595': attribute type 39 has an invalid length. [ 135.069682][ T7943] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 135.141529][ T7955] srh1_mt6_check: 5 callbacks suppressed [ 135.141546][ T7955] ip6t_srh: unknown srh match flags 4000 [ 135.381036][ T7999] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 135.725114][ T8064] netlink: 'syz.2.1654': attribute type 39 has an invalid length. [ 135.733479][ T8064] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 135.871325][ T8093] netlink: 'syz.3.1669': attribute type 39 has an invalid length. [ 135.881474][ T8093] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 136.175112][ T29] kauditd_printk_skb: 1890 callbacks suppressed [ 136.175131][ T29] audit: type=1400 audit(1769065766.469:7879): avc: denied { read write } for pid=3325 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 136.210649][ T29] audit: type=1400 audit(1769065766.509:7880): avc: denied { read } for pid=8148 comm="syz.3.1697" dev="nsfs" ino=4026532752 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 136.243143][ T29] audit: type=1400 audit(1769065766.509:7881): avc: denied { create } for pid=8151 comm="syz.1.1698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 136.264394][ T29] audit: type=1400 audit(1769065766.529:7882): avc: denied { read write } for pid=3325 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 136.289444][ T29] audit: type=1400 audit(1769065766.539:7883): avc: denied { read write } for pid=3329 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 136.316226][ T29] audit: type=1400 audit(1769065766.539:7884): avc: denied { map_create } for pid=8150 comm="syz.2.1699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 136.335970][ T29] audit: type=1400 audit(1769065766.539:7885): avc: denied { prog_load } for pid=8150 comm="syz.2.1699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 136.356410][ T29] audit: type=1400 audit(1769065766.559:7886): avc: denied { map_create } for pid=8150 comm="syz.2.1699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 136.376419][ T29] audit: type=1400 audit(1769065766.589:7887): avc: denied { prog_load } for pid=8150 comm="syz.2.1699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 136.396103][ T29] audit: type=1400 audit(1769065766.589:7888): avc: denied { create } for pid=8150 comm="syz.2.1699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 136.662105][ T8203] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 136.690143][ T8211] ip6t_srh: unknown srh match flags 4000 [ 136.862577][ T8246] ip6t_srh: unknown srh match flags 4000 [ 137.362923][ T8350] ip6t_srh: unknown srh match flags 4000 [ 137.590624][ T8392] ip6t_srh: unknown srh match flags 4000 [ 137.842489][ T8448] ip6t_srh: unknown srh match flags 4000 [ 137.867564][ T8451] __nla_validate_parse: 23 callbacks suppressed [ 137.867651][ T8451] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1844'. [ 137.894985][ T8451] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1844'. [ 138.100335][ T8480] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1858'. [ 138.112828][ T8480] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1858'. [ 138.122661][ T8477] ip6t_srh: unknown srh match flags 4000 [ 138.287681][ T8518] ip6t_srh: unknown srh match flags 4000 [ 138.434224][ T8548] ip6t_srh: unknown srh match flags 4000 [ 138.570161][ T8577] ip6t_srh: unknown srh match flags 4000 [ 139.165863][ T8697] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 139.556694][ T8780] netlink: 48 bytes leftover after parsing attributes in process `syz.0.2002'. [ 139.683731][ T8806] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 139.742457][ T8816] netlink: 48 bytes leftover after parsing attributes in process `syz.0.2019'. [ 139.945226][ T8848] netlink: 48 bytes leftover after parsing attributes in process `syz.2.2034'. [ 140.142076][ T8897] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 140.399065][ T8947] netlink: 48 bytes leftover after parsing attributes in process `syz.4.2086'. [ 140.663186][ T9005] netlink: 'syz.3.2113': attribute type 4 has an invalid length. [ 140.672094][ T9005] netlink: 168 bytes leftover after parsing attributes in process `syz.3.2113'. [ 140.689987][ T9007] netlink: 'syz.0.2115': attribute type 10 has an invalid length. [ 140.709940][ T9007] team0: Port device vxcan1 added [ 141.046397][ T9079] netlink: 48 bytes leftover after parsing attributes in process `syz.0.2150'. [ 141.190103][ T29] kauditd_printk_skb: 2028 callbacks suppressed [ 141.190122][ T29] audit: type=1400 audit(1769065771.479:9917): avc: denied { read write } for pid=3329 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 141.242605][ T29] audit: type=1400 audit(1769065771.479:9918): avc: denied { create } for pid=9106 comm="syz.2.2165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 141.263033][ T29] audit: type=1400 audit(1769065771.529:9919): avc: denied { read write } for pid=3325 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 141.333227][ T29] audit: type=1400 audit(1769065771.549:9920): avc: denied { create } for pid=9110 comm="syz.3.2167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 141.352922][ T29] audit: type=1400 audit(1769065771.549:9921): avc: denied { allowed } for pid=9112 comm="syz.1.2169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 141.372737][ T29] audit: type=1400 audit(1769065771.549:9922): avc: denied { read } for pid=9110 comm="syz.3.2167" dev="nsfs" ino=4026532752 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 141.394451][ T29] audit: type=1400 audit(1769065771.549:9923): avc: denied { map_create } for pid=9110 comm="syz.3.2167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 141.413927][ T29] audit: type=1400 audit(1769065771.549:9924): avc: denied { prog_load } for pid=9110 comm="syz.3.2167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 141.433019][ T29] audit: type=1400 audit(1769065771.549:9925): avc: denied { create } for pid=9110 comm="syz.3.2167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 141.453336][ T29] audit: type=1400 audit(1769065771.549:9926): avc: denied { read } for pid=9110 comm="syz.3.2167" dev="nsfs" ino=4026532752 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 141.952003][ T9229] xfrm0: entered promiscuous mode [ 141.957143][ T9229] xfrm0: entered allmulticast mode [ 141.988429][ T9238] xt_CT: You must specify a L4 protocol and not use inversions on it [ 142.076003][ T9253] srh1_mt6_check: 5 callbacks suppressed [ 142.076024][ T9253] ip6t_srh: unknown srh match flags 4000 [ 142.222631][ T9284] ip6t_srh: unknown srh match flags 4000 [ 142.384953][ T9319] ip6t_srh: unknown srh match flags 4000 [ 142.548848][ T9350] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 142.700039][ T9381] ip6t_srh: unknown srh match flags 4000 [ 142.941615][ T9429] ip6t_srh: unknown srh match flags 4000 [ 143.057331][ T9453] __nla_validate_parse: 5 callbacks suppressed [ 143.057347][ T9453] netlink: 48 bytes leftover after parsing attributes in process `syz.0.2334'. [ 143.092901][ T9457] ip6t_srh: unknown srh match flags 4000 [ 143.398825][ T9506] ip6t_srh: unknown srh match flags 4000 [ 143.645355][ T9527] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 143.773796][ T9558] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 144.118744][ T9629] netlink: 48 bytes leftover after parsing attributes in process `syz.0.2419'. [ 144.228239][ T9650] ip6t_srh: unknown srh match flags 4000 [ 144.336325][ T9662] netlink: 48 bytes leftover after parsing attributes in process `syz.3.2434'. [ 144.462144][ T9676] --map-set only usable from mangle table [ 144.579141][ T9694] ip6t_srh: unknown srh match flags 4000 [ 144.723135][ T9723] vlan0: entered promiscuous mode [ 145.297128][ T9842] netlink: 20 bytes leftover after parsing attributes in process `syz.2.2523'. [ 145.625474][ T9909] ip6t_srh: unknown srh match flags 4000 [ 146.200547][ T29] kauditd_printk_skb: 1685 callbacks suppressed [ 146.200565][ T29] audit: type=1400 audit(1769065776.489:11612): avc: denied { read write } for pid=3329 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 146.236629][ T29] audit: type=1400 audit(1769065776.499:11613): avc: denied { open } for pid=10028 comm="syz.4.2615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 146.256890][ T29] audit: type=1400 audit(1769065776.499:11614): avc: denied { open } for pid=10028 comm="syz.4.2615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 146.276358][ T29] audit: type=1400 audit(1769065776.509:11615): avc: denied { open } for pid=10028 comm="syz.4.2615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 146.296022][ T29] audit: type=1400 audit(1769065776.509:11616): avc: denied { create } for pid=10028 comm="syz.4.2615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 146.318620][ T29] audit: type=1400 audit(1769065776.529:11617): avc: denied { open } for pid=10031 comm="syz.3.2616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 146.338261][ T29] audit: type=1400 audit(1769065776.549:11618): avc: denied { read write } for pid=10031 comm="syz.3.2616" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 146.363985][ T29] audit: type=1400 audit(1769065776.549:11619): avc: denied { create } for pid=10031 comm="syz.3.2616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 146.384069][ T29] audit: type=1400 audit(1769065776.549:11620): avc: denied { create } for pid=10031 comm="syz.3.2616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 146.404830][ T29] audit: type=1400 audit(1769065776.549:11621): avc: denied { create } for pid=10031 comm="syz.3.2616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 146.755346][T10104] netlink: 'syz.4.2649': attribute type 6 has an invalid length. [ 146.919030][T10130] veth0_virt_wifi: entered promiscuous mode [ 147.004112][T10118] ip6_vti0 speed is unknown, defaulting to 1000 [ 147.076267][T10118] lo speed is unknown, defaulting to 1000 [ 147.126846][T10154] srh1_mt6_check: 5 callbacks suppressed [ 147.126861][T10154] ip6t_srh: unknown srh match flags 4000 [ 147.140146][T10135] ip6_vti0 speed is unknown, defaulting to 1000 [ 147.240034][T10135] lo speed is unknown, defaulting to 1000 [ 147.359690][T10177] ip6t_srh: unknown srh match flags 4000 [ 147.468746][T10193] IPVS: ovf: FWM 3 0x00000003 - no destination available [ 147.584821][T10214] ip6t_srh: unknown srh match flags 4000 [ 147.795927][T10244] ip6t_srh: unknown srh match flags 4000 [ 147.956359][T10271] ip6t_srh: unknown srh match flags 4000 [ 148.073774][T10294] ip6t_srh: unknown srh match flags 4000 [ 148.360516][T10352] ip6t_srh: unknown srh match flags 4000 [ 148.507675][T10379] ip6t_srh: unknown srh match flags 4000 [ 148.593675][T10392] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2784'. [ 148.948864][T10464] netlink: 20 bytes leftover after parsing attributes in process `syz.0.2819'. [ 148.958132][T10464] netlink: 36 bytes leftover after parsing attributes in process `syz.0.2819'. [ 148.979627][T10468] vlan3: entered promiscuous mode [ 148.984964][T10468] gretap0: entered promiscuous mode [ 149.024025][T10476] netlink: 'syz.0.2824': attribute type 21 has an invalid length. [ 149.032129][T10476] netlink: 128 bytes leftover after parsing attributes in process `syz.0.2824'. [ 149.041593][T10476] netlink: 'syz.0.2824': attribute type 5 has an invalid length. [ 