last executing test programs: 2m7.256190837s ago: executing program 3 (id=116): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32=0x0, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0x8}, 0x18) unshare(0x42000000) syz_usb_disconnect(0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x8052, &(0x7f0000000100)={[{@jqfmt_vfsv0}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7ffffffc}}, {@inlinecrypt}, {@barrier_val={'barrier', 0x3d, 0x1}}]}, 0x5, 0x4dd, &(0x7f0000000740)="$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") r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000010900010073797a310000000048000000030a01010000000000000000010000000900030073797a3100000000080007006e6174000900010073797a310000000014000480080002407c40280f080001"], 0xb8}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) 2m6.638130898s ago: executing program 0 (id=137): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000180)='./file1\x00', 0x0) chdir(&(0x7f0000000040)='./file1\x00') r2 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = open$dir(&(0x7f0000000180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000000)='./file0\x00', 0x4) renameat(r3, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') 2m6.619000958s ago: executing program 0 (id=138): set_mempolicy(0x6, &(0x7f00000003c0)=0x8000000000000001, 0xe0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x101, 0x7ffc, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 2m6.51882839s ago: executing program 0 (id=140): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0xc0802, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000200)=0x3) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000100)=0x2000004) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000240)='\x00!', 0x2}], 0x1, 0x7, 0x0) 2m6.447987431s ago: executing program 0 (id=141): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x40, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='./file0/../file0/../file0/../file0\x00') 2m6.409026192s ago: executing program 0 (id=142): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) mkdirat(0xffffffffffffff9c, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, &(0x7f0000000140)=[{{0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}], 0x10) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, &(0x7f0000000100)=[{{0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}], 0x8) socket$packet(0x11, 0xa, 0x300) 2m6.240026514s ago: executing program 0 (id=147): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x38, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000040), &(0x7f0000000200)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) r4 = socket(0x80000000000000a, 0x1, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x6, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 2m6.238957644s ago: executing program 3 (id=148): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(r0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000004c0)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@dioread_lock}, {@data_err_ignore}, {@discard}, {@data_err_ignore}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@bh}, {@errors_remount}]}, 0x1, 0x553, &(0x7f0000001080)="$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") r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2c, r4, 0x1, 0x70bd2d, 0x0, {0x1b}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}]}, 0x2c}}, 0x0) 2m6.195032475s ago: executing program 32 (id=147): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x38, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000040), &(0x7f0000000200)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) r4 = socket(0x80000000000000a, 0x1, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x6, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 2m6.088833937s ago: executing program 3 (id=152): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0xc0802, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000200)=0x3) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000100)=0x2000004) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000240)='\x00!', 0x2}], 0x1, 0x7, 0x0) 2m5.938500719s ago: executing program 3 (id=153): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x40, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='./file0/../file0/../file0/../file0\x00') 2m5.857203531s ago: executing program 3 (id=156): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x3}, 0x18) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$qrtrtun(r2, &(0x7f0000000900)="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", 0x45c) r4 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={r3, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0x45c], 0x0, 0x0, 0x1, 0x1}}, 0x40) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={r4, 0x0, 0x0}, 0x10) 2m5.570885426s ago: executing program 3 (id=161): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x9) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1}, 0x9) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'veth0_virt_wifi\x00', 0x2000000}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000002c0)={0x1, 'ipvlan1\x00', 0x100}, 0x18) 2m5.570674096s ago: executing program 33 (id=161): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x9) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1}, 0x9) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'veth0_virt_wifi\x00', 0x2000000}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000002c0)={0x1, 'ipvlan1\x00', 0x100}, 0x18) 1.338100368s ago: executing program 4 (id=3596): sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x40000) syz_open_dev$usbfs(0x0, 0x77, 0x101301) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/freeze_filesystems', 0x4ae82, 0x12c) write$UHID_CREATE2(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC=r0], 0x118) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x800002, &(0x7f0000000000)={[{@noblock_validity}, {@dioread_nolock}, {@errors_remount}, {@minixdf}, {@jqfmt_vfsv0}, {@usrjquota, 0x2e}], [], 0x22}, 0x84, 0x464, &(0x7f0000000ac0)="$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") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x80402, 0x0) write$binfmt_aout(r1, 0x0, 0xff2e) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x10e, &(0x7f00000007c0)={[{@errors_remount}, {@stripe={'stripe', 0x3d, 0x10}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4432326d}}, {@errors_remount}, {@nodelalloc}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}], [{@pcr={'pcr', 0x3d, 0x2b}}, {@fowner_eq}, {@fsname={'fsname', 0x3d, '{'}}, {@fsmagic={'fsmagic', 0x3d, 0x8}}]}, 0x3, 0x464, &(0x7f0000000300)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x80c406, &(0x7f0000000540)=ANY=[@ANYBLOB='dots,dots,dmask=000000000200000,nodots,discard,nfs=nostale_ro,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c646f733178666c6f70707900000000000000003030ffffffff303030303031373737373737373756c0f39fdb37372c004c0f1208ec0c34b7df4ba1c1e6b76697434db8574db9bcaef6a61a12c3f260bebc7ac5b1b11361119b83f1cf9f686b715b8e58fd37cea6623dc422c2ddbcefe94e5c255b5e8c90613e6b598b3b7a2c05de53dab7"], 0x1, 0x291, &(0x7f0000000280)="$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") r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$nl_route(0x10, 0x3, 0x0) 1.23117572s ago: executing program 4 (id=3598): perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x65, 0xfc, 0x5, 0x0, 0x0, 0x7, 0x89008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc46, 0x0, @perf_bp={0x0, 0x4}, 0x10, 0x8, 0x7ffffefc, 0x3, 0x1, 0x0, 0x4, 0x0, 0x100, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x9) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000002a00)={0x0, {'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000000c0)=""/43, 0x2b}}, 0x120) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x50) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x101080, 0x0) ioctl$AUTOFS_IOC_READY(r2, 0x9360, 0x6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10000000, @void, @value}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001240)={&(0x7f00000004c0)={0x14, 0x19, 0x1, 0x0, 0x0, {0x1d, 0xd601, 0x9}}, 0x14}}, 0x0) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r3, &(0x7f0000000440)={@val, @void, @eth={@broadcast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x452c, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {0x0, 0x6558, 0x18, 0x0, @wg=@data={0x4, 0x0, 0xffffdd86}}}}}}}, 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x18) chmod(&(0x7f0000000340)='./file1\x00', 0x0) 1.189956301s ago: executing program 5 (id=3599): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x0, &(0x7f00000001c0), 0x1, 0x50c, &(0x7f0000000400)="$eJzs3c9vI1cdAPCvndhxsmmTlh4AQbu0QEGrdRJvG1U9QDkhhCohegRpGxJvFMWOo9gpTdhDeuaKRCVOcOQP6HlP3LkguCGh5YDEjwi0QeJgNONJ1iQ2MZvEDvHnI43mvXljf79vN/Oe/RJ7AhhbtyPiICKKEfF+RMxlx3PZFu90tuS8J4cPV48OH67mot1+76+5tD05Fl2PSdzKnrMUEd/9ZsQPcmfjNvf2N1dqtepOVl9o1bcXmnv7dzfqK+vV9epWpbK8tLz41r03K5fW11fqxaz0+ce/Pvjqj5K0ZrMj3f24TJ2uF07iJCYj4ttXEWwEJrJ9ccR58GzyEfFiRLyaXv9zMZH+dAIAN1m7PRftue46AHDT5dM1sFy+nK0FzEY+Xy531vBeipl8rdFs3XnQ2N1a66yVzUch/2CjVl3M1grno5BL6ktp+Wm9cqp+LyJeiIifTE2n9fJqo7Y2yhc+ADDGbp2a//8x1Zn/AYAbrjTqBACAoTP/A8D4Mf8DwPgx/wPA+OnM/9P/68N6fK0HAPD/wvt/ABg/5n8AGCvfeffdZGsfZd9/vfbB3u5m44O7a9XmZrm+u1pebexsl9cbjfX0O3vq5z1frdHYXnojdj+c/9p2s7XQ3Nu/X2/sbrXup9/rfb9aSM86GELPAIB+Xnjl0e9yyYz89nS6Rde9HAojzQy4avlRJwCMzMSoEwBGxt2+YHxd4D2+5QG4Ic77LE+p1weE2u12++pSAq7Y65+x/g/jqmv9318Bw5ix/g/jy/o/jK92OzfoPf9j0BMBgOvNGj/Q5/f/L2b7X2a/HPj+2ukzPr7KrAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOB6O77/bzm7F/hs5PPlcsRzETEfhdyDjVp1MSKej4jfThWmkvrSiHMGAC4q/6dcev+v0tmml2+dFIsR8cOfvffTD1darZ3fRBRzf5s6Pt76ODteGWriAMCAjufpdN/1Rv7J4cPV422Y+fz5GxHJS48k7tFhMY5O4k/GZLovRSEiZv6ey+odua61i4s4+CgiPt2r/7mYTddAOq+LTsdPYj831Pj5/4ifT9s6++Tf4lOXkAuMm0fJ+PNOr+svH7fTfe/rv5SOUBeXjX/JU60epWPg0/jH499En/Hv9qAx3vjVtzql6bNtH0V8djLiOPZR1/hzHD/XJ/4XB4z/+8+9/Gq/tvbPI16P3vG7Yy206tsLzb39uxv1lfXqenWrUlleWl58696blYV0jXqh/2zwl7fvPN+vLen/TJ/4pXP6/6UB+/+Lf73/vS/8l/hfea1X/Hy81C/+Hz5Jd18eMP7KzCc93tw/jb/Wp//n/f/fGTD+4z/un7ltOAAwOs29/c2VWq26M8RCKS708GJEDD1nhWtRSH5kr0EaPQtfv+DzFAY9uRi9m378WueaPtXUbj9TPv1GjMtYdQOug5OLPiL+OepkAAAAAAAAAAAAAACAnobx6ahR9xEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAICb698BAAD//0xSzUc=") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002400)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000001e40)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000440)='./file0\x00', 0x10, &(0x7f00000004c0)={[{@norecovery}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'pagemap\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x36, 0x37, 0x64, 0x37, 0x64, 0x66, 0xe884cb4e3f984bb3], 0x2d, [0x56, 0x62, 0x39, 0x34], 0x2d, [0x2f34a4e58530bd5c, 0x36, 0x31, 0x73082a6e5dcbdde6], 0x2d, [0x62, 0x6e, 0x38, 0x39], 0x2d, [0x33, 0x61, 0x37, 0x39, 0x32, 0x36, 0x36, 0x64]}}}, {@uid_gt}, {@fsname={'fsname', 0x3d, '[]*'}}, {@obj_user={'obj_user', 0x3d, 't-)-/{@:\xb5%'}}]}, 0xee, 0x469, &(0x7f0000000ac0)="$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") quotactl$Q_QUOTAON(0xffffffff80000201, &(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f00000033c0)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r2 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_elf32(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c460480000307000000000000000200030006000000090300003800e700000000000e0000000000200001"], 0x58) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) socket$packet(0x11, 0x3, 0x300) writev(r3, &(0x7f00000003c0)=[{&(0x7f0000000040)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fdd411efc40800040000000000000000", 0x39}], 0x1) 1.166700681s ago: executing program 4 (id=3600): getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x60010020, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, 0x0, 0x0) keyctl$join(0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) 1.071175043s ago: executing program 5 (id=3601): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./bus\x00', 0x0, &(0x7f0000002480)=ANY=[], 0x1, 0x11f4, &(0x7f0000001280)="$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") bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES16], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000b40)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r2, 0x0, 0x4000006}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[], 0x48) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000010000d0428bd7000fcdbff2500008000", @ANYRES32=0x0, @ANYBLOB="1000000000000000280012800b00010062726964676500001800028005001900840000"], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32=0x0, @ANYBLOB="0300000000000000280012800a00010076786c616e00"], 0x50}, 0x1, 0x0, 0x0, 0x13d33d22cca65c15}, 0x4008840) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newqdisc={0x24, 0x24, 0x1, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}, {0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x40010}, 0x840) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) 885.413906ms ago: executing program 4 (id=3602): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) listen(r5, 0x0) r7 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f6400947e570028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 874.373886ms ago: executing program 4 (id=3603): r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0xc8101339d8526c63}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f0000000940)='sys_enter\x00', r3}, 0x18) syncfs(r0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x8000, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x2, @perf_config_ext={0xf60, 0x40ffffffff}, 0x1100, 0x5, 0x10, 0x5, 0x10000000, 0x5, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x19, 0x1e, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000004000000000000000100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000f20000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000085000000140000001800000001000000000000008000000018680000100000000000000007000000bf"], &(0x7f0000000400)='syzkaller\x00', 0x8880, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xda, @void, @value}, 0x94) r4 = semget$private(0x0, 0x6, 0x3b1) semtimedop(r4, &(0x7f0000000040)=[{0x0, 0x1}], 0x1, 0x0) semop(r4, &(0x7f0000000180)=[{}], 0x1) semop(r4, &(0x7f0000000080)=[{0x4, 0x40, 0x800}, {0x0, 0x0, 0x1400}], 0x2) semctl$IPC_RMID(r4, 0x0, 0x0) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000000)=[0x4, 0x8, 0x7, 0x6]) 779.223218ms ago: executing program 5 (id=3605): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@mcast2, 0x0, 0x2b}, 0x0, @in=@empty}}, 0xe8) r2 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020b000102"], 0x10}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="0212000002"], 0x10}}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@updpolicy={0xb8, 0x19, 0xfd3649826d894c67, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80, '\x00', 0x8}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, {}, 0x0, 0x0, 0x0, 0x1}}, 0xb8}}, 0x4000000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r4) sendmsg$DEVLINK_CMD_RATE_NEW(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r5, 0x1, 0xa1, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) 778.919168ms ago: executing program 5 (id=3606): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) umount2(0x0, 0x2) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="180800001bc81a000000000002000001851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000101180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000e500010000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 764.970578ms ago: executing program 2 (id=3607): bpf$MAP_CREATE(0x0, 0x0, 0x48) socket(0x840000000002, 0x3, 0xff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000003c0)='sched_switch\x00', r0, 0x0, 0x40000000000000}, 0x18) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x8, 0x3, 0x4c0, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x3f0, 0xffffffff, 0xffffffff, 0x3f0, 0xffffffff, 0xb, 0x0, {[{{@ipv6={@dev={0xfe, 0x80, '\x00', 0x1a}, @dev={0xfe, 0x80, '\x00', 0x28}, [0xffffff00, 0xffffff00, 0x0, 0xff000000], [0xff, 0x0, 0x9f19fd7a5e924fa7, 0xff], 'macvtap0\x00', 'bridge0\x00', {0xff}, {0xff}, 0x2b, 0x7, 0x5, 0x10}, 0x0, 0x1a0, 0x1c0, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x81, 0x0, 0x24, 0x0, 'syz1\x00'}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x1c8, 0x230, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@tcpmss={{0x28}, {0x39d3, 0x9, 0x1}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socket$packet(0x11, 0x2, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00'}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet6(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newtfilter={0x24, 0x11, 0x1, 0x691522eb, 0x0, {0x0, 0x0, 0x74, r2, {0x10, 0x4}, {}, {0x5}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) 748.837368ms ago: executing program 4 (id=3608): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB], 0x0, 0x5, 0xc3, &(0x7f0000000640)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0}, 0x18) socket$kcm(0x11, 0x2, 0x0) socket$kcm(0x11, 0x2, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000500)='afs_server\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) io_getevents(0x0, 0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[], 0x48) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r2, &(0x7f0000001340)=[{&(0x7f0000000580)=""/148, 0x94}], 0x1) readv(r2, &(0x7f0000001240)=[{&(0x7f0000000040)=""/73, 0x49}], 0x1) 699.215889ms ago: executing program 2 (id=3609): r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000440), 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x4, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000008500000029000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r6}, 0x10) r7 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[], [], 0x6b}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x1, 