last executing test programs: 1.506108716s ago: executing program 4 (id=4103): mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x100000a, 0x204031, 0xffffffffffffffff, 0x1bf5f000) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x6f5e, 0xa0001) setresuid(0x0, 0xee00, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000000c0)={0x53, 0xfffffffffffffffc, 0x6, 0x0, @buffer={0x20, 0x0, 0x0}, &(0x7f0000000240)="b98828b74ea9", 0x0, 0x100004, 0x26, 0x3, 0x0}) 1.503754976s ago: executing program 4 (id=4105): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)={0x4c, 0x2, 0x6, 0x801, 0xe4340000, 0x0, {0xa}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x4c}}, 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000c80)={0x5c, 0x9, 0x6, 0x801, 0x0, 0x0, {0x7}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x34, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @remote}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0xe1f}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x88}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10000042}, 0x90) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x2, 0x200, @loopback, 0x7}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r2, &(0x7f0000000440)="7f", 0x1, 0x20000045, &(0x7f00000001c0)={0xa, 0x2, 0xffff, @loopback, 0x9}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='vegas', 0x5) sendmmsg$inet6(r2, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000240)="534b0ac01bd0edcbe8a5dea438bce2d26b42fac94876446e7a50498dd3ce64ca74af811203320c767ab62b9746565e64d89162c210e84a", 0x37}], 0x1}}], 0x1, 0x4000000) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000040)={0x42, 0x0, 0x3}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000300)={'lo\x00', 0x0}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r9, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x338, 0x158, 0x5c, 0x160, 0x158, 0x3e0, 0x268, 0x228, 0x25a, 0x268, 0x228, 0x4, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'veth0_to_batadv\x00', 'pim6reg\x00', {}, {}, 0x3a}, 0x5002, 0x118, 0x158, 0x52020000, {0x0, 0x6802000000000000}, [@common=@unspec=@limit={{0x48}, {0x10000, 0x80000000, 0x8, 0x9, 0x40, 0x5, 0x4}}, @common=@unspec=@state={{0x28}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x7, 0x2, {0xfffffffffffffffa}}}}, {{@ipv6={@local, @empty, [], [], 'veth1_to_hsr\x00', 'dummy0\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0xffffffff, 'snmp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x398) sendmsg$ETHTOOL_MSG_EEE_SET(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000000c0)={0x34, r6, 0x1, 0x70bd25, 0x25dedafe, {}, [@ETHTOOL_A_EEE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x28000}, 0x24000894) r10 = socket$tipc(0x1e, 0x2, 0x0) r11 = dup3(r4, r10, 0x0) setsockopt$TIPC_GROUP_LEAVE(r11, 0x10f, 0x88) sendmsg$NL80211_CMD_SET_CQM(r11, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000500)={0x120, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2da7, 0x42}}}}, [@NL80211_ATTR_CQM={0x3c, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x4}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x3}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0xb}, @NL80211_ATTR_CQM_RSSI_THOLD={0x20, 0x1, [0x6, 0x4, 0x7, 0xdf, 0x8001, 0x6, 0x38e]}]}, @NL80211_ATTR_CQM={0x68, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THOLD={0x8, 0x1, [0x9]}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0xa}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x63}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x1d7}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0xb}, @NL80211_ATTR_CQM_RSSI_THOLD={0x1c, 0x1, [0xffffff97, 0x3, 0xe, 0x1, 0x8, 0x7]}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x2bd}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x7}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x2e3}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x329}]}, @NL80211_ATTR_CQM={0x44, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x4a}, @NL80211_ATTR_CQM_RSSI_THOLD={0x10, 0x1, [0x0, 0x4800, 0x7]}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0xd}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x3}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x9}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x5}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x10001}]}, @NL80211_ATTR_CQM={0x18, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THOLD={0xc, 0x1, [0x5, 0xe]}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x1a}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x1}, 0x840) sendto$inet6(r2, &(0x7f00000006c0)="5671cd3b959efb3a2a8caf49ba7fbca5dc8a94f143cff61b66507cf8f93352bc5c85043c20db4cc6274e130b5bb32b2b5976fc74c7174bec3e3eccf04a2f0517378c974c1a39815c15de7726a8eff7de703b5513ace3a8a51c14c7ba20184a2fc304cd2bdb6f586a2edbc5e9487b5bbecf798ece1d683a32b76663a398e36e73cdf70cf57167785b738c0dec09e7e47505c71922bb94dea4d4d8c8e13bd7c02b2337e3cb7551bf24ca0b9e97b12017c1028d1e46e54eb63a906913a9f7ddabcd18cbb5901913523447c6ff86deb469352c660f5a3abc3a383d5481af9e29885d6210adf1a449dd37a3", 0xe9, 0x80, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x50, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x20, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_ROUTER={0x5, 0x16, 0x2}, @IFLA_BR_MCAST_STARTUP_QUERY_CNT={0x8, 0x1d, 0x9}, @IFLA_BR_MCAST_LAST_MEMBER_INTVL={0xc, 0x1e, 0x5}]}}}]}, 0x50}, 0x1, 0x0, 0x0, 0x400c000}, 0x44) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004080}, 0x48810) recvmsg(r0, &(0x7f000000c1c0)={0x0, 0x0, &(0x7f000000c080)=[{&(0x7f000000acc0)=""/4096, 0x1000}], 0x1}, 0x20) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=""/242, 0xf2) 1.464384718s ago: executing program 1 (id=4107): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x14, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x2000000, {0xa, 0x4e24, 0x9, @mcast2, 0x4}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa02, {{0x6000000, 0x4e24, 0x40003, @mcast1}, {0x2, 0xfff9, 0xc00, @remote, 0xffffffff}, r1, 0x9dffffff}}, 0x48) 1.42972248s ago: executing program 4 (id=4108): r0 = epoll_create1(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x6000200e}) 1.400249991s ago: executing program 1 (id=4109): openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000008c0)='./file1\x00', 0x1008490, &(0x7f00000000c0)={[{@block_validity}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000001500)="$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") quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f0000000080)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000100)={0x3, 0x1, 0x246, 0x7fffffffffffffff, 0xfffffffffffffffa, 0xfffffffffffffffb, 0x10000000000000, 0x7fff, 0x9b}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x4db, 0x20081, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x0, 0x2}, 0x2, 0x0, 0x10ffe, 0x4, 0x2, 0x80000011, 0x1, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@sndrcv={0x30, 0x84, 0x1, {0x7, 0x444, 0x40, 0x401, 0x2, 0xc355, 0x17c, 0x7fffffff}}], 0x30, 0x4040850}, 0x40000) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="240000003700090025bd7000ff840000"], 0x24}}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x8, 0x64039, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x6, 0x3}, 0x10, 0x5, 0x43a1bd77, 0x7, 0xaa4, 0x6, 0x3, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x200, 0x0) unshare(0x22020400) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) r5 = socket$inet_sctp(0x2, 0x1, 0x84) r6 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xc, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000180)={0xfff, 0x8, 0x8, 0xffffffff, r7}, &(0x7f00000001c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000001, 0x13, r3, 0x0) 1.334158685s ago: executing program 4 (id=4110): syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="4400000010000304000000000000000000007400", @ANYRES32=r1, @ANYBLOB="0000000000000000240012800b000100627269646765000014000280060027000000000005002d"], 0x44}, 0x1, 0x0, 0x0, 0x40800}, 0x0) 1.324718385s ago: executing program 0 (id=4112): r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) ptrace(0x10, 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/locks\x00', 0x0, 0x0) pread64(r1, &(0x7f00000002c0)=""/124, 0x7c, 0x7) r2 = open(&(0x7f0000000080)='./file1\x00', 0x66842, 0x90) socket(0x15, 0x5, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r5 = epoll_create1(0x0) r6 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r6, &(0x7f00000001c0)={0x20002011}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x83, 0x0, 0x0, 0x7, 0x510, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x1000, 0x20da, 0x0, 0xa, 0x20005, 0xac6, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) epoll_pwait2(r5, &(0x7f0000000100)=[{}], 0x1, 0x0, 0x0, 0x0) r7 = socket(0x2, 0x80805, 0x0) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r8, 0x0) close(0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e23, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x7a, &(0x7f0000000340)={r9, @in6={{0xa, 0x3, 0x4, @mcast1}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r7, 0x84, 0x71, &(0x7f00000005c0)={r10, 0x2}, &(0x7f0000000600)=0x8) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x800000, &(0x7f0000000a00)={[{@dioread_lock}]}, 0x12, 0x522, &(0x7f00000023c0)="$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") syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x181d011, 0x0, 0x40, 0x0, &(0x7f0000000140)) rmdir(&(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') bind$can_raw(r3, 0x0, 0x0) mq_open(&(0x7f0000000a00)='!\x7f\x00\xca\x00\x00\x00\f\x00\x00\x01E!T\xeeux\x00\xbf@\xf4\x1c\xbce\xca\x97\xd5pkv\x88L\xe8$\xef\xfeI\xdaW1\xfcg\xa1\xdb$,0y$\xcd{zl.\xae\x805\xa8\xd6\x85\x15\xd2\x0e~\xcc\x90\x97\xe8h\v\x1a9X\a\xca{\x11#\x95m{U\xe5-\xabRw\xcafy\xe6\aNhX4Ll[\x14\x150x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x0, 0x4e22, 0xc8, 0xa, 0x20, 0x0, 0x2c, r4, r11}, {0xfee7, 0xd, 0xbca, 0x7, 0x7, 0xfffffffeffffffff, 0x4, 0x81}, {0x40, 0x6, 0xe, 0xfff}, 0xd60e, 0x6e6bb0, 0x0, 0x0, 0x5, 0x2}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4d5, 0x2b}, 0xa, @in=@rand_addr=0x64010101, 0x3505, 0x1, 0x0, 0x4, 0x7, 0x6, 0x2}}, 0xe8) 1.310948485s ago: executing program 4 (id=4113): socket$netlink(0x10, 0x3, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000402) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x2f, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffce0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000200)={0x2, 0x4e24, @remote}, 0x10) pipe(0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r3) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r3, 0x0, 0x84) sendmsg$rds(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) ppoll(&(0x7f0000000180)=[{r2, 0x2000}], 0x1, 0x0, 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001480), 0x42002, 0x0) open_by_handle_at(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="c800000071000000efc180b2ba2adf6ac513d05195efea76ff4b110000abc596293fa13b1331dca24d8f82e05f2b808724987be11cb4b71c00a90b7f8bb556e7218a5f2e61e868d19ec1d4457e2554962fc48f8613f76cf8ac22b341a0cc6776ff94032a6f218c8c272a811672c73d02a50b7abc08cfa85e443fe8e5ca7edb30b4ab2b7e5371b810099f232d73770a77f353cf"], 0x5a9600) fcntl$setpipe(r4, 0x407, 0x4) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000023892) r6 = syz_io_uring_setup(0x2af, &(0x7f0000000080)={0x0, 0x1803, 0x10000, 0xfffffffb, 0x100002cf}, &(0x7f0000000380)=0x0, &(0x7f00000003c0)=0x0) syz_io_uring_submit(r7, r8, &(0x7f00000009c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xffffffffffffff31}) io_uring_enter(r6, 0x7a98, 0x0, 0x0, 0x0, 0x17) r9 = socket(0x10, 0x3, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x0, &(0x7f0000000100)=0x1, 0x0, 0x4) write(r9, &(0x7f0000000080)="1400000052004f030e789e7ee2ce2fa4ff612d27", 0x14) recvmmsg(r9, &(0x7f0000005c80), 0x0, 0x10122, 0x0) 1.298167116s ago: executing program 0 (id=4114): socket$inet_icmp_raw(0x2, 0x3, 0x1) unshare(0x22020600) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x5319) 1.145823474s ago: executing program 0 (id=4116): bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xf, 0x47, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000791800000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x64, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x6, 0x4, &(0x7f0000000480)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400}, 0x94) 1.130458834s ago: executing program 0 (id=4117): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4010, &(0x7f00000001c0), 0x2, 0xbd8, &(0x7f00000083c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xa0242, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000180)='./file3\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x4) renameat2(0xffffffffffffff9c, &(0x7f0000000080)='./file3\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2) 641.216049ms ago: executing program 3 (id=4118): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000002280)={0x3, &(0x7f0000000180)=[{0x20, 0x2, 0x81, 0xfffff034}, {0x48}, {0x6, 0xba, 0x2, 0xffff}]}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22, 0x7, @loopback, 0x23}, 0x1c) 639.744389ms ago: executing program 0 (id=4128): mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x183) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) chroot(&(0x7f0000000b40)='./file0/../file0/../file0/../file0\x00') getcwd(&(0x7f0000000200)=""/48, 0x30) 590.131021ms ago: executing program 0 (id=4119): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)={0x4c, 0x2, 0x6, 0x801, 0xe4340000, 0x0, {0xa}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x4c}}, 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000c80)={0x5c, 