149.049484][T10476] netlink: 'syz.0.2824': attribute type 6 has an invalid length. [ 149.057417][T10476] netlink: 3 bytes leftover after parsing attributes in process `syz.0.2824'. [ 149.120751][T10486] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2829'. [ 149.129833][T10486] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2829'. [ 149.168954][T10493] netlink: 'syz.0.2832': attribute type 12 has an invalid length. [ 149.177026][T10493] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2832'. [ 149.230861][T10452] ip6_vti0 speed is unknown, defaulting to 1000 [ 149.269232][T10452] lo speed is unknown, defaulting to 1000 [ 149.504505][T10543] ip6t_srh: unknown srh match flags 4000 [ 149.564432][T10553] netlink: 168 bytes leftover after parsing attributes in process `syz.0.2861'. [ 149.719599][T10579] netlink: 36 bytes leftover after parsing attributes in process `syz.4.2874'. [ 149.839431][T10599] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 150.120264][T10649] ip6t_srh: unknown srh match flags 4000 [ 150.505639][T10693] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 150.512229][T10693] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 150.519942][T10693] vhci_hcd vhci_hcd.0: Device attached [ 150.527991][T10695] vhci_hcd: cannot find the pending unlink 12 [ 150.541753][T10695] vhci_hcd: connection closed [ 150.541882][ T31] vhci_hcd vhci_hcd.1: stop threads [ 150.551960][ T31] vhci_hcd vhci_hcd.1: release socket [ 150.557368][ T31] vhci_hcd vhci_hcd.1: disconnect device [ 151.197780][T10766] cgroup: fork rejected by pids controller in /syz3 [ 151.227808][ T29] kauditd_printk_skb: 1478 callbacks suppressed [ 151.227835][ T29] audit: type=1400 audit(1769065781.519:13100): avc: denied { read write } for pid=10765 comm="syz.3.2959" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 151.289441][ T29] audit: type=1400 audit(1769065781.559:13101): avc: denied { open } for pid=10765 comm="syz.3.2959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 151.309615][ T29] audit: type=1400 audit(1769065781.559:13102): avc: denied { execmem } for pid=10765 comm="syz.3.2959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 151.329506][ T29] audit: type=1400 audit(1769065781.559:13103): avc: denied { prog_load } for pid=10770 comm="syz.4.2961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.348982][ T29] audit: type=1400 audit(1769065781.569:13104): avc: denied { prog_load } for pid=10770 comm="syz.4.2961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.368543][ T29] audit: type=1400 audit(1769065781.569:13105): avc: denied { map_create } for pid=10770 comm="syz.4.2961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.389632][ T29] audit: type=1400 audit(1769065781.579:13106): avc: denied { read write } for pid=3329 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 151.426818][ T29] audit: type=1400 audit(1769065781.649:13107): avc: denied { create } for pid=10772 comm="syz.3.2962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 151.448184][ T29] audit: type=1400 audit(1769065781.709:13108): avc: denied { prog_load } for pid=10774 comm="syz.4.2963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 151.459112][T10769] ip6_vti0 speed is unknown, defaulting to 1000 [ 151.490032][ T29] audit: type=1400 audit(1769065781.719:13109): avc: denied { read write } for pid=3329 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 151.561344][T10769] lo speed is unknown, defaulting to 1000 [ 151.804223][T10915] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 151.906740][T10926] bridge1: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 152.578728][T11212] srh1_mt6_check: 5 callbacks suppressed [ 152.578748][T11212] ip6t_srh: unknown srh match flags 4000 [ 152.676253][T11229] gre1: entered promiscuous mode [ 152.681304][T11229] gre1: entered allmulticast mode [ 152.740578][T11241] ip6t_srh: unknown srh match flags 4000 [ 153.179976][T11404] ip6t_srh: unknown srh match flags 4000 [ 153.215946][T11407] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 153.485671][T11434] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 153.932082][T11467] netlink: 'syz.4.3101': attribute type 4 has an invalid length. [ 153.940044][T11467] __nla_validate_parse: 9 callbacks suppressed [ 153.940059][T11467] netlink: 17 bytes leftover after parsing attributes in process `syz.4.3101'. [ 153.970720][T11467] netlink: 'syz.4.3101': attribute type 1 has an invalid length. [ 153.978554][T11467] netlink: 'syz.4.3101': attribute type 2 has an invalid length. [ 153.987271][T11464] ip6_vti0 speed is unknown, defaulting to 1000 [ 154.022693][T11464] lo speed is unknown, defaulting to 1000 [ 154.304071][T11602] netlink: 32 bytes leftover after parsing attributes in process `syz.4.3118'. [ 154.364267][T11612] tun0: tun_chr_ioctl cmd 1074025675 [ 154.369819][T11612] tun0: persist enabled [ 154.374474][T11612] tun0: tun_chr_ioctl cmd 1074025675 [ 154.379961][T11612] tun0: persist enabled [ 154.584642][T11651] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 154.585441][T11650] netlink: 48 bytes leftover after parsing attributes in process `syz.3.3141'. [ 154.686040][T11667] ip6t_srh: unknown srh match flags 4000 [ 154.865245][T11697] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 154.936346][T11707] netlink: 48 bytes leftover after parsing attributes in process `syz.0.3169'. [ 155.026411][T11724] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 155.169743][T11747] ip6t_srh: unknown srh match flags 4000 [ 155.254885][T11756] ip6t_srh: unknown srh match flags 4000 [ 155.268584][T11758] IPVS: ovf: FWM 3 0x00000003 - no destination available [ 155.279742][T11758] IPVS: ovf: FWM 3 0x00000003 - no destination available [ 155.699215][T11893] ip6_vti0 speed is unknown, defaulting to 1000 [ 155.734928][T11893] lo speed is unknown, defaulting to 1000 [ 155.801722][T11904] netlink: 48 bytes leftover after parsing attributes in process `syz.3.3213'. [ 155.854779][T11908] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3215'. [ 155.993918][T11920] netlink: 27 bytes leftover after parsing attributes in process `syz.3.3221'. [ 156.268913][ T29] kauditd_printk_skb: 1016 callbacks suppressed [ 156.268934][ T29] audit: type=1400 audit(1769065786.559:14126): avc: denied { create } for pid=11945 comm="syz.1.3234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 156.334158][ T29] audit: type=1400 audit(1769065786.609:14127): avc: denied { read write } for pid=3325 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.358935][ T29] audit: type=1400 audit(1769065786.619:14128): avc: denied { open } for pid=12050 comm="syz.1.3236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 156.378870][ T29] audit: type=1400 audit(1769065786.619:14129): avc: denied { prog_load } for pid=12050 comm="syz.1.3236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 156.398330][ T29] audit: type=1400 audit(1769065786.619:14130): avc: denied { open } for pid=12050 comm="syz.1.3236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 156.475625][T12063] netlink: 36 bytes leftover after parsing attributes in process `syz.1.3240'. [ 156.481815][ T29] audit: type=1400 audit(1769065786.669:14131): avc: denied { read write } for pid=3325 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.495104][T12063] netlink: 36 bytes leftover after parsing attributes in process `syz.1.3240'. [ 156.509768][ T29] audit: type=1400 audit(1769065786.719:14132): avc: denied { read write } for pid=3329 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.509844][ T29] audit: type=1400 audit(1769065786.729:14133): avc: denied { read write } for pid=12052 comm="syz.1.3238" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.567758][ T29] audit: type=1400 audit(1769065786.739:14134): avc: denied { read write } for pid=12053 comm="syz.3.3237" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.592264][ T29] audit: type=1400 audit(1769065786.749:14135): avc: denied { read write } for pid=3325 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.811799][ T3490] Process accounting resumed [ 157.003102][T12187] xt_TCPMSS: Only works on TCP SYN packets [ 157.034713][T12189] netlink: 292 bytes leftover after parsing attributes in process `syz.3.3253'. [ 157.272908][T12310] ip6t_srh: unknown srh match flags 4000 [ 157.496601][T12429] ip6t_srh: unknown srh match flags 4000 [ 157.573893][T12452] netlink: 'syz.1.3273': attribute type 4 has an invalid length. [ 157.610040][T12488] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 157.840796][T12555] ip6t_srh: unknown srh match flags 4000 [ 158.028979][T12575] netlink: 'syz.4.3293': attribute type 3 has an invalid length. [ 158.137213][T12581] ip6t_srh: unknown srh match flags 4000 [ 158.343456][T12611] ip6t_srh: unknown srh match flags 4000 [ 158.400173][T12617] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 158.919112][T12686] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 159.046006][T12700] ip6t_srh: unknown srh match flags 4000 [ 159.093133][ T3676] Bluetooth: hci0: sending frame failed (-49) [ 159.099822][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -49 [ 159.212959][T12715] ip6t_srh: unknown srh match flags 4000 [ 159.232435][T12717] __nla_validate_parse: 10 callbacks suppressed [ 159.232455][T12717] netlink: 48 bytes leftover after parsing attributes in process `syz.1.3355'. [ 159.510051][T12744] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1001 sclass=netlink_route_socket pid=12744 comm=syz.1.3369 [ 159.534302][T12746] netlink: 48 bytes leftover after parsing attributes in process `syz.3.3371'. [ 159.552012][T12744] netlink: 'syz.1.3369': attribute type 10 has an invalid length. [ 159.645137][T12753] ip6t_srh: unknown srh match flags 4000 [ 159.691034][T12765] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12765 comm=syz.1.3379 [ 160.006449][T12794] netlink: 48 bytes leftover after parsing attributes in process `syz.3.3392'. [ 160.787372][T12834] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3407'. [ 161.008402][T12836] ip6t_srh: unknown srh match flags 4000 [ 161.274030][ T29] kauditd_printk_skb: 701 callbacks suppressed [ 161.274047][ T29] audit: type=1400 audit(1769065791.569:14837): avc: denied { create } for pid=12849 comm="syz.4.3413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 161.361117][ T29] audit: type=1400 audit(1769065791.639:14838): avc: denied { open } for pid=12862 comm="syz.4.3419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 161.431765][ T29] audit: type=1400 audit(1769065791.709:14839): avc: denied { open } for pid=12866 comm="syz.4.3420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 161.451285][ T29] audit: type=1400 audit(1769065791.709:14840): avc: denied { prog_load } for pid=12866 comm="syz.4.3420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.471025][ T29] audit: type=1400 audit(1769065791.709:14841): avc: denied { prog_load } for pid=12866 comm="syz.4.3420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.490304][ T29] audit: type=1400 audit(1769065791.709:14842): avc: denied { map_create } for pid=12866 comm="syz.4.3420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.510801][ T29] audit: type=1400 audit(1769065791.709:14843): avc: denied { prog_load } for pid=12866 comm="syz.4.3420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.530613][ T29] audit: type=1400 audit(1769065791.709:14844): avc: denied { create } for pid=12866 comm="syz.4.3420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 161.551888][ T29] audit: type=1400 audit(1769065791.709:14845): avc: denied { prog_load } for pid=12866 comm="syz.4.3420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.571277][ T29] audit: type=1400 audit(1769065791.709:14846): avc: denied { open } for pid=12866 comm="syz.4.3420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 161.910063][T12880] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 162.241879][T12905] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 162.313245][T13007] ip6t_srh: unknown srh match flags 4000 [ 162.496649][T13016] ip6_vti0 speed is unknown, defaulting to 1000 [ 162.554583][T13016] lo speed is unknown, defaulting to 1000 [ 162.593488][T13124] netlink: 'syz.3.3445': attribute type 16 has an invalid length. [ 162.601595][T13124] netlink: 'syz.3.3445': attribute type 17 has an invalid length. [ 162.636360][T13124] erspan0: entered promiscuous mode [ 162.676252][T13124] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.694190][T13124] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 162.714022][ T3490] ip6_vti0 speed is unknown, defaulting to 1000 [ 162.721558][ T3490] syz2: Port: 1 Link ACTIVE [ 162.738743][ T9] ip6_vti0 speed is unknown, defaulting to 1000 [ 162.907891][T13136] netlink: 48 bytes leftover after parsing attributes in process `syz.3.3450'. [ 162.938726][T13139] ip6t_srh: unknown srh match flags 4000 [ 163.389520][T13272] ip6t_srh: unknown srh match flags 4000 [ 163.466102][T13270] ip6_vti0 speed is unknown, defaulting to 1000 [ 163.514042][T13270] lo speed is unknown, defaulting to 1000 [ 163.662899][T13383] bond0: (slave vlan0): Opening slave failed [ 163.830794][T13592] netlink: 48 bytes leftover after parsing attributes in process `syz.3.3475'. [ 163.875749][T13596] ip6t_srh: unknown srh match flags 4000 [ 163.902746][T13598] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3478'. [ 163.911865][T13598] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3478'. [ 163.930201][T13598] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3478'. [ 163.939234][T13598] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3478'. [ 164.171911][T13724] netlink: 'syz.4.3490': attribute type 21 has an invalid length. [ 164.180155][T13724] netlink: 'syz.4.3490': attribute type 21 has an invalid length. [ 164.400457][T13748] ip6t_srh: unknown srh match flags 4000 [ 164.441335][T13753] netlink: 'syz.3.3500': attribute type 14 has an invalid length. [ 164.449411][T13753] __nla_validate_parse: 3 callbacks suppressed [ 164.449498][T13753] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3500'. [ 164.464775][T13753] netlink: 'syz.3.3500': attribute type 14 has an invalid length. [ 164.472813][T13753] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3500'. [ 164.608155][T13763] ip6t_srh: unknown srh match flags 4000 [ 164.645367][T13767] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3506'. [ 164.818370][T13778] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3512'. [ 164.897221][T13788] ip6t_srh: unknown srh match flags 4000 [ 164.976302][T13798] netlink: 'syz.4.3521': attribute type 1 has an invalid length. [ 165.007915][T13798] 8021q: adding VLAN 0 to HW filter on device bond2 [ 165.088462][T13798] bond2: (slave geneve2): making interface the new active one [ 165.125469][T13798] bond2: (slave geneve2): Enslaving as an active interface with an up link [ 165.134585][ T31] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 165.148729][ T31] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 165.186458][ T31] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 165.227035][ T31] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 165.346662][T13920] geneve3: entered promiscuous mode [ 165.352071][T13920] geneve3: entered allmulticast mode [ 165.372301][ T4626] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 20000 - 0 [ 165.380707][ T4626] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 20000 - 0 [ 165.389684][ T4626] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 20000 - 0 [ 165.398351][T13917] ip6t_srh: unknown srh match flags 4000 [ 165.404227][ T4626] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 20000 - 0 [ 165.600920][T13943] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3540'. [ 165.610033][T13943] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3540'. [ 165.868824][T14173] ip6t_srh: unknown srh match flags 4000 [ 166.169142][T14316] netlink: 48 bytes leftover after parsing attributes in process `syz.3.3575'. [ 166.285430][ T29] kauditd_printk_skb: 648 callbacks suppressed [ 166.285450][ T29] audit: type=1400 audit(1769065796.579:15495): avc: denied { allowed } for pid=14335 comm="syz.4.3585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 166.339269][ T29] audit: type=1400 audit(1769065796.599:15496): avc: denied { create } for pid=14329 comm="syz.3.3582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 166.359271][ T29] audit: type=1400 audit(1769065796.619:15497): avc: denied { read write } for pid=3329 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 166.384016][ T29] audit: type=1400 audit(1769065796.629:15498): avc: denied { create } for pid=14338 comm="syz.4.3586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 166.405531][ T29] audit: type=1400 audit(1769065796.629:15499): avc: denied { name_bind } for pid=14340 comm="syz.3.3587" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 166.427512][ T29] audit: type=1400 audit(1769065796.689:15500): avc: denied { create } for pid=14342 comm="syz.4.3588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 166.447607][ T29] audit: type=1400 audit(1769065796.689:15501): avc: denied { create } for pid=14342 comm="syz.4.3588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 166.472757][T14424] netlink: 48 bytes leftover after parsing attributes in process `syz.4.3589'. [ 166.479253][ T29] audit: type=1400 audit(1769065796.759:15502): avc: denied { create } for pid=14413 comm="syz.4.3589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 166.501631][ T29] audit: type=1400 audit(1769065796.759:15503): avc: denied { map_create } for pid=14413 comm="syz.4.3589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 166.521026][ T29] audit: type=1400 audit(1769065796.759:15504): avc: denied { prog_load } for pid=14413 comm="syz.4.3589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 166.722260][T14485] ip6t_srh: unknown srh match flags 4000 [ 166.729477][T14486] netlink: 'syz.0.3609': attribute type 30 has an invalid length. [ 166.745419][T14486] bond2: option arp_missed_max: invalid value (0) [ 166.751993][T14486] bond2: option arp_missed_max: allowed values 1 - 255 [ 166.763533][T14486] bond2 (unregistering): Released all slaves [ 166.779744][T14492] netlink: 'syz.1.3610': attribute type 3 has an invalid length. [ 166.787852][T14492] netlink: 152 bytes leftover after parsing attributes in process `syz.1.3610'. [ 166.918701][T14544] ip6t_srh: unknown srh match flags 4000 [ 167.009161][T14621] cgroup: fork rejected by pids controller in /syz4 [ 167.145733][T14757] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3642'. [ 167.158972][T14759] A link change request failed with some changes committed already. Interface ip_vti0 may have been left with an inconsistent configuration, please check. [ 168.206710][T15375] srh1_mt6_check: 2 callbacks suppressed [ 168.206776][T15375] ip6t_srh: unknown srh match flags 4000 [ 168.605602][T15404] ip6t_srh: unknown srh match flags 4000 [ 169.152836][T15686] ip6t_srh: unknown srh match flags 4000 [ 169.253078][T15699] ip6t_srh: unknown srh match flags 4000 [ 169.386757][T15718] ip6t_srh: unknown srh match flags 4000 [ 169.411364][T15714] macvlan0: entered promiscuous mode [ 169.449192][T15714] batman_adv: batadv0: Adding interface: macvlan0 [ 169.455794][T15714] batman_adv: batadv0: The MTU of interface macvlan0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 169.481708][T15714] batman_adv: batadv0: Not using interface macvlan0 (retrying later): interface not active [ 169.553267][T15740] geneve3: entered promiscuous mode [ 169.609005][T15750] __nla_validate_parse: 4 callbacks suppressed [ 169.609024][T15750] netlink: 48 bytes leftover after parsing attributes in process `syz.3.3779'. [ 169.775848][T15780] netlink: 48 bytes leftover after parsing attributes in process `syz.3.3793'. [ 169.960264][T15908] netlink: 48 bytes leftover after parsing attributes in process `syz.3.3808'. [ 170.945961][T16294] netlink: 'syz.3.3848': attribute type 29 has an invalid length. [ 170.955214][T16294] netlink: 'syz.3.3848': attribute type 29 has an invalid length. [ 171.264764][T16534] ip6t_srh: unknown srh match flags 4000 [ 171.292206][ T29] kauditd_printk_skb: 1045 callbacks suppressed [ 171.292224][ T29] audit: type=1400 audit(1769065801.593:16550): avc: denied { prog_load } for pid=16536 comm="syz.0.3869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 171.355226][ T29] audit: type=1400 audit(1769065801.593:16551): avc: denied { read } for pid=16537 comm="syz.1.3871" dev="nsfs" ino=4026532512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 171.377119][ T29] audit: type=1400 audit(1769065801.603:16552): avc: denied { create } for pid=16540 comm="syz.3.3870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 171.398243][ T29] audit: type=1400 audit(1769065801.613:16553): avc: denied { read write } for pid=16540 comm="syz.3.3870" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 171.422519][ T29] audit: type=1400 audit(1769065801.613:16554): avc: denied { create } for pid=16536 comm="syz.0.3869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 171.443952][ T29] audit: type=1400 audit(1769065801.623:16555): avc: denied { create } for pid=16537 comm="syz.1.3871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 171.465100][ T29] audit: type=1400 audit(1769065801.623:16556): avc: denied { create } for pid=16537 comm="syz.1.3871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 171.485867][ T29] audit: type=1400 audit(1769065801.623:16557): avc: denied { name_bind } for pid=16537 comm="syz.1.3871" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 171.507981][ T29] audit: type=1400 audit(1769065801.623:16558): avc: denied { create } for pid=16537 comm="syz.1.3871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 171.528896][ T29] audit: type=1400 audit(1769065801.623:16559): avc: denied { create } for pid=16537 comm="syz.1.3871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 171.623103][T16567] netlink: 76 bytes leftover after parsing attributes in process `syz.2.3881'. [ 172.136002][T16902] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3898'. [ 172.151178][T16902] 8021q: adding VLAN 0 to HW filter on device bond3 [ 172.163133][T16902] wireguard0: entered promiscuous mode [ 172.168670][T16902] wireguard0: entered allmulticast mode [ 172.177488][T16902] 8021q: adding VLAN 0 to HW filter on device bond3 [ 172.185982][T16902] bond3: (slave wireguard0): The slave device specified does not support setting the MAC address [ 172.221981][T16902] bond3: (slave wireguard0): Error -95 calling set_mac_address [ 172.315704][T16922] geneve2: entered promiscuous mode [ 172.320968][T16922] geneve2: entered allmulticast mode [ 172.327343][ T4626] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 20000 - 0 [ 172.359250][ T4626] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 20000 - 0 [ 172.403256][ T4626] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 20000 - 0 [ 172.438253][ T4626] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 20000 - 0 [ 172.834518][T17183] ip6t_srh: unknown srh match flags 4000 [ 173.073094][T17323] ip6t_srh: unknown srh match flags 4000 [ 173.098079][T17326] netlink: 'syz.1.3956': attribute type 8 has an invalid length. [ 173.105981][T17326] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3956'. [ 173.579969][T17615] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3974'. [ 173.683635][T17677] -: renamed from syzkaller0 [ 174.146810][T17910] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3993'. [ 174.241171][T17912] netlink: 24 bytes leftover after parsing attributes in process `syz.4.3994'. [ 174.416811][T17921] ip6t_srh: unknown srh match flags 4000 [ 174.490977][T17928] ip6t_srh: unknown srh match flags 4000 [ 174.711584][T17974] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4012'. [ 174.726790][T17974] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4012'. [ 174.758969][T17974] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4012'. [ 174.774601][T18055] ip6t_srh: unknown srh match flags 4000 [ 174.947635][T18174] xfrm0: left promiscuous mode [ 174.952518][T18174] xfrm0: left allmulticast mode [ 174.962532][T18174] veth2: left promiscuous mode [ 174.967362][T18174] veth2: left allmulticast mode [ 174.984503][T18174] geneve2: left promiscuous mode [ 174.989581][T18174] geneve2: left allmulticast mode [ 175.022868][ T4626] netdevsim netdevsim0 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 175.031562][ T4626] netdevsim netdevsim0 eth0: unset [1, 0] type 2 family 0 port 20000 - 0 [ 175.064977][ T4626] netdevsim netdevsim0 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 175.073440][ T4626] netdevsim netdevsim0 eth1: unset [1, 0] type 2 family 0 port 20000 - 0 [ 175.095295][T18185] ip6t_srh: unknown srh match flags 4000 [ 175.113069][ T4626] netdevsim netdevsim0 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 175.121585][ T4626] netdevsim netdevsim0 eth2: unset [1, 0] type 2 family 0 port 20000 - 0 [ 175.150725][ T4626] netdevsim netdevsim0 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 175.159241][ T4626] netdevsim netdevsim0 eth3: unset [1, 0] type 2 family 0 port 20000 - 0 [ 175.379353][T18211] netlink: 'syz.1.4038': attribute type 14 has an invalid length. [ 175.387586][T18211] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4038'. [ 175.421342][T18211] netlink: 'syz.1.4038': attribute type 14 has an invalid length. [ 175.429378][T18211] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4038'. [ 175.721242][T18215] ip6t_srh: unknown srh match flags 4000 [ 176.311825][ T29] kauditd_printk_skb: 12767 callbacks suppressed [ 176.311851][ T29] audit: type=1400 audit(1769065806.603:29156): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 176.339654][ T29] audit: type=1400 audit(1769065806.603:29157): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 176.361195][ T29] audit: type=1400 audit(1769065806.603:29158): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 176.368300][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 176.383495][ T29] audit: type=1400 audit(1769065806.603:29159): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 176.390023][ T3049] audit: audit_lost=58 audit_rate_limit=0 audit_backlog_limit=64 [ 176.411442][ T29] audit: type=1400 audit(1769065806.603:29160): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 176.419203][ T3049] audit: backlog limit exceeded [ 176.440376][ T29] audit: type=1400 audit(1769065806.603:29161): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 176.467022][ T29] audit: type=1400 audit(1769065806.603:29162): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 176.825451][T18449] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4056'. [ 176.893439][T18449] 8021q: adding VLAN 0 to HW filter on device bond4 [ 176.985126][T18658] netlink: 48 bytes leftover after parsing attributes in process `syz.1.4060'. [ 177.029940][T18662] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4061'. [ 177.041815][T18658] netlink: 20 bytes leftover after parsing attributes in process `syz.1.4060'. [ 177.050997][T18658] netlink: 20 bytes leftover after parsing attributes in process `syz.1.4060'. [ 177.121295][T18201] ip6_vti0 speed is unknown, defaulting to 1000 [ 177.529862][T18920] netlink: 'syz.3.4077': attribute type 12 has an invalid length. [ 177.546742][T18920] netlink: 'syz.3.4077': attribute type 12 has an invalid length. [ 177.637423][T18672] ip6_vti0 speed is unknown, defaulting to 1000 [ 177.645253][T18201] lo speed is unknown, defaulting to 1000 [ 177.874337][T18672] lo speed is unknown, defaulting to 1000 [ 177.926748][T19117] ip6t_srh: unknown srh match flags 4000 [ 178.168488][T19189] netlink: 'syz.0.4096': attribute type 39 has an invalid length. [ 178.286303][T19348] ip6t_srh: unknown srh match flags 4000 [ 178.465379][T19463] gtp0: entered promiscuous mode [ 178.511343][T19132] ip6_vti0 speed is unknown, defaulting to 1000 [ 178.600213][T19132] lo speed is unknown, defaulting to 1000 [ 178.965150][T19596] ip6t_srh: unknown srh match flags 4000 [ 179.337362][T19606] bond1: entered promiscuous mode [ 179.662119][T19624] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 180.599426][T20203] __nla_validate_parse: 2 callbacks suppressed [ 180.599445][T20203] netlink: 1343 bytes leftover after parsing attributes in process `syz.1.4171'. [ 180.707744][T20210] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 180.714454][T20210] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 180.722042][T20210] vhci_hcd vhci_hcd.0: Device attached [ 180.729921][T20211] vhci_hcd: connection closed [ 180.730087][ T1666] vhci_hcd vhci_hcd.1: stop threads [ 180.740818][ T1666] vhci_hcd vhci_hcd.1: release socket [ 180.746366][ T1666] vhci_hcd vhci_hcd.1: disconnect device [ 180.895855][T20327] ip6t_srh: unknown srh match flags 4000 [ 180.910882][T20329] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4182'. [ 180.937659][T20329] 8021q: adding VLAN 0 to HW filter on device bond5 [ 180.975910][T20329] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4182'. [ 180.984899][T20329] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4182'. [ 181.019307][T20329] macsec1: entered promiscuous mode [ 181.024845][T20329] bond5: entered promiscuous mode [ 181.030215][T20329] macsec1: entered allmulticast mode [ 181.035607][T20329] bond5: entered allmulticast mode [ 181.198596][T20460] ip6t_srh: unknown srh match flags 4000 [ 181.321802][ T29] kauditd_printk_skb: 18978 callbacks suppressed [ 181.321818][ T29] audit: type=1400 audit(1769065811.613:48129): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 181.362138][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 181.369087][ T3049] audit: audit_lost=63 audit_rate_limit=0 audit_backlog_limit=64 [ 181.377000][ T3049] audit: backlog limit exceeded [ 181.382207][T20521] audit: audit_backlog=65 > audit_backlog_limit=64 [ 181.383332][ T29] audit: type=1400 audit(1769065811.653:48130): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 181.388783][T20521] audit: audit_lost=64 audit_rate_limit=0 audit_backlog_limit=64 [ 181.410203][ T29] audit: type=1400 audit(1769065811.653:48131): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 181.418020][T20521] audit: backlog limit exceeded [ 181.440074][ T29] audit: type=1400 audit(1769065811.653:48132): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 181.625072][T20688] ip6t_srh: unknown srh match flags 4000 [ 181.705205][T20767] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=24 sclass=netlink_audit_socket pid=20767 comm=syz.1.4212 [ 182.074763][T21026] ip6t_srh: unknown srh match flags 4000 [ 182.482729][T21072] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4248'. [ 182.961033][T21226] netlink: 'syz.4.4274': attribute type 12 has an invalid length. [ 183.197862][T21258] netlink: 20 bytes leftover after parsing attributes in process `syz.1.4289'. [ 183.239661][T21262] netlink: 'syz.0.4291': attribute type 3 has an invalid length. [ 183.260717][T21262] netlink: 'syz.0.4291': attribute type 3 has an invalid length. [ 183.444698][T21481] netlink: 24 bytes leftover after parsing attributes in process `syz.4.4299'. [ 183.493478][T21481] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=21481 comm=syz.4.4299 [ 183.725537][T21602] netlink: 28 bytes leftover after parsing attributes in process `syz.3.4310'. [ 183.734892][T21602] netlink: 'syz.3.4310': attribute type 7 has an invalid length. [ 183.742873][T21602] netlink: 'syz.3.4310': attribute type 8 has an invalid length. [ 183.750679][T21602] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4310'. [ 183.828615][T21609] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4313'. [ 183.870736][T21609] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 184.005991][T21613] ip6_vti0 speed is unknown, defaulting to 1000 [ 184.121218][T21613] lo speed is unknown, defaulting to 1000 [ 184.148774][T21624] ip6t_srh: unknown srh match flags 4000 [ 184.512635][T21649] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=21649 comm=syz.1.4331 [ 185.017641][T21664] ip6_vti0 speed is unknown, defaulting to 1000 [ 185.428655][T21779] ip6t_srh: unknown srh match flags 4000 [ 185.439162][T21777] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=21777 comm=syz.4.4343 [ 185.715829][T21664] lo speed is unknown, defaulting to 1000 [ 185.942415][T21904] __nla_validate_parse: 2 callbacks suppressed [ 185.942435][T21904] netlink: 28 bytes leftover after parsing attributes in process `syz.4.4356'. [ 185.957740][T21904] netlink: 32 bytes leftover after parsing attributes in process `syz.4.4356'. [ 185.966817][T21904] netlink: 28 bytes leftover after parsing attributes in process `syz.4.4356'. [ 186.014204][T21904] netlink: 32 bytes leftover after parsing attributes in process `syz.4.4356'. [ 186.130202][T22009] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4358'. [ 186.331989][ T29] kauditd_printk_skb: 18684 callbacks suppressed [ 186.332006][ T29] audit: type=1400 audit(1769065816.633:66520): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 186.386819][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 186.393602][ T3049] audit: audit_lost=164 audit_rate_limit=0 audit_backlog_limit=64 [ 186.401435][ T3049] audit: backlog limit exceeded [ 186.430700][ T29] audit: type=1400 audit(1769065816.663:66521): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 186.451927][ T29] audit: type=1400 audit(1769065816.663:66522): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 186.473581][ T29] audit: type=1400 audit(1769065816.663:66523): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 186.494899][ T29] audit: type=1400 audit(1769065816.663:66524): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 186.516794][ T29] audit: type=1400 audit(1769065816.663:66525): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 186.537955][ T29] audit: type=1400 audit(1769065816.663:66526): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 186.954638][ T4635] Bluetooth: hci0: Frame reassembly failed (-84) [ 188.749070][T22452] ip6t_srh: unknown srh match flags 4000 [ 188.971808][ T3676] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 189.513995][T22603] ip6t_srh: unknown srh match flags 4000 [ 189.749774][T22710] ip6_vti0 speed is unknown, defaulting to 1000 [ 189.798171][T22710] lo speed is unknown, defaulting to 1000 [ 190.163698][T23346] ip6t_srh: unknown srh match flags 4000 [ 190.413138][T23448] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4428'. [ 190.575759][T23572] netlink: 24 bytes leftover after parsing attributes in process `syz.4.4438'. [ 190.813250][T23611] ip6t_srh: unknown srh match flags 4000 [ 190.850145][T23614] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=23614 comm=syz.0.4453 [ 190.878099][T23614] netlink: 'syz.0.4453': attribute type 1 has an invalid length. [ 190.920825][T23614] 8021q: adding VLAN 0 to HW filter on device bond2 [ 190.990186][T23724] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4456'. [ 191.130749][T23742] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 191.341730][ T29] kauditd_printk_skb: 27248 callbacks suppressed [ 191.341746][ T29] audit: type=1400 audit(1769065821.643:88087): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 191.384705][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 191.388286][ T29] audit: type=1400 audit(1769065821.673:88088): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 191.391287][ T3049] audit: audit_lost=2061 audit_rate_limit=0 audit_backlog_limit=64 [ 191.412488][ T29] audit: type=1400 audit(1769065821.673:88089): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 191.420387][ T3049] audit: backlog limit exceeded [ 191.441659][ T29] audit: type=1400 audit(1769065821.673:88090): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 191.447869][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 191.468025][ T29] audit: type=1400 audit(1769065821.673:88091): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 191.474688][ T3049] audit: audit_lost=2062 audit_rate_limit=0 audit_backlog_limit=64 [ 191.509696][T23957] syzkaller0: entered promiscuous mode [ 191.515288][T23957] syzkaller0: entered allmulticast mode [ 191.745439][T23965] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4474'. [ 192.095138][T24190] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4485'. [ 192.302603][T24314] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4496'. [ 192.312138][T24310] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=24310 comm=syz.1.4494 [ 192.326955][T24310] netlink: 'syz.1.4494': attribute type 1 has an invalid length. [ 192.407309][T24310] 8021q: adding VLAN 0 to HW filter on device bond5 [ 192.420966][T24314] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4496'. [ 192.435951][T24323] bond5: (slave dummy0): making interface the new active one [ 193.088327][T24323] bond5: (slave dummy0): Enslaving as an active interface with an up link [ 193.216836][T24314] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4496'. [ 193.271437][T24314] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4496'. [ 193.451507][T24791] vlan1: entered promiscuous mode [ 193.456864][T24791] bridge0: entered promiscuous mode [ 193.488780][T24868] ip6t_srh: unknown srh match flags 4000 [ 193.551021][T24874] netlink: 280 bytes leftover after parsing attributes in process `syz.0.4520'. [ 193.629289][T24881] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4523'. [ 193.722800][T24890] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=24890 comm=syz.0.4527 [ 193.756570][T24890] netlink: 'syz.0.4527': attribute type 1 has an invalid length. [ 193.789867][T24890] 8021q: adding VLAN 0 to HW filter on device bond3 [ 194.140354][T25009] netlink: 24 bytes leftover after parsing attributes in process `syz.2.4535'. [ 194.187105][T25012] netlink: 'syz.3.4537': attribute type 10 has an invalid length. [ 194.222695][T25012] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.240791][T25012] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 194.953206][T25240] ip6t_srh: unknown srh match flags 4000 [ 196.064745][T25366] __nla_validate_parse: 6 callbacks suppressed [ 196.064807][T25366] netlink: 80 bytes leftover after parsing attributes in process `syz.3.4556'. [ 196.351471][ T29] kauditd_printk_skb: 24795 callbacks suppressed [ 196.351491][ T29] audit: type=1400 audit(1769065826.643:110765): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 196.390224][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 196.396807][ T3049] audit: audit_lost=2770 audit_rate_limit=0 audit_backlog_limit=64 [ 196.404759][ T3049] audit: backlog limit exceeded [ 196.437406][ T29] audit: type=1400 audit(1769065826.653:110766): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 196.451091][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 196.459220][ T29] audit: type=1400 audit(1769065826.653:110767): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 196.465621][ T3049] audit: audit_lost=2771 audit_rate_limit=0 audit_backlog_limit=64 [ 196.465641][ T3049] audit: backlog limit exceeded [ 196.487066][ T29] audit: type=1400 audit(1769065826.653:110768): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 196.892749][T25477] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4563'. [ 197.131740][T25483] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=25483 comm=syz.4.4566 [ 197.434244][T25609] netlink: 'syz.0.4580': attribute type 4 has an invalid length. [ 197.497591][T25811] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=25811 comm=syz.0.4581 [ 197.551838][T25818] netlink: 200 bytes leftover after parsing attributes in process `syz.0.4584'. [ 197.668998][T25818] ip6_vti0 speed is unknown, defaulting to 1000 [ 197.719782][T25818] lo speed is unknown, defaulting to 1000 [ 197.950050][T26033] ip6t_srh: unknown srh match flags 4000 [ 198.321601][T26139] netlink: 44 bytes leftover after parsing attributes in process `syz.0.4609'. [ 198.417500][T26053] ip6_vti0 speed is unknown, defaulting to 1000 [ 198.426979][T26165] pim6reg1: entered promiscuous mode [ 198.432370][T26165] pim6reg1: entered allmulticast mode [ 198.496389][T26053] lo speed is unknown, defaulting to 1000 [ 198.880248][T26280] netlink: 'syz.0.4607': attribute type 1 has an invalid length. [ 198.937551][T26280] bond4: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 199.070519][T26390] veth5: entered promiscuous mode [ 199.098388][T26390] bond4: (slave veth5): Enslaving as a backup interface with a down link [ 199.212472][T26395] netlink: 'syz.4.4615': attribute type 4 has an invalid length. [ 199.235494][T26397] netlink: 14 bytes leftover after parsing attributes in process `syz.3.4616'. [ 199.252017][T26397] hsr_slave_0: left promiscuous mode [ 199.261371][T26397] hsr_slave_1: left promiscuous mode [ 199.327755][T26403] ip6t_srh: unknown srh match flags 4000 [ 199.606702][T26413] netlink: 44 bytes leftover after parsing attributes in process `syz.2.4622'. [ 199.794144][T26422] xt_TCPMSS: Only works on TCP SYN packets [ 199.814218][T26422] netlink: 24 bytes leftover after parsing attributes in process `syz.3.4628'. [ 199.984975][T26529] netlink: 'syz.3.4630': attribute type 4 has an invalid length. [ 200.166245][T26528] cgroup: fork rejected by pids controller in /syz0 [ 200.187296][T26638] netlink: 'syz.3.4634': attribute type 1 has an invalid length. [ 200.218189][T26638] 8021q: adding VLAN 0 to HW filter on device bond2 [ 200.315774][T26844] C: renamed from team_slave_0 [ 200.333313][T26844] netlink: 152 bytes leftover after parsing attributes in process `syz.3.4636'. [ 200.571971][T26955] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26955 comm=syz.0.4642 [ 200.813706][T26960] ip6t_srh: unknown srh match flags 4000 [ 200.916494][T26965] ip6t_srh: unknown srh match flags 4000 [ 201.044154][T26971] netlink: 'syz.2.4643': attribute type 4 has an invalid length. [ 201.090874][T26975] xt_TCPMSS: Only works on TCP SYN packets [ 201.101993][T26975] netlink: 24 bytes leftover after parsing attributes in process `syz.4.4652'. [ 201.244646][T27089] netlink: 360 bytes leftover after parsing attributes in process `syz.2.4655'. [ 201.286336][T27191] ip6t_srh: unknown srh match flags 4000 [ 201.375309][ T29] kauditd_printk_skb: 20467 callbacks suppressed [ 201.375326][ T29] audit: type=1400 audit(1769065831.674:131002): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 201.403295][ T29] audit: type=1400 audit(1769065831.674:131003): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 201.422069][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 201.425059][ T29] audit: type=1400 audit(1769065831.674:131004): avc: denied { open } for pid=27196 comm="syz.3.4659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 201.431393][ T3049] audit: audit_lost=2850 audit_rate_limit=0 audit_backlog_limit=64 [ 201.431409][ T3049] audit: backlog limit exceeded [ 201.442295][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 201.451097][ T29] audit: type=1400 audit(1769065831.674:131005): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 201.458979][ T3049] audit: audit_lost=2851 audit_rate_limit=0 audit_backlog_limit=64 [ 201.463852][ T29] audit: type=1400 audit(1769065831.674:131006): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 201.521393][T27197] netlink: 'syz.3.4659': attribute type 6 has an invalid length. [ 201.778026][T27204] C: renamed from team_slave_0 [ 201.795298][T27204] netlink: 152 bytes leftover after parsing attributes in process `syz.1.4663'. [ 201.883834][T27518] ip6t_srh: unknown srh match flags 4000 [ 201.962988][T27523] ip6t_srh: unknown srh match flags 4000 [ 202.021402][T27528] bond1: option mode: unable to set because the bond device has slaves [ 202.051894][T27528] 8021q: adding VLAN 0 to HW filter on device macvlan1 [ 202.068690][T27528] bond1: (slave macvlan1): Enslaving as a backup interface with an up link [ 202.098431][T27528] netlink: 'syz.4.4674': attribute type 10 has an invalid length. [ 202.124168][T27528] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 202.168987][T27528] 8021q: adding VLAN 0 to HW filter on device bond6 [ 202.209064][T27535] syzkaller0: entered promiscuous mode [ 202.214636][T27535] syzkaller0: entered allmulticast mode [ 202.395039][T27543] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4682'. [ 202.509184][T27550] SET target dimension over the limit! [ 202.683591][T27561] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4690'. [ 202.705695][T27561] bridge0: port 2(macsec1) entered blocking state [ 202.712439][T27561] bridge0: port 2(macsec1) entered disabled state [ 202.720271][T27561] macsec1: entered allmulticast mode [ 202.725964][T27561] bridge0: entered allmulticast mode [ 202.754516][T27561] macsec1: left allmulticast mode [ 202.759903][T27561] bridge0: left allmulticast mode [ 203.286217][T27924] SET target dimension over the limit! [ 203.433282][T27944] IPv6: NLM_F_CREATE should be specified when creating new route [ 204.283607][T28136] ip6t_srh: unknown srh match flags 4000 [ 204.574303][T28175] ip6t_srh: unknown srh match flags 4000 [ 204.777845][T28307] ip6t_srh: unknown srh match flags 4000 [ 205.244675][T28378] ip6t_srh: unknown srh match flags 4000 [ 205.938110][T28679] ip6t_srh: unknown srh match flags 4000 [ 206.381135][ T29] kauditd_printk_skb: 