0xd853, 0x400, 0x0, 0xf}) 698.468679ms ago: executing program 2 (id=3611): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1, 0x0, 0xfffffffffffffffc}, 0x18) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) gettid() socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x70, 0x4) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0xea}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) sendmmsg$inet(r2, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="ea6d177f4bca9fdd116cfe98efd4953a9819c23df89e1915ca87034640e03a455bc243e90b1abb18f2907a0741170177e74f7c883ffacb823f2db3515b8e6aa8a863eae7ac1773e9dd0213bd2742121b65b50995549076c9053cda2e6e3ddbb32ccf7e412a918d9678f0c14dceff81869199bbb78b0924f83081c310971a9f7022b66741f1d374e0288348a3669c277bc4da04fe3b113afe9ca8e5d085795d3b78d4cb78f48d37b113e200bcd56a2f892326882a27f6ecf8a3ab9db8f1d61f4131cbb288ce3e8c8aaefd62", 0xcb}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendto$inet(r2, &(0x7f0000000700)="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", 0xfe6a, 0x40040, 0x0, 0xfffffffffffffe93) 697.818979ms ago: executing program 2 (id=3612): mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff530000008003950323030302e75"], 0x15) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[], 0x15) r2 = dup(r1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000020000000c"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) creat(&(0x7f0000000040)='./file0\x00', 0x0) 669.669ms ago: executing program 2 (id=3613): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = io_uring_setup(0x70c3, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) r2 = socket(0x2b, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xfe, 0x0, 0x7ffc9ffe}]}) clock_getres(0xeaffffff, 0x0) ioctl$SIOCSIFMTU(r2, 0x5411, &(0x7f0000000140)={'veth1_to_batadv\x00', 0x865}) chdir(&(0x7f00000004c0)='./file0\x00') r4 = socket$inet(0xa, 0x2, 0x9) connect$inet(r4, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r2, 0xcc) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000100)) close_range(r1, 0xffffffffffffffff, 0x0) 618.81425ms ago: executing program 2 (id=3615): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000080), 0x0, &(0x7f00000007c0), 0x0, r3) request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000000c0)='&\x00', r3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x40000f63c) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) msgrcv(0x0, 0x0, 0x0, 0x3, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)={{0x1}, 0x0, 0x0, 0x800000000000000, 0x4, 0x2, 0x0, 0x4, 0xe8, 0x0, 0x0, 0x0, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) socket$nl_route(0x10, 0x3, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000000), r5) sendmsg$NFC_CMD_DEP_LINK_UP(r5, &(0x7f0000000600)={0x0, 0xffffffffffffff24, &(0x7f00000005c0)={&(0x7f0000000700)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01002abd7000fbdbdf250400000005000a0000000000080001"], 0x3c}, 0x1, 0x0, 0x0, 0x26040041}, 0x40) 342.017245ms ago: executing program 1 (id=3627): getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xd, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000010000000000000000000850000002300000018110000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB="d4a5d2f537725b5d3446", @ANYRES16=0x0, @ANYBLOB="000425bd7000fbdbdf254500000008000300", @ANYRES32=r1], 0x1c}, 0x1, 0x0, 0x0, 0x4000811}, 0x40000) waitid(0xfe, 0x0, 0x0, 0x8, 0xfffffffffffffffd) r2 = socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYRES16, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x60, &(0x7f0000000180)={'filter\x00', 0xfffffffffffff20, [{}, {0x0, 0x100000000000000}]}, 0x68) syz_open_dev$loop(&(0x7f0000000480), 0x4, 0x2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$tmpfs(0x0, &(0x7f0000000400)='./file0/../file0\x00', &(0x7f00000001c0), 0x0, 0x0) umount2(0x0, 0x0) 208.687217ms ago: executing program 6 (id=3629): r0 = socket(0x10, 0x3, 0x9) connect$netlink(r0, &(0x7f0000000640)=@proc={0x10, 0x0, 0x25dfdbfc, 0x2000}, 0xc) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r0, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[], 0x30}}, 0x800) syz_genetlink_get_family_id$mptcp(0x0, r0) r1 = openat$sysfs(0xffffff9c, 0x0, 0x2a100, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_buf(r2, 0x6, 0xd, 0x0, 0x0) getsockopt$inet6_mptcp_buf(r2, 0x11c, 0x3, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) finit_module(r1, 0x0, 0x2) r3 = socket(0x400000000010, 0x3, 0x0) socket$unix(0x1, 0x5, 0x0) sendmsg$nl_route_sched(r3, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_ANNOUNCE(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="900000"], 0x90}, 0x1, 0x0, 0x0, 0x10}, 0x40) 208.327667ms ago: executing program 5 (id=3630): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\v\x00\x00\x00'], 0x48) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000540)=ANY=[@ANYRES64=r0], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000180), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0xffffffffffffffff) futex(0x0, 0x3, 0x801, 0x0, 0x0, 0xfffffffc) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, 0x0, 0x48) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1) modify_ldt$write(0x1, &(0x7f0000000300)={0x9, 0x20000000, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x1}, 0x10) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) 207.832847ms ago: executing program 1 (id=3631): io_uring_setup(0x1581, &(0x7f0000000a40)={0x0, 0x2000000, 0x40, 0x1000, 0x3bd}) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000002c0)="9e", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x4008000) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24, 0x7f, @dev={0xfe, 0x80, '\x00', 0x41}, 0xca}, 0x1c) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 159.928778ms ago: executing program 1 (id=3632): r0 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x20000010) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000040)=0x80000001, 0x4) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x10, 0x0, @fd_index=0x3}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r1 = syz_io_uring_setup(0x83f, &(0x7f00000000c0)={0x0, 0xa9ee, 0x0, 0x3, 0x8002ae}, &(0x7f0000000140)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x2000044, &(0x7f0000000040)={[{@errors_remount}, {@jqfmt_vfsold}, {@quota}]}, 0x2, 0x500, &(0x7f0000000b00)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x103042, 0x80) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x8004587d, &(0x7f0000000340)={0x2, 0x2, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x109880}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00'}, 0x18) io_uring_enter(r1, 0x3516, 0x0, 0x0, 0x0, 0xfffffdcf) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 159.487418ms ago: executing program 6 (id=3633): openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="4400000010000100"/20, @ANYRES32=r4, @ANYBLOB="00000000000000001c0012800b00010067656e65766500000c00028008000200ac1414"], 0x44}, 0x1, 0x2}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x700000000000000, &(0x7f0000000180)=@base={0x1d, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 159.150298ms ago: executing program 5 (id=3634): ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000001c0)) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f0000000200)={[{@inlinecrypt}, {@jqfmt_vfsv1}, {@quota}, {@init_itable_val={'init_itable', 0x3d, 0x8}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@sysvgroups}, {@noauto_da_alloc}, {@stripe={'stripe', 0x3d, 0x5}}, {@orlov}], [{@appraise}]}, 0x1, 0x56f, &(0x7f0000003780)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x441, 0x14a) fallocate(r0, 0x20, 0x0, 0x8) unshare(0x8000000) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='asymmetric\x00', 0x0, &(0x7f00000002c0)="9fcc", 0x2, r1) semget$private(0x0, 0x4000, 0x555) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f00000012c0)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x12) write(r3, &(0x7f0000004200)='t', 0x1) fsopen(&(0x7f0000000000)='cpuset\x00', 0x0) sendfile(r3, r2, 0x0, 0x3ffff) sendfile(r3, r2, 0x0, 0x7ffff000) semtimedop(0x0, &(0x7f0000000440)=[{0x0, 0x0, 0x1000}], 0xf, 0x0) 158.818078ms ago: executing program 6 (id=3635): setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x33, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) r0 = syz_io_uring_setup(0x110, &(0x7f00000000c0)={0x0, 0x59fa, 0x400, 0x8, 0x3}, &(0x7f0000000180), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x40241, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000240)={0x2, &(0x7f0000000400)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x6, 0x0, 0x0, 0x4006}]}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) write$tun(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="000086dd0003110004"], 0x10da) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r5 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x40000) readv(r5, &(0x7f0000000080)=[{&(0x7f0000000880)=""/97, 0x61}], 0x1) 83.284829ms ago: executing program 1 (id=3636): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r0, 0x0, 0x1, 0x0) write$binfmt_script(r2, &(0x7f00000000c0), 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000001480)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000380)='kfree\x00', r3}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200), 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) gettid() perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b73, 0x1, @perf_config_ext={0x8, 0xaea}, 0x14105, 0x32, 0xfffffbff, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r4 = syz_io_uring_setup(0x254c, &(0x7f0000000000)={0x0, 0x7c87, 0x800, 0x0, 0x39}, &(0x7f0000000080), &(0x7f00000001c0)) io_uring_register$IORING_REGISTER_PBUF_RING(r4, 0x16, &(0x7f0000000900)={&(0x7f0000003000)={[{0x0, 0x0, 0x1}]}, 0x1, 0x3}, 0x1) io_uring_register$IORING_UNREGISTER_PBUF_RING(r4, 0x17, &(0x7f0000000f40)={0x0, 0x0, 0x3}, 0x1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) 82.936279ms ago: executing program 6 (id=3637): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0xd, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) socket$kcm(0xa, 0x2, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000080000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0x3) socket$kcm(0x10, 0x2, 0x0) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000280)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300000000fff1850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x105b7e, 0x2, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0xc7, 0xfffffbff, 0x3, 0x2, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x3) socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x10, 0x400000002, 0x0) r2 = socket$kcm(0x10, 0x400000002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x2010, r1, 0xfda, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="1c0000005e0007"], 0xfe33) 66.26131ms ago: executing program 6 (id=3638): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x80000000000, 0x42071, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x2, @perf_config_ext={0x0, 0x10000}, 0x1030, 0x8, 0x3, 0x0, 0x2004, 0x1088f104, 0xe9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="d800000018008103e00312ba0d8105040a600300ff0f040b067c55a1bc000900b80006990700000015000500fef32702d3001500030001400200000901ac040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b66bce0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0x48002) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x1, 0x0, 0x7ffc1ffb}]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYRES16=r1], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r2, 0x0, 0x3}, 0x18) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pwrite64(r3, &(0x7f00000020c0)="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", 0x1000, 0x3) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000008c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="01030000b000000000001c00000018000180146864d30812fa0600020076657468300000000000000000000000a847f5e32ab9865ab6ce4bc8f22141606912f0bd31a257f273dab20f4203525e6af1994f20045c68aceffa90f488f357381e740900000000000000d35aa6df1c4b9451921de8d4ea575c31757d31cc94081565daf6b8849456b057df1c2e8c6710017cceee70c83494bdb0e0fcf02deecb8b66ad35b67e1fcab58c5bb57f7b5eef84483a0ad802cf1d449eca91dcde0ef1b3f348a6416a3e83a837be41a56b6defab3eaf8a58a91554b295ecdbe3c4166a7b"], 0x2c}, 0x1, 0x0, 0x0, 0x20040005}, 0x40040) getpid() getgroups(0x4, &(0x7f0000000600)=[0xee00, 0xee01, 0xee01, 0xee01]) socket$nl_generic(0x10, 0x3, 0x10) 50.98624ms ago: executing program 1 (id=3639): ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000240)='kfree\x00', r0}, 0x10) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000003980)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a300000000074000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021380011800a0001006c696d6974000000280002800c00024000000000000000030c00014000000000000001010c0001400000000000000101b81700000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000008c1703800c0000800800034000000002"], 0x1874}}, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) syz_clone(0x2045280, 0x0, 0x0, 0x0, 0x0, 0x0) 904.921µs ago: executing program 1 (id=3640): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) socket$inet(0x2, 0x2, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_generic(0x10, 0x3, 0x10) creat(&(0x7f0000000340)='./file1\x00', 0x2) syz_open_dev$tty20(0xc, 0x4, 0x0) socket$rxrpc(0x21, 0x2, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x100004, 0x5, 0x4, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001500)) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000100)) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000200)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYRES16=r0]) 0s ago: executing program 6 (id=3641): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, r1, 0x400, 0x70bd2a, 0x25dfdbfe, {{}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x44000) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000600), 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000280)={0x0, 0x0, {0x0, 0x0, 0x40000000, 0x0, 0x7}, 0x8}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = mq_open(&(0x7f0000000040)='!se\xf7ih,\x17i\xacP\xe6lNnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x2, &(0x7f0000000300)={0x0, 0x1, 0x6}) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): 59.332100][ T5385] bridge0: left promiscuous mode [ 59.441227][ T5401] sit0: entered allmulticast mode [ 59.653743][ T5440] netlink: 'syz.5.697': attribute type 10 has an invalid length. [ 59.663649][ T5440] batman_adv: batadv0: Adding interface: team0 [ 59.669985][ T5440] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 59.695299][ T5440] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 59.710615][ T5440] netlink: 'syz.5.697': attribute type 10 has an invalid length. [ 59.720502][ T5440] team0: entered promiscuous mode [ 59.725666][ T5440] team_slave_0: entered promiscuous mode [ 59.731455][ T5440] team_slave_1: entered promiscuous mode [ 59.744825][ T5440] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.754346][ T5440] batman_adv: batadv0: Interface activated: team0 [ 59.760969][ T5440] batman_adv: batadv0: Interface deactivated: team0 [ 59.767632][ T5440] batman_adv: batadv0: Removing interface: team0 [ 59.775647][ T5440] bridge0: port 3(team0) entered blocking state [ 59.782868][ T5440] bridge0: port 3(team0) entered disabled state [ 59.789883][ T5440] team0: entered allmulticast mode [ 59.795064][ T5440] team_slave_0: entered allmulticast mode [ 59.801604][ T5440] team_slave_1: entered allmulticast mode [ 59.809456][ T5440] bridge0: port 3(team0) entered blocking state [ 59.815819][ T5440] bridge0: port 3(team0) entered forwarding state [ 60.278061][ T5478] __nla_validate_parse: 13 callbacks suppressed [ 60.278081][ T5478] netlink: 24 bytes leftover after parsing attributes in process `syz.5.713'. [ 60.310893][ T5478] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=5478 comm=syz.5.713 [ 60.575276][ T5515] netlink: 'syz.1.731': attribute type 4 has an invalid length. [ 60.593835][ T5519] netlink: 'syz.5.733': attribute type 27 has an invalid length. [ 60.603013][ T5515] netlink: 'syz.1.731': attribute type 4 has an invalid length. [ 60.619472][ T5519] sit0: left allmulticast mode [ 60.631543][ T5519] bridge0: port 3(team0) entered disabled state [ 60.638007][ T5519] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.645263][ T5519] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.658310][ T5519] $Hÿ: left promiscuous mode [ 60.663182][ T5519] bond_slave_0: left promiscuous mode [ 60.668724][ T5519] bond_slave_1: left promiscuous mode [ 60.674610][ T5519] dummy0: left promiscuous mode [ 60.731632][ T5519] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 60.741952][ T5519] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 60.775037][ T5519] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 60.784275][ T5519] netdevsim netdevsim5 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 60.793378][ T5519] netdevsim netdevsim5 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 60.803712][ T5519] netdevsim netdevsim5 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 60.836066][ T5520] 8021q: adding VLAN 0 to HW filter on device $Hÿ [ 60.844492][ T5520] bridge0: port 3(team0) entered blocking state [ 60.850872][ T5520] bridge0: port 3(team0) entered forwarding state [ 60.859280][ T5520] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.869991][ T5520] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 60.893465][ T31] bridge0: port 3(team0) entered disabled state [ 60.955801][ T5554] netlink: 4 bytes leftover after parsing attributes in process `syz.5.747'. [ 60.986098][ T5554] 8021q: adding VLAN 0 to HW filter on device team1 [ 61.059019][ T5574] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=5574 comm=syz.4.750 [ 61.107181][ T5580] netlink: 'syz.5.759': attribute type 1 has an invalid length. [ 61.126742][ T5580] bond0: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 61.137753][ T5580] netlink: 28 bytes leftover after parsing attributes in process `syz.5.759'. [ 61.151213][ T5580] bond0 (unregistering): (slave ip6gretap1): Releasing backup interface [ 61.162526][ T5580] bond0 (unregistering): Released all slaves [ 61.208430][ T5587] syzkaller0: entered promiscuous mode [ 61.213996][ T5587] syzkaller0: entered allmulticast mode [ 61.310103][ T5599] netlink: 'syz.2.768': attribute type 4 has an invalid length. [ 61.335328][ T5599] netlink: 'syz.2.768': attribute type 4 has an invalid length. [ 61.738307][ T5619] netlink: 'syz.5.777': attribute type 10 has an invalid length. [ 61.748008][ T5619] $Hÿ: (slave dummy0): Releasing backup interface [ 61.756568][ T5619] dummy0: entered promiscuous mode [ 61.761855][ T5619] dummy0: entered allmulticast mode [ 61.767698][ T5619] team0: Port device dummy0 added [ 61.774012][ T37] bridge0: port 3(team0) entered blocking state [ 61.776860][ T5619] netlink: 'syz.5.777': attribute type 10 has an invalid length. [ 61.780328][ T37] bridge0: port 3(team0) entered forwarding state [ 61.801600][ T5619] dummy0: left promiscuous mode [ 61.806633][ T5619] dummy0: left allmulticast mode [ 61.812323][ T5619] team0: Port device dummy0 removed [ 61.822295][ T5619] $Hÿ: (slave dummy0): Enslaving as an active interface with an up link [ 61.831745][ T31] bridge0: port 3(team0) entered disabled state [ 62.002653][ T5642] netlink: 4 bytes leftover after parsing attributes in process `syz.4.788'. [ 62.496160][ T5693] pim6reg1: entered promiscuous mode [ 62.501569][ T5693] pim6reg1: entered allmulticast mode [ 62.685526][ T5704] netlink: 4 bytes leftover after parsing attributes in process `syz.1.818'. [ 62.696771][ T5704] netlink: 28 bytes leftover after parsing attributes in process `syz.1.818'. [ 62.742440][ T5712] netlink: 4 bytes leftover after parsing attributes in process `syz.1.819'. [ 62.753946][ T5712] netlink: 12 bytes leftover after parsing attributes in process `syz.1.819'. [ 62.865546][ T29] kauditd_printk_skb: 1110 callbacks suppressed [ 62.865562][ T29] audit: type=1400 audit(1750474015.401:3684): avc: denied { read write } for pid=3848 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 62.928493][ T29] audit: type=1400 audit(1750474015.441:3685): avc: denied { open } for pid=5721 comm="syz.1.826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 62.947768][ T29] audit: type=1400 audit(1750474015.441:3686): avc: denied { prog_load } for pid=5721 comm="syz.1.826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 62.968102][ T29] audit: type=1400 audit(1750474015.441:3687): avc: denied { prog_load } for pid=5721 comm="syz.1.826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 62.987223][ T29] audit: type=1400 audit(1750474015.451:3688): avc: denied { prog_load } for pid=5726 comm="syz.5.827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 63.007727][ T29] audit: type=1400 audit(1750474015.451:3689): avc: denied { map_create } for pid=5726 comm="syz.5.827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 63.026819][ T29] audit: type=1400 audit(1750474015.451:3690): avc: denied { prog_load } for pid=5726 comm="syz.5.827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 63.047284][ T29] audit: type=1400 audit(1750474015.451:3691): avc: denied { read } for pid=5726 comm="syz.5.827" dev="nsfs" ino=4026532380 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 63.069172][ T29] audit: type=1400 audit(1750474015.451:3692): avc: denied { execute } for pid=5726 comm="syz.5.827" dev="tmpfs" ino=1069 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 63.091464][ T29] audit: type=1400 audit(1750474015.461:3693): avc: denied { read write } for pid=3848 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.191289][ T5739] sch_tbf: burst 4398 is lower than device lo mtu (11337746) ! [ 63.363813][ T2958] IPVS: starting estimator thread 0... [ 63.396276][ T5768] netlink: 'syz.6.845': attribute type 1 has an invalid length. [ 63.412203][ T5768] 8021q: adding VLAN 0 to HW filter on device bond3 [ 63.421916][ T5768] netlink: 8 bytes leftover after parsing attributes in process `syz.6.845'. [ 63.433776][ T5768] vlan2: entered promiscuous mode [ 63.438859][ T5768] bond3: entered promiscuous mode [ 63.444842][ T5768] dummy0: entered promiscuous mode [ 63.454493][ T5768] bond3: (slave dummy0): making interface the new active one [ 63.462160][ T5764] IPVS: using max 2064 ests per chain, 103200 per kthread [ 63.465601][ T5768] bond3: (slave dummy0): Enslaving as an active interface with an up link [ 63.596912][ T5790] netlink: 4 bytes leftover after parsing attributes in process `syz.6.855'. [ 63.611495][ T5790] team1: entered promiscuous mode [ 63.616566][ T5790] team1: entered allmulticast mode [ 64.008080][ T5822] netlink: 'syz.2.868': attribute type 1 has an invalid length. [ 64.022833][ T5822] 8021q: adding VLAN 0 to HW filter on device bond1 [ 64.049971][ T5822] vlan2: entered promiscuous mode [ 64.055063][ T5822] bond1: entered promiscuous mode [ 64.073973][ T5822] dummy0: entered promiscuous mode [ 64.103835][ T5822] bond1: (slave dummy0): making interface the new active one [ 64.114033][ T5822] bond1: (slave dummy0): Enslaving as an active interface with an up link [ 64.316738][ T5850] @ÿ: renamed from bond_slave_0 [ 64.563871][ T5875] @ÿ: renamed from bond_slave_0 [ 65.228461][ T5904] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.250671][ T5904] vlan2: entered promiscuous mode [ 65.255859][ T5904] bond0: entered promiscuous mode [ 65.263399][ T5904] dummy0: entered promiscuous mode [ 65.276504][ T5904] bond0: (slave dummy0): making interface the new active one [ 65.286433][ T5904] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 65.359141][ T5926] __nla_validate_parse: 4 callbacks suppressed [ 65.359160][ T5926] netlink: 24 bytes leftover after parsing attributes in process `syz.4.914'. [ 65.400560][ T5926] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=5926 comm=syz.4.914 [ 65.664147][ T5965] netlink: 24 bytes leftover after parsing attributes in process `syz.5.930'. [ 65.689213][ T5965] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=5965 comm=syz.5.930 [ 66.077938][ T5999] netlink: 24 bytes leftover after parsing attributes in process `syz.2.947'. [ 66.115767][ T5999] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=5999 comm=syz.2.947 [ 66.382330][ T6020] validate_nla: 1 callbacks suppressed [ 66.382345][ T6020] netlink: 'syz.5.958': attribute type 4 has an invalid length. [ 66.444260][ T6026] sch_tbf: burst 4398 is lower than device lo mtu (11337746) ! [ 66.703960][ T6042] bond0: (slave dummy0): Releasing active interface [ 66.719300][ T6042] bridge_slave_0: left allmulticast mode [ 66.724986][ T6042] bridge_slave_0: left promiscuous mode [ 66.730670][ T6042] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.740606][ T6042] bridge_slave_1: left allmulticast mode [ 66.746302][ T6042] bridge_slave_1: left promiscuous mode [ 66.752310][ T6042] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.762165][ T6042] $Hÿ: (slave bond_slave_0): Releasing backup interface [ 66.769792][ T6042] bond_slave_0: left promiscuous mode [ 66.778406][ T6042] $Hÿ: (slave bond_slave_1): Releasing backup interface [ 66.786025][ T6042] bond_slave_1: left promiscuous mode [ 66.795105][ T6042] team0: Port device team_slave_0 removed [ 66.804091][ T6042] team0: Port device team_slave_1 removed [ 66.811549][ T6042] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 66.819019][ T6042] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 66.827803][ T6042] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 66.835288][ T6042] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 67.174526][ T6074] netlink: 'syz.2.980': attribute type 12 has an invalid length. [ 67.565908][ T6087] netlink: 24 bytes leftover after parsing attributes in process `syz.5.987'. [ 67.566972][ T6088] netlink: 'syz.6.988': attribute type 4 has an invalid length. [ 67.588432][ T6087] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=6087 comm=syz.5.987 [ 67.596562][ T6088] netlink: 'syz.6.988': attribute type 4 has an invalid length. [ 67.679546][ T6093] netlink: 2028 bytes leftover after parsing attributes in process `syz.5.989'. [ 67.688684][ T6093] netlink: 12 bytes leftover after parsing attributes in process `syz.5.989'. [ 67.867086][ T29] kauditd_printk_skb: 877 callbacks suppressed [ 67.867102][ T29] audit: type=1400 audit(1750474532.399:4571): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 67.873515][ T6113] netlink: 24 bytes leftover after parsing attributes in process `syz.1.999'. [ 67.904776][ T29] audit: type=1400 audit(1750474532.439:4572): avc: denied { read } for pid=6114 comm="syz.6.1000" dev="nsfs" ino=4026533019 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 67.929746][ T29] audit: type=1400 audit(1750474532.439:4573): avc: denied { map_create } for pid=6114 comm="syz.6.1000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 67.949078][ T29] audit: type=1400 audit(1750474532.439:4574): avc: denied { map_create } for pid=6114 comm="syz.6.1000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 67.968382][ T29] audit: type=1400 audit(1750474532.439:4575): avc: denied { prog_load } for pid=6114 comm="syz.6.1000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 67.988733][ T29] audit: type=1400 audit(1750474532.439:4576): avc: denied { prog_load } for pid=6114 comm="syz.6.1000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 68.007967][ T29] audit: type=1326 audit(1750474532.439:4577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6114 comm="syz.6.1000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd7406ae929 code=0x7ffc0000 [ 68.032534][ T29] audit: type=1326 audit(1750474532.439:4578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6114 comm="syz.6.1000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd7406ae929 code=0x7ffc0000 [ 68.036075][ T6117] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=6117 comm=syz.1.999 [ 68.055959][ T29] audit: type=1326 audit(1750474532.439:4579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6114 comm="syz.6.1000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=98 compat=0 ip=0x7fd7406ae929 code=0x7ffc0000 [ 68.056009][ T29] audit: type=1326 audit(1750474532.439:4580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6114 comm="syz.6.1000" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd7406ae929 code=0x7ffc0000 [ 68.148769][ T6121] netlink: 'syz.1.1001': attribute type 4 has an invalid length. [ 68.176830][ T6121] netlink: 'syz.1.1001': attribute type 4 has an invalid length. [ 68.188787][ T6125] netlink: 'syz.6.1004': attribute type 4 has an invalid length. [ 68.210672][ T6125] netlink: 'syz.6.1004': attribute type 4 has an invalid length. [ 68.263486][ T6135] netlink: 'syz.2.1009': attribute type 4 has an invalid length. [ 68.306349][ T6135] netlink: 'syz.2.1009': attribute type 4 has an invalid length. [ 68.394869][ T6154] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1016'. [ 68.419132][ T6154] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1016'. [ 68.428484][ T6154] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1016'. [ 68.595640][ T6171] sch_fq: defrate 0 ignored. [ 68.738321][ T6189] bond1: (slave dummy0): Releasing active interface [ 69.619913][ T6237] team0: left allmulticast mode [ 69.624858][ T6237] team_slave_0: left allmulticast mode [ 69.630704][ T6237] team_slave_1: left allmulticast mode [ 69.636201][ T6237] team0: left promiscuous mode [ 69.641617][ T6237] team_slave_0: left promiscuous mode [ 69.647239][ T6237] team_slave_1: left promiscuous mode [ 69.652910][ T6237] bridge0: port 3(team0) entered disabled state [ 69.662635][ T6237] $Hÿ: (slave dummy0): Releasing backup interface [ 69.671197][ T6237] bridge_slave_0: left allmulticast mode [ 69.676932][ T6237] bridge_slave_0: left promiscuous mode [ 69.682941][ T6237] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.690979][ T6237] bridge_slave_1: left allmulticast mode [ 69.696660][ T6237] bridge_slave_1: left promiscuous mode [ 69.702422][ T6237] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.712283][ T6237] $Hÿ: (slave 5@ÿ): Releasing backup interface [ 69.720638][ T6237] $Hÿ: (slave bond_slave_1): Releasing backup interface [ 69.730399][ T6237] team0: Port device team_slave_0 removed [ 69.737875][ T6237] team0: Port device team_slave_1 removed [ 69.744273][ T6237] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 69.752110][ T6237] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 70.592665][ T6276] __nla_validate_parse: 3 callbacks suppressed [ 70.592678][ T6276] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1079'. [ 70.745356][ T6289] bridge_slave_0: left allmulticast mode [ 70.751108][ T6289] bridge_slave_0: left promiscuous mode [ 70.756858][ T6289] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.767816][ T6289] bridge_slave_1: left allmulticast mode [ 70.773538][ T6289] bridge_slave_1: left promiscuous mode [ 70.779259][ T6289] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.790168][ T6289] bond0: (slave bond_slave_0): Releasing backup interface [ 70.799803][ T6289] bond0: (slave bond_slave_1): Releasing backup interface [ 70.813047][ T6289] team0: Port device team_slave_0 removed [ 70.822786][ T6289] team0: Port device team_slave_1 removed [ 70.829791][ T6289] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 70.837304][ T6289] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 70.846100][ T6289] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 70.854102][ T6289] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 70.938038][ T6304] bridge0: entered promiscuous mode [ 70.943793][ T6304] macvtap1: entered allmulticast mode [ 70.949310][ T6304] bridge0: entered allmulticast mode [ 71.002861][ T6314] netlink: 12 bytes leftover after parsing attributes in process `syz.5.1086'. [ 71.276392][ T6344] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1109'. [ 71.289163][ T6344] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1109'. [ 71.468877][ T6359] netlink: 24 bytes leftover after parsing attributes in process `syz.5.1105'. [ 71.493934][ T6359] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=6359 comm=syz.5.1105 [ 71.626090][ T6369] bridge: RTM_NEWNEIGH with invalid ether address [ 71.824018][ T6390] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1119'. [ 71.840101][ T6392] bridge0: entered promiscuous mode [ 71.857200][ T6392] macvtap1: entered allmulticast mode [ 71.862683][ T6392] bridge0: entered allmulticast mode [ 71.899776][ T6390] 8021q: adding VLAN 0 to HW filter on device bond1 [ 72.041322][ T6398] syzkaller0: entered promiscuous mode [ 72.432005][ T6423] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1130'. [ 72.495234][ T6431] netlink: 12 bytes leftover after parsing attributes in process `syz.5.1136'. [ 72.496215][ T6432] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1134'. [ 72.520496][ T6432] 8021q: adding VLAN 0 to HW filter on device bond1 [ 72.536048][ T6431] 8021q: adding VLAN 0 to HW filter on device bond1 [ 72.544068][ T6431] bond0: (slave bond1): Enslaving as an active interface with an up link [ 72.564293][ T6431] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1136'. [ 72.576464][ T6431] bond0 (unregistering): (slave bond1): Releasing backup interface [ 72.586552][ T6431] bond0 (unregistering): Released all slaves [ 72.731644][ T6457] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING [ 72.793991][ T6467] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING [ 72.886437][ T29] kauditd_printk_skb: 896 callbacks suppressed [ 72.886498][ T29] audit: type=1400 audit(1750474537.419:5477): avc: denied { read write } for pid=3304 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.917890][ T29] audit: type=1400 audit(1750474537.429:5478): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.942272][ T29] audit: type=1400 audit(1750474537.439:5479): avc: denied { map_create } for pid=6486 comm="syz.2.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 72.961650][ T29] audit: type=1400 audit(1750474537.439:5480): avc: denied { prog_load } for pid=6486 comm="syz.2.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 72.980912][ T29] audit: type=1400 audit(1750474537.439:5481): avc: denied { prog_load } for pid=6486 comm="syz.2.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 73.000160][ T29] audit: type=1400 audit(1750474537.439:5482): avc: denied { prog_load } for pid=6486 comm="syz.2.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 73.019247][ T29] audit: type=1400 audit(1750474537.439:5483): avc: denied { create } for pid=6486 comm="syz.2.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 73.039929][ T29] audit: type=1400 audit(1750474537.439:5484): avc: denied { create } for pid=6486 comm="syz.2.