0x9, 0x6, 0x801, 0x0, 0x0, {0x7}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x34, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @remote}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0xe1f}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x88}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10000042}, 0x90) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x2, 0x200, @loopback, 0x7}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r2, &(0x7f0000000440)="7f", 0x1, 0x20000045, &(0x7f00000001c0)={0xa, 0x2, 0xffff, @loopback, 0x9}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='vegas', 0x5) sendmmsg$inet6(r2, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000240)="534b0ac01bd0edcbe8a5dea438bce2d26b42fac94876446e7a50498dd3ce64ca74af811203320c767ab62b9746565e64d89162c210e84a", 0x37}], 0x1}}], 0x1, 0x4000000) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000040)={0x42, 0x0, 0x3}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000300)={'lo\x00', 0x0}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r9, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x338, 0x158, 0x5c, 0x160, 0x158, 0x3e0, 0x268, 0x228, 0x25a, 0x268, 0x228, 0x4, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'veth0_to_batadv\x00', 'pim6reg\x00', {}, {}, 0x3a}, 0x5002, 0x118, 0x158, 0x52020000, {0x0, 0x6802000000000000}, [@common=@unspec=@limit={{0x48}, {0x10000, 0x80000000, 0x8, 0x9, 0x40, 0x5, 0x4}}, @common=@unspec=@state={{0x28}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x7, 0x2, {0xfffffffffffffffa}}}}, {{@ipv6={@local, @empty, [], [], 'veth1_to_hsr\x00', 'dummy0\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0xffffffff, 'snmp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x398) sendmsg$ETHTOOL_MSG_EEE_SET(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000000c0)={0x34, r6, 0x1, 0x70bd25, 0x25dedafe, {}, [@ETHTOOL_A_EEE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x28000}, 0x24000894) r10 = socket$tipc(0x1e, 0x2, 0x0) r11 = dup3(r4, r10, 0x0) setsockopt$TIPC_GROUP_LEAVE(r11, 0x10f, 0x88) sendmsg$NL80211_CMD_SET_CQM(r11, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000500)={0x120, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2da7, 0x42}}}}, [@NL80211_ATTR_CQM={0x3c, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x4}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x3}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0xb}, @NL80211_ATTR_CQM_RSSI_THOLD={0x20, 0x1, [0x6, 0x4, 0x7, 0xdf, 0x8001, 0x6, 0x38e]}]}, @NL80211_ATTR_CQM={0x68, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THOLD={0x8, 0x1, [0x9]}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0xa}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x63}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x1d7}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0xb}, @NL80211_ATTR_CQM_RSSI_THOLD={0x1c, 0x1, [0xffffff97, 0x3, 0xe, 0x1, 0x8, 0x7]}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x2bd}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x7}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x2e3}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x329}]}, @NL80211_ATTR_CQM={0x44, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x4a}, @NL80211_ATTR_CQM_RSSI_THOLD={0x10, 0x1, [0x0, 0x4800, 0x7]}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0xd}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x3}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x9}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x5}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x10001}]}, @NL80211_ATTR_CQM={0x18, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THOLD={0xc, 0x1, [0x5, 0xe]}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x1a}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x1}, 0x840) sendto$inet6(r2, &(0x7f00000006c0)="5671cd3b959efb3a2a8caf49ba7fbca5dc8a94f143cff61b66507cf8f93352bc5c85043c20db4cc6274e130b5bb32b2b5976fc74c7174bec3e3eccf04a2f0517378c974c1a39815c15de7726a8eff7de703b5513ace3a8a51c14c7ba20184a2fc304cd2bdb6f586a2edbc5e9487b5bbecf798ece1d683a32b76663a398e36e73cdf70cf57167785b738c0dec09e7e47505c71922bb94dea4d4d8c8e13bd7c02b2337e3cb7551bf24ca0b9e97b12017c1028d1e46e54eb63a906913a9f7ddabcd18cbb5901913523447c6ff86deb469352c660f5a3abc3a383d5481af9e29885d6210adf1a449dd37a3", 0xe9, 0x80, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x50, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x20, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_ROUTER={0x5, 0x16, 0x2}, @IFLA_BR_MCAST_STARTUP_QUERY_CNT={0x8, 0x1d, 0x9}, @IFLA_BR_MCAST_LAST_MEMBER_INTVL={0xc, 0x1e, 0x5}]}}}]}, 0x50}, 0x1, 0x0, 0x0, 0x400c000}, 0x44) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004080}, 0x48810) recvmsg(r0, &(0x7f000000c1c0)={0x0, 0x0, &(0x7f000000c080)=[{&(0x7f000000acc0)=""/4096, 0x1000}], 0x1}, 0x20) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=""/242, 0xf2) 589.890851ms ago: executing program 3 (id=4120): capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x6, 0xe, 0x13e, 0x89, 0xffffffff, 0x2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1e, 0x0, &(0x7f0000000180)="e30080670000ec67838717bd86dde1484db4241544716b9ea42231ed9953", 0x0, 0xa0000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3}, 0x50) r0 = syz_open_dev$sg(&(0x7f0000000140), 0x6f5e, 0x1) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x85) 550.979603ms ago: executing program 3 (id=4121): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20004001}, 0x4000018) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310007000008000a40fffffffc14000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x94}, 0x24000000) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a3c000000090a010200000000000000000a0000040900020073797a390000000008000a40fffffffc0900010073797a3100000000080005400000000d"], 0x64}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000000) 484.254676ms ago: executing program 3 (id=4122): r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) ptrace(0x10, 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/locks\x00', 0x0, 0x0) pread64(r1, &(0x7f00000002c0)=""/124, 0x7c, 0x7) r2 = open(&(0x7f0000000080)='./file1\x00', 0x66842, 0x90) socket(0x15, 0x5, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r5 = epoll_create1(0x0) r6 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r6, &(0x7f00000001c0)={0x20002011}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x83, 0x0, 0x0, 0x7, 0x510, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x1000, 0x20da, 0x0, 0xa, 0x20005, 0xac6, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) epoll_pwait2(r5, &(0x7f0000000100)=[{}], 0x1, 0x0, 0x0, 0x0) r7 = socket(0x2, 0x80805, 0x0) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r8, 0x0) close(0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x7a, &(0x7f0000000340)={r9, @in6={{0xa, 0x3, 0x4, @mcast1}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r7, 0x84, 0x71, &(0x7f00000005c0)={r10, 0x2}, &(0x7f0000000600)=0x8) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x800000, &(0x7f0000000a00)={[{@dioread_lock}]}, 0x12, 0x522, &(0x7f00000023c0)="$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") syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x181d011, 0x0, 0x40, 0x0, &(0x7f0000000140)) rmdir(&(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') bind$can_raw(r3, &(0x7f00000001c0)={0x1d, r4}, 0x10) mq_open(&(0x7f0000000a00)='!\x7f\x00\xca\x00\x00\x00\f\x00\x00\x01E!T\xeeux\x00\xbf@\xf4\x1c\xbce\xca\x97\xd5pkv\x88L\xe8$\xef\xfeI\xdaW1\xfcg\xa1\xdb$,0y$\xcd{zl.\xae\x805\xa8\xd6\x85\x15\xd2\x0e~\xcc\x90\x97\xe8h\v\x1a9X\a\xca{\x11#\x95m{U\xe5-\xabRw\xcafy\xe6\aNhX4Ll[\x14\x150x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x0, 0x4e22, 0xc8, 0xa, 0x20, 0x0, 0x2c, r4, r11}, {0xfee7, 0xd, 0xbca, 0x7, 0x7, 0xfffffffeffffffff, 0x4, 0x81}, {0x40, 0x6, 0xe, 0xfff}, 0xd60e, 0x6e6bb0, 0x0, 0x0, 0x5, 0x2}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4d5, 0x2b}, 0xa, @in=@rand_addr=0x64010101, 0x3505, 0x1, 0x0, 0x4, 0x7, 0x6, 0x2}}, 0xe8) 483.582936ms ago: executing program 3 (id=4123): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1) io_setup(0x239f, &(0x7f0000000380)=0x0) io_submit(r1, 0x477f, &(0x7f0000000b40)=[&(0x7f0000000080)={0x200000000000000, 0x0, 0x0, 0x7, 0x8, r0, 0x0}]) 477.976037ms ago: executing program 2 (id=4124): add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x7e, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @udp={0xa, 0x6, '\x00', 0x48, 0x11, 0x0, @local, @ipv4={'\x00', '\xff\xff', @empty}, {[], {0x4e1d, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "dc521c259b538a2bf2a113dc2eeec0a072edf20b6d59027f", "d646c098cfc27eb8549d66e7b219c2c32f25d6bfcc2419dff9e59631718ba089"}}}}}}}, 0x0) 448.085278ms ago: executing program 4 (id=4125): socket$netlink(0x10, 0x3, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000402) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x2f, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffce0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000200)={0x2, 0x4e24, @remote}, 0x10) pipe(0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r3) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r3, 0x0, 0x84) sendmsg$rds(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) ppoll(&(0x7f0000000180)=[{r2, 0x2000}], 0x1, 0x0, 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r4 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x42002, 0x0) open_by_handle_at(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="c800000071000000efc180b2ba2adf6ac513d05195efea76ff4b110000abc596293fa13b1331dca24d8f82e05f2b808724987be11cb4b71c00a90b7f8bb556e7218a5f2e61e868d19ec1d4457e2554962fc48f8613f76cf8ac22b341a0cc6776ff94032a6f218c8c272a811672c73d02a50b7abc08cfa85e443fe8e5ca7edb30b4ab2b7e5371b810099f232d73770a77f353cfcd8c7882948877a4069f988edd7d0942817fa1a28e24fc739c3f94e0219915990a648642eff54e175bf2a02371851fda"], 0x5a9600) fcntl$setpipe(r4, 0x407, 0x4) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000023892) r6 = syz_io_uring_setup(0x2af, &(0x7f0000000080)={0x0, 0x1803, 0x10000, 0xfffffffb, 0x100002cf}, &(0x7f0000000380)=0x0, &(0x7f00000003c0)=0x0) syz_io_uring_submit(r7, r8, &(0x7f00000009c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xffffffffffffff31}) io_uring_enter(r6, 0x7a98, 0x0, 0x0, 0x0, 0x17) r9 = socket(0x10, 0x3, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x0, &(0x7f0000000100)=0x1, 0x0, 0x4) write(r9, &(0x7f0000000080)="1400000052004f030e789e7ee2ce2fa4ff612d27", 0x14) recvmmsg(r9, &(0x7f0000005c80), 0x0, 0x10122, 0x0) 443.772328ms ago: executing program 2 (id=4126): r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) ptrace(0x10, 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/locks\x00', 0x0, 0x0) pread64(r1, &(0x7f00000002c0)=""/124, 0x7c, 0x7) r2 = open(&(0x7f0000000080)='./file1\x00', 0x66842, 0x90) socket(0x15, 0x5, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r5 = epoll_create1(0x0) r6 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r6, &(0x7f00000001c0)={0x20002011}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x83, 0x0, 0x0, 0x7, 0x510, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x1000, 0x20da, 0x0, 0xa, 0x20005, 0xac6, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) epoll_pwait2(r5, &(0x7f0000000100)=[{}], 0x1, 0x0, 0x0, 0x0) r7 = socket(0x2, 0x80805, 0x0) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r8, 0x0) close(0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e23, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x7a, &(0x7f0000000340)={r9, @in6={{0xa, 0x3, 0x4, @mcast1}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r7, 0x84, 0x71, 0x0, &(0x7f0000000600)) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x800000, &(0x7f0000000a00)={[{@dioread_lock}]}, 0x12, 0x522, &(0x7f00000023c0)="$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") syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x181d011, 0x0, 0x40, 0x0, &(0x7f0000000140)) rmdir(&(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') bind$can_raw(r3, &(0x7f00000001c0)={0x1d, r4}, 0x10) mq_open(&(0x7f0000000a00)='!\x7f\x00\xca\x00\x00\x00\f\x00\x00\x01E!T\xeeux\x00\xbf@\xf4\x1c\xbce\xca\x97\xd5pkv\x88L\xe8$\xef\xfeI\xdaW1\xfcg\xa1\xdb$,0y$\xcd{zl.