21215 callbacks suppressed [ 206.381155][ T29] audit: type=1400 audit(1769065836.684:151027): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 206.428252][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 206.428934][T28756] audit: audit_backlog=65 > audit_backlog_limit=64 [ 206.435172][ T3049] audit: audit_lost=3250 audit_rate_limit=0 audit_backlog_limit=64 [ 206.441580][T28756] audit: audit_lost=3251 audit_rate_limit=0 audit_backlog_limit=64 [ 206.441603][T28756] audit: backlog limit exceeded [ 206.441880][T28758] audit: audit_backlog=65 > audit_backlog_limit=64 [ 206.449563][ T3049] audit: backlog limit exceeded [ 206.451814][T28757] audit: audit_backlog=65 > audit_backlog_limit=64 [ 206.458239][T28758] audit: audit_lost=3252 audit_rate_limit=0 audit_backlog_limit=64 [ 208.796132][T29528] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5115'. [ 208.805210][T29528] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5115'. [ 209.456025][T29634] ip6t_srh: unknown srh match flags 4000 [ 209.925079][T29714] ip6t_srh: unknown srh match flags 4000 [ 210.643013][T29830] ip6t_srh: unknown srh match flags 4000 [ 210.874515][T29865] ip6t_srh: unknown srh match flags 4000 [ 211.099714][T29903] ip6t_srh: unknown srh match flags 4000 [ 211.382880][T29944] futex_wake_op: syz.4.5319 tries to shift op by -3; fix this program [ 211.391681][ T29] kauditd_printk_skb: 19175 callbacks suppressed [ 211.391699][ T29] audit: type=1400 audit(1769065841.694:169912): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 211.428986][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 211.435605][ T3049] audit: audit_lost=3350 audit_rate_limit=0 audit_backlog_limit=64 [ 211.442120][T29948] audit: audit_backlog=65 > audit_backlog_limit=64 [ 211.443996][ T3049] audit: backlog limit exceeded [ 211.450429][T29948] audit: audit_lost=3351 audit_rate_limit=0 audit_backlog_limit=64 [ 211.450444][T29948] audit: backlog limit exceeded [ 211.474161][T29950] audit: audit_backlog=65 > audit_backlog_limit=64 [ 211.480794][T29950] audit: audit_lost=3352 audit_rate_limit=0 audit_backlog_limit=64 [ 211.488929][T29950] audit: backlog limit exceeded [ 211.619702][T29972] futex_wake_op: syz.3.5333 tries to shift op by -3; fix this program [ 211.829466][T30003] futex_wake_op: syz.0.5348 tries to shift op by -3; fix this program [ 212.121946][T30046] ip6t_srh: unknown srh match flags 4000 [ 212.371950][T30088] ip6t_srh: unknown srh match flags 4000 [ 212.594171][T30126] ip6t_srh: unknown srh match flags 4000 [ 212.829148][T30162] ip6t_srh: unknown srh match flags 4000 [ 215.691889][T30612] ip6t_srh: unknown srh match flags 4000 [ 216.400474][ T29] kauditd_printk_skb: 19031 callbacks suppressed [ 216.400492][ T29] audit: type=1400 audit(1769065846.694:188572): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 216.444545][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 216.451688][ T3049] audit: audit_lost=3477 audit_rate_limit=0 audit_backlog_limit=64 [ 216.459851][ T3049] audit: backlog limit exceeded [ 216.467732][ T29] audit: type=1400 audit(1769065846.714:188573): avc: denied { create } for pid=30715 comm="syz.0.5702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 216.488162][ T29] audit: type=1400 audit(1769065846.724:188574): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 216.510226][ T29] audit: type=1400 audit(1769065846.724:188575): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 216.532205][ T29] audit: type=1400 audit(1769065846.724:188576): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 216.554051][ T29] audit: type=1400 audit(1769065846.724:188577): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 216.575769][ T29] audit: type=1400 audit(1769065846.724:188578): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 217.087261][T30786] syzkaller0: entered promiscuous mode [ 217.092839][T30786] syzkaller0: entered allmulticast mode [ 218.293222][T31079] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 218.654276][T31129] syzkaller0: entered promiscuous mode [ 218.660477][T31129] syzkaller0: entered allmulticast mode [ 219.703881][T31243] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 220.338141][T31369] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.364299][T31369] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 220.938568][T31421] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.966007][T31421] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 220.982127][ T23] lo speed is unknown, defaulting to 1000 [ 220.987903][ T23] syz1: Port: 1 Link ACTIVE [ 221.013170][ T3801] lo speed is unknown, defaulting to 1000 [ 221.410076][ T29] kauditd_printk_skb: 22541 callbacks suppressed [ 221.410096][ T29] audit: type=1400 audit(1769065851.705:209737): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 221.459937][ T29] audit: type=1400 audit(1769065851.735:209738): avc: denied { create } for pid=31510 comm="syz.4.6049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 221.479884][T31518] audit: audit_backlog=65 > audit_backlog_limit=64 [ 221.480338][ T29] audit: type=1400 audit(1769065851.735:209739): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 221.486804][T31518] audit: audit_lost=3939 audit_rate_limit=0 audit_backlog_limit=64 [ 221.508339][ T29] audit: type=1400 audit(1769065851.735:209740): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 221.516385][T31518] audit: backlog limit exceeded [ 221.537645][ T29] audit: type=1400 audit(1769065851.735:209741): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 221.537680][ T29] audit: type=1400 audit(1769065851.735:209742): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 221.543910][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 221.879032][T31562] ip6t_srh: unknown srh match flags 4000 [ 222.135380][T31594] syzkaller0: entered promiscuous mode [ 222.141394][T31594] syzkaller0: entered allmulticast mode [ 223.055167][T31714] syzkaller0: entered promiscuous mode [ 223.060949][T31714] syzkaller0: entered allmulticast mode [ 223.368247][T31750] syzkaller0: entered promiscuous mode [ 223.374498][T31750] syzkaller0: entered allmulticast mode [ 223.672764][T31782] ip6t_srh: unknown srh match flags 4000 [ 223.986856][T31828] ip6t_srh: unknown srh match flags 4000 [ 224.882639][T31964] netlink: 'syz.3.6274': attribute type 10 has an invalid length. [ 226.420233][ T29] kauditd_printk_skb: 25154 callbacks suppressed [ 226.420249][ T29] audit: type=1400 audit(1769065856.725:232807): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 226.448372][ T29] audit: type=1400 audit(1769065856.725:232808): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 226.471032][ T29] audit: type=1400 audit(1769065856.725:232809): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 226.492858][ T29] audit: type=1400 audit(1769065856.725:232810): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 226.518274][ T29] audit: type=1400 audit(1769065856.725:232811): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 226.539864][ T29] audit: type=1400 audit(1769065856.725:232812): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 226.561886][ T29] audit: type=1400 audit(1769065856.725:232813): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 226.583410][ T29] audit: type=1400 audit(1769065856.725:232814): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 226.605044][ T29] audit: type=1400 audit(1769065856.725:232815): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 226.626516][ T29] audit: type=1400 audit(1769065856.725:232816): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 227.413526][T32410] ip6t_srh: unknown srh match flags 4000 [ 228.470494][T32575] ip6t_srh: unknown srh match flags 4000 [ 228.480170][T32575] cgroup: fork rejected by pids controller in /syz2 [ 228.856062][T32732] ip6t_srh: unknown srh match flags 4000 [ 228.943989][T32749] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6566'. [ 229.078042][T32765] x_tables: ip6_tables: socket match: used from hooks FORWARD, but only valid from PREROUTING/INPUT [ 229.114467][ T308] ip6t_srh: unknown srh match flags 4000 [ 229.554416][ T383] netlink: 'syz.3.6614': attribute type 6 has an invalid length. [ 229.758807][ T416] bond3: Unable to set down delay as MII monitoring is disabled [ 229.799319][ T416] bond3 (unregistering): Released all slaves [ 229.829133][ T423] bridge_slave_0: default FDB implementation only supports local addresses [ 230.522912][ T539] netlink: 14593 bytes leftover after parsing attributes in process `syz.4.6687'. [ 230.886848][ T575] ip6t_srh: unknown srh match flags 4000 [ 231.368420][ T730] ip6t_srh: unknown srh match flags 4000 [ 231.429621][ T29] kauditd_printk_skb: 20698 callbacks suppressed [ 231.429642][ T29] audit: type=1400 audit(1769065861.735:253227): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 231.460768][ T29] audit: type=1400 audit(1769065861.735:253228): avc: denied { create } for pid=738 comm="syz.4.6735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 231.482689][ T29] audit: type=1400 audit(1769065861.755:253229): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 231.504390][ T29] audit: type=1400 audit(1769065861.755:253230): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 231.525810][ T29] audit: type=1400 audit(1769065861.755:253231): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 231.547230][ T29] audit: type=1400 audit(1769065861.765:253233): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 231.562224][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 231.568738][ T29] audit: type=1400 audit(1769065861.755:253232): avc: denied { open } for pid=738 comm="syz.4.6735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 231.575956][ T3049] audit: audit_lost=4733 audit_rate_limit=0 audit_backlog_limit=64 [ 231.595305][ T29] audit: type=1400 audit(1769065861.765:253234): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 231.715932][ T757] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6746'. [ 231.891065][ T785] gretap0: entered promiscuous mode [ 231.896458][ T785] vlan1: entered promiscuous mode [ 231.952631][ T793] netlink: 14593 bytes leftover after parsing attributes in process `syz.0.6763'. [ 232.223269][ T835] ip6t_srh: unknown srh match flags 4000 [ 232.616425][ T891] bridge: RTM_NEWNEIGH bridge0 without NUD_PERMANENT [ 232.670618][ T900] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6813'. [ 232.941131][ T1039] netlink: 36 bytes leftover after parsing attributes in process `syz.4.6832'. [ 233.007532][ T918] ip6_vti0 speed is unknown, defaulting to 1000 [ 233.119295][ T918] lo speed is unknown, defaulting to 1000 [ 233.163023][ T1065] bond0: Caught tx_queue_len zero misconfig [ 233.346502][ T1082] ip6t_srh: unknown srh match flags 4000 [ 233.660760][ T1102] Process accounting resumed [ 234.048023][ T1239] netlink: 32 bytes leftover after parsing attributes in process `syz.0.6881'. [ 234.897814][ T1309] ip6_vti0 speed is unknown, defaulting to 1000 [ 234.973371][ T1309] lo speed is unknown, defaulting to 1000 [ 235.563500][ T1452] ip6_vti0 speed is unknown, defaulting to 1000 [ 235.735114][ T1452] lo speed is unknown, defaulting to 1000 [ 235.752603][ T1708] ip6t_srh: unknown srh match flags 4000 [ 236.343507][ T1860] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=1860 comm=syz.3.6975 [ 236.439530][ T29] kauditd_printk_skb: 21151 callbacks suppressed [ 236.439548][ T29] audit: type=1400 audit(1769065866.746:272522): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 236.468836][ T29] audit: type=1400 audit(1769065866.746:272523): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 236.489639][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 236.491000][ T29] audit: type=1400 audit(1769065866.746:272524): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 236.497128][ T3049] audit: audit_lost=5355 audit_rate_limit=0 audit_backlog_limit=64 [ 236.518658][ T29] audit: type=1400 audit(1769065866.746:272525): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 236.518695][ T29] audit: type=1400 audit(1769065866.746:272526): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 236.526981][ T3049] audit: backlog limit exceeded [ 236.548039][ T29] audit: type=1400 audit(1769065866.746:272527): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 236.571610][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 236.782063][ T1872] can0: slcan on ttyS3. [ 236.823235][ T1893] ip6t_srh: unknown srh match flags 4000 [ 237.170036][ T1891] can0 (unregistered): slcan off ttyS3. [ 237.496533][ T2439] netlink: 36 bytes leftover after parsing attributes in process `syz.3.7011'. [ 237.521814][ T2439] netlink: 36 bytes leftover after parsing attributes in process `syz.3.7011'. [ 237.872026][ T2469] netlink: 36 bytes leftover after parsing attributes in process `syz.0.7027'. [ 238.233275][ T2575] ip6t_srh: unknown srh match flags 4000 [ 238.537388][ T2731] xt_TCPMSS: Only works on TCP SYN packets [ 241.193030][ T3181] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3181 comm=syz.1.7118 [ 241.421683][ T3201] netlink: 92 bytes leftover after parsing attributes in process `syz.0.7130'. [ 241.449329][ T29] kauditd_printk_skb: 30477 callbacks suppressed [ 241.449345][ T29] audit: type=1400 audit(1769065871.756:301092): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 241.473770][ T3205] ip6t_srh: unknown srh match flags 4000 [ 241.509081][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 241.516183][ T3049] audit: audit_lost=5994 audit_rate_limit=0 audit_backlog_limit=64 [ 241.524442][ T3049] audit: backlog limit exceeded [ 241.529993][ T3205] audit: audit_backlog=65 > audit_backlog_limit=64 [ 241.536574][ T3205] audit: audit_lost=5995 audit_rate_limit=0 audit_backlog_limit=64 [ 241.539024][ T29] audit: type=1400 audit(1769065871.756:301093): avc: denied { read write } for pid=3329 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 241.544646][ T3205] audit: backlog limit exceeded [ 241.569234][ T29] audit: type=1400 audit(1769065871.756:301094): avc: denied { open } for pid=3204 comm="syz.3.7131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 241.594026][ T29] audit: type=1400 audit(1769065871.756:301095): avc: denied { open } for pid=3204 comm="syz.3.7131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 241.618286][ T3210] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7134'. [ 241.627932][ T3210] netlink: 24 bytes leftover after parsing attributes in process `syz.3.7134'. [ 242.112324][ T3404] netlink: 'syz.2.7162': attribute type 10 has an invalid length. [ 242.523342][ T3582] netlink: 'syz.2.7185': attribute type 1 has an invalid length. [ 242.563857][ T3582] 8021q: adding VLAN 0 to HW filter on device bond3 [ 242.598799][ T3582] bond3: (slave geneve4): making interface the new active one [ 242.620701][ T3582] bond3: (slave geneve4): Enslaving as an active interface with an up link [ 242.630353][ T31] netdevsim netdevsim2 eth0: set [1, 1] type 2 family 0 port 6081 - 0 [ 242.646881][ T31] netdevsim netdevsim2 eth1: set [1, 1] type 2 family 0 port 6081 - 0 [ 242.677357][ T31] netdevsim netdevsim2 eth2: set [1, 1] type 2 family 0 port 6081 - 0 [ 242.707352][ T31] netdevsim netdevsim2 eth3: set [1, 1] type 2 family 0 port 6081 - 0 [ 242.797300][ T3711] netlink: 8 bytes leftover after parsing attributes in process `syz.0.7199'. [ 242.806436][ T3711] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7199'. [ 242.816170][ T3711] netlink: 8 bytes leftover after parsing attributes in process `syz.0.7199'. [ 242.825193][ T3711] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7199'. [ 243.202923][ T3963] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7218'. [ 243.556455][ T4172] ip6_vti0 speed is unknown, defaulting to 1000 [ 243.599971][ T4172] lo speed is unknown, defaulting to 1000 [ 243.828260][ T4306] netlink: 'syz.4.7240': attribute type 2 has an invalid length. [ 243.836213][ T4306] netlink: 28 bytes leftover after parsing attributes in process `syz.4.7240'. [ 245.082300][ T4695] sctp: [Deprecated]: syz.3.7280 (pid 4695) Use of struct sctp_assoc_value in delayed_ack socket option. [ 245.082300][ T4695] Use struct sctp_sack_info instead [ 246.139916][ T4861] netlink: 4 bytes leftover after parsing attributes in process `syz.3.7305'. [ 246.458738][ T29] kauditd_printk_skb: 21310 callbacks suppressed [ 246.458755][ T29] audit: type=1400 audit(1769065876.756:321806): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 246.501635][ T29] audit: type=1400 audit(1769065876.756:321807): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 246.522971][ T29] audit: type=1400 audit(1769065876.756:321808): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 246.544796][ T29] audit: type=1400 audit(1769065876.756:321809): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 246.566270][ T29] audit: type=1400 audit(1769065876.756:321810): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 246.587628][ T29] audit: type=1400 audit(1769065876.756:321811): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 246.603509][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 246.609277][ T29] audit: type=1400 audit(1769065876.756:321812): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 246.615849][ T3049] audit: audit_lost=6196 audit_rate_limit=0 audit_backlog_limit=64 [ 246.637172][ T29] audit: type=1400 audit(1769065876.756:321813): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 248.087007][ T5066] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7363'. [ 248.293434][ T5098] ip6_vti0 speed is unknown, defaulting to 1000 [ 248.377059][ T5098] lo speed is unknown, defaulting to 1000 [ 248.496271][ T5405] [syz.0.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 249.215075][ T5572] netlink: 16316 bytes leftover after parsing attributes in process `syz.3.7415'. [ 250.497370][ T6213] netlink: 16 bytes leftover after parsing attributes in process `syz.4.7481'. [ 250.787191][ T6276] ip6_vti0 speed is unknown, defaulting to 1000 [ 250.851424][ T6276] lo speed is unknown, defaulting to 1000 [ 251.468450][ T29] kauditd_printk_skb: 21053 callbacks suppressed [ 251.468541][ T29] audit: type=1400 audit(251.441:342611): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 251.486951][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 251.502771][ T3049] audit: audit_lost=6282 audit_rate_limit=0 audit_backlog_limit=64 [ 251.510825][ T3049] audit: backlog limit exceeded [ 251.515159][ T29] audit: type=1400 audit(251.451:342612): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 251.534092][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 251.537334][ T29] audit: type=1400 audit(251.451:342613): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 251.543227][ T3049] audit: audit_lost=6283 audit_rate_limit=0 audit_backlog_limit=64 [ 251.543292][ T3049] audit: backlog limit exceeded [ 251.544577][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 251.623734][ T6508] netlink: 24 bytes leftover after parsing attributes in process `syz.4.7523'. [ 251.673016][ T6512] netlink: 'syz.0.7525': attribute type 4 has an invalid length. [ 251.682847][ T6512] netlink: 'syz.0.7525': attribute type 4 has an invalid length. [ 252.646086][ T6726] ip6_vti0 speed is unknown, defaulting to 1000 [ 252.745474][ T6959] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7579'. [ 252.775363][ T6726] lo speed is unknown, defaulting to 1000 [ 255.003217][ T1858] Bluetooth: hci0: Frame reassembly failed (-84) [ 256.481632][ T29] kauditd_printk_skb: 29313 callbacks suppressed [ 256.481651][ T29] audit: type=1326 audit(256.461:369906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8243 comm="syz.1.7697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7ff73fa0b58e code=0x7ffc0000 [ 256.518341][ T29] audit: type=1400 audit(256.461:369907): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 256.540473][ T29] audit: type=1400 audit(256.461:369908): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 256.552735][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 256.561748][ T29] audit: type=1400 audit(256.461:369909): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 256.568009][ T3049] audit: audit_lost=6958 audit_rate_limit=0 audit_backlog_limit=64 [ 256.568055][ T3049] audit: backlog limit exceeded [ 256.588958][ T29] audit: type=1400 audit(256.461:369910): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 256.607019][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 256.623271][ T29] audit: type=1400 audit(256.461:369911): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 257.048145][ T44] Bluetooth: hci0: command 0x1003 tx timeout [ 257.054354][ T3676] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 258.509345][ T8768] [syz.3.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 258.762881][ T8887] netlink: 48 bytes leftover after parsing attributes in process `syz.4.7752'. [ 258.829475][ T8944] netlink: 12 bytes leftover after parsing attributes in process `syz.4.7754'. [ 258.855229][ T8944] 8021q: adding VLAN 0 to HW filter on device bond7 [ 259.589340][ T9464] ip6_vti0 speed is unknown, defaulting to 1000 [ 259.633066][ T9464] lo speed is unknown, defaulting to 1000 [ 259.843459][ T9676] netlink: 12 bytes leftover after parsing attributes in process `syz.0.7782'. [ 259.852788][ T9676] netlink: 'syz.0.7782': attribute type 12 has an invalid length. [ 259.882645][ T9676] netlink: 12 bytes leftover after parsing attributes in process `syz.0.7782'. [ 259.891793][ T9676] netlink: 'syz.0.7782': attribute type 12 has an invalid length. [ 260.057288][ T9690] syzkaller0: entered promiscuous mode [ 260.062860][ T9690] syzkaller0: entered allmulticast mode [ 260.428848][ T9920] netlink: 20 bytes leftover after parsing attributes in process `syz.4.7803'. [ 260.466468][ T9920] vlan1: entered promiscuous mode [ 260.639178][T10045] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7812'. [ 260.653994][T10045] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7812'. [ 260.878210][T10180] netlink: 4 bytes leftover after parsing attributes in process `syz.3.7823'. [ 261.250095][ T64] Bluetooth: hci0: Frame reassembly failed (-84) [ 261.260819][ T64] Bluetooth: hci1: Frame reassembly failed (-84) [ 261.424460][T10465] netlink: 28 bytes leftover after parsing attributes in process `syz.2.7855'. [ 261.488050][ T29] kauditd_printk_skb: 24937 callbacks suppressed [ 261.488066][ T29] audit: type=1400 audit(261.462:393197): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 261.515950][ T29] audit: type=1400 audit(261.472:393198): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 261.539847][ T29] audit: type=1400 