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 73.060739][ T29] audit: type=1400 audit(1750474537.459:5485): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.085055][ T29] audit: type=1400 audit(1750474537.469:5486): avc: denied { map_create } for pid=6484 comm="syz.4.1161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 73.110189][ T6492] validate_nla: 9 callbacks suppressed [ 73.110225][ T6492] netlink: 'syz.1.1164': attribute type 4 has an invalid length. [ 73.138192][ T6492] netlink: 'syz.1.1164': attribute type 4 has an invalid length. [ 73.170623][ T6497] netlink: 'syz.1.1165': attribute type 4 has an invalid length. [ 73.185149][ T6498] bridge0: port 1(syz_tun) entered blocking state [ 73.191706][ T6498] bridge0: port 1(syz_tun) entered disabled state [ 73.210144][ T6498] syz_tun: entered allmulticast mode [ 73.216713][ T6498] syz_tun: entered promiscuous mode [ 73.225548][ T6498] bridge0: port 1(syz_tun) entered blocking state [ 73.232217][ T6498] bridge0: port 1(syz_tun) entered forwarding state [ 73.649488][ T6539] syzkaller0: entered promiscuous mode [ 73.655042][ T6539] syzkaller0: entered allmulticast mode [ 73.702098][ T6544] bridge0: port 3(syz_tun) entered blocking state [ 73.709443][ T6544] bridge0: port 3(syz_tun) entered disabled state [ 73.716354][ T6544] syz_tun: entered allmulticast mode [ 73.724288][ T6544] syz_tun: entered promiscuous mode [ 73.731208][ T6544] bridge0: port 3(syz_tun) entered blocking state [ 73.737714][ T6544] bridge0: port 3(syz_tun) entered forwarding state [ 74.241544][ T6564] sock: sock_set_timeout: `syz.2.1190' (pid 6564) tries to set negative timeout [ 74.323395][ T6573] bond3: (slave dummy0): Releasing active interface [ 74.338088][ T6573] bridge_slave_0: left allmulticast mode [ 74.343978][ T6573] bridge_slave_0: left promiscuous mode [ 74.351210][ T6573] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.362563][ T6573] bridge_slave_1: left allmulticast mode [ 74.368408][ T6573] bridge_slave_1: left promiscuous mode [ 74.374233][ T6573] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.384670][ T6573] bond0: (slave bond_slave_0): Releasing backup interface [ 74.396296][ T6573] bond0: (slave bond_slave_1): Releasing backup interface [ 74.410521][ T6573] team0: Port device team_slave_0 removed [ 74.420241][ T6573] team0: Port device team_slave_1 removed [ 74.427683][ T6573] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 74.435191][ T6573] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 74.449142][ T6573] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 74.456681][ T6573] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 74.477610][ T6573] bond1: (slave bond2): Releasing backup interface [ 75.770435][ T6653] batadv1: entered promiscuous mode [ 75.787959][ T6653] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 77.008465][ T6704] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1250'. [ 77.155772][ T6685] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1246'. [ 77.891131][ T29] kauditd_printk_skb: 603 callbacks suppressed [ 77.891149][ T29] audit: type=1400 audit(1750474542.429:6090): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.935722][ T6738] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1266'. [ 77.952709][ T6738] 8021q: adding VLAN 0 to HW filter on device team1 [ 77.966426][ T29] audit: type=1400 audit(1750474542.469:6091): avc: denied { map_create } for pid=6737 comm="syz.1.1266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 77.988519][ T29] audit: type=1400 audit(1750474542.469:6092): avc: denied { prog_load } for pid=6737 comm="syz.1.1266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 78.111241][ T29] audit: type=1400 audit(1750474542.569:6093): avc: denied { read write } for pid=3848 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.111356][ T6747] netlink: 'syz.2.1269': attribute type 4 has an invalid length. [ 78.136325][ T29] audit: type=1400 audit(1750474542.579:6094): avc: denied { prog_load } for pid=6739 comm="syz.2.1267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 78.165208][ T29] audit: type=1400 audit(1750474542.579:6095): avc: denied { prog_load } for pid=6739 comm="syz.2.1267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 78.186380][ T29] audit: type=1400 audit(1750474542.579:6096): avc: denied { mounton } for pid=6739 comm="syz.2.1267" path="/248/file0" dev="tmpfs" ino=1315 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 78.211848][ T29] audit: type=1400 audit(1750474542.589:6097): avc: denied { map_create } for pid=6741 comm="syz.5.1268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 78.231114][ T29] audit: type=1400 audit(1750474542.589:6098): avc: denied { prog_load } for pid=6741 comm="syz.5.1268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 78.253220][ T29] audit: type=1400 audit(1750474542.589:6099): avc: denied { prog_load } for pid=6741 comm="syz.5.1268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 78.306999][ T6760] netlink: 52 bytes leftover after parsing attributes in process `syz.1.1273'. [ 78.553139][ T6785] netlink: 'syz.2.1284': attribute type 10 has an invalid length. [ 78.583894][ T6785] batman_adv: batadv0: Adding interface: team0 [ 78.590143][ T6785] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.615921][ T6786] netlink: 'syz.2.1284': attribute type 10 has an invalid length. [ 78.615942][ T6786] netlink: 2 bytes leftover after parsing attributes in process `syz.2.1284'. [ 78.635009][ T6785] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 78.657412][ T6786] team0: entered promiscuous mode [ 78.663089][ T6786] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.673996][ T6786] batman_adv: batadv0: Interface activated: team0 [ 78.680673][ T6786] batman_adv: batadv0: Interface deactivated: team0 [ 78.687324][ T6786] batman_adv: batadv0: Removing interface: team0 [ 78.701883][ T6786] bridge0: port 1(team0) entered blocking state [ 78.709526][ T6786] bridge0: port 1(team0) entered disabled state [ 78.724896][ T6786] team0: entered allmulticast mode [ 78.792753][ T6795] netlink: 24 bytes leftover after parsing attributes in process `syz.6.1288'. [ 78.811979][ T6795] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=6795 comm=syz.6.1288 [ 78.849939][ T6799] sch_tbf: burst 0 is lower than device lo mtu (11337746) ! [ 78.987533][ T6815] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1298'. [ 79.072825][ T6821] syzkaller0: entered promiscuous mode [ 79.078481][ T6821] syzkaller0: entered allmulticast mode [ 79.322098][ T6847] bridge0: port 1(team0) entered disabled state [ 79.331694][ T6847] team0 (unregistering): left allmulticast mode [ 79.339818][ T6847] bridge0: port 1(team0) entered disabled state [ 79.439961][ T6855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6855 comm=syz.5.1316 [ 79.474574][ T6857] ip6gre1: entered allmulticast mode [ 79.485865][ T6855] bond0: (slave gretap1): Enslaving as an active interface with an up link [ 79.502144][ T6855] vlan0: entered allmulticast mode [ 79.508965][ T6855] bond0: entered allmulticast mode [ 79.514096][ T6855] gretap1: entered allmulticast mode [ 79.593675][ T6870] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1324'. [ 79.631595][ T6875] netlink: 'syz.4.1327': attribute type 4 has an invalid length. [ 79.643547][ T6878] sch_fq: defrate 0 ignored. [ 79.731016][ T6891] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1335'. [ 79.745540][ T6891] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1335'. [ 79.794530][ T6902] netlink: '+}[@': attribute type 4 has an invalid length. [ 80.550467][ T6936] netlink: 'syz.1.1356': attribute type 13 has an invalid length. [ 80.634403][ T6936] bridge0: port 3(syz_tun) entered disabled state [ 80.758551][ T6936] bridge0: left allmulticast mode [ 80.918812][ T6951] netlink: 'syz.1.1358': attribute type 10 has an invalid length. [ 80.937952][ T6951] team0: Port device dummy0 added [ 80.955022][ T6951] netlink: 'syz.1.1358': attribute type 10 has an invalid length. [ 80.978992][ T6951] team0: Port device dummy0 removed [ 81.010489][ T6951] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 81.131690][ T6960] Cannot find add_set index 0 as target [ 81.336317][ T6975] sch_fq: defrate 0 ignored. [ 81.745632][ T6990] netlink: '+}[@': attribute type 4 has an invalid length. [ 81.798646][ T6996] netlink: 'syz.2.1372': attribute type 1 has an invalid length. [ 81.839252][ T6996] bond3: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 81.867321][ T6996] bond3 (unregistering): (slave ip6gretap1): Releasing backup interface [ 81.891850][ T6996] bond3 (unregistering): Released all slaves [ 82.018074][ T7002] netlink: 'syz.2.1374': attribute type 10 has an invalid length. [ 82.026236][ T7002] dummy0: left promiscuous mode [ 82.041274][ T7002] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 82.211610][ T7005] syzkaller0: entered promiscuous mode [ 82.217309][ T7005] syzkaller0: entered allmulticast mode [ 82.732660][ T7038] __nla_validate_parse: 2 callbacks suppressed [ 82.732673][ T7038] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1394'. [ 82.763429][ T7038] team2: entered promiscuous mode [ 82.769604][ T7038] team2: entered allmulticast mode [ 82.822608][ T7044] xt_hashlimit: max too large, truncated to 1048576 [ 82.905847][ T29] kauditd_printk_skb: 737 callbacks suppressed [ 82.905922][ T29] audit: type=1400 audit(1750474547.439:6837): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.949040][ T29] audit: type=1400 audit(1750474547.459:6838): avc: denied { map_create } for pid=7052 comm="syz.1.1401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 82.971215][ T29] audit: type=1400 audit(1750474547.459:6839): avc: denied { prog_load } for pid=7052 comm="syz.1.1401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 82.990419][ T29] audit: type=1400 audit(1750474547.459:6840): avc: denied { prog_load } for pid=7052 comm="syz.1.1401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 83.012390][ T29] audit: type=1400 audit(1750474547.459:6841): avc: denied { prog_load } for pid=7052 comm="syz.1.1401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 83.031513][ T29] audit: type=1400 audit(1750474547.459:6842): avc: denied { mounton } for pid=7052 comm="syz.1.1401" path="/240/file0" dev="tmpfs" ino=1267 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 83.041938][ T7064] netlink: 60 bytes leftover after parsing attributes in process `syz.6.1407'. [ 83.057348][ T29] audit: type=1400 audit(1750474547.459:6843): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.072757][ T7065] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7065 comm=syz.1.1403 [ 83.090530][ T29] audit: type=1400 audit(1750474547.459:6844): avc: denied { map_create } for pid=7054 comm="syz.1.1402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 83.121883][ T29] audit: type=1400 audit(1750474547.459:6845): avc: denied { read } for pid=7054 comm="syz.1.1402" dev="nsfs" ino=4026532395 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 83.143087][ T29] audit: type=1400 audit(1750474547.459:6846): avc: denied { create } for pid=7054 comm="syz.1.1402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 83.197721][ T7073] pim6reg1: entered promiscuous mode [ 83.203142][ T7073] pim6reg1: entered allmulticast mode [ 84.078164][ T7153] validate_nla: 1 callbacks suppressed [ 84.078182][ T7153] netlink: 'syz.2.1450': attribute type 21 has an invalid length. [ 84.108173][ T7153] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1450'. [ 84.206155][ T7161] netlink: 'syz.1.1454': attribute type 27 has an invalid length. [ 84.295430][ T7161] macvtap1: left allmulticast mode [ 84.295478][ T7172] xt_hashlimit: max too large, truncated to 1048576 [ 84.339051][ T7175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7175 comm=syz.4.1459 [ 84.616472][ T7227] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1485'. [ 84.625521][ T7227] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1485'. [ 84.635434][ T7227] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1485'. [ 84.644497][ T7227] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1485'. [ 84.871844][ T7253] netlink: 'syz.6.1496': attribute type 27 has an invalid length. [ 84.912850][ T7253] dummy0: left promiscuous mode [ 84.972034][ T7253] netdevsim netdevsim6 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.981269][ T7253] netdevsim netdevsim6 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.990260][ T7253] netdevsim netdevsim6 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.999245][ T7253] netdevsim netdevsim6 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.013884][ T7253] vlan2: left promiscuous mode [ 85.019910][ T7253] bond3: left promiscuous mode [ 85.025116][ T7253] team1: left promiscuous mode [ 85.029950][ T7253] team1: left allmulticast mode [ 85.035032][ T7253] bridge0: left allmulticast mode [ 85.040391][ T7253] macvtap1: left allmulticast mode [ 85.046247][ T7253] team2: left promiscuous mode [ 85.051440][ T7253] team2: left allmulticast mode [ 85.286585][ T7272] syzkaller0: entered promiscuous mode [ 85.292202][ T7272] syzkaller0: entered allmulticast mode [ 86.145099][ T7322] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1527'. [ 86.574072][ T7358] netlink: 'syz.5.1543': attribute type 10 has an invalid length. [ 86.601020][ T7358] bridge0: port 1(syz_tun) entered disabled state [ 86.621365][ T7358] bridge0: port 1(syz_tun) entered blocking state [ 86.628047][ T7358] bridge0: port 1(syz_tun) entered forwarding state [ 86.641506][ T7358] $Hÿ: (slave bridge0): Enslaving as an active interface with an up link [ 86.675582][ T7358] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1543'. [ 86.712925][ T7358] syz_tun: left allmulticast mode [ 86.718047][ T7358] syz_tun: left promiscuous mode [ 86.723259][ T7358] bridge0: port 1(syz_tun) entered disabled state [ 86.740665][ T7358] $Hÿ: (slave bridge0): Releasing backup interface [ 87.051951][ T7393] netlink: 'syz.1.1559': attribute type 33 has an invalid length. [ 87.062780][ T7393] netlink: 152 bytes leftover after parsing attributes in process `syz.1.1559'. [ 87.907171][ T29] kauditd_printk_skb: 1201 callbacks suppressed [ 87.907199][ T29] audit: type=1400 audit(1750474552.449:8048): avc: denied { create } for pid=7474 comm="syz.5.1605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 87.935568][ T29] audit: type=1400 audit(1750474552.449:8049): avc: denied { read write } for pid=7473 comm="syz.1.1596" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 87.959729][ T29] audit: type=1400 audit(1750474552.459:8050): avc: denied { map_create } for pid=7473 comm="syz.1.1596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 87.979004][ T29] audit: type=1400 audit(1750474552.459:8051): avc: denied { prog_load } for pid=7473 comm="syz.1.1596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 87.998103][ T29] audit: type=1400 audit(1750474552.459:8052): avc: denied { prog_load } for pid=7473 comm="syz.1.1596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 88.017229][ T29] audit: type=1400 audit(1750474552.459:8053): avc: denied { create } for pid=7474 comm="syz.5.1605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 88.038289][ T29] audit: type=1400 audit(1750474552.469:8054): avc: denied { create } for pid=7474 comm="syz.5.1605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 88.061311][ T29] audit: type=1400 audit(1750474552.469:8055): avc: denied { create } for pid=7474 comm="syz.5.1605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 88.081894][ T29] audit: type=1400 audit(1750474552.509:8056): avc: denied { read write } for pid=3848 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 88.169014][ T29] audit: type=1400 audit(1750474552.699:8057): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 88.241333][ T7483] __nla_validate_parse: 2 callbacks suppressed [ 88.241352][ T7483] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1598'. [ 88.319080][ T7494] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1603'. [ 88.404192][ T7508] xt_TPROXY: Can be used only with -p tcp or -p udp [ 88.428608][ T7512] netlink: 'syz.6.1614': attribute type 33 has an invalid length. [ 88.436531][ T7512] netlink: 152 bytes leftover after parsing attributes in process `syz.6.1614'. [ 88.448126][ T7512] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1614'. [ 88.579266][ T7525] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1619'. [ 88.588322][ T7525] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1619'. [ 88.616937][ T7525] netdevsim netdevsim6 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 88.625829][ T7525] netdevsim netdevsim6 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 88.634598][ T7525] netdevsim netdevsim6 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 88.643348][ T7525] netdevsim netdevsim6 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 88.709733][ T7537] pim6reg1: entered promiscuous mode [ 88.715741][ T7537] pim6reg1: entered allmulticast mode [ 89.740436][ T7615] veth1_macvtap: left promiscuous mode [ 89.746010][ T7615] macsec0: entered allmulticast mode [ 90.788655][ T7690] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1691'. [ 90.857803][ T7695] syzkaller0: entered promiscuous mode [ 90.863434][ T7695] syzkaller0: entered allmulticast mode [ 91.188202][ T7720] sch_tbf: burst 4398 is lower than device lo mtu (11337746) ! [ 91.197296][ T7720] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1705'. [ 91.234224][ T7728] netlink: 32 bytes leftover after parsing attributes in process `syz.2.1706'. [ 91.255051][ T7728] netlink: 32 bytes leftover after parsing attributes in process `syz.2.1706'. [ 91.934654][ T7769] ALSA: seq fatal error: cannot create timer (-19) [ 92.302269][ T7794] netlink: 'syz.5.1735': attribute type 10 has an invalid length. [ 92.313064][ T7794] batman_adv: batadv0: Adding interface: team0 [ 92.319368][ T7794] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 92.344700][ T7794] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 92.603837][ T7816] netlink: 'syz.5.1746': attribute type 4 has an invalid length. [ 92.654745][ T7823] netlink: 'syz.5.1746': attribute type 4 has an invalid length. [ 92.850889][ T7834] netlink: 'syz.5.1765': attribute type 4 has an invalid length. [ 92.865348][ T7834] netlink: 'syz.5.1765': attribute type 4 has an invalid length. [ 92.921443][ T29] kauditd_printk_skb: 940 callbacks suppressed [ 92.921658][ T29] audit: type=1400 audit(1750474557.459:8998): avc: denied { read write } for pid=7844 comm="syz.1.1758" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 92.954884][ T29] audit: type=1400 audit(1750474557.459:8999): avc: denied { map_create } for pid=7844 comm="syz.1.1758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 92.974227][ T29] audit: type=1400 audit(1750474557.459:9000): avc: denied { prog_load } for pid=7844 comm="syz.1.1758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 