\xae\x805\xa8\xd6\x85\x15\xd2\x0e~\xcc\x90\x97\xe8h\v\x1a9X\a\xca{\x11#\x95m{U\xe5-\xabRw\xcafy\xe6\aNhX4Ll[\x14\x150x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x0, 0x4e22, 0xc8, 0xa, 0x20, 0x0, 0x2c, r4, r10}, {0xfee7, 0xd, 0xbca, 0x7, 0x7, 0xfffffffeffffffff, 0x4, 0x81}, {0x40, 0x6, 0xe, 0xfff}, 0xd60e, 0x6e6bb0, 0x0, 0x0, 0x5, 0x2}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4d5, 0x2b}, 0xa, @in=@rand_addr=0x64010101, 0x3505, 0x1, 0x0, 0x4, 0x7, 0x6, 0x2}}, 0xe8) 414.66529ms ago: executing program 2 (id=4127): r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000280)={@multicast2, @local, @remote}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB="e0000002ac1414aa"], 0x1c) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x64, 0x0, 0x4, 0x2, 0x0, @empty, @multicast2}, @timestamp_reply={0x11, 0x0, 0x0, 0xe000, 0x2, 0x10001, 0x8000000}}}}}, 0x0) 342.097683ms ago: executing program 2 (id=4129): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000600), 0xc2841, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001440)={'\x00', 0x4212}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETLINK(r0, 0x400454cd, 0x325) 330.973344ms ago: executing program 3 (id=4130): r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect$lan78xx(0x6, 0x3f, &(0x7f0000000140)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0x424, 0x7850, 0x0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x41015500, 0x0) 262.459827ms ago: executing program 2 (id=4131): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000016c0)={0x10, 0x0, 0x25dfdbfb, 0x40000044}, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x41, 0x3, 0x388, 0x218, 0x19, 0x0, 0x0, 0x0, 0x2f0, 0x1f0, 0x1f0, 0x2f0, 0x1f0, 0x3, 0x0, {[{{@ip={@private, @dev, 0x0, 0x0, 'wlan1\x00', 'wg1\x00'}, 0x0, 0x1f8, 0x218, 0x0, {0x0, 0xffffffffa0028000}, [@common=@unspec=@quota={{0x38}}, @common=@inet=@hashlimit2={{0x150}, {'veth1\x00', {0x8, 0x8, 0x0, 0x0, 0x0, 0x687c, 0x1}}}]}, @unspec=@TRACE={0x20}}, {{@ip={@empty, @empty, 0x0, 0x0, 'veth0_vlan\x00', 'netpci0\x00', {}, {}, 0xff84}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x21, 0xffffffff, 0x3, '\x00', 'syz0\x00', {0x2}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3e8) 182.026711ms ago: executing program 2 (id=4132): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x6f, &(0x7f0000000280)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x61, 0x2, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x4e24, 0x4e20, 0x4d, 0x0, @opaque="b7ca129549bf31be1131cc3c7517ca193cefa6096666528999a4a151ce3a0ff77bce06ffcafb95d136620e0379809df504ce2a5099d8bd4951994c2a5d4e6f8a89b0d62b23"}}}}}, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000140)=""/46, 0x2e}, {0x0}, {&(0x7f0000001480)=""/30, 0x1e}], 0x3) 99.497785ms ago: executing program 1 (id=4133): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)={0x4c, 0x2, 0x6, 0x801, 0xe4340000, 0x0, {0xa}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x4c}}, 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000c80)={0x5c, 0x9, 0x6, 0x801, 0x0, 0x0, {0x7}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x34, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @remote}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0xe1f}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x88}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10000042}, 0x90) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x2, 0x200, @loopback, 0x7}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r2, &(0x7f0000000440)="7f", 0x1, 0x20000045, &(0x7f00000001c0)={0xa, 0x2, 0xffff, @loopback, 0x9}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='vegas', 0x5) sendmmsg$inet6(r2, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000240)="534b0ac01bd0edcbe8a5dea438bce2d26b42fac94876446e7a50498dd3ce64ca74af811203320c767ab62b9746565e64d89162c210e84aacc075dc30af2f60c36e4abb4e986f149611d8bd5334996caed771187552b8fdc0c0ad7e2e3bed94000000000000000000", 0x68}], 0x1}}], 0x1, 0x4000000) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000040)={0x42, 0x0, 0x3}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000300)={'lo\x00', 0x0}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r9, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x338, 0x158, 0x5c, 0x160, 0x158, 0x3e0, 0x268, 0x228, 0x25a, 0x268, 0x228, 0x4, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'veth0_to_batadv\x00', 'pim6reg\x00', {}, {}, 0x3a}, 0x5002, 0x118, 0x158, 0x52020000, {0x0, 0x6802000000000000}, [@common=@unspec=@limit={{0x48}, {0x10000, 0x80000000, 0x8, 0x9, 0x40, 0x5, 0x4}}, @common=@unspec=@state={{0x28}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x7, 0x2, {0xfffffffffffffffa}}}}, {{@ipv6={@local, @empty, [], [], 'veth1_to_hsr\x00', 'dummy0\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0xffffffff, 'snmp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x398) sendmsg$ETHTOOL_MSG_EEE_SET(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000000c0)={0x34, r6, 0x1, 0x70bd25, 0x25dedafe, {}, [@ETHTOOL_A_EEE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x28000}, 0x24000894) r10 = socket$tipc(0x1e, 0x2, 0x0) r11 = dup3(r4, r10, 0x0) setsockopt$TIPC_GROUP_LEAVE(r11, 0x10f, 0x88) sendmsg$NL80211_CMD_SET_CQM(r11, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000500)={0x120, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2da7, 0x42}}}}, [@NL80211_ATTR_CQM={0x3c, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x4}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x3}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0xb}, @NL80211_ATTR_CQM_RSSI_THOLD={0x20, 0x1, [0x6, 0x4, 0x7, 0xdf, 0x8001, 0x6, 0x38e]}]}, @NL80211_ATTR_CQM={0x68, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THOLD={0x8, 0x1, [0x9]}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0xa}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x63}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x1d7}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0xb}, @NL80211_ATTR_CQM_RSSI_THOLD={0x1c, 0x1, [0xffffff97, 0x3, 0xe, 0x1, 0x8, 0x7]}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x2bd}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x7}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x2e3}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x329}]}, @NL80211_ATTR_CQM={0x44, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x4a}, @NL80211_ATTR_CQM_RSSI_THOLD={0x10, 0x1, [0x0, 0x4800, 0x7]}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0xd}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x3}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x9}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x5}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x10001}]}, @NL80211_ATTR_CQM={0x18, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THOLD={0xc, 0x1, [0x5, 0xe]}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x1a}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x1}, 0x840) sendto$inet6(r2, &(0x7f00000006c0)="5671cd3b959efb3a2a8caf49ba7fbca5dc8a94f143cff61b66507cf8f93352bc5c85043c20db4cc6274e130b5bb32b2b5976fc74c7174bec3e3eccf04a2f0517378c974c1a39815c15de7726a8eff7de703b5513ace3a8a51c14c7ba20184a2fc304cd2bdb6f586a2edbc5e9487b5bbecf798ece1d683a32b76663a398e36e73cdf70cf57167785b738c0dec09e7e47505c71922bb94dea4d4d8c8e13bd7c02b2337e3cb7551bf24ca0b9e97b12017c1028d1e46e54eb63a906913a9f7ddabcd18cbb5901913523447c6ff86deb469352c660f5a3abc3a383d5481af9e29885d6210adf1a449dd37a3", 0xe9, 0x80, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x50, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x20, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_ROUTER={0x5, 0x16, 0x2}, @IFLA_BR_MCAST_STARTUP_QUERY_CNT={0x8, 0x1d, 0x9}, @IFLA_BR_MCAST_LAST_MEMBER_INTVL={0xc, 0x1e, 0x5}]}}}]}, 0x50}, 0x1, 0x0, 0x0, 0x400c000}, 0x44) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004080}, 0x48810) recvmsg(r0, &(0x7f000000c1c0)={0x0, 0x0, &(0x7f000000c080)=[{&(0x7f000000acc0)=""/4096, 0x1000}], 0x1}, 0x20) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=""/242, 0xf2) 64.571917ms ago: executing program 1 (id=4134): r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) ptrace(0x10, 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/locks\x00', 0x0, 0x0) pread64(r1, &(0x7f00000002c0)=""/124, 0x7c, 0x7) r2 = open(&(0x7f0000000080)='./file1\x00', 0x66842, 0x90) socket(0x15, 0x5, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r5 = epoll_create1(0x0) r6 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r6, &(0x7f00000001c0)={0x20002011}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x83, 0x0, 0x0, 0x7, 0x510, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x1000, 0x20da, 0x0, 0xa, 0x20005, 0xac6, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) epoll_pwait2(r5, &(0x7f0000000100)=[{}], 0x1, 0x0, 0x0, 0x0) r7 = socket(0x2, 0x80805, 0x0) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r8, 0x0) close(0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e23, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x7a, &(0x7f0000000340)={r9, @in6={{0xa, 0x3, 0x4, @mcast1}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r7, 0x84, 0x71, 0x0, &(0x7f0000000600)) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x800000, &(0x7f0000000a00)={[{@dioread_lock}]}, 0x12, 0x522, &(0x7f00000023c0)="$eJzs3U9sI1cZAPBvJsnau02bLfQAqNClFBa0WjvxtquqF8qpQqgSokcO25B4oyh2HMVOacIeskfuSFTiBCfOHJA4IPXEHYkD3LiUA1KBFahBQsLVjO2s88eJlU3sbfz7SSO/mTf2996O5j3r82ZeABPrRkTsRsSViHg3Iua6x5PuFm92tuy8Tx49WNp79GApiXb7nX8meX12LPrek3mm+5nFiPjBWxE/Sg4F/VNEc3tnbbFWq252D5Vb9Y1yc3vn9mp9caW6Ul2vVO4u3J1//c5rlXPr60v133x8NSJ+/7svf/TH3W/9JGvWbLeuvx/nqdP1mf04memI+N5FBBuDqW5/rpzlzWd6E+cpjYjPRcTL+f0/F1P51Tzo4GX69ghbBwBchHZ7Ltpz/fsAwGWX5jmwJC11cwGzkaalUieH90JcS2uNZuvW/cbW+nInV3Y9ZtL7q7XqfDdXeD1mkvur09WFvNzbr1Urh/bvRMTzEfGzwtV8v7TUqC2P84sPAEywZw7N//8pdOZ/AOCSKz4uFsbZDgBgdIrjbgAAMHLmfwCYPOZ/AJg85n8AmDzmfwCYPOZ/AJgo33/77Wxr73Wff7383vbWWuO928vV5lqpvrVUWmpsbpRWGo2V/Jk99dM+r9ZobCy8Glvvl1vVZqvc3N65V29srbfu5c/1vledGUmvAICTPP/Sh39JImL3jav5Fn3P+z91rn7xolsHXKR03A0AxmZq3A0Axuboal/ApJCPh8n1/3a7HX1r90bEw/1S38NAB/4XoQ+GCpNaNxSePje/+AT5f+AzTf4fJtfZ8v++y8NlIP8Pk6vdTqz5DwATRo4fSE6p7//9f77dtzPc7/8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwKc3mW5KWumuBz0aalkoRz0bE9ZhJ7q/WqvMR8VxE/LkwU8j2FyLCukEA8FmW/j3prv91c+6V2cO1Vwr/LeSvEfHjX7zz8/cXW63NhYgryb/2j7c+6B6vjKP9AMBpevN0bx7v+eTRg6XeNsr2fPydzuKiWdy97tapmY7p/LWY5xqu/Tvp7ndk31emziH+7sOI+MJx/U/y3Mj17sqnh+NnsZ8dafz0QPw0r+u8Zv8Wnz+HtsCk+TAbf9487v5L40b+evz9X8xHqCfXG//2jox/6f74NzVg/LsxbIxX//DdIwfbc526hxFfmo7Y63143/gzHTHXi3Vc/FeGjP/XF7/y8qC69i8jbsZx/U8OxCq36hvl5vbO7dX64kp1pbpeqdxduDv/+p3XKuU8R13uZaqP+scbt54bFD/r/7UB8TtXvjiw/18fsv+/+t+7P/zqCfG/+bXjr/8LJ8TP5sRvDBl/8dpvi4PqsvjLA/o/fUL87NitIeN/9Led5SFPBQBGoLm9s7ZYq1U3n7xQPPGc9DxCDFFIInYvOMTjQuHXP33r9JMLI2vPGQsxqGrqaWnhpSkUno5mDFEY98gEXLTHN/24WwIAAAAAAAAAAAAAAAwyij8nGncfAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAuLw+DQAA///1+tbf") syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x181d011, 0x0, 0x40, 0x0, &(0x7f0000000140)) rmdir(&(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') bind$can_raw(r3, &(0x7f00000001c0)={0x1d, r4}, 0x10) mq_open(&(0x7f0000000a00)='!\x7f\x00\xca\x00\x00\x00\f\x00\x00\x01E!T\xeeux\x00\xbf@\xf4\x1c\xbce\xca\x97\xd5pkv\x88L\xe8$\xef\xfeI\xdaW1\xfcg\xa1\xdb$,0y$\xcd{zl.\xae\x805\xa8\xd6\x85\x15\xd2\x0e~\xcc\x90\x97\xe8h\v\x1a9X\a\xca{\x11#\x95m{U\xe5-\xabRw\xcafy\xe6\aNhX4Ll[\x14\x150x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x0, 0x4e22, 0xc8, 0xa, 0x20, 0x0, 0x2c, r4, r10}, {0xfee7, 0xd, 0xbca, 0x7, 0x7, 0xfffffffeffffffff, 0x4, 0x81}, {0x40, 0x6, 0xe, 0xfff}, 0xd60e, 0x6e6bb0, 0x0, 0x0, 0x5, 0x2}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4d5, 0x2b}, 0xa, @in=@rand_addr=0x64010101, 0x3505, 0x1, 0x0, 0x4, 0x7, 0x6, 0x2}}, 0xe8) 813.32µs ago: executing program 1 (id=4135): r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) ptrace(0x10, 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/locks\x00', 0x0, 0x0) pread64(r1, &(0x7f00000002c0)=""/124, 0x7c, 0x7) r2 = open(&(0x7f0000000080)='./file1\x00', 0x66842, 0x90) socket(0x15, 0x5, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r5 = epoll_create1(0x0) r6 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r6, &(0x7f00000001c0)={0x20002011}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x83, 0x0, 0x0, 0x7, 0x510, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x1000, 0x20da, 0x0, 0xa, 0x20005, 0xac6, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) epoll_pwait2(r5, &(0x7f0000000100)=[{}], 0x1, 0x0, 0x0, 0x0) r7 = socket(0x2, 0x80805, 0x0) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r8, 0x0) close(0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e23, @rand_addr=0x64010100}]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x7a, &(0x7f0000000340)={r9, @in6={{0xa, 0x3, 0x4, @mcast1}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r7, 0x84, 0x71, &(0x7f00000005c0)={r10, 0x2}, &(0x7f0000000600)=0x8) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x800000, &(0x7f0000000a00)={[{@dioread_lock}]}, 0x12, 0x522, &(0x7f00000023c0)="$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") syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x181d011, 0x0, 0x40, 0x0, &(0x7f0000000140)) rmdir(&(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') bind$can_raw(r3, &(0x7f00000001c0)={0x1d, r4}, 0x10) mq_open(&(0x7f0000000a00)='!\x7f\x00\xca\x00\x00\x00\f\x00\x00\x01E!T\xeeux\x00\xbf@\xf4\x1c\xbce\xca\x97\xd5pkv\x88L\xe8$\xef\xfeI\xdaW1\xfcg\xa1\xdb$,0y$\xcd{zl.