audit(261.472:393199): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 261.561590][ T29] audit: type=1400 audit(261.472:393200): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 261.575671][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 261.582788][ T29] audit: type=1400 audit(261.472:393201): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 261.589247][ T3049] audit: audit_lost=7510 audit_rate_limit=0 audit_backlog_limit=64 [ 261.609997][ T29] audit: type=1400 audit(261.472:393202): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 261.618298][ T3049] audit: backlog limit exceeded [ 261.639168][ T29] audit: type=1400 audit(261.472:393203): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 262.002418][T10826] netlink: 12 bytes leftover after parsing attributes in process `syz.0.7877'. [ 262.184150][T10941] netlink: 'syz.4.7883': attribute type 10 has an invalid length. [ 263.287739][ T3676] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 263.293993][T10445] Bluetooth: hci1: command 0x1003 tx timeout [ 263.300576][ T44] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 263.300748][T12707] Bluetooth: hci0: command 0x1003 tx timeout [ 263.319070][T11745] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 263.415542][ T3801] lo speed is unknown, defaulting to 1000 [ 263.423602][ T3801] syz1: Port: 1 Link DOWN [ 263.450302][ T3403] lo speed is unknown, defaulting to 1000 [ 264.208728][T12262] xt_hashlimit: size too large, truncated to 1048576 [ 264.215584][T12262] xt_hashlimit: max too large, truncated to 1048576 [ 264.534758][T12487] __nla_validate_parse: 2 callbacks suppressed [ 264.534778][T12487] netlink: 20 bytes leftover after parsing attributes in process `syz.2.7991'. [ 264.552265][T12489] syzkaller1: entered promiscuous mode [ 264.558318][T12489] syzkaller1: entered allmulticast mode [ 265.222735][T12505] ip6_vti0 speed is unknown, defaulting to 1000 [ 265.233251][T12970] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8021'. [ 265.293564][T12505] lo speed is unknown, defaulting to 1000 [ 265.602164][T13184] ip6_vti0 speed is unknown, defaulting to 1000 [ 265.732854][T13184] lo speed is unknown, defaulting to 1000 [ 265.959900][T13524] netlink: 28 bytes leftover after parsing attributes in process `syz.0.8044'. [ 265.969520][T13524] netlink: 'syz.0.8044': attribute type 7 has an invalid length. [ 265.975497][T13520] syzkaller0: entered promiscuous mode [ 265.977261][T13524] netlink: 'syz.0.8044': attribute type 8 has an invalid length. [ 265.977280][T13524] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8044'. [ 265.999619][T13520] syzkaller0: entered allmulticast mode [ 266.025556][T13528] netlink: 'syz.4.8046': attribute type 1 has an invalid length. [ 266.053998][T13528] 8021q: adding VLAN 0 to HW filter on device bond9 [ 266.073245][T13528] bond9: (slave geneve4): making interface the new active one [ 266.082495][T13528] bond9: (slave geneve4): Enslaving as an active interface with an up link [ 266.445979][T14061] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8045'. [ 266.497608][ T29] kauditd_printk_skb: 22918 callbacks suppressed [ 266.497627][ T29] audit: type=1400 audit(266.472:414697): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.512748][T14062] ip6tnl0: Caught tx_queue_len zero misconfig [ 266.531701][ T29] audit: type=1400 audit(266.482:414698): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.552671][ T29] audit: type=1400 audit(266.482:414699): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.573631][ T29] audit: type=1400 audit(266.482:414700): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.594549][ T29] audit: type=1400 audit(266.482:414701): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.615471][ T29] audit: type=1400 audit(266.482:414702): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.636286][ T29] audit: type=1400 audit(266.482:414703): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.657901][ T29] audit: type=1400 audit(266.482:414704): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.679665][ T29] audit: type=1400 audit(266.482:414705): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.701512][ T29] audit: type=1400 audit(266.482:414706): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 267.184053][T14486] netlink: 32 bytes leftover after parsing attributes in process `syz.4.8068'. [ 267.315569][T14497] xt_physdev: --physdev-out and --physdev-is-out only supported in the FORWARD and POSTROUTING chains with bridged traffic [ 267.416061][T14505] syzkaller0: entered promiscuous mode [ 267.421766][T14505] syzkaller0: entered allmulticast mode [ 267.548858][T14110] ip6_vti0 speed is unknown, defaulting to 1000 [ 267.803811][T14283] ip6_vti0 speed is unknown, defaulting to 1000 [ 267.810714][T14110] lo speed is unknown, defaulting to 1000 [ 268.032054][T14506] ip6_vti0 speed is unknown, defaulting to 1000 [ 268.111863][T14283] lo speed is unknown, defaulting to 1000 [ 268.173972][T14506] lo speed is unknown, defaulting to 1000 [ 269.541912][T14966] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8103'. [ 270.051325][T15199] [syz.2.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 270.093003][T15203] netlink: 'syz.4.8121': attribute type 1 has an invalid length. [ 270.137481][T15203] bond10: entered promiscuous mode [ 270.150963][T15203] 8021q: adding VLAN 0 to HW filter on device bond10 [ 270.751835][T15953] netlink: 20 bytes leftover after parsing attributes in process `syz.0.8145'. [ 270.880922][T15961] syzkaller0: entered promiscuous mode [ 270.887017][T15961] syzkaller0: entered allmulticast mode [ 271.001443][T16164] 8021q: adding VLAN 0 to HW filter on device macvlan3 [ 271.024895][T16164] bond4: (slave macvlan3): Enslaving as an active interface with an up link [ 271.507932][ T29] kauditd_printk_skb: 27403 callbacks suppressed [ 271.507960][ T29] audit: type=1400 audit(271.482:441069): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 271.543864][ T29] audit: type=1400 audit(271.482:441070): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 271.565415][ T29] audit: type=1400 audit(271.492:441071): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 271.572056][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 271.587946][ T29] audit: type=1400 audit(271.492:441072): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 271.592746][ T3049] audit: audit_lost=8333 audit_rate_limit=0 audit_backlog_limit=64 [ 271.592760][ T3049] audit: backlog limit exceeded [ 271.597568][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 271.614909][ T29] audit: type=1400 audit(271.492:441073): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 271.621693][ T3049] audit: audit_lost=8334 audit_rate_limit=0 audit_backlog_limit=64 [ 272.009206][T16283] ip6_vti0 speed is unknown, defaulting to 1000 [ 272.144690][T16816] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8175'. [ 272.160982][T16283] lo speed is unknown, defaulting to 1000 [ 272.166968][T16816] bond1: option mode: unable to set because the bond device has slaves [ 272.177822][T16816] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8175'. [ 272.186751][T16816] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8175'. [ 272.202256][T16816] netlink: 'syz.4.8175': attribute type 10 has an invalid length. [ 272.334111][T16826] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8181'. [ 272.911942][T16834] ================================================================== [ 272.920086][T16834] BUG: KCSAN: data-race in atime_needs_update / touch_atime [ 272.927421][T16834] [ 272.929771][T16834] read to 0xffff88811a6c6f70 of 4 bytes by task 16842 on cpu 1: [ 272.937427][T16834] atime_needs_update+0x25f/0x3e0 [ 272.942605][T16834] touch_atime+0x4a/0x340 [ 272.947151][T16834] shmem_file_splice_read+0x5b1/0x600 [ 272.952610][T16834] splice_direct_to_actor+0x26e/0x670 [ 272.958058][T16834] do_splice_direct+0x119/0x1a0 [ 272.963000][T16834] do_sendfile+0x380/0x650 [ 272.967553][T16834] __x64_sys_sendfile64+0x105/0x150 [ 272.972788][T16834] x64_sys_call+0x2db1/0x3000 [ 272.977937][T16834] do_syscall_64+0xc0/0x2a0 [ 272.982598][T16834] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 272.988652][T16834] [ 272.991008][T16834] write to 0xffff88811a6c6f70 of 4 bytes by task 16834 on cpu 0: [ 272.999102][T16834] touch_atime+0x1e8/0x340 [ 273.003560][T16834] shmem_file_splice_read+0x5b1/0x600 [ 273.009078][T16834] splice_direct_to_actor+0x26e/0x670 [ 273.014734][T16834] do_splice_direct+0x119/0x1a0 [ 273.019653][T16834] do_sendfile+0x380/0x650 [ 273.024120][T16834] __x64_sys_sendfile64+0x105/0x150 [ 273.029531][T16834] x64_sys_call+0x2db1/0x3000 [ 273.034282][T16834] do_syscall_64+0xc0/0x2a0 [ 273.038824][T16834] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 273.044749][T16834] [ 273.047198][T16834] value changed: 0x323bf9bb -> 0x3536f52b [ 273.052933][T16834] [ 273.055290][T16834] Reported by Kernel Concurrency Sanitizer on: [ 273.061498][T16834] CPU: 0 UID: 0 PID: 16834 Comm: syz.1.8184 Not tainted syzkaller #0 PREEMPT(voluntary) [ 273.071341][T16834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 273.081525][T16834] ================================================================== [ 276.518111][ T29] kauditd_printk_skb: 38823 callbacks suppressed [ 276.518126][ T29] audit: type=1400 audit(276.502:477667): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 276.540305][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 276.546980][ T29] audit: type=1400 audit(276.502:477668): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 276.551891][ T3049] audit: audit_lost=9078 audit_rate_limit=0 audit_backlog_limit=64 [ 276.574336][ T29] audit: type=1400 audit(276.502:477669): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 276.580565][ T3049] audit: backlog limit exceeded [ 276.603449][ T29] audit: type=1400 audit(276.502:477670): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 276.608128][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 276.629233][ T29] audit: type=1400 audit(276.502:477671): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 276.634126][ T3049] audit: audit_lost=9079 audit_rate_limit=0 audit_backlog_limit=64 [ 281.526676][ T29] kauditd_printk_skb: 43241 callbacks suppressed [ 281.526770][ T29] audit: type=1400 audit(281.503:520912): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 281.553484][ T3049] audit: audit_backlog=65 > audit_backlog_limit=64 [ 281.555064][ T29] audit: type=1400 audit(281.513:520913): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 281.562386][ T3049] audit: audit_lost=9080 audit_rate_limit=0 audit_backlog_limit=64 [ 281.582059][ T29] audit: type=1400 audit(281.513:520914): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 281.582096][ T29] audit: type=1400 audit(281.513:520915): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 281.582128][ T29] audit: type=1400 audit(281.513:520916): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 281.582194][ T29] audit: type=1400 audit(281.513:520917): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 281.582225][ T29] audit: type=1400 audit(281.513:520918): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 281.582256][ T29] audit: type=1400 audit(281.513:520919): avc: denied { read } for pid=3049 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0