92.993502][ T29] audit: type=1400 audit(1750474557.459:9001): avc: denied { prog_load } for pid=7844 comm="syz.1.1758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 93.012681][ T29] audit: type=1400 audit(1750474557.459:9002): avc: denied { prog_load } for pid=7844 comm="syz.1.1758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 93.032293][ T29] audit: type=1400 audit(1750474557.509:9003): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.056764][ T29] audit: type=1400 audit(1750474557.519:9004): avc: denied { map_create } for pid=7846 comm="syz.2.1759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 93.076174][ T29] audit: type=1400 audit(1750474557.529:9005): avc: denied { prog_load } for pid=7846 comm="syz.2.1759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 93.095659][ T29] audit: type=1400 audit(1750474557.569:9006): avc: denied { read write } for pid=3304 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.120353][ T29] audit: type=1400 audit(1750474557.569:9007): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.148630][ T7856] ALSA: seq fatal error: cannot create timer (-19) [ 93.469783][ T7891] xt_TPROXY: Can be used only with -p tcp or -p udp [ 93.691067][ T7917] syzkaller0: entered promiscuous mode [ 93.696623][ T7917] syzkaller0: entered allmulticast mode [ 93.744065][ T7919] bond0: (slave dummy0): Releasing backup interface [ 93.753310][ T7919] batman_adv: batadv0: Adding interface: dummy0 [ 93.759701][ T7919] batman_adv: batadv0: The MTU of interface dummy0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 93.785030][ T7919] batman_adv: batadv0: Not using interface dummy0 (retrying later): interface not active [ 93.932420][ T7940] netlink: 'syz.2.1803': attribute type 3 has an invalid length. [ 93.942830][ T7940] netlink: 'syz.2.1803': attribute type 3 has an invalid length. [ 94.202340][ T7973] __nla_validate_parse: 3 callbacks suppressed [ 94.202362][ T7973] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1817'. [ 94.297974][ T7985] netlink: 52 bytes leftover after parsing attributes in process `syz.6.1822'. [ 94.609787][ T8038] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1847'. [ 95.034124][ T8073] batman_adv: batadv0: Removing interface: team0 [ 95.042669][ T8073] bond0: (slave gretap1): Releasing backup interface [ 95.052727][ T8073] gretap1: left allmulticast mode [ 95.263674][ T8090] bridge: RTM_NEWNEIGH with invalid ether address [ 95.418905][ T8103] netlink: 136 bytes leftover after parsing attributes in process `syz.2.1877'. [ 95.428102][ T8103] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 95.443735][ T8101] macsec0: entered promiscuous mode [ 95.622695][ T8109] syzkaller0: entered promiscuous mode [ 95.628426][ T8109] syzkaller0: entered allmulticast mode [ 96.004865][ T8158] syz.2.1903 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 96.492375][ T8179] A link change request failed with some changes committed already. Interface veth1_to_bond may have been left with an inconsistent configuration, please check. [ 96.913275][ T8198] syzkaller0: entered promiscuous mode [ 96.919189][ T8198] syzkaller0: entered allmulticast mode [ 97.274572][ T8215] netlink: 16255 bytes leftover after parsing attributes in process `syz.5.1925'. [ 97.930182][ T29] kauditd_printk_skb: 1060 callbacks suppressed [ 97.930201][ T29] audit: type=1400 audit(1750474562.459:10068): avc: denied { mounton } for pid=8262 comm="syz.1.1948" path="/372/file0" dev="tmpfs" ino=1963 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 97.990811][ T29] audit: type=1400 audit(1750474562.469:10069): avc: denied { map_create } for pid=8265 comm="syz.2.1950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.010137][ T29] audit: type=1400 audit(1750474562.469:10070): avc: denied { prog_load } for pid=8265 comm="syz.2.1950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.031801][ T29] audit: type=1400 audit(1750474562.469:10071): avc: denied { open } for pid=8265 comm="syz.2.1950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 98.051183][ T29] audit: type=1400 audit(1750474562.469:10072): avc: denied { prog_load } for pid=8265 comm="syz.2.1950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.056799][ T8273] syzkaller0: entered promiscuous mode [ 98.073366][ T29] audit: type=1400 audit(1750474562.469:10073): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.075897][ T8273] syzkaller0: entered allmulticast mode [ 98.108679][ T29] audit: type=1400 audit(1750474562.509:10074): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.136018][ T29] audit: type=1400 audit(1750474562.509:10075): avc: denied { prog_load } for pid=8264 comm="syz.5.1949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.155303][ T29] audit: type=1400 audit(1750474562.509:10076): avc: denied { map_create } for pid=8264 comm="syz.5.1949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.177451][ T29] audit: type=1400 audit(1750474562.509:10077): avc: denied { prog_load } for pid=8264 comm="syz.5.1949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.322207][ T8370] netlink: 'syz.5.1995': attribute type 39 has an invalid length. [ 99.854879][ T8420] netlink: 'syz.4.2015': attribute type 4 has an invalid length. [ 99.918802][ T8425] netlink: 5 bytes leftover after parsing attributes in process `syz.6.2022'. [ 100.016918][ T8441] netlink: 'syz.6.2030': attribute type 10 has an invalid length. [ 100.029330][ T8441] team0: Port device dummy0 added [ 100.035104][ T8441] netlink: 'syz.6.2030': attribute type 10 has an invalid length. [ 100.061160][ T8441] team0: Port device dummy0 removed [ 100.069104][ T8441] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 100.602773][ T8494] syzkaller0: entered promiscuous mode [ 100.608618][ T8494] syzkaller0: entered allmulticast mode [ 100.779751][ T8510] syzkaller0: entered promiscuous mode [ 100.785313][ T8510] syzkaller0: entered allmulticast mode [ 101.026112][ T8526] netlink: 92 bytes leftover after parsing attributes in process `syz.5.2066'. [ 101.418831][ T8551] A link change request failed with some changes committed already. Interface veth1_to_bond may have been left with an inconsistent configuration, please check. [ 101.821548][ T8575] netlink: 'syz.6.2087': attribute type 4 has an invalid length. [ 101.858779][ T8575] netlink: 'syz.6.2087': attribute type 4 has an invalid length. [ 101.963100][ T8585] netlink: 'syz.1.2091': attribute type 39 has an invalid length. [ 101.974661][ T8585] syz_tun (unregistering): left allmulticast mode [ 101.982600][ T8585] syz_tun (unregistering): left promiscuous mode [ 101.989785][ T8585] bridge0: port 3(syz_tun) entered disabled state [ 102.019767][ T8589] netlink: 16402 bytes leftover after parsing attributes in process `syz.6.2092'. [ 102.033587][ T8583] netlink: 16402 bytes leftover after parsing attributes in process `syz.6.2092'. [ 102.076027][ T8593] netlink: 'syz.6.2095': attribute type 1 has an invalid length. [ 102.142056][ T8596] netlink: 8 bytes leftover after parsing attributes in process `syz.6.2095'. [ 102.156254][ T8601] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2107'. [ 102.183707][ T8601] 8021q: adding VLAN 0 to HW filter on device bond2 [ 102.196291][ T8596] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 102.206837][ T8596] bond4: (slave batadv0): Enslaving as a backup interface with an up link [ 102.224368][ T8601] vlan0: entered allmulticast mode [ 102.229623][ T8601] bond2: entered allmulticast mode [ 102.259981][ T8593] bond4 (unregistering): (slave batadv0): Releasing backup interface [ 102.269054][ T8593] bond4 (unregistering): Released all slaves [ 102.579713][ T8625] syzkaller0: entered promiscuous mode [ 102.585274][ T8625] syzkaller0: entered allmulticast mode [ 102.690603][ T8645] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2115'. [ 102.701066][ T8645] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2115'. [ 102.947821][ T29] kauditd_printk_skb: 1077 callbacks suppressed [ 102.947835][ T29] audit: type=1400 audit(1750474567.479:11092): avc: denied { create } for pid=8673 comm="syz.4.2130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 103.008947][ T29] audit: type=1400 audit(1750474567.519:11093): avc: denied { map_create } for pid=8673 comm="syz.4.2130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.029648][ T29] audit: type=1400 audit(1750474567.519:11094): avc: denied { prog_load } for pid=8673 comm="syz.4.2130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.049648][ T29] audit: type=1400 audit(1750474567.519:11095): avc: denied { remount } for pid=8673 comm="syz.4.2130" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 103.070846][ T29] audit: type=1400 audit(1750474567.519:11096): avc: denied { read write } for pid=8673 comm="syz.4.2130" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.095760][ T29] audit: type=1400 audit(1750474567.529:11097): avc: denied { read write } for pid=3891 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.122155][ T29] audit: type=1400 audit(1750474567.539:11098): avc: denied { read write } for pid=3304 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.146459][ T29] audit: type=1400 audit(1750474567.539:11099): avc: denied { prog_load } for pid=8675 comm="syz.6.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.167706][ T29] audit: type=1400 audit(1750474567.549:11100): avc: denied { prog_load } for pid=8675 comm="syz.6.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.186962][ T29] audit: type=1400 audit(1750474567.549:11101): avc: denied { read } for pid=8675 comm="syz.6.2131" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=0 [ 103.859639][ T8728] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2153'. [ 103.913794][ T8732] netlink: 'syz.1.2164': attribute type 4 has an invalid length. [ 103.933239][ T8732] netlink: 'syz.1.2164': attribute type 4 has an invalid length. [ 104.120619][ T8763] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2169'. [ 104.488009][ T8792] ÿÿÿÿÿÿ: renamed from vlan1 [ 104.673858][ T8807] serio: Serial port ttyS3 [ 105.450480][ T8852] pim6reg1: entered promiscuous mode [ 105.455865][ T8852] pim6reg1: entered allmulticast mode [ 105.586864][ T8860] validate_nla: 2 callbacks suppressed [ 105.586882][ T8860] netlink: 'syz.1.2212': attribute type 4 has an invalid length. [ 105.640397][ T8860] netlink: 'syz.1.2212': attribute type 4 has an invalid length. [ 105.687600][ T8868] netlink: 24 bytes leftover after parsing attributes in process `syz.5.2216'. [ 105.943246][ T8887] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=8887 comm=syz.1.2224 [ 106.202451][ T8893] netlink: 'syz.2.2226': attribute type 1 has an invalid length. [ 106.210459][ T8893] netlink: 'syz.2.2226': attribute type 4 has an invalid length. [ 106.218226][ T8893] netlink: 9462 bytes leftover after parsing attributes in process `syz.2.2226'. [ 106.337771][ T8893] netlink: 'syz.2.2226': attribute type 1 has an invalid length. [ 106.345585][ T8893] netlink: 'syz.2.2226': attribute type 4 has an invalid length. [ 106.353363][ T8893] netlink: 9462 bytes leftover after parsing attributes in process `syz.2.2226'. [ 107.277109][ T8928] xt_CT: You must specify a L4 protocol and not use inversions on it [ 107.839425][ T8965] netlink: 'syz.2.2255': attribute type 1 has an invalid length. [ 107.884165][ T8965] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2255'. [ 107.919822][ T8965] 8021q: adding VLAN 0 to HW filter on device batadv2 [ 107.935915][ T8965] bond3: (slave batadv2): Enslaving as a backup interface with an up link [ 107.965150][ T8972] bond3 (unregistering): (slave batadv2): Releasing backup interface [ 107.981736][ T8972] bond3 (unregistering): Released all slaves [ 108.002430][ T29] kauditd_printk_skb: 716 callbacks suppressed [ 108.002447][ T29] audit: type=1400 audit(1750474572.539:11818): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 108.059634][ T29] audit: type=1400 audit(1750474572.579:11819): avc: denied { open } for pid=8973 comm="syz.1.2259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 108.079073][ T29] audit: type=1400 audit(1750474572.579:11820): avc: denied { prog_load } for pid=8974 comm="syz.5.2269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 108.098760][ T29] audit: type=1400 audit(1750474572.579:11821): avc: denied { map_create } for pid=8973 comm="syz.1.2259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 108.113622][ T8982] netlink: 96 bytes leftover after parsing attributes in process `syz.5.2260'. [ 108.118188][ T29] audit: type=1400 audit(1750474572.579:11822): avc: denied { prog_load } for pid=8973 comm="syz.1.2259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 108.118220][ T29] audit: type=1400 audit(1750474572.579:11823): avc: denied { prog_load } for pid=8973 comm="syz.1.2259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 108.118244][ T29] audit: type=1400 audit(1750474572.579:11824): avc: denied { create } for pid=8974 comm="syz.5.2269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 108.118315][ T29] audit: type=1400 audit(1750474572.579:11825): avc: denied { create } for pid=8974 comm="syz.5.2269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 108.118343][ T29] audit: type=1400 audit(1750474572.579:11826): avc: denied { create } for pid=8974 comm="syz.5.2269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 108.118371][ T29] audit: type=1400 audit(1750474572.579:11827): avc: denied { create } for pid=8974 comm="syz.5.2269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 108.904788][ T9015] netlink: 'syz.6.2276': attribute type 4 has an invalid length. [ 108.915999][ T9015] netlink: 'syz.6.2276': attribute type 4 has an invalid length. [ 109.472788][ T5303] IPVS: starting estimator thread 0... [ 109.577153][ T9058] IPVS: using max 2304 ests per chain, 115200 per kthread [ 109.676013][ T9071] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2301'. [ 110.196157][ T9097] syzkaller0: entered promiscuous mode [ 110.202425][ T9097] syzkaller0: entered allmulticast mode [ 110.500737][ T9125] netlink: 16 bytes leftover after parsing attributes in process `syz.2.2323'. [ 110.547271][ T9129] netlink: 'syz.4.2325': attribute type 10 has an invalid length. [ 110.574916][ T9129] dummy0: left promiscuous mode [ 110.600217][ T9129] team0: Port device dummy0 added [ 110.626073][ T9129] netlink: 'syz.4.2325': attribute type 10 has an invalid length. [ 110.638358][ T9129] team0: Port device dummy0 removed [ 110.640458][ T9129] dummy0: entered promiscuous mode [ 110.640657][ T9129] $Hÿ: (slave dummy0): Enslaving as an active interface with an up link [ 110.853162][ T9151] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 110.860037][ T9151] syzkaller0: entered promiscuous mode [ 110.860059][ T9151] syzkaller0: entered allmulticast mode [ 111.031000][ T9168] netlink: 96 bytes leftover after parsing attributes in process `syz.2.2341'. [ 111.080667][ T9171] netlink: 'syz.4.2342': attribute type 4 has an invalid length. [ 111.090777][ T9171] netlink: 'syz.4.2342': attribute type 4 has an invalid length. [ 111.150346][ T9181] netlink: 'syz.4.2347': attribute type 1 has an invalid length. [ 111.195486][ T9181] 8021q: adding VLAN 0 to HW filter on device bond2 [ 111.216256][ T2958] IPVS: starting estimator thread 0... [ 111.245412][ T9190] veth7: entered promiscuous mode [ 111.258280][ T9190] bond2: (slave veth7): Enslaving as an active interface with a down link [ 111.291283][ T9181] vlan3: entered allmulticast mode [ 111.296483][ T9181] bond2: entered allmulticast mode [ 111.305271][ T9181] bond2: (slave vlan3): the slave hw address is in use by the bond; couldn't find a slave with a free hw address to give it (this should not have happened) [ 111.321152][ T9189] IPVS: using max 2352 ests per chain, 117600 per kthread [ 111.386231][ T9201] netlink: '+}[@': attribute type 13 has an invalid length. [ 111.483834][ T9201] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 111.493606][ T9201] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 111.503625][ T9201] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 111.512540][ T9201] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 111.850512][ T9221] netlink: 'syz.6.2364': attribute type 16 has an invalid length. [ 111.858520][ T9221] netlink: 'syz.6.2364': attribute type 17 has an invalid length. [ 112.022785][ T5302] IPVS: starting estimator thread 0... [ 112.051825][ T9237] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2372'. [ 112.117830][ T9235] IPVS: using max 1872 ests per chain, 93600 per kthread [ 112.153922][ T9252] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2378'. [ 112.642703][ T9278] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 113.096667][ T29] kauditd_printk_skb: 775 callbacks suppressed [ 113.096684][ T29] audit: type=1400 audit(1750474577.629:12603): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 113.127448][ T29] audit: type=1400 audit(1750474577.639:12604): avc: denied { prog_load } for pid=9289 comm="syz.1.2391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 113.146633][ T29] audit: type=1400 audit(1750474577.639:12605): avc: denied { map_create } for pid=9289 comm="syz.1.2391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 113.165952][ T29] audit: type=1400 audit(1750474577.639:12606): avc: denied { prog_load } for pid=9289 comm="syz.1.2391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 113.185174][ T29] audit: type=1400 audit(1750474577.649:12607): avc: denied { prog_load } for pid=9289 comm="syz.1.2391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 113.204441][ T29] audit: type=1400 audit(1750474577.649:12608): avc: denied { prog_load } for pid=9289 comm="syz.1.2391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 113.259921][ T29] audit: type=1400 audit(1750474577.769:12609): avc: denied { map_create } for pid=9284 comm="syz.6.2393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 113.280671][ T29] audit: type=1400 audit(1750474577.769:12610): avc: denied { prog_load } for pid=9284 comm="syz.6.2393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 113.300556][ T29] audit: type=1400 audit(1750474577.769:12611): avc: denied { lock } for pid=9284 comm="syz.6.2393" path="socket:[23166]" dev="sockfs" ino=23166 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=0 [ 113.325766][ T29] audit: type=1400 audit(1750474577.799:12612): avc: denied { prog_load } for pid=9282 comm="syz.5.2392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 113.642517][ T9308] xt_CT: You must specify a L4 protocol and not use inversions on it [ 113.651621][ T9306] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2400'. [ 113.750231][ T9319] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2407'. [ 113.888768][ T5303] IPVS: starting estimator thread 0... [ 113.977075][ T9320] IPVS: using max 1824 ests per chain, 91200 per kthread [ 114.107779][ T9324] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2409'. [ 114.780819][ T9347] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2417'. [ 114.789851][ T9347] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2417'. [ 114.884638][ T9353] bridge0: entered allmulticast mode [ 114.938743][ T9358] netlink: 'syz.1.2423': attribute type 1 has an invalid length. [ 114.986001][ T9358] 8021q: adding VLAN 0 to HW filter on device bond3 [ 115.084301][ T9358] veth5: entered promiscuous mode [ 115.098673][ T9358] bond3: (slave veth5): Enslaving as an active interface with a down link [ 115.146975][ T9358] vlan0: entered allmulticast mode [ 115.153602][ T9358] bond3: entered allmulticast mode [ 115.156250][ T9358] bond3: (slave vlan0): the slave hw address is in use by the bond; couldn't find a slave with a free hw address to give it (this should not have happened) [ 115.179317][ T9369] netlink: 'syz.4.2428': attribute type 10 has an invalid length. [ 115.187273][ T9369] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2428'. [ 115.208367][ T9369] batadv0: entered promiscuous mode [ 115.213674][ T9369] batadv0: entered allmulticast mode [ 115.222006][ T9369] bridge0: port 1(batadv0) entered blocking state [ 115.228627][ T9369] bridge0: port 1(batadv0) entered disabled state [ 115.245786][ T9369] bridge0: port 1(batadv0) entered blocking state [ 115.252446][ T9369] bridge0: port 1(batadv0) entered forwarding state [ 115.632600][ T9415] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2449'. [ 115.727406][ T4270] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 115.736705][ T4270] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 115.906721][ T9435] netlink: 'syz.2.2457': attribute type 1 has an invalid length. [ 115.935602][ T9435] 8021q: adding VLAN 0 to HW filter on device bond4 [ 115.944517][ T9435] bond3: (slave bond4): making interface the new active one [ 115.953176][ T9435] bond3: (slave bond4): Enslaving as an active interface with an up link [ 116.026178][ T9445] 8021q: adding VLAN 0 to HW filter on device bond3 [ 116.576976][ T9482] netlink: 'syz.2.2476': attribute type 10 has an invalid length. [ 116.584988][ T9482] __nla_validate_parse: 1 callbacks suppressed [ 116.585005][ T9482] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2476'. [ 116.601573][ T9484] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=9484 comm=syz.4.2478 [ 116.609241][ T9482] batadv0: entered promiscuous mode [ 116.619547][ T9482] batadv0: entered allmulticast mode [ 116.624953][ T9482] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 116.814783][ T9510] netlink: 'syz.5.2490': attribute type 6 has an invalid length. [ 116.839440][ T9514] netlink: 'syz.1.2491': attribute type 10 has an invalid length. [ 116.848008][ T9514] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2491'. [ 116.858256][ T9513] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2492'. [ 116.874852][ T9514] batadv0: entered promiscuous mode [ 116.880918][ T9514] batadv0: entered allmulticast mode [ 116.886561][ T9514] bridge0: port 3(batadv0) entered blocking state [ 116.894528][ T9514] bridge0: port 3(batadv0) entered disabled state [ 117.257156][ T3334] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 117.266436][ T3334] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 118.022130][ T9592] netlink: 'syz.2.2527': attribute type 4 has an invalid length. [ 118.033919][ T9592] netlink: 'syz.2.2527': attribute type 4 has an invalid length. [ 118.097354][ T29] kauditd_printk_skb: 854 callbacks suppressed [ 118.097372][ T29] audit: type=1400 audit(1750474582.629:13467): avc: denied { create } for pid=9598 comm="syz.2.2530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 118.131379][ T29] audit: type=1400 audit(1750474582.669:13468): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 118.182170][ T29] audit: type=1400 audit(1750474582.699:13469): avc: denied { read write } for pid=3304 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 118.208677][ T29] audit: type=1400 audit(1750474582.699:13470): avc: denied { read write } for pid=3848 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 118.233027][ T29] audit: type=1400 audit(1750474582.699:13471): avc: denied { map_create } for pid=9600 comm="syz.2.2531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 118.254311][ T29] audit: type=1400 audit(1750474582.709:13472): avc: denied { prog_load } for pid=9600 comm="syz.2.2531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 118.273630][ T29] audit: type=1400 audit(1750474582.709:13473): avc: denied { prog_load } for pid=9600 comm="syz.2.2531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 118.294829][ T29] audit: type=1400 audit(1750474582.709:13474): avc: denied { map_create } for pid=9600 comm="syz.2.2531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 118.314639][ T29] audit: type=1400 audit(1750474582.709:13475): avc: denied { prog_load } for pid=9600 comm="syz.2.2531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 118.336007][ T29] audit: type=1400 audit(1750474582.709:13476): avc: denied { prog_load } for pid=9600 comm="syz.2.2531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 118.791264][ T9621] netlink: 'syz.2.2539': attribute type 1 has an invalid length. [ 118.816571][ T9621] veth7: entered promiscuous mode [ 118.823308][ T9621] bond5: (slave veth7): Enslaving as a backup interface with a down link [ 118.875624][ T9628] netlink: 'syz.6.2540': attribute type 10 has an invalid length. [ 118.883564][ T9628] netlink: 40 bytes leftover after parsing attributes in process `syz.6.2540'. [ 118.922026][ T9628] A link change request failed with some changes committed already. Interface geneve1 may have been left with an inconsistent configuration, please check. [ 119.480747][ T9664] netlink: 14 bytes leftover after parsing attributes in process `syz.1.2556'. [ 119.505522][ T9664] hsr_slave_0: left promiscuous mode [ 119.513307][ T9664] hsr_slave_1: left promiscuous mode [ 119.541761][ T9672] xt_CT: You must specify a L4 protocol and not use inversions on it [ 119.577385][ T9674] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2560'. [ 119.617162][ T9674] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2560'. [ 119.800023][ T9694] syzkaller0: entered promiscuous mode [ 119.805650][ T9694] syzkaller0: entered allmulticast mode [ 119.954941][ T9711] netlink: 'syz.1.2577': attribute type 1 has an invalid length. [ 119.980449][ T9711] bond4: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 119.999850][ T9711] veth7: entered promiscuous mode [ 120.006395][ T9711] bond4: (slave veth7): Enslaving as a backup interface with a down link [ 120.027621][ T9714] xt_CT: You must specify a L4 protocol and not use inversions on it [ 120.063211][ T9718] netlink: 'syz.4.2580': attribute type 4 has an invalid length. [ 120.088282][ T9720] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2581'. [ 120.171212][ T9733] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2587'. [ 120.180292][ T9733] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2587'. [ 120.504684][ T9752] syzkaller0: entered promiscuous mode [ 120.510264][ T9752] syzkaller0: entered allmulticast mode [ 120.601079][ T9759] hsr_slave_0: left promiscuous mode [ 120.733062][ T9765] GUP no longer grows the stack in syz.1.2601 (9765): 200000004000-200000008000 (200000002000) [ 120.743590][ T9765] CPU: 1 UID: 0 PID: 9765 Comm: syz.1.2601 Not tainted 6.16.0-rc2-syzkaller-00269-g11313e2f7812 #0 PREEMPT(voluntary) [ 120.743620][ T9765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 120.743635][ T9765] Call Trace: [ 120.743642][ T9765] [ 120.743652][ T9765] __dump_stack+0x1d/0x30 [ 120.743680][ T9765] dump_stack_lvl+0xe8/0x140 [ 120.743726][ T9765] dump_stack+0x15/0x1b [ 120.743744][ T9765] __get_user_pages+0x199d/0x1fb0 [ 120.743771][ T9765] ? __rcu_read_unlock+0x4f/0x70 [ 120.743797][ T9765] get_user_pages_remote+0x1dc/0x7a0 [ 120.743849][ T9765] __access_remote_vm+0x156/0x560 [ 120.743875][ T9765] access_remote_vm+0x32/0x40 [ 120.743897][ T9765] proc_pid_cmdline_read+0x30f/0x6a0 [ 120.743979][ T9765] ? __pfx_proc_pid_cmdline_read+0x10/0x10 [ 120.744089][ T9765] vfs_readv+0x3fb/0x690 [ 120.744120][ T9765] __x64_sys_preadv+0xfd/0x1c0 [ 120.744159][ T9765] x64_sys_call+0x1503/0x2fb0 [ 120.744179][ T9765] do_syscall_64+0xd2/0x200 [ 120.744196][ T9765] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 120.744225][ T9765] ? clear_bhb_loop+0x40/0x90 [ 120.744278][ T9765] ? clear_bhb_loop+0x40/0x90 [ 120.744306][ T9765] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 120.744333][ T9765] RIP: 0033:0x7fda87e0e929 [ 120.744348][ T9765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 120.744365][ T9765] RSP: 002b:00007fda86477038 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 120.744445][ T9765] RAX: ffffffffffffffda RBX: 00007fda88035fa0 RCX: 00007fda87e0e929 [ 120.744461][ T9765] RDX: 0000000000000001 RSI: 0000200000000d00 RDI: 0000000000000006 [ 120.744477][ T9765] RBP: 00007fda87e90b39 R08: 0000000000000200 R09: 0000000000000000 [ 120.744492][ T9765] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000 [ 120.744527][ T9765] R13: 0000000000000000 R14: 00007fda88035fa0 R15: 00007ffdee306488 [ 120.744570][ T9765] [ 121.385122][ T9807] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 121.670955][ T9835] validate_nla: 5 callbacks suppressed [ 121.670971][ T9835] netlink: 'syz.5.2632': attribute type 10 has an invalid length. [ 121.685508][ T9835] team0: Port device dummy0 added [ 121.692684][ T9835] netlink: 'syz.5.2632': attribute type 10 has an invalid length. [ 121.702514][ T9835] team0: Port device dummy0 removed [ 121.710347][ T9835] $Hÿ: (slave dummy0): Enslaving as an active interface with an up link [ 122.098907][ T9845] netlink: 'syz.6.2639': attribute type 4 has an invalid length. [ 122.111180][ T9845] netlink: 'syz.6.2639': attribute type 4 has an invalid length. [ 122.185428][ T9861] __nla_validate_parse: 4 callbacks suppressed [ 122.185441][ T9861] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2645'. [ 122.339968][ T9881] netlink: 24 bytes leftover after parsing attributes in process `syz.6.2655'. [ 122.381160][ T9885] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2657'. [ 122.405787][ T9887] netlink: 'syz.2.2658': attribute type 1 has an invalid length. [ 122.424001][ T9887] 8021q: adding VLAN 0 to HW filter on device bond6 [ 122.440456][ T9887] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2658'. [ 122.445763][ T9885] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2657'. [ 122.452416][ T9887] ipvlan0: entered promiscuous mode [ 122.463818][ T9887] 8021q: adding VLAN 0 to HW filter on device ipvlan0 [ 122.472050][ T9887] bond6: (slave ipvlan0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 122.579858][ T9893] netlink: 14 bytes leftover after parsing attributes in process `syz.2.2659'. [ 122.589814][ T9893] hsr_slave_0: left promiscuous mode [ 122.595611][ T9893] hsr_slave_1: left promiscuous mode [ 122.622348][ T9896] netlink: 763 bytes leftover after parsing attributes in process `syz.1.2661'. [ 122.632223][ T9896] bridge0: port 4(bond0) entered blocking state [ 122.638582][ T9896] bridge0: port 4(bond0) entered disabled state [ 122.650194][ T9896] bond0: entered allmulticast mode [ 122.655545][ T9896] @ÿ: entered allmulticast mode [ 122.660654][ T9896] bond_slave_1: entered allmulticast mode [ 122.668270][ T9896] dummy0: entered allmulticast mode [ 122.674335][ T9896] bond0: entered promiscuous mode [ 122.681459][ T9896] @ÿ: entered promiscuous mode [ 122.686611][ T9896] bond_slave_1: entered promiscuous mode [ 122.694267][ T9896] dummy0: entered promiscuous mode [ 122.702945][ T9908] netlink: 'syz.2.2665': attribute type 10 has an invalid length. [ 122.711272][ T9908] batman_adv: batadv0: Removing interface: dummy0 [ 122.730308][ T9908] netlink: 'syz.2.2665': attribute type 10 has an invalid length. [ 122.739464][ T9904] bond0: left allmulticast mode [ 122.744380][ T9904] @ÿ: left allmulticast mode [ 122.749240][ T9904] bond_slave_1: left allmulticast mode [ 122.758295][ T9904] dummy0: left allmulticast mode [ 122.763336][ T9904] bond0: left promiscuous mode [ 122.770301][ T9904] @ÿ: left promiscuous mode [ 122.775152][ T9904] bond_slave_1: left promiscuous mode [ 122.782363][ T9904] dummy0: left promiscuous mode [ 122.787505][ T9904] bridge0: port 4(bond0) entered disabled state [ 122.796773][ T9908] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 123.155308][ T29] kauditd_printk_skb: 1044 callbacks suppressed [ 123.155327][ T29] audit: type=1400 audit(1750474587.689:14521): avc: denied { read write } for pid=3848 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 123.190370][ T29] audit: type=1400 audit(1750474587.729:14522): avc: denied { prog_load } for pid=9944 comm="syz.5.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 123.211547][ T29] audit: type=1400 audit(1750474587.729:14523): avc: denied { create } for pid=9944 comm="syz.5.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 123.231541][ T29] audit: type=1400 audit(1750474587.729:14524): avc: denied { read } for pid=9944 comm="syz.5.2682" dev="nsfs" ino=4026532380 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 123.253027][ T29] audit: type=1400 audit(1750474587.729:14525): avc: denied { read } for pid=9944 comm="syz.5.2682" dev="nsfs" ino=4026532380 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 123.274289][ T29] audit: type=1400 audit(1750474587.729:14526): avc: denied { prog_load } for pid=9944 comm="syz.5.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 123.293554][ T29] audit: type=1400 audit(1750474587.729:14527): avc: denied { create } for pid=9944 comm="syz.5.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 123.313836][ T29] audit: type=1400 audit(1750474587.729:14528): avc: denied { create } for pid=9944 comm="syz.5.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 123.334203][ T29] audit: type=1400 audit(1750474587.729:14529): avc: denied { create } for pid=9944 comm="syz.5.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 123.354945][ T29] audit: type=1400 audit(1750474587.739:14530): avc: denied { read write } for pid=3848 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 123.406192][ T9950] netlink: 'syz.6.2684': attribute type 10 has an invalid length. [ 123.416745][ T9950] bond0: (slave dummy0): Releasing backup interface [ 123.428962][ T9950] netlink: 'syz.6.2684': attribute type 10 has an invalid length. [ 123.440937][ T9950] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 123.522334][ T9958] pim6reg1: entered promiscuous mode [ 123.528393][ T9958] pim6reg1: entered allmulticast mode [ 124.150003][ T9982] bridge0: entered allmulticast mode [ 124.170389][ T9982] bridge0: port 3(batadv0) entered disabled state [ 124.188357][ T9982] bridge_slave_1: left allmulticast mode [ 124.194144][ T9982] bridge_slave_1: left promiscuous mode [ 124.199952][ T9982] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.220369][ T9982] bridge_slave_0: left allmulticast mode [ 124.226144][ T9982] bridge_slave_0: left promiscuous mode [ 124.231923][ T9982] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.409891][T10009] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2710'. [ 124.810452][T10029] bridge: RTM_NEWNEIGH with invalid ether address [ 124.886583][T10039] netlink: 24 bytes leftover after parsing attributes in process `syz.2.2725'. [ 125.024251][T10041] xt_recent: hitcount (4294967295) is larger than allowed maximum (65535) [ 125.331962][T10043] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2728'. [ 125.444111][T10050] bridge: RTM_NEWNEIGH with invalid ether address [ 125.495330][T10054] pim6reg1: entered promiscuous mode [ 125.500949][T10054] pim6reg1: entered allmulticast mode [ 126.085939][T10085] bridge0: port 1(batadv0) entered disabled state [ 126.106769][T10085] bridge0: entered allmulticast mode [ 126.123141][T10085] bridge0: port 1(batadv0) entered disabled state [ 126.294691][T10103] $Hÿ: (slave dummy0): Releasing backup interface [ 126.310405][T10103] dummy0: left promiscuous mode [ 126.410495][T10106] netlink: 'syz.6.2753': attribute type 4 has an invalid length. [ 126.420207][T10103] bond2: (slave veth7): Releasing active interface [ 126.753963][T10139] validate_nla: 1 callbacks suppressed [ 126.753981][T10139] netlink: 'syz.5.2771': attribute type 4 has an invalid length. [ 126.772420][T10139] netlink: 'syz.5.2771': attribute type 4 has an invalid length. [ 128.160714][ T29] kauditd_printk_skb: 1178 callbacks suppressed [ 128.160732][ T29] audit: type=1400 audit(1750474592.699:15709): avc: denied { read write } for pid=3848 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 128.160862][T10237] sch_tbf: burst 32855 is lower than device lo mtu (11337746) ! [ 128.196044][ T29] audit: type=1400 audit(1750474592.729:15710): avc: denied { read write } for pid=10230 comm="syz.2.2814" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 128.281611][ T29] audit: type=1400 