\xae\x805\xa8\xd6\x85\x15\xd2\x0e~\xcc\x90\x97\xe8h\v\x1a9X\a\xca{\x11#\x95m{U\xe5-\xabRw\xcafy\xe6\aNhX4Ll[\x14\x150x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x0, 0x4e22, 0xc8, 0xa, 0x20, 0x0, 0x2c, r4, r11}, {0xfee7, 0xd, 0xbca, 0x7, 0x7, 0xfffffffeffffffff, 0x4, 0x81}, {0x40, 0x6, 0xe, 0xfff}, 0xd60e, 0x6e6bb0, 0x0, 0x0, 0x5, 0x2}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4d5, 0x2b}, 0xa, @in=@rand_addr=0x64010101, 0x3505, 0x1, 0x0, 0x4, 0x7, 0x6, 0x2}}, 0xe8) 0s ago: executing program 1 (id=4136): socket$netlink(0x10, 0x3, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000402) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x2f, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffce0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000200)={0x2, 0x4e24, @remote}, 0x10) pipe(0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r3) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r3, 0x0, 0x84) sendmsg$rds(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) ppoll(&(0x7f0000000180)=[{r2, 0x2000}], 0x1, 0x0, 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001480), 0x42002, 0x0) open_by_handle_at(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="c800000071000000efc180b2ba2adf6ac513d05195efea76ff4b110000abc596293fa13b1331dca24d8f82e05f2b808724987be11cb4b71c00a90b7f8bb556e7218a5f2e61e868d19ec1d4457e2554962fc48f8613f76cf8ac22b341a0cc6776ff94032a6f218c8c272a811672c73d02a50b7abc08cfa85e443fe8e5ca7edb30b4ab2b7e5371b810099f232d73770a77f353cf"], 0x5a9600) fcntl$setpipe(r4, 0x407, 0x4) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x20000023892) r6 = syz_io_uring_setup(0x2af, &(0x7f0000000080)={0x0, 0x1803, 0x10000, 0xfffffffb, 0x100002cf}, &(0x7f0000000380)=0x0, &(0x7f00000003c0)=0x0) syz_io_uring_submit(r7, r8, &(0x7f00000009c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xffffffffffffff31}) io_uring_enter(r6, 0x7a98, 0x0, 0x0, 0x0, 0x17) r9 = socket(0x10, 0x3, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x0, &(0x7f0000000100)=0x1, 0x0, 0x4) write(r9, &(0x7f0000000080)="1400000052004f030e789e7ee2ce2fa4ff612d27", 0x14) recvmmsg(r9, &(0x7f0000005c80), 0x0, 0x10122, 0x0) kernel console output (not intermixed with test programs): , leaking uprobe [ 79.694571][ T4244] xt_limit: Overflow, try lower: 65536/2147483648 [ 79.988467][ T4248] xt_limit: Overflow, try lower: 65536/2147483648 [ 80.776218][ T4261] loop1: detected capacity change from 0 to 1764 [ 80.783855][ T4261] iso9660: Unknown parameter 'utF8' [ 81.579727][ T4273] xt_CT: You must specify a L4 protocol and not use inversions on it [ 82.571829][ T28] kauditd_printk_skb: 240 callbacks suppressed [ 82.571900][ T28] audit: type=1326 audit(1773787919.821:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4272 comm="syz.0.165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 83.551803][ T28] audit: type=1326 audit(1773787919.821:834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4272 comm="syz.0.165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 83.575455][ T28] audit: type=1326 audit(1773787919.821:835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4272 comm="syz.0.165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=89 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 83.600666][ T4273] wireguard0: entered promiscuous mode [ 83.660419][ T28] audit: type=1326 audit(1773787919.821:836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4272 comm="syz.0.165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 83.688169][ T4273] wireguard0: entered allmulticast mode [ 83.731146][ T28] audit: type=1326 audit(1773787919.821:837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4272 comm="syz.0.165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 83.776588][ T4283] loop1: detected capacity change from 0 to 1024 [ 83.802432][ T4283] EXT4-fs: Ignoring removed mblk_io_submit option [ 83.820890][ T4283] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 83.837605][ T28] audit: type=1326 audit(1773787919.821:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4272 comm="syz.0.165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 83.862533][ T28] audit: type=1326 audit(1773787919.821:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4272 comm="syz.0.165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 83.871872][ T4283] EXT4-fs (loop1): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 83.888867][ T28] audit: type=1326 audit(1773787919.821:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4272 comm="syz.0.165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 83.925406][ T4283] EXT4-fs error (device loop1): ext4_ext_check_inode:521: inode #11: comm syz.1.168: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 32512(32512) [ 83.949174][ T4283] loop1: lost file I/O error report for ino 11 type 5 pos 0x0 len 0x0 error -117 [ 83.949418][ T4283] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.168: couldn't read orphan inode 11 (err -117) [ 83.958731][ C0] EXT4-fs (loop1): error count since last fsck: 1 [ 83.958772][ C0] EXT4-fs (loop1): initial error at time 1773787921: ext4_ext_check_inode:521: inode 11 [ 83.958821][ C0] EXT4-fs (loop1): last error at time 1773787921: ext4_ext_check_inode:521: inode 11 [ 84.029535][ T28] audit: type=1326 audit(1773787919.821:841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4272 comm="syz.0.165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 84.062252][ T4283] loop1: lost filesystem error report for type 5 error -117 [ 84.062753][ T28] audit: type=1326 audit(1773787919.821:842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4272 comm="syz.0.165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 84.095145][ T4283] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 84.147696][ T4283] EXT4-fs error (device loop1): ext4_read_block_bitmap_nowait:483: comm syz.1.168: Invalid block bitmap block 0 in block_group 0 [ 84.162930][ T4283] EXT4-fs error (device loop1): ext4_acquire_dquot:7001: comm syz.1.168: Failed to acquire dquot type 0 [ 84.491304][ T4303] netlink: 24 bytes leftover after parsing attributes in process `syz.3.172'. [ 84.519492][ T4300] EXT4-fs error (device loop1): __ext4_get_inode_loc:4782: comm syz.1.168: Invalid inode table block 8589934593 in block_group 0 [ 84.943389][ T4298] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=4298 comm=syz.3.172 [ 84.963991][ T4298] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 84.972547][ T4298] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 85.314627][ T4306] netlink: 132 bytes leftover after parsing attributes in process `syz.4.173'. [ 85.473091][ T4308] capability: warning: `syz.4.173' uses deprecated v2 capabilities in a way that may be insecure [ 85.535438][ T4310] xt_limit: Overflow, try lower: 65536/2147483648 [ 85.699171][ T3965] EXT4-fs error (device loop1): __ext4_get_inode_loc:4782: comm kworker/u8:15: Invalid inode table block 8589934593 in block_group 0 [ 85.729179][ T4315] xt_limit: Overflow, try lower: 65536/2147483648 [ 85.729376][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 85.939277][ T4330] loop1: detected capacity change from 0 to 512 [ 85.953591][ T4330] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 85.966349][ T4330] ext4 filesystem being mounted at /42/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 86.005551][ T4316] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 86.022367][ T4316] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 86.053745][ T4335] xt_limit: Overflow, try lower: 65536/2147483648 [ 86.103237][ T4336] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 86.298994][ T4316] ref_ctr going negative. vaddr: 0x200000ffd002, curr val: -26127, delta: 1 [ 86.317745][ T4316] ref_ctr increment failed for inode: 0xad offset: 0x5 ref_ctr_offset: 0x2 of mm: 0xffff88810477ec00 [ 86.497486][ T4342] syz_tun: entered allmulticast mode [ 86.594997][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 86.612441][ T4311] ref_ctr going negative. vaddr: 0x200000ffd002, curr val: -26127, delta: -1 [ 86.708344][ T4311] ref_ctr decrement failed for inode: 0xad offset: 0x5 ref_ctr_offset: 0x2 of mm: 0xffff88810477ec00 [ 86.722298][ T4311] uprobe: syz.2.176:4311 failed to unregister, leaking uprobe [ 86.921186][ T4347] loop1: detected capacity change from 0 to 512 [ 86.936609][ T4347] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 86.949291][ T4347] ext4 filesystem being mounted at /43/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 86.992299][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 87.252220][ T4364] netlink: 24 bytes leftover after parsing attributes in process `syz.4.188'. [ 87.329625][ T4362] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=4362 comm=syz.4.188 [ 87.581913][ T28] kauditd_printk_skb: 540 callbacks suppressed [ 87.581927][ T28] audit: type=1326 audit(1773787924.841:1381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4357 comm="syz.0.200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 87.749265][ T28] audit: type=1326 audit(1773787924.881:1382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4357 comm="syz.0.200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 88.008329][ T4374] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.189'. [ 88.027592][ T28] audit: type=1326 audit(1773787924.881:1383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4357 comm="syz.0.200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 88.158631][ T4373] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.189'. [ 88.175612][ T28] audit: type=1326 audit(1773787924.881:1384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4357 comm="syz.0.200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 88.262273][ T28] audit: type=1326 audit(1773787924.881:1385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4357 comm="syz.0.200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 88.396962][ T28] audit: type=1326 audit(1773787924.891:1386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4357 comm="syz.0.200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 88.518671][ T28] audit: type=1326 audit(1773787924.891:1387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4357 comm="syz.0.200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 88.547765][ T4382] xt_limit: Overflow, try lower: 65536/2147483648 [ 88.629079][ T28] audit: type=1326 audit(1773787924.891:1388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4357 comm="syz.0.200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 88.839527][ T28] audit: type=1326 audit(1773787924.901:1389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4357 comm="syz.0.200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 88.878967][ T28] audit: type=1326 audit(1773787924.901:1390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4357 comm="syz.0.200" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 88.954723][ T4386] loop1: detected capacity change from 0 to 512 [ 88.967902][ T4388] netlink: 12 bytes leftover after parsing attributes in process `syz.2.193'. [ 89.012695][ T4386] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 89.035521][ T4386] ext4 filesystem being mounted at /45/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 89.119021][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 89.159882][ T4395] netlink: 80 bytes leftover after parsing attributes in process `syz.1.196'. [ 89.452496][ T4408] netlink: 'syz.4.199': attribute type 13 has an invalid length. [ 91.604888][ T4430] xt_limit: Overflow, try lower: 65536/2147483648 [ 91.625712][ T4431] netlink: 24 bytes leftover after parsing attributes in process `syz.1.206'. [ 91.696965][ T4431] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=4431 comm=syz.1.206 [ 91.831022][ T4437] netlink: 12 bytes leftover after parsing attributes in process `syz.0.216'. [ 92.138563][ T4428] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 92.147389][ T4428] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 92.751514][ T28] kauditd_printk_skb: 867 callbacks suppressed [ 92.751528][ T28] audit: type=1326 audit(1773787930.011:2258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4439 comm="syz.2.210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7faac6b7cfce code=0x7ffc0000 [ 92.924860][ T28] audit: type=1326 audit(1773787930.041:2259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4439 comm="syz.2.210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7faac6b7cfce code=0x7ffc0000 [ 92.949484][ T28] audit: type=1326 audit(1773787930.051:2260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4439 comm="syz.2.210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7faac6b7cfce code=0x7ffc0000 [ 92.973438][ T28] audit: type=1326 audit(1773787930.051:2261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4439 comm="syz.2.210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7faac6b7cfce code=0x7ffc0000 [ 93.556581][ T28] audit: type=1326 audit(1773787930.051:2262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4439 comm="syz.2.210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7faac6b7cfce code=0x7ffc0000 [ 93.614129][ T4447] 8021q: adding VLAN 0 to HW filter on device bond0 [ 93.625088][ T4447] 8021q: adding VLAN 0 to HW filter on device team0 [ 93.637397][ T4447] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 93.735146][ T28] audit: type=1326 audit(1773787930.051:2263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4439 comm="syz.2.210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7faac6b7cfce code=0x7ffc0000 [ 93.759176][ T28] audit: type=1326 audit(1773787930.061:2264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4439 comm="syz.2.210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7faac6b7cfce code=0x7ffc0000 [ 93.782757][ T28] audit: type=1326 audit(1773787930.061:2265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4439 comm="syz.2.210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7faac6b7cfce code=0x7ffc0000 [ 93.880242][ T28] audit: type=1326 audit(1773787930.071:2266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4439 comm="syz.2.210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7faac6b7cfce code=0x7ffc0000 [ 93.904015][ T28] audit: type=1326 audit(1773787930.071:2267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4439 comm="syz.2.210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7faac6b7cfce code=0x7ffc0000 [ 94.483507][ T4455] loop1: detected capacity change from 0 to 512 [ 94.518633][ T4455] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 94.531147][ T4455] ext4 filesystem being mounted at /50/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 94.595995][ T4455] netlink: 12 bytes leftover after parsing attributes in process `syz.1.214'. [ 94.842069][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 94.919249][ T4468] loop1: detected capacity change from 0 to 512 [ 94.946845][ T4468] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 94.991906][ T4468] ext4 filesystem being mounted at /51/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 95.047185][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 95.086267][ T4475] loop1: detected capacity change from 0 to 1024 [ 95.093242][ T4475] EXT4-fs: Ignoring removed mblk_io_submit option [ 95.107852][ T4475] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 95.118478][ T4475] EXT4-fs (loop1): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 95.144837][ T4475] EXT4-fs error (device loop1): ext4_ext_check_inode:521: inode #11: comm syz.1.219: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 32512(32512) [ 95.164345][ T4475] loop1: lost file I/O error report for ino 11 type 5 pos 0x0 len 0x0 error -117 [ 95.164507][ T4475] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.219: couldn't read orphan inode 11 (err -117) [ 95.173768][ C0] EXT4-fs (loop1): error count since last fsck: 1 [ 95.173806][ C0] EXT4-fs (loop1): initial error at time 1773787932: ext4_ext_check_inode:521: inode 11 [ 95.173870][ C0] EXT4-fs (loop1): last error at time 1773787932: ext4_ext_check_inode:521: inode 11 [ 95.211890][ T4475] loop1: lost filesystem error report for type 5 error -117 [ 95.212576][ T4475] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 95.264296][ T4475] EXT4-fs error (device loop1): ext4_read_block_bitmap_nowait:483: comm syz.1.219: Invalid block bitmap block 0 in block_group 0 [ 95.282090][ T4481] xt_limit: Overflow, try lower: 65536/2147483648 [ 95.316503][ T4475] EXT4-fs error (device loop1): ext4_acquire_dquot:7001: comm syz.1.219: Failed to acquire dquot type 0 [ 95.415606][ T4475] EXT4-fs error (device loop1): __ext4_get_inode_loc:4782: comm syz.1.219: Invalid inode table block 8589934593 in block_group 0 [ 95.739219][ T3973] EXT4-fs error (device loop1): __ext4_get_inode_loc:4782: comm kworker/u8:16: Invalid inode table block 8589934593 in block_group 0 [ 95.753760][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 97.831707][ T4498] netlink: 'syz.4.226': attribute type 36 has an invalid length. [ 97.842625][ T4498] bridge1: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 97.852479][ T4498] bridge1: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 97.865769][ T4498] netlink: 'syz.4.226': attribute type 10 has an invalid length. [ 97.873602][ T4498] macvlan1: entered allmulticast mode [ 97.879299][ T4498] veth1_vlan: entered allmulticast mode [ 97.886138][ T4498] team0: Port device macvlan1 added [ 98.149360][ T4505] syz_tun: entered allmulticast mode [ 98.171879][ T28] kauditd_printk_skb: 815 callbacks suppressed [ 98.171989][ T28] audit: type=1326 audit(1773787935.401:3081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4503 comm="syz.0.229" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 98.548523][ T4502] loop1: detected capacity change from 0 to 512 [ 98.667288][ T28] audit: type=1326 audit(1773787935.401:3082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4503 comm="syz.0.229" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 98.691429][ T28] audit: type=1326 audit(1773787935.401:3083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4503 comm="syz.0.229" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 98.717011][ T4502] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 98.729786][ T4502] ext4 filesystem being mounted at /53/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 98.779037][ T28] audit: type=1326 audit(1773787935.401:3084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4503 comm="syz.0.229" exe="/root/syz-executor" sig=0 arch=c000003e syscall=441 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 98.808244][ T28] audit: type=1326 audit(1773787935.401:3085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4503 comm="syz.0.229" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 98.821417][ T4516] netlink: 12 bytes leftover after parsing attributes in process `syz.1.228'. [ 98.847631][ T4513] netlink: 12 bytes leftover after parsing attributes in process `syz.4.230'. [ 98.850304][ T28] audit: type=1326 audit(1773787935.401:3086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4503 comm="syz.0.229" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 98.892356][ T28] audit: type=1326 audit(1773787935.401:3087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4503 comm="syz.0.229" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 98.925520][ T28] audit: type=1326 audit(1773787935.401:3088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4503 comm="syz.0.229" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 98.949098][ T28] audit: type=1326 audit(1773787935.401:3089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4503 comm="syz.0.229" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 98.988549][ T28] audit: type=1326 audit(1773787935.401:3090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4503 comm="syz.0.229" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 99.059387][ T4518] xt_limit: Overflow, try lower: 65536/2147483648 [ 99.120909][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 99.166840][ T4527] loop1: detected capacity change from 0 to 512 [ 99.196006][ T4527] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 99.211458][ T4527] ext4 filesystem being mounted at /54/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 99.299273][ T4534] netlink: 'syz.2.237': attribute type 39 has an invalid length. [ 99.309194][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 99.792598][ T4553] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.238'. [ 99.802364][ T4550] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.238'. [ 100.312588][ T4564] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=4564 comm=syz.4.247 [ 101.430443][ T4609] netlink: 'syz.2.267': attribute type 13 has an invalid length. [ 102.060356][ T4636] bond1: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 102.088011][ T4642] netlink: 80 bytes leftover after parsing attributes in process `syz.0.280'. [ 102.109088][ T4636] bond1 (unregistering): Released all slaves [ 102.624254][ T4659] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 102.648465][ T4661] netlink: 80 bytes leftover after parsing attributes in process `syz.3.288'. [ 102.676609][ T4055] lo speed is unknown, defaulting to 1000 [ 102.710613][ T4664] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 103.112396][ T4678] netlink: 80 bytes leftover after parsing attributes in process `syz.0.293'. [ 103.184321][ T28] kauditd_printk_skb: 3011 callbacks suppressed [ 103.184338][ T28] audit: type=1400 audit(1773787940.451:6081): avc: denied { prog_load } for pid=4677 comm="syz.0.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.254528][ T28] audit: type=1400 audit(1773787940.461:6082): avc: denied { prog_load } for pid=4671 comm="syz.3.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.287909][ T28] audit: type=1400 audit(1773787940.461:6083): avc: denied { prog_load } for pid=4671 comm="syz.3.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.309426][ T28] audit: type=1400 audit(1773787940.461:6084): avc: denied { open } for pid=4671 comm="syz.3.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 103.337172][ T28] audit: type=1400 audit(1773787940.461:6085): avc: denied { allowed } for pid=4671 comm="syz.3.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 103.357396][ T28] audit: type=1400 audit(1773787940.461:6086): avc: denied { prog_load } for pid=4677 comm="syz.0.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.380504][ T28] audit: type=1400 audit(1773787940.461:6087): avc: denied { create } for pid=4677 comm="syz.0.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 103.381183][ T4686] audit: audit_backlog=65 > audit_backlog_limit=64 [ 103.408523][ T28] audit: type=1400 audit(1773787940.461:6088): avc: denied { bpf } for pid=4677 comm="syz.0.293" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 103.430973][ T4686] audit: audit_lost=8 audit_rate_limit=0 audit_backlog_limit=64 [ 103.628223][ T4698] xt_limit: Overflow, try lower: 65536/2147483648 [ 103.676557][ T4701] netlink: 80 bytes leftover after parsing attributes in process `syz.1.300'. [ 103.677376][ T4692] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.296'. [ 103.702387][ T4696] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.296'. [ 104.213143][ T4714] netlink: 80 bytes leftover after parsing attributes in process `syz.0.305'. [ 104.953192][ T4726] xt_limit: Overflow, try lower: 65536/2147483648 [ 104.999128][ T4728] netlink: 80 bytes leftover after parsing attributes in process `syz.1.311'. [ 107.115326][ T4743] netlink: 132 bytes leftover after parsing attributes in process `syz.1.317'. [ 107.370601][ T4758] netlink: 80 bytes leftover after parsing attributes in process `syz.4.323'. [ 107.870294][ T4784] netlink: 80 bytes leftover after parsing attributes in process `syz.4.335'. [ 107.877730][ T4787] xt_limit: Overflow, try lower: 65536/2147483648 [ 108.019076][ T4810] netlink: 80 bytes leftover after parsing attributes in process `syz.2.347'. [ 108.135917][ T4818] xt_limit: Overflow, try lower: 65536/2147483648 [ 108.192082][ T28] kauditd_printk_skb: 1598 callbacks suppressed [ 108.192095][ T28] audit: type=1326 audit(1773787945.461:7686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4801 comm="syz.4.343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 108.224844][ T28] audit: type=1400 audit(1773787945.491:7687): avc: denied { map_create } for pid=4821 comm="syz.1.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 108.292178][ T28] audit: type=1326 audit(1773787945.521:7688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4801 comm="syz.4.343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 108.364725][ T28] audit: type=1326 audit(1773787945.531:7689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4801 comm="syz.4.343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 108.427967][ T4838] audit: audit_backlog=65 > audit_backlog_limit=64 [ 108.434681][ T4838] audit: audit_lost=9 audit_rate_limit=0 audit_backlog_limit=64 [ 108.442931][ T28] audit: type=1326 audit(1773787945.541:7690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4801 comm="syz.4.343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 108.466782][ T4838] audit: backlog limit exceeded [ 108.472321][ T4838] audit: audit_backlog=65 > audit_backlog_limit=64 [ 108.479232][ T4838] audit: audit_lost=10 audit_rate_limit=0 audit_backlog_limit=64 [ 108.611361][ T4842] xt_limit: Overflow, try lower: 65536/2147483648 [ 108.639757][ T4849] netlink: 80 bytes leftover after parsing attributes in process `syz.1.364'. [ 108.745462][ T4862] netlink: 'syz.3.370': attribute type 39 has an invalid length. [ 108.876350][ T4877] netlink: 80 bytes leftover after parsing attributes in process `syz.3.376'. [ 108.877227][ T4875] xt_limit: Overflow, try lower: 65536/2147483648 [ 109.501025][ T4906] xt_limit: Overflow, try lower: 65536/2147483648 [ 109.529948][ T4908] netlink: 80 bytes leftover after parsing attributes in process `syz.2.389'. [ 109.839740][ T4936] netlink: 80 bytes leftover after parsing attributes in process `syz.0.401'. [ 111.289105][ T5025] xt_limit: Overflow, try lower: 65536/2147483648 [ 112.506446][ T5126] netlink: 'syz.0.479': attribute type 36 has an invalid length. [ 112.522032][ T5126] bridge6: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 112.559211][ T5126] bridge6: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 112.579458][ T5129] netlink: 'syz.0.479': attribute type 10 has an invalid length. [ 112.610210][ T5129] macvlan1: entered allmulticast mode [ 112.625563][ T5129] veth1_vlan: entered allmulticast mode [ 112.642316][ T5134] netlink: 80 bytes leftover after parsing attributes in process `syz.2.487'. [ 112.654754][ T5129] team0: Port device macvlan1 added [ 112.752532][ T5140] netlink: 80 bytes leftover after parsing attributes in process `syz.1.499'. [ 112.801922][ T5148] syz.2.492 uses obsolete (PF_INET,SOCK_PACKET) [ 112.990091][ T5163] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.496'. [ 113.042425][ T5160] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.496'. [ 113.192220][ T5175] netlink: 80 bytes leftover after parsing attributes in process `syz.1.505'. [ 113.211536][ T5175] audit_log_start: 4057 callbacks suppressed [ 113.211555][ T5175] audit: audit_backlog=65 > audit_backlog_limit=64 [ 113.231817][ T5175] audit: audit_lost=27 audit_rate_limit=0 audit_backlog_limit=64 [ 113.249805][ T28] audit: type=1400 audit(1773787950.321:11699): avc: denied { create } for pid=5164 comm="syz.3.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 113.269999][ T5176] audit: audit_backlog=65 > audit_backlog_limit=64 [ 113.279427][ T5175] audit: backlog limit exceeded [ 113.289512][ T5176] audit: audit_lost=28 audit_rate_limit=0 audit_backlog_limit=64 [ 113.299585][ T28] audit: type=1400 audit(1773787950.321:11700): avc: denied { create } for pid=5164 comm="syz.3.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 113.333153][ T5177] audit: audit_backlog=65 > audit_backlog_limit=64 [ 113.339676][ T5177] audit: audit_lost=29 audit_rate_limit=0 audit_backlog_limit=64 [ 113.350333][ T28] audit: type=1400 audit(1773787950.321:11701): avc: denied { block_suspend } for pid=5164 comm="syz.3.500" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 113.482184][ T5188] xt_limit: Overflow, try lower: 65536/2147483648 [ 113.561609][ T5202] netlink: 80 bytes leftover after parsing attributes in process `syz.1.517'. [ 113.711124][ T5222] xt_limit: Overflow, try lower: 65536/2147483648 [ 113.724935][ T5225] xt_limit: Overflow, try lower: 65536/2147483648 [ 113.828062][ T5235] netlink: 80 bytes leftover after parsing attributes in process `syz.0.532'. [ 114.036736][ T5252] xt_limit: Overflow, try lower: 65536/2147483648 [ 114.144036][ T5261] netlink: 80 bytes leftover after parsing attributes in process `syz.0.543'. [ 114.575419][ T5286] netlink: 'syz.3.553': attribute type 2 has an invalid length. [ 114.856318][ T5291] xt_limit: Overflow, try lower: 65536/2147483648 [ 114.997175][ T5295] __nla_validate_parse: 2 callbacks suppressed [ 114.997224][ T5295] netlink: 80 bytes leftover after parsing attributes in process `syz.2.557'. [ 115.866230][ T5320] x_tables: duplicate underflow at hook 2 [ 116.004166][ T5334] bridge0: entered promiscuous mode [ 116.061139][ T5338] xt_limit: Overflow, try lower: 65536/2147483648 [ 116.511945][ T5355] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.578'. [ 116.575342][ T5349] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.578'. [ 116.614621][ T5368] xt_limit: Overflow, try lower: 65536/2147483648 [ 116.747076][ T5381] netlink: 80 bytes leftover after parsing attributes in process `syz.2.594'. [ 116.815985][ T5387] netlink: 'syz.2.597': attribute type 10 has an invalid length. [ 116.867940][ T5391] xt_limit: Overflow, try lower: 65536/2147483648 [ 117.131441][ T5416] xt_limit: Overflow, try lower: 65536/2147483648 [ 117.379379][ T5442] netlink: 80 bytes leftover after parsing attributes in process `syz.3.622'. [ 117.431439][ T5450] xt_limit: Overflow, try lower: 65536/2147483648 [ 117.656222][ T5480] netlink: 16186 bytes leftover after parsing attributes in process `syz.3.641'. [ 117.682322][ T5483] xt_limit: Overflow, try lower: 65536/2147483648 [ 117.875934][ T5511] xt_limit: Overflow, try lower: 65536/2147483648 [ 117.980651][ T5528] netlink: 8 bytes leftover after parsing attributes in process `syz.2.659'. [ 118.044078][ T5537] netlink: 'syz.0.667': attribute type 12 has an invalid length. [ 118.109404][ T5545] xt_limit: Overflow, try lower: 65536/2147483648 [ 118.225617][ T28] kauditd_printk_skb: 2675 callbacks suppressed [ 118.225631][ T28] audit: type=1400 audit(1773787955.491:14360): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 118.394500][ T5570] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.672'. [ 118.414278][ T5550] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.672'. [ 118.455879][ T5574] xt_connbytes: Forcing CT accounting to be enabled [ 118.477759][ T5574] xt_CT: You must specify a L4 protocol and not use inversions on it [ 118.557822][ T5581] netlink: 52 bytes leftover after parsing attributes in process `syz.2.687'. [ 118.590298][ T5581] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 118.695234][ T5587] audit: audit_backlog=65 > audit_backlog_limit=64 [ 118.721877][ T5587] audit: audit_lost=35 audit_rate_limit=0 audit_backlog_limit=64 [ 118.742951][ T5587] audit: backlog limit exceeded [ 118.833253][ T28] audit: type=1400 audit(1773787955.491:14361): avc: denied { execmem } for pid=5558 comm="syz.2.678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 118.914674][ T28] audit: type=1400 audit(1773787955.501:14362): avc: denied { open } for pid=5558 comm="syz.2.678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 118.980183][ T28] audit: type=1400 audit(1773787955.501:14363): avc: denied { open } for pid=5558 comm="syz.2.678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 119.050051][ T28] audit: type=1400 audit(1773787955.501:14364): avc: denied { create } for pid=5558 comm="syz.2.678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 119.131556][ T28] audit: type=1400 audit(1773787955.501:14365): avc: denied { open } for pid=5558 comm="syz.2.678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 119.195694][ T28] audit: type=1400 audit(1773787955.551:14366): avc: denied { create } for pid=5549 comm="syz.0.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 119.548120][ T5595] xt_limit: Overflow, try lower: 65536/2147483648 [ 120.190422][ T5612] __nla_validate_parse: 1 callbacks suppressed [ 120.190438][ T5612] netlink: 80 bytes leftover after parsing attributes in process `syz.2.701'. [ 120.296303][ T5616] netlink: 80 bytes leftover after parsing attributes in process `syz.4.702'. [ 120.331090][ T5619] xt_limit: Overflow, try lower: 65536/2147483648 [ 120.595003][ T5643] netlink: 80 bytes leftover after parsing attributes in process `syz.3.714'. [ 120.681869][ T5639] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.710'. [ 120.692195][ T5646] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.710'. [ 121.346119][ T5674] netlink: 80 bytes leftover after parsing attributes in process `syz.4.727'. [ 121.844069][ T5700] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.735'. [ 121.902340][ T5709] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.735'. [ 122.509055][ T5718] netlink: 80 bytes leftover after parsing attributes in process `syz.4.745'. [ 123.610205][ T28] kauditd_printk_skb: 2367 callbacks suppressed [ 123.610221][ T28] audit: type=1400 audit(1773787960.871:16734): avc: denied { create } for pid=5753 comm="syz.4.761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 123.710096][ T28] audit: type=1400 audit(1773787960.971:16735): avc: denied { prog_load } for pid=5757 comm="syz.4.763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 123.800100][ T28] audit: type=1400 audit(1773787960.971:16736): avc: denied { execmem } for pid=5757 comm="syz.4.763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 123.859884][ T28] audit: type=1400 audit(1773787961.031:16737): avc: denied { create } for pid=5757 comm="syz.4.763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 124.030985][ T28] audit: type=1400 audit(1773787961.291:16738): avc: denied { create } for pid=5760 comm="syz.3.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 124.101815][ T28] audit: type=1400 audit(1773787961.361:16739): avc: denied { create } for pid=5762 comm="syz.3.765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 124.171818][ T28] audit: type=1400 audit(1773787961.371:16740): avc: denied { prog_load } for pid=5762 comm="syz.3.765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 124.241554][ T28] audit: type=1400 audit(1773787961.371:16741): avc: denied { prog_load } for pid=5762 comm="syz.3.765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 124.268911][ T5774] audit: audit_backlog=65 > audit_backlog_limit=64 [ 124.278986][ T5774] audit: audit_lost=36 audit_rate_limit=0 audit_backlog_limit=64 [ 124.594088][ T5786] No such timeout policy "syz1" [ 125.332932][ T5796] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.778'. [ 125.395710][ T5802] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.778'. [ 125.457284][ T5816] netlink: 20 bytes leftover after parsing attributes in process `syz.4.788'. [ 126.437481][ T5831] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.792'. [ 126.456231][ T5830] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.792'. [ 127.673358][ T5851] netlink: 80 bytes leftover after parsing attributes in process `syz.3.798'. [ 128.612107][ T28] kauditd_printk_skb: 2252 callbacks suppressed [ 128.612120][ T28] audit: type=1326 audit(1773787965.881:18969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5872 comm="syz.4.806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 128.672930][ T28] audit: type=1326 audit(1773787965.921:18970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5872 comm="syz.4.806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 128.723040][ T28] audit: type=1326 audit(1773787965.921:18971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5872 comm="syz.4.806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 128.771054][ T28] audit: type=1326 audit(1773787965.921:18972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5872 comm="syz.4.806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 128.818795][ T28] audit: type=1326 audit(1773787965.921:18973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5872 comm="syz.4.806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 128.868998][ T28] audit: type=1326 audit(1773787965.921:18974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5872 comm="syz.4.806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 128.921960][ T28] audit: type=1326 audit(1773787965.921:18975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5872 comm="syz.4.806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 128.972147][ T28] audit: type=1326 audit(1773787965.931:18976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5872 comm="syz.4.806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 129.015945][ T28] audit: type=1326 audit(1773787965.931:18977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5872 comm="syz.4.806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 129.071902][ T28] audit: type=1326 audit(1773787965.931:18978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5872 comm="syz.4.806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 129.457450][ T5893] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.813'. [ 129.500739][ T5891] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.813'. [ 129.816480][ T5909] netlink: 80 bytes leftover after parsing attributes in process `syz.2.822'. [ 130.225436][ T5931] netlink: 80 bytes leftover after parsing attributes in process `syz.2.831'. [ 130.331511][ T5944] capability: warning: `syz.4.838' uses 32-bit capabilities (legacy support in use) [ 130.483625][ T5955] __nla_validate_parse: 1 callbacks suppressed [ 130.483683][ T5955] netlink: 80 bytes leftover after parsing attributes in process `syz.2.843'. [ 130.543191][ T5959] netlink: 80 bytes leftover after parsing attributes in process `syz.2.844'. [ 130.729204][ T5965] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.846'. [ 130.749123][ T5964] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.846'. [ 130.986700][ T5981] netlink: 80 bytes leftover after parsing attributes in process `syz.2.854'. [ 131.204222][ T6008] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.858'. [ 131.214130][ T6001] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.858'. [ 131.278435][ T6015] netlink: 80 bytes leftover after parsing attributes in process `syz.0.869'. [ 131.802719][ T6041] netlink: 80 bytes leftover after parsing attributes in process `syz.0.881'. [ 132.182191][ T6066] netlink: 80 bytes leftover after parsing attributes in process `syz.4.892'. [ 132.251558][ T6073] xt_limit: Overflow, try lower: 65536/2147483648 [ 132.560628][ T6105] xt_limit: Overflow, try lower: 65536/2147483648 [ 133.355964][ T6137] xt_limit: Overflow, try lower: 65536/2147483648 [ 133.609752][ T6164] xt_limit: Overflow, try lower: 65536/2147483648 [ 133.631939][ T28] kauditd_printk_skb: 5433 callbacks suppressed [ 133.631954][ T28] audit: type=1326 audit(1773787970.901:24409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz.4.917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 133.667151][ T28] audit: type=1400 audit(1773787970.931:24410): avc: denied { read } for pid=6167 comm="syz.3.932" name="event2" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 133.690979][ T28] audit: type=1400 audit(1773787970.931:24411): avc: denied { create } for pid=6163 comm="syz.1.936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 133.735309][ T28] audit: type=1326 audit(1773787970.951:24412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz.4.917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 133.760128][ T6177] audit: audit_backlog=65 > audit_backlog_limit=64 [ 133.766912][ T6177] audit: audit_lost=46 audit_rate_limit=0 audit_backlog_limit=64 [ 133.775065][ T6177] audit: backlog limit exceeded [ 133.779992][ T28] audit: type=1400 audit(1773787970.961:24413): avc: denied { prog_load } for pid=6169 comm="syz.2.938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 133.802115][ T28] audit: type=1326 audit(1773787970.971:24414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz.4.917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 133.841230][ T6179] audit: audit_backlog=65 > audit_backlog_limit=64 [ 136.731044][ T6376] __nla_validate_parse: 11 callbacks suppressed [ 136.731060][ T6376] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1026'. [ 136.764651][ T6382] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1026'. [ 137.614927][ T6421] xt_limit: Overflow, try lower: 65536/2147483648 [ 137.953139][ T6442] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1053'. [ 137.978566][ T6437] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1053'. [ 137.986928][ T6444] netlink: 80 bytes leftover after parsing attributes in process `syz.0.1058'. [ 138.642031][ T28] kauditd_printk_skb: 6608 callbacks suppressed [ 138.642045][ T28] audit: type=1326 audit(1773787975.911:31018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6453 comm="syz.4.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 138.704924][ T28] audit: type=1326 audit(1773787975.951:31019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6453 comm="syz.4.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 138.760407][ T28] audit: type=1326 audit(1773787975.951:31020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6453 comm="syz.4.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 138.807100][ T28] audit: type=1326 audit(1773787975.961:31021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6453 comm="syz.4.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 138.841826][ T28] audit: type=1326 audit(1773787975.961:31022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6453 comm="syz.4.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 138.896388][ T28] audit: type=1326 audit(1773787975.961:31023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6453 comm="syz.4.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 138.922121][ T28] audit: type=1326 audit(1773787975.961:31024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6453 comm="syz.4.