audit(1750474592.739:15711): avc: denied { prog_load } for pid=10238 comm="syz.5.2817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 128.302345][ T29] audit: type=1400 audit(1750474592.739:15712): avc: denied { map_create } for pid=10238 comm="syz.5.2817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 128.322465][ T29] audit: type=1400 audit(1750474592.739:15713): avc: denied { prog_load } for pid=10238 comm="syz.5.2817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 128.343238][ T29] audit: type=1400 audit(1750474592.739:15714): avc: denied { prog_load } for pid=10238 comm="syz.5.2817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 128.352715][T10247] audit: audit_backlog=65 > audit_backlog_limit=64 [ 128.363428][ T29] audit: type=1326 audit(1750474592.739:15715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10238 comm="syz.5.2817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2fa1dce929 code=0x7ffc0000 [ 128.369145][T10247] audit: audit_lost=22 audit_rate_limit=0 audit_backlog_limit=64 [ 128.369160][T10247] audit: backlog limit exceeded [ 128.581856][T10275] (unnamed net_device) (uninitialized): option updelay: invalid value (18446744071562067968) [ 128.592183][T10275] (unnamed net_device) (uninitialized): option updelay: allowed values 0 - 2147483647 [ 128.764656][T10293] bond0: (slave dummy0): Releasing backup interface [ 128.780521][T10293] bond3: (slave bond4): Releasing backup interface [ 128.792993][T10293] bond5: (slave veth7): Releasing backup interface [ 129.002620][T10303] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 129.146141][T10310] __nla_validate_parse: 3 callbacks suppressed [ 129.146156][T10310] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2849'. [ 129.679129][T10346] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2866'. [ 129.702112][T10346] bond3: entered promiscuous mode [ 129.708045][T10346] bond3: entered allmulticast mode [ 129.713495][T10346] 8021q: adding VLAN 0 to HW filter on device bond3 [ 130.343945][T10368] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 130.680755][T10387] wireguard0: entered promiscuous mode [ 130.686447][T10387] wireguard0: entered allmulticast mode [ 131.017238][T10426] gtp0: entered promiscuous mode [ 131.743383][T10469] netlink: 'syz.5.2919': attribute type 10 has an invalid length. [ 131.756474][T10469] $Hÿ: (slave bridge_slave_1): Enslaving as an active interface with an up link [ 131.782896][T10469] netlink: 14 bytes leftover after parsing attributes in process `syz.5.2919'. [ 131.801075][T10469] $Hÿ (unregistering): (slave dummy0): Releasing backup interface [ 131.819860][T10469] $Hÿ (unregistering): (slave bridge_slave_1): Releasing backup interface [ 131.888105][T10469] $Hÿ (unregistering): Released all slaves [ 132.111891][T10481] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2925'. [ 132.120995][T10481] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2925'. [ 132.181389][T10489] netlink: 'syz.2.2928': attribute type 4 has an invalid length. [ 132.210056][T10489] netlink: 'syz.2.2928': attribute type 4 has an invalid length. [ 132.245876][T10492] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2929'. [ 132.272479][T10492] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2929'. [ 132.425433][T10499] netlink: 'syz.6.2920': attribute type 10 has an invalid length. [ 132.433665][T10499] veth0_vlan: entered allmulticast mode [ 132.524887][T10510] wireguard0: entered promiscuous mode [ 132.530478][T10510] wireguard0: entered allmulticast mode [ 132.705869][T10505] bond0: (slave veth0_to_hsr): Enslaving as an active interface with an up link [ 132.834945][T10521] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2938'. [ 132.845834][T10521] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2938'. [ 133.169523][ T29] kauditd_printk_skb: 1274 callbacks suppressed [ 133.169541][ T29] audit: type=1400 audit(1750474597.709:16705): avc: denied { prog_load } for pid=10531 comm="syz.4.2942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 133.195252][ T29] audit: type=1400 audit(1750474597.709:16706): avc: denied { map_create } for pid=10531 comm="syz.4.2942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 133.214789][ T29] audit: type=1400 audit(1750474597.709:16707): avc: denied { prog_load } for pid=10531 comm="syz.4.2942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 133.234171][ T29] audit: type=1400 audit(1750474597.709:16708): avc: denied { prog_load } for pid=10531 comm="syz.4.2942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 133.253461][ T29] audit: type=1400 audit(1750474597.709:16709): avc: denied { prog_load } for pid=10531 comm="syz.4.2942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 133.272794][ T29] audit: type=1400 audit(1750474597.709:16710): avc: denied { open } for pid=10531 comm="syz.4.2942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 133.341390][ T29] audit: type=1400 audit(1750474597.879:16711): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 133.369835][ T29] audit: type=1400 audit(1750474597.909:16712): avc: denied { map_create } for pid=10534 comm="syz.1.2943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 133.374872][T10535] vlan0: entered promiscuous mode [ 133.395818][T10535] hsr_slave_1: entered promiscuous mode [ 133.401320][ T29] audit: type=1400 audit(1750474597.909:16713): avc: denied { prog_load } for pid=10534 comm="syz.1.2943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 133.402330][T10535] vlan0: entered allmulticast mode [ 133.420638][ T29] audit: type=1400 audit(1750474597.909:16714): avc: denied { map_create } for pid=10534 comm="syz.1.2943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 133.427715][T10537] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2943'. [ 133.457866][T10535] hsr_slave_1: entered allmulticast mode [ 134.679613][T10605] __nla_validate_parse: 4 callbacks suppressed [ 134.679631][T10605] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2984'. [ 134.721504][T10605] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 20000 - 0 [ 134.729892][T10605] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 20000 - 0 [ 134.738212][T10605] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 20000 - 0 [ 134.746691][T10605] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 20000 - 0 [ 134.759378][T10605] bond5: (slave geneve2): Enslaving as an active interface with an up link [ 135.223687][T10644] netlink: 'syz.1.2989': attribute type 10 has an invalid length. [ 135.286600][T10645] netlink: 'syz.1.2989': attribute type 10 has an invalid length. [ 135.286918][T10644] bond0: (slave dummy0): Releasing backup interface [ 135.369385][T10644] team0: Port device dummy0 added [ 135.392469][T10645] team0: Port device dummy0 removed [ 135.404842][T10645] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 135.488946][T10649] netlink: 14593 bytes leftover after parsing attributes in process `syz.6.2990'. [ 135.519714][T10649] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2990'. [ 135.912642][T10665] syzkaller0: entered promiscuous mode [ 135.919058][T10665] syzkaller0: entered allmulticast mode [ 136.182834][T10692] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3005'. [ 136.456786][T10710] geneve0: entered allmulticast mode [ 136.503647][T10719] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3021'. [ 136.531493][T10724] Cannot find add_set index 0 as target [ 136.612819][T10734] netlink: 20 bytes leftover after parsing attributes in process `syz.6.3028'. [ 136.700697][T10739] sch_tbf: burst 0 is lower than device lo mtu (11337746) ! [ 136.741201][T10739] netlink: 'syz.6.3030': attribute type 13 has an invalid length. [ 136.770461][T10739] netdevsim netdevsim6 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 136.780731][T10739] netdevsim netdevsim6 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 136.790260][T10739] netdevsim netdevsim6 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 136.799256][T10739] netdevsim netdevsim6 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 136.935251][T10751] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3034'. [ 137.858947][T10788] xt_connbytes: Forcing CT accounting to be enabled [ 137.865618][T10788] Cannot find set identified by id 0 to match [ 137.954890][T10799] netlink: 20 bytes leftover after parsing attributes in process `syz.2.3051'. [ 138.066767][T10809] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3066'. [ 138.147255][T10816] netlink: 'syz.2.3057': attribute type 3 has an invalid length. [ 138.189308][ T29] kauditd_printk_skb: 797 callbacks suppressed [ 138.189345][ T29] audit: type=1400 audit(1750474602.729:17512): avc: denied { read write } for pid=3891 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 138.230665][ T29] audit: type=1400 audit(1750474602.769:17513): avc: denied { bpf } for pid=10820 comm="syz.6.3059" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 138.256519][ T29] audit: type=1400 audit(1750474602.799:17514): avc: denied { create } for pid=10820 comm="syz.6.3059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 138.281551][ T29] audit: type=1400 audit(1750474602.799:17515): avc: denied { map_create } for pid=10820 comm="syz.6.3059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 138.301150][ T29] audit: type=1400 audit(1750474602.799:17516): avc: denied { prog_load } for pid=10820 comm="syz.6.3059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 138.322461][ T29] audit: type=1400 audit(1750474602.799:17517): avc: denied { create } for pid=10820 comm="syz.6.3059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 138.342449][ T29] audit: type=1400 audit(1750474602.799:17518): avc: denied { allowed } for pid=10820 comm="syz.6.3059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 138.364252][ T29] audit: type=1400 audit(1750474602.869:17519): avc: denied { read write } for pid=3891 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 138.392584][ T29] audit: type=1400 audit(1750474602.929:17520): avc: denied { create } for pid=10822 comm="syz.6.3060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 138.416001][ T29] audit: type=1400 audit(1750474602.959:17521): avc: denied { prog_load } for pid=10822 comm="syz.6.3060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 138.493055][T10826] netlink: 'syz.1.3061': attribute type 27 has an invalid length. [ 138.513271][T10828] netlink: 24 bytes leftover after parsing attributes in process `syz.6.3062'. [ 138.526039][T10826] batadv0: left promiscuous mode [ 138.531906][T10826] batadv0: left allmulticast mode [ 138.610974][T10826] veth5: left promiscuous mode [ 138.638651][T10826] veth7: left promiscuous mode [ 138.649432][T10826] vlan0: left promiscuous mode [ 138.654294][T10826] hsr_slave_1: left promiscuous mode [ 138.659974][T10826] vlan0: left allmulticast mode [ 138.664874][T10826] hsr_slave_1: left allmulticast mode [ 138.672250][T10826] netdevsim netdevsim1 eth0: unset [1, 0] type 2 family 0 port 20000 - 0 [ 138.680873][T10826] netdevsim netdevsim1 eth1: unset [1, 0] type 2 family 0 port 20000 - 0 [ 138.689462][T10826] netdevsim netdevsim1 eth2: unset [1, 0] type 2 family 0 port 20000 - 0 [ 138.698109][T10826] netdevsim netdevsim1 eth3: unset [1, 0] type 2 family 0 port 20000 - 0 [ 138.740656][T10838] Cannot find add_set index 0 as target [ 138.936950][T10864] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=10864 comm=syz.1.3079 [ 139.600669][T10900] netlink: 'syz.2.3091': attribute type 4 has an invalid length. [ 139.955535][T10917] netlink: 'syz.2.3099': attribute type 13 has an invalid length. [ 139.964957][T10917] __nla_validate_parse: 4 callbacks suppressed [ 139.964992][T10917] netlink: 152 bytes leftover after parsing attributes in process `syz.2.3099'. [ 139.999268][T10917] erspan0: refused to change device tx_queue_len [ 140.005747][T10917] A link change request failed with some changes committed already. Interface erspan0 may have been left with an inconsistent configuration, please check. [ 140.027801][T10923] Falling back ldisc for ttyS3. [ 140.058725][T10928] netlink: 'syz.4.3104': attribute type 7 has an invalid length. [ 140.066525][T10928] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3104'. [ 140.092250][T10931] netlink: 'syz.5.3103': attribute type 10 has an invalid length. [ 140.101593][T10931] team0: Port device dummy0 added [ 140.111554][T10931] netlink: 'syz.5.3103': attribute type 10 has an invalid length. [ 140.133295][T10931] team0: Port device dummy0 removed [ 140.286665][T10939] netlink: 60 bytes leftover after parsing attributes in process `syz.4.3109'. [ 140.367511][T10945] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 140.396856][T10947] TCP: out of memory -- consider tuning tcp_mem [ 140.500521][T10959] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 140.561073][T10960] netlink: 'syz.6.3115': attribute type 4 has an invalid length. [ 140.581672][T10954] netlink: 'syz.6.3115': attribute type 4 has an invalid length. [ 140.709711][T10970] !: renamed from dummy0 [ 141.555808][T10994] syzkaller0: entered promiscuous mode [ 141.562836][T10994] syzkaller0: entered allmulticast mode [ 142.033166][T11015] netlink: 16 bytes leftover after parsing attributes in process `syz.4.3138'. [ 142.042326][T11015] tc_dump_action: action bad kind [ 142.542060][T11025] netlink: 'syz.6.3142': attribute type 1 has an invalid length. [ 142.596891][T11025] 8021q: adding VLAN 0 to HW filter on device bond4 [ 142.630233][T11028] 8021q: adding VLAN 0 to HW filter on device bond4 [ 142.656833][T11028] bond4: (slave vxcan1): The slave device specified does not support setting the MAC address [ 142.670810][T11028] bond4: (slave vxcan1): Error -95 calling set_mac_address [ 142.705249][T11025] veth9: entered promiscuous mode [ 142.721579][T11025] bond4: (slave veth9): Enslaving as an active interface with a down link [ 142.784102][T11037] erspan0: entered allmulticast mode [ 142.804046][T11037] bond4: (slave erspan0): making interface the new active one [ 142.813579][T11037] bond4: (slave erspan0): Enslaving as an active interface with an up link [ 142.823020][T11033] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3143'. [ 142.957154][T11054] Falling back ldisc for ttyS3. [ 143.032246][T11065] xt_cgroup: invalid path, errno=-2 [ 143.451569][ T29] kauditd_printk_skb: 684 callbacks suppressed [ 143.451586][ T29] audit: type=1400 audit(1750474607.989:18206): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 143.491392][ T29] audit: type=1400 audit(1750474608.029:18207): avc: denied { map_create } for pid=11068 comm="syz.1.3161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 143.532132][ T29] audit: type=1400 audit(1750474608.049:18208): avc: denied { map_create } for pid=11068 comm="syz.1.3161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 143.551691][ T29] audit: type=1400 audit(1750474608.049:18209): avc: denied { prog_load } for pid=11068 comm="syz.1.3161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 143.571220][ T29] audit: type=1400 audit(1750474608.049:18210): avc: denied { prog_load } for pid=11068 comm="syz.1.3161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 143.590666][ T29] audit: type=1400 audit(1750474608.049:18211): avc: denied { prog_load } for pid=11068 comm="syz.1.3161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 143.609962][ T29] audit: type=1400 audit(1750474608.049:18212): avc: denied { prog_load } for pid=11068 comm="syz.1.3161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 143.629358][ T29] audit: type=1400 audit(1750474608.059:18213): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 143.654086][ T29] audit: type=1400 audit(1750474608.069:18214): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 143.678513][ T29] audit: type=1400 audit(1750474608.109:18215): avc: denied { prog_load } for pid=11070 comm="syz.2.3163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 143.810088][T11085] validate_nla: 2 callbacks suppressed [ 143.810107][T11085] netlink: 'syz.4.3170': attribute type 4 has an invalid length. [ 143.850269][T11085] netlink: 'syz.4.3170': attribute type 4 has an invalid length. [ 143.887157][T11086] Falling back ldisc for ttyS3. [ 144.878520][T11117] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3181'. [ 144.953063][T11127] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3186'. [ 145.024703][T11131] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3188'. [ 145.058894][T11131] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3188'. [ 145.245003][T11152] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3197'. [ 145.254349][T11152] bridge_slave_0: entered allmulticast mode [ 145.263023][T11152] netlink: 'syz.4.3197': attribute type 3 has an invalid length. [ 145.270897][T11152] netlink: 1 bytes leftover after parsing attributes in process `syz.4.3197'. [ 145.496144][T11162] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3203'. [ 145.522972][T11162] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3203'. [ 145.593292][T11164] netlink: 'syz.4.3202': attribute type 10 has an invalid length. [ 145.603414][T11164] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3202'. [ 145.768519][T11164] team0: Port device geneve1 added [ 145.833994][T11174] batadv0: left promiscuous mode [ 145.839114][T11174] batadv0: left allmulticast mode [ 145.846486][T11174] macsec0: left allmulticast mode [ 145.851714][T11174] geneve0: left allmulticast mode [ 145.860268][T11174] vlan2: left promiscuous mode [ 145.865217][T11174] bond1: left promiscuous mode [ 145.870726][T11174] batadv1: left promiscuous mode [ 145.875786][T11174] ip6gre1: left allmulticast mode [ 145.886433][T11174] bridge0: left allmulticast mode [ 145.896588][T11174] veth7: left promiscuous mode [ 145.904554][T11174] wireguard0: left promiscuous mode [ 145.909847][T11174] wireguard0: left allmulticast mode [ 145.983205][T11178] team0: Port device geneve1 removed [ 146.053918][T11191] netlink: 