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 138.946315][ T28] audit: type=1326 audit(1773787975.961:31025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6453 comm="syz.4.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 138.970648][ T28] audit: type=1326 audit(1773787975.961:31026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6453 comm="syz.4.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 138.994577][ T28] audit: type=1326 audit(1773787975.961:31027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6453 comm="syz.4.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 139.182456][ T6467] xt_limit: Overflow, try lower: 65536/2147483648 [ 139.239695][ T6475] netlink: 80 bytes leftover after parsing attributes in process `syz.1.1069'. [ 139.595224][ T6504] xt_limit: Overflow, try lower: 65536/2147483648 [ 139.640709][ T6507] netlink: 80 bytes leftover after parsing attributes in process `syz.2.1083'. [ 139.951060][ T6522] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1088'. [ 139.971516][ T6521] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1088'. [ 140.467439][ T6536] xt_limit: Overflow, try lower: 65536/2147483648 [ 140.889123][ T6559] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1104'. [ 140.902183][ T6562] xt_limit: Overflow, try lower: 65536/2147483648 [ 141.300658][ T6589] xt_limit: Overflow, try lower: 65536/2147483648 [ 141.915285][ T6622] __nla_validate_parse: 3 callbacks suppressed [ 141.915301][ T6622] netlink: 80 bytes leftover after parsing attributes in process `syz.3.1133'. [ 142.413465][ T6653] netlink: 80 bytes leftover after parsing attributes in process `syz.3.1146'. [ 142.758050][ T6679] netlink: 80 bytes leftover after parsing attributes in process `syz.2.1158'. [ 142.967464][ T6705] xt_limit: Overflow, try lower: 65536/2147483648 [ 143.014748][ T6712] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1163'. [ 143.035193][ T6699] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1163'. [ 143.078551][ T6718] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1175'. [ 143.160831][ T6726] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1179'. [ 143.330662][ T6737] xt_limit: Overflow, try lower: 65536/2147483648 [ 143.416729][ T6733] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1182'. [ 143.444295][ T6738] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1182'. [ 143.652686][ T28] kauditd_printk_skb: 4695 callbacks suppressed [ 143.652699][ T28] audit: type=1326 audit(1773787980.921:35723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.4.1172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 143.809813][ T28] audit: type=1326 audit(1773787981.051:35724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.4.1172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 143.898364][ T28] audit: type=1326 audit(1773787981.051:35725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.4.1172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 143.985755][ T28] audit: type=1326 audit(1773787981.051:35726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.4.1172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 144.047199][ T6767] xt_limit: Overflow, try lower: 65536/2147483648 [ 144.062411][ T28] audit: type=1326 audit(1773787981.051:35727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.4.1172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 144.086353][ T28] audit: type=1326 audit(1773787981.051:35728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.4.1172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 144.145108][ T28] audit: type=1326 audit(1773787981.061:35729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.4.1172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 144.171235][ T28] audit: type=1326 audit(1773787981.061:35730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.4.1172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 144.261853][ T28] audit: type=1326 audit(1773787981.061:35731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.4.1172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 144.315991][ T28] audit: type=1326 audit(1773787981.061:35732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.4.1172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 146.512330][ T6861] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1228'. [ 148.612076][ T6914] __nla_validate_parse: 1 callbacks suppressed [ 148.612092][ T6914] netlink: 80 bytes leftover after parsing attributes in process `syz.4.1252'. [ 148.633120][ T6916] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1251'. [ 148.652420][ T6911] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1251'. [ 148.673091][ T28] kauditd_printk_skb: 2816 callbacks suppressed [ 148.673106][ T28] audit: type=1400 audit(1773787985.931:38549): avc: denied { prog_load } for pid=6913 comm="syz.4.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.709124][ T28] audit: type=1400 audit(1773787985.931:38550): avc: denied { prog_load } for pid=6913 comm="syz.4.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.751919][ T6922] xt_limit: Overflow, try lower: 65536/2147483648 [ 148.758796][ T28] audit: type=1400 audit(1773787985.931:38551): avc: denied { prog_load } for pid=6913 comm="syz.4.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.758819][ T28] audit: type=1400 audit(1773787985.931:38552): avc: denied { open } for pid=6913 comm="syz.4.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 148.758845][ T28] audit: type=1400 audit(1773787985.941:38553): avc: denied { map_create } for pid=6913 comm="syz.4.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.758886][ T28] audit: type=1400 audit(1773787985.941:38554): avc: denied { prog_load } for pid=6913 comm="syz.4.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.758905][ T28] audit: type=1400 audit(1773787985.941:38555): avc: denied { prog_load } for pid=6913 comm="syz.4.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.844593][ T6926] netlink: 80 bytes leftover after parsing attributes in process `syz.1.1255'. [ 148.858329][ T28] audit: type=1400 audit(1773787985.941:38556): avc: denied { create } for pid=6913 comm="syz.4.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 148.905936][ T6928] audit: audit_backlog=65 > audit_backlog_limit=64 [ 148.910733][ T6929] audit: audit_backlog=65 > audit_backlog_limit=64 [ 149.336705][ T6949] xt_limit: Overflow, try lower: 65536/2147483648 [ 149.522319][ T6967] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1267'. [ 149.543240][ T6953] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1267'. [ 149.707674][ T6978] xt_limit: Overflow, try lower: 65536/2147483648 [ 149.914135][ T6985] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1277'. [ 149.932315][ T6984] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1277'. [ 150.263335][ T6989] netlink: 80 bytes leftover after parsing attributes in process `syz.2.1280'. [ 152.439449][ T7086] netlink: 80 bytes leftover after parsing attributes in process `syz.0.1321'. [ 153.651922][ T7119] __nla_validate_parse: 2 callbacks suppressed [ 153.651938][ T7119] netlink: 80 bytes leftover after parsing attributes in process `syz.0.1334'. [ 153.685875][ T28] kauditd_printk_skb: 4243 callbacks suppressed [ 153.685890][ T28] audit: type=1400 audit(1773787990.951:42754): avc: denied { create } for pid=7120 comm="syz.4.1335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 153.736186][ T28] audit: type=1400 audit(1773787990.961:42755): avc: denied { prog_load } for pid=7118 comm="syz.0.1334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 153.758383][ T7126] geneve2: entered promiscuous mode [ 153.780020][ T7130] audit: audit_backlog=65 > audit_backlog_limit=64 [ 153.782243][ T7126] geneve2: entered allmulticast mode [ 153.786855][ T7130] audit: audit_lost=65 audit_rate_limit=0 audit_backlog_limit=64 [ 153.801795][ T28] audit: type=1400 audit(1773787990.961:42756): avc: denied { prog_load } for pid=7118 comm="syz.0.1334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 153.811069][ T7130] audit: backlog limit exceeded [ 153.844066][ T28] audit: type=1400 audit(1773787990.961:42757): avc: denied { prog_load } for pid=7118 comm="syz.0.1334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 153.892194][ T28] audit: type=1400 audit(1773787990.961:42758): avc: denied { open } for pid=7118 comm="syz.0.1334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 153.933070][ T7137] audit: audit_backlog=65 > audit_backlog_limit=64 [ 153.940171][ T28] audit: type=1400 audit(1773787990.981:42759): avc: denied { map_create } for pid=7118 comm="syz.0.1334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 154.020333][ T7140] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1341'. [ 154.030117][ T7135] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1341'. [ 154.332831][ T7164] xt_limit: Overflow, try lower: 65536/2147483648 [ 154.524121][ T7170] xt_limit: Overflow, try lower: 65536/2147483648 [ 154.702455][ T7180] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1359'. [ 154.712326][ T7175] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1359'. [ 154.850870][ T7188] xt_limit: Overflow, try lower: 65536/2147483648 [ 155.552286][ T7217] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1374'. [ 155.582655][ T7212] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1374'. [ 155.834810][ T7223] xt_limit: Overflow, try lower: 65536/2147483648 [ 155.913215][ T7225] bond1: option arp_validate: invalid value (18446744073709551615) [ 155.928038][ T7225] bond1 (unregistering): Released all slaves [ 158.389017][ T7317] xt_limit: Overflow, try lower: 65536/2147483648 [ 158.584727][ T7324] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1417'. [ 158.622076][ T7329] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1417'. [ 159.082708][ T28] kauditd_printk_skb: 3116 callbacks suppressed [ 159.082724][ T28] audit: type=1400 audit(1773787996.351:45853): avc: denied { create } for pid=7331 comm="syz.0.1421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 159.122000][ T28] audit: type=1400 audit(1773787996.351:45854): avc: denied { create } for pid=7331 comm="syz.0.1421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 159.142063][ T7334] bridge0: entered allmulticast mode [ 159.157332][ T28] audit: type=1400 audit(1773787996.351:45855): avc: denied { block_suspend } for pid=7331 comm="syz.0.1421" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 159.194924][ T28] audit: type=1400 audit(1773787996.351:45856): avc: denied { open } for pid=7331 comm="syz.0.1421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 159.241383][ T28] audit: type=1326 audit(1773787996.351:45857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7331 comm="syz.0.1421" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 159.274550][ T7337] audit: audit_backlog=65 > audit_backlog_limit=64 [ 159.281079][ T7337] audit: audit_lost=74 audit_rate_limit=0 audit_backlog_limit=64 [ 159.296634][ T7339] audit: audit_backlog=65 > audit_backlog_limit=64 [ 159.303252][ T7337] audit: backlog limit exceeded [ 159.313460][ T7337] audit: audit_backlog=65 > audit_backlog_limit=64 [ 159.581921][ T7348] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1427'. [ 159.601313][ T7347] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1427'. [ 160.372374][ T7358] xt_limit: Overflow, try lower: 65536/2147483648 [ 161.973328][ T7384] xt_limit: Overflow, try lower: 65536/2147483648 [ 162.587282][ T7401] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1448'. [ 162.605543][ T7403] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1449'. [ 162.721784][ T7402] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1449'. [ 162.743476][ T7397] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1448'. [ 163.959587][ T7422] xt_limit: Overflow, try lower: 65536/2147483648 [ 164.099222][ T28] kauditd_printk_skb: 2376 callbacks suppressed [ 164.099275][ T28] audit: type=1400 audit(1773788001.361:48230): avc: denied { create } for pid=7425 comm="syz.4.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 164.151773][ T28] audit: type=1400 audit(1773788001.401:48231): avc: denied { open } for pid=7425 comm="syz.4.