'syz.1.3214': attribute type 10 has an invalid length. [ 146.063420][T11193] xt_TPROXY: Can be used only with -p tcp or -p udp [ 146.072487][T11191] team0 (unregistering): Port device team_slave_0 removed [ 146.082704][T11191] team0 (unregistering): Port device team_slave_1 removed [ 146.509795][T11232] sch_fq: defrate 0 ignored. [ 146.899361][T11252] netlink: 'syz.5.3240': attribute type 27 has an invalid length. [ 147.235984][T11259] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 147.862956][T11299] $Hÿ: left promiscuous mode [ 147.883148][T11299] batadv0: left promiscuous mode [ 147.888402][T11299] batadv0: left allmulticast mode [ 147.915892][T11299] bridge_slave_0: left allmulticast mode [ 147.970036][T11299] netdevsim netdevsim4 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 147.980257][T11299] netdevsim netdevsim4 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 147.988964][T11299] netdevsim netdevsim4 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 147.997495][T11299] netdevsim netdevsim4 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 148.015499][T11299] vlan2: left promiscuous mode [ 148.022085][T11299] bond0: left promiscuous mode [ 148.029493][T11299] veth7: left promiscuous mode [ 148.034612][T11299] bond3: left promiscuous mode [ 148.039480][T11299] bond3: left allmulticast mode [ 148.466811][ T29] kauditd_printk_skb: 732 callbacks suppressed [ 148.466830][ T29] audit: type=1400 audit(1750474612.999:18948): avc: denied { read write } for pid=3304 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 148.501174][ T29] audit: type=1400 audit(1750474613.039:18949): avc: denied { map_create } for pid=11329 comm="syz.4.3275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.577790][ T29] audit: type=1400 audit(1750474613.059:18950): avc: denied { prog_load } for pid=11329 comm="syz.4.3275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.599098][ T29] audit: type=1400 audit(1750474613.059:18951): avc: denied { prog_load } for pid=11329 comm="GPL" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.617882][ T29] audit: type=1400 audit(1750474613.059:18952): avc: denied { prog_load } for pid=11329 comm="GPL" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.638670][ T29] audit: type=1400 audit(1750474613.069:18953): avc: denied { read write } for pid=11329 comm="GPL" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 148.662348][ T29] audit: type=1400 audit(1750474613.079:18954): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 148.686678][ T29] audit: type=1400 audit(1750474613.079:18955): avc: denied { read write } for pid=3304 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 148.713023][ T29] audit: type=1400 audit(1750474613.089:18956): avc: denied { map_create } for pid=11331 comm="syz.1.3276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.732531][ T29] audit: type=1326 audit(1750474613.089:18957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11289 comm="syz.6.3259" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd7406ae929 code=0x7fc00000 [ 148.734624][T11342] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3279'. [ 148.792163][T11342] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3279'. [ 148.903728][T11356] xt_bpf: check failed: parse error [ 150.305006][T11434] netlink: 'syz.4.3320': attribute type 4 has an invalid length. [ 150.343121][T11438] netlink: 'syz.2.3322': attribute type 21 has an invalid length. [ 150.372995][T11438] netlink: 132 bytes leftover after parsing attributes in process `syz.2.3322'. [ 150.667872][T11457] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 150.704798][T11458] netlink: 96 bytes leftover after parsing attributes in process `syz.4.3330'. [ 150.990782][T11468] netlink: 'syz.1.3335': attribute type 10 has an invalid length. [ 151.454443][T11484] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3340'. [ 151.470612][T11484] team0: entered promiscuous mode [ 151.475747][T11484] team0: entered allmulticast mode [ 151.521942][T11488] netlink: 32 bytes leftover after parsing attributes in process `syz.2.3341'. [ 152.798046][T11523] netlink: 'syz.1.3356': attribute type 1 has an invalid length. [ 152.805841][T11523] netlink: 'syz.1.3356': attribute type 2 has an invalid length. [ 153.469785][ T29] kauditd_printk_skb: 891 callbacks suppressed [ 153.469800][ T29] audit: type=1400 audit(1750474618.009:19849): avc: denied { read write } for pid=3891 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 153.761013][T11536] netlink: 24 bytes leftover after parsing attributes in process `syz.6.3360'. [ 153.780920][ T29] audit: type=1400 audit(1750474618.299:19850): avc: denied { open } for pid=11534 comm="syz.6.3360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 153.800434][ T29] audit: type=1400 audit(1750474618.319:19851): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 153.853892][ T29] audit: type=1400 audit(1750474618.369:19852): avc: denied { read write } for pid=3304 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 153.884007][T11536] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11536 comm=syz.6.3360 [ 153.912465][ T29] audit: type=1400 audit(1750474618.449:19853): avc: denied { create } for pid=11540 comm="syz.4.3362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 153.932445][ T29] audit: type=1400 audit(1750474618.449:19854): avc: denied { execmem } for pid=11540 comm="syz.4.3362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 153.962351][ T29] audit: type=1400 audit(1750474618.449:19855): avc: denied { read write } for pid=11538 comm="syz.1.3361" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 153.986894][ T29] audit: type=1400 audit(1750474618.499:19856): avc: denied { prog_load } for pid=11540 comm="syz.4.3362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 154.006202][ T29] audit: type=1400 audit(1750474618.499:19857): avc: denied { prog_load } for pid=11540 comm="syz.4.3362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 154.011058][T11539] netlink: 'syz.1.3361': attribute type 39 has an invalid length. [ 154.027252][ T29] audit: type=1400 audit(1750474618.529:19858): avc: denied { map_create } for pid=11538 comm="syz.1.3361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 154.072562][T11544] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3363'. [ 154.291521][T11552] netlink: 'syz.1.3366': attribute type 4 has an invalid length. [ 154.314340][T11553] netlink: 2036 bytes leftover after parsing attributes in process `syz.6.3365'. [ 154.323596][T11553] netlink: 24 bytes leftover after parsing attributes in process `syz.6.3365'. [ 154.941719][T11611] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3392'. [ 154.961610][T11614] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3393'. [ 154.995705][T11619] binfmt_misc: register: failed to install interpreter file ./file0 [ 155.071953][T11628] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=11628 comm=syz.4.3399 [ 155.127722][T11634] serio: Serial port ptm0 [ 155.168306][T11630] syzkaller0: entered promiscuous mode [ 155.173848][T11630] syzkaller0: entered allmulticast mode [ 155.303486][T11655] vlan0: entered promiscuous mode [ 155.308677][T11655] hsr_slave_1: entered promiscuous mode [ 155.314410][T11655] vlan0: entered allmulticast mode [ 155.319641][T11655] hsr_slave_1: entered allmulticast mode [ 155.350370][T11657] Cannot find del_set index 0 as target [ 155.382945][T11663] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3411'. [ 155.428278][T11666] netlink: 'syz.2.3415': attribute type 13 has an invalid length. [ 156.018133][T11696] netlink: 'syz.6.3427': attribute type 10 has an invalid length. [ 156.027297][T11696] bond0: (slave dummy0): Releasing backup interface [ 156.035795][T11696] netlink: 'syz.6.3427': attribute type 10 has an invalid length. [ 156.055919][T11696] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 156.271516][T11705] netlink: 'syz.4.3432': attribute type 1 has an invalid length. [ 156.315624][T11705] 8021q: adding VLAN 0 to HW filter on device bond4 [ 157.089869][T11766] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3457'. [ 157.135337][T11771] netlink: 'syz.4.3460': attribute type 10 has an invalid length. [ 157.223632][T11779] netlink: 'syz.6.3461': attribute type 21 has an invalid length. [ 157.231576][T11779] netlink: 'syz.6.3461': attribute type 20 has an invalid length. [ 157.245324][T11782] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3464'. [ 157.289948][T11782] veth13: entered promiscuous mode [ 157.359073][T11791] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3468'. [ 157.419643][T11791] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3468'. [ 157.505231][T11797] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3470'. [ 157.799589][T11817] bridge0: the hash_elasticity option has been deprecated and is always 16 [ 157.951211][T11841] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3490'. [ 157.962552][T11846] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 157.962552][T11846] The task syz.2.3482 (11846) triggered the difference, watch for misbehavior. [ 157.986804][T11846] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3482'. [ 158.487154][ T29] kauditd_printk_skb: 1355 callbacks suppressed [ 158.487229][ T29] audit: type=1400 audit(1750474622.779:21214): avc: denied { prog_load } for pid=11859 comm="syz.4.3499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.515090][ T29] audit: type=1400 audit(1750474622.779:21215): avc: denied { mounton } for pid=11862 comm="syz.6.3500" path="/640/bus" dev="tmpfs" ino=3367 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 158.539916][ T29] audit: type=1400 audit(1750474622.789:21216): avc: denied { read write } for pid=3891 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 158.564304][ T29] audit: type=1400 audit(1750474622.799:21217): avc: denied { map_create } for pid=11869 comm="syz.6.3502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.585634][ T29] audit: type=1400 audit(1750474622.799:21218): avc: denied { prog_load } for pid=11869 comm="syz.6.3502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.604919][ T29] audit: type=1400 audit(1750474622.799:21219): avc: denied { prog_load } for pid=11869 comm="syz.6.3502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.626179][ T29] audit: type=1400 audit(1750474622.799:21220): avc: denied { map_create } for pid=11869 comm="syz.6.3502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.645690][ T29] audit: type=1400 audit(1750474622.799:21221): avc: denied { prog_load } for pid=11869 comm="syz.6.3502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.666939][ T29] audit: type=1400 audit(1750474622.799:21222): avc: denied { read write } for pid=11869 comm="syz.6.3502" name="uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=0 [ 158.692732][ T29] audit: type=1400 audit(1750474622.799:21223): avc: denied { prog_load } for pid=11869 comm="syz.6.3502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 159.267665][T11902] x_tables: duplicate underflow at hook 2 [ 159.634926][T11913] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3518'. [ 159.673046][T11913] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3518'. [ 160.000469][T11927] netlink: 'syz.4.3525': attribute type 1 has an invalid length. [ 160.024427][T11929] xt_TPROXY: Can be used only with -p tcp or -p udp [ 160.051101][T11927] 8021q: adding VLAN 0 to HW filter on device bond5 [ 160.983705][T11981] x_tables: ip6_tables: socket match: used from hooks FORWARD, but only valid from PREROUTING/INPUT [ 161.116192][T11993] netlink: 'syz.1.3551': attribute type 1 has an invalid length. [ 161.126108][T11993] netlink: 'syz.1.3551': attribute type 4 has an invalid length. [ 161.133965][T11993] netlink: 9462 bytes leftover after parsing attributes in process `syz.1.3551'. [ 161.165698][T11996] netlink: 'syz.4.3552': attribute type 27 has an invalid length. [ 161.307595][T12009] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3558'. [ 161.410289][T12018] xt_hashlimit: max too large, truncated to 1048576 [ 162.605033][T12065] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3579'. [ 162.836777][T12072] netlink: 'syz.2.3582': attribute type 4 has an invalid length. [ 163.518416][ T29] kauditd_printk_skb: 976 callbacks suppressed [ 163.518434][ T29] audit: type=1400 audit(1750474628.059:22200): avc: denied { read write } for pid=3891 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 163.565740][T12095] netlink: 'syz.6.3589': attribute type 10 has an invalid length. [ 163.573091][ T29] audit: type=1400 audit(1750474628.099:22201): avc: denied { read write } for pid=12094 comm="syz.6.3589" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 163.599960][ T29] audit: type=1400 audit(1750474628.099:22202): avc: denied { prog_load } for pid=12094 comm="syz.6.3589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.619297][ T29] audit: type=1400 audit(1750474628.099:22203): avc: denied { prog_load } for pid=12094 comm="syz.6.3589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.831332][ T29] audit: type=1400 audit(1750474628.119:22204): avc: denied { map_create } for pid=12094 comm="syz.6.3589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.850787][ T29] audit: type=1400 audit(1750474628.119:22205): avc: denied { prog_load } for pid=12094 comm="syz.6.3589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.870064][ T29] audit: type=1400 audit(1750474628.119:22206): avc: denied { read write } for pid=3891 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 163.894383][ T29] audit: type=1400 audit(1750474628.179:22207): avc: denied { map_create } for pid=12096 comm="syz.6.3590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.913816][ T29] audit: type=1400 audit(1750474628.179:22208): avc: denied { prog_load } for pid=12096 comm="syz.6.3590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.933179][ T29] audit: type=1400 audit(1750474628.179:22209): avc: denied { create } for pid=12096 comm="syz.6.3590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 164.119423][T12109] netlink: 16 bytes leftover after parsing attributes in process `syz.5.3594'. [ 164.149287][T12109] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.158112][T12109] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.166895][T12109] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.177693][T12109] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.188003][T12109] bridge0: port 1(geneve2) entered blocking state [ 164.194496][T12109] bridge0: port 1(geneve2) entered disabled state [ 164.217263][T12109] geneve2: entered allmulticast mode [ 164.235632][T12109] geneve2: entered promiscuous mode [ 164.309322][T12116] netlink: 'syz.5.3597': attribute type 10 has an invalid length. [ 164.350383][T12116] team0: Port device dummy0 added [ 164.360520][T12119] netlink: 'syz.5.3597': attribute type 10 has an invalid length. [ 164.380664][T12119] team0: Port device dummy0 removed [ 164.473262][T12121] netlink: 'syz.5.3599': attribute type 4 has an invalid length. [ 164.673069][T12125] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3601'. [ 164.682035][T12125] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3601'. [ 164.694834][T12125] netdevsim netdevsim5 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 164.703647][T12125] netdevsim netdevsim5 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 164.712435][T12125] netdevsim netdevsim5 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 164.721269][T12125] netdevsim netdevsim5 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 164.751477][T12125] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3601'. [ 164.760650][T12125] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3601'. [ 164.857994][T12138] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 164.902531][T12149] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3604'. [ 165.261408][T12184] syzkaller0: entered promiscuous mode [ 165.267134][T12184] syzkaller0: entered allmulticast mode [ 165.389311][T12193] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12193 comm=syz.6.3629 [ 165.621876][T12211] ================================================================== [ 165.630023][T12211] BUG: KCSAN: data-race in shmem_file_splice_read / shmem_file_splice_read [ 165.638671][T12211] [ 165.638680][T12211] write to 0xffff888103de99a8 of 8 bytes by task 12201 on cpu 0: [ 165.638700][T12211] shmem_file_splice_read+0x470/0x600 [ 165.638726][T12211] splice_direct_to_actor+0x26c/0x680 [ 165.638757][T12211] do_splice_direct+0xda/0x150 [ 165.638789][T12211] do_sendfile+0x380/0x650 [ 165.638810][T12211] __x64_sys_sendfile64+0x105/0x150 [ 165.638845][T12211] x64_sys_call+0xb39/0x2fb0 [ 165.638872][T12211] do_syscall_64+0xd2/0x200 [ 165.638890][T12211] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 165.638918][T12211] [ 165.638925][T12211] write to 0xffff888103de99a8 of 8 bytes by task 12211 on cpu 1: [ 165.638943][T12211] shmem_file_splice_read+0x470/0x600 [ 165.638969][T12211] splice_direct_to_actor+0x26c/0x680 [ 165.639006][T12211] do_splice_direct+0xda/0x150 [ 165.639042][T12211] do_sendfile+0x380/0x650 [ 165.639070][T12211] __x64_sys_sendfile64+0x105/0x150 [ 165.639092][T12211] x64_sys_call+0xb39/0x2fb0 [ 165.639115][T12211] do_syscall_64+0xd2/0x200 [ 165.639136][T12211] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 165.639160][T12211] [ 165.639164][T12211] value changed: 0x0000000000001e83 -> 0x0000000000001e8a [ 165.639175][T12211] [ 165.639178][T12211] Reported by Kernel Concurrency Sanitizer on: [ 165.639192][T12211] CPU: 1 UID: 0 PID: 12211 Comm: syz.5.3634 Not tainted 6.16.0-rc2-syzkaller-00269-g11313e2f7812 #0 PREEMPT(voluntary) [ 165.639229][T12211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 165.639245][T12211] ================================================================== [ 165.661645][T12219] ALSA: seq fatal error: cannot create timer (-22)