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 164.264231][ T28] audit: type=1400 audit(1773788001.531:48232): avc: denied { execmem } for pid=7428 comm="syz.0.1459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 164.616928][ T28] audit: type=1400 audit(1773788001.631:48233): avc: denied { prog_load } for pid=7428 comm="syz.0.1459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 164.696807][ T28] audit: type=1400 audit(1773788001.631:48234): avc: denied { prog_load } for pid=7428 comm="syz.0.1459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 164.771805][ T28] audit: type=1400 audit(1773788001.631:48235): avc: denied { prog_load } for pid=7428 comm="syz.0.1459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 164.830698][ T28] audit: type=1400 audit(1773788001.631:48236): avc: denied { open } for pid=7428 comm="syz.0.1459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 164.921161][ T28] audit: type=1400 audit(1773788001.631:48237): avc: denied { bpf } for pid=7428 comm="syz.0.1459" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 164.996067][ T28] audit: type=1400 audit(1773788001.631:48238): avc: denied { open } for pid=7428 comm="syz.0.1459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 165.028883][ T7433] netlink: 80 bytes leftover after parsing attributes in process `syz.2.1461'. [ 165.073309][ T28] audit: type=1400 audit(1773788001.631:48239): avc: denied { create } for pid=7428 comm="syz.0.1459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=0 [ 165.571057][ T7474] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 165.620282][ T7478] xt_limit: Overflow, try lower: 65536/2147483648 [ 165.758430][ T7494] x_tables: ip_tables: osf match: used from hooks OUTPUT, but only valid from PREROUTING/INPUT/FORWARD [ 165.855052][ T7511] netlink: 80 bytes leftover after parsing attributes in process `syz.3.1497'. [ 165.946761][ T7521] veth5: entered allmulticast mode [ 166.086301][ T7527] netlink: 'syz.3.1503': attribute type 7 has an invalid length. [ 166.097141][ T7527] netlink: 148 bytes leftover after parsing attributes in process `syz.3.1503'. [ 166.515508][ T7547] netlink: 80 bytes leftover after parsing attributes in process `syz.1.1512'. [ 166.771900][ T7562] xt_limit: Overflow, try lower: 65536/2147483648 [ 166.896130][ T7575] netlink: 80 bytes leftover after parsing attributes in process `syz.1.1524'. [ 167.136191][ T7591] xt_limit: Overflow, try lower: 65536/2147483648 [ 167.708912][ T7602] netlink: 80 bytes leftover after parsing attributes in process `syz.2.1535'. [ 167.942613][ T7618] xt_limit: Overflow, try lower: 65536/2147483648 [ 168.109364][ T7630] netlink: 80 bytes leftover after parsing attributes in process `syz.1.1547'. [ 168.575128][ T7643] xt_limit: Overflow, try lower: 65536/2147483648 [ 168.656314][ T7655] netlink: 80 bytes leftover after parsing attributes in process `syz.1.1558'. [ 168.933984][ T7673] xt_limit: Overflow, try lower: 65536/2147483648 [ 169.102547][ T28] kauditd_printk_skb: 3562 callbacks suppressed [ 169.102561][ T28] audit: type=1326 audit(1773788006.371:51802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7669 comm="syz.1.1564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 169.151778][ T28] audit: type=1326 audit(1773788006.391:51803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7669 comm="syz.1.1564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 169.192194][ T28] audit: type=1326 audit(1773788006.391:51804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7669 comm="syz.1.1564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 169.241767][ T28] audit: type=1326 audit(1773788006.391:51805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7669 comm="syz.1.1564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 169.281822][ T28] audit: type=1326 audit(1773788006.391:51806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7669 comm="syz.1.1564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 169.331771][ T28] audit: type=1326 audit(1773788006.391:51807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7669 comm="syz.1.1564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 169.377208][ T28] audit: type=1326 audit(1773788006.391:51808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7669 comm="syz.1.1564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 169.421755][ T28] audit: type=1326 audit(1773788006.391:51809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7669 comm="syz.1.1564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 169.465797][ T28] audit: type=1326 audit(1773788006.391:51810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7669 comm="syz.1.1564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 169.531182][ T28] audit: type=1326 audit(1773788006.401:51811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7669 comm="syz.1.1564" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 169.722650][ T7688] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1572'. [ 169.895624][ T7708] netlink: 80 bytes leftover after parsing attributes in process `syz.4.1581'. [ 170.396640][ T7726] xt_limit: Overflow, try lower: 65536/2147483648 [ 170.520384][ T7730] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 170.687307][ T7725] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1585'. [ 170.718860][ T7740] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1585'. [ 170.853036][ T7752] xt_limit: Overflow, try lower: 65536/2147483648 [ 171.025762][ T7763] lo speed is unknown, defaulting to 1000 [ 172.050084][ T7782] xt_limit: Overflow, try lower: 65536/2147483648 [ 172.341923][ T7796] netlink: 80 bytes leftover after parsing attributes in process `syz.4.1617'. [ 172.931927][ T7814] xt_limit: Overflow, try lower: 65536/2147483648 [ 173.604646][ T7837] netlink: 80 bytes leftover after parsing attributes in process `syz.2.1633'. [ 173.683390][ T7844] xt_limit: Overflow, try lower: 65536/2147483648 [ 174.111928][ T28] kauditd_printk_skb: 3424 callbacks suppressed [ 174.111943][ T28] audit: type=1326 audit(1773788011.381:55236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7833 comm="syz.4.1632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 174.171817][ T28] audit: type=1326 audit(1773788011.411:55237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7833 comm="syz.4.1632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fe9b122c799 code=0x7ffc0000 [ 174.228420][ T28] audit: type=1326 audit(1773788011.411:55238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7833 comm="syz.4.1632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=231 compat=0 ip=0x7fe9b122c799 code=0x7ffc0000 [ 174.276127][ T28] audit: type=1400 audit(1773788011.461:55239): avc: denied { create } for pid=7861 comm="syz.4.1643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 174.324444][ T7866] netlink: 80 bytes leftover after parsing attributes in process `syz.4.1645'. [ 174.362590][ T28] audit: type=1400 audit(1773788011.541:55240): avc: denied { create } for pid=7863 comm="syz.4.1644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 174.793724][ T28] audit: type=1400 audit(1773788011.591:55241): avc: denied { create } for pid=7865 comm="syz.4.1645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 174.849999][ T7874] netlink: 80 bytes leftover after parsing attributes in process `syz.4.1647'. [ 174.894895][ T28] audit: type=1400 audit(1773788011.591:55242): avc: denied { map_create } for pid=7865 comm="syz.4.1645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 174.971772][ T28] audit: type=1400 audit(1773788011.591:55243): avc: denied { map_create } for pid=7865 comm="syz.4.1645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 175.032922][ T7883] audit: audit_backlog=65 > audit_backlog_limit=64 [ 175.039523][ T28] audit: type=1400 audit(1773788011.591:55244): avc: denied { prog_load } for pid=7865 comm="syz.4.1645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 176.220546][ T7922] netlink: 80 bytes leftover after parsing attributes in process `syz.3.1665'. [ 177.798143][ T7987] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.1688'. [ 177.840745][ T7985] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.1688'. [ 179.121851][ T28] kauditd_printk_skb: 6876 callbacks suppressed [ 179.121877][ T28] audit: type=1326 audit(1773788016.391:62107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8015 comm="syz.1.1697" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 179.172279][ T28] audit: type=1326 audit(1773788016.391:62108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8005 comm="syz.0.1696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 179.209477][ T28] audit: type=1326 audit(1773788016.391:62109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8005 comm="syz.0.1696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 179.233369][ T28] audit: type=1326 audit(1773788016.391:62110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8005 comm="syz.0.1696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 179.256973][ T28] audit: type=1326 audit(1773788016.391:62111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8005 comm="syz.0.1696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 179.280631][ T28] audit: type=1326 audit(1773788016.391:62112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8005 comm="syz.0.1696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 179.304193][ T28] audit: type=1326 audit(1773788016.391:62113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8005 comm="syz.0.1696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 179.327870][ T28] audit: type=1326 audit(1773788016.391:62114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8005 comm="syz.0.1696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 179.351573][ T28] audit: type=1326 audit(1773788016.391:62115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8005 comm="syz.0.1696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 179.384063][ T28] audit: type=1326 audit(1773788016.391:62116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8005 comm="syz.0.1696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 181.514532][ T8116] netlink: 80 bytes leftover after parsing attributes in process `syz.1.1738'. [ 182.492874][ T8146] netlink: 80 bytes leftover after parsing attributes in process `syz.1.1749'. [ 182.600491][ T8157] netlink: 80 bytes leftover after parsing attributes in process `syz.1.1754'. [ 183.097048][ T8175] netlink: 80 bytes leftover after parsing attributes in process `syz.3.1760'. [ 183.326076][ T8193] netlink: 80 bytes leftover after parsing attributes in process `syz.0.1766'. [ 183.379681][ T8202] xt_limit: Overflow, try lower: 65536/2147483648 [ 183.439757][ T8210] netlink: 80 bytes leftover after parsing attributes in process `syz.4.1774'. [ 183.473516][ T8213] xt_limit: Overflow, try lower: 65536/2147483648 [ 183.797743][ T8224] netlink: 80 bytes leftover after parsing attributes in process `syz.3.1780'. [ 183.881538][ T8231] xt_limit: Overflow, try lower: 65536/2147483648 [ 184.003020][ T8241] netlink: 80 bytes leftover after parsing attributes in process `syz.1.1788'. [ 184.131925][ T28] kauditd_printk_skb: 9387 callbacks suppressed [ 184.131939][ T28] audit: type=1326 audit(1773788021.401:71504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8215 comm="syz.4.1777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 184.133171][ T8253] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1787'. [ 184.138359][ T28] audit: type=1326 audit(1773788021.401:71505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8215 comm="syz.4.1777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 184.222410][ T28] audit: type=1326 audit(1773788021.431:71506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8215 comm="syz.4.1777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 184.246338][ T8246] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1787'. [ 184.254852][ T28] audit: type=1400 audit(1773788021.431:71507): avc: denied { create } for pid=8243 comm="syz.1.1789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 184.291768][ T28] audit: type=1400 audit(1773788021.431:71508): avc: denied { create } for pid=8243 comm="syz.1.1789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 184.325156][ T28] audit: type=1400 audit(1773788021.431:71509): avc: denied { create } for pid=8243 comm="syz.1.1789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 184.361802][ T28] audit: type=1400 audit(1773788021.431:71510): avc: denied { create } for pid=8243 comm="syz.1.1789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 184.382885][ T28] audit: type=1400 audit(1773788021.431:71511): avc: denied { map_create } for pid=8243 comm="syz.1.1789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 184.402597][ T28] audit: type=1326 audit(1773788021.431:71512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8215 comm="syz.4.1777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 184.426486][ T28] audit: type=1326 audit(1773788021.431:71513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8215 comm="syz.4.1777" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 185.280117][ T8286] xt_limit: Overflow, try lower: 65536/2147483648 [ 186.470374][ T8343] xt_limit: Overflow, try lower: 65536/2147483648 [ 187.167953][ T8354] xt_limit: Overflow, try lower: 65536/2147483648 [ 187.356832][ T8364] __nla_validate_parse: 5 callbacks suppressed [ 187.356847][ T8364] netlink: 80 bytes leftover after parsing attributes in process `syz.4.1838'. [ 187.467325][ T8378] xt_limit: Overflow, try lower: 65536/2147483648 [ 187.521181][ T8383] xt_limit: Overflow, try lower: 65536/2147483648 [ 187.560690][ T8386] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1840'. [ 187.581308][ T8375] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1840'. [ 188.567850][ T8417] xt_limit: Overflow, try lower: 65536/2147483648 [ 189.142053][ T28] kauditd_printk_skb: 4695 callbacks suppressed [ 189.142066][ T28] audit: type=1326 audit(1773788026.411:76209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8426 comm="syz.4.1866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 189.203210][ T28] audit: type=1326 audit(1773788026.441:76210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8426 comm="syz.4.1866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 189.280392][ T28] audit: type=1326 audit(1773788026.441:76211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8426 comm="syz.4.1866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 189.316551][ T28] audit: type=1326 audit(1773788026.441:76212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8426 comm="syz.4.1866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 189.361809][ T28] audit: type=1326 audit(1773788026.441:76213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8426 comm="syz.4.1866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 189.423230][ T28] audit: type=1326 audit(1773788026.441:76214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8426 comm="syz.4.1866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 189.468505][ T28] audit: type=1326 audit(1773788026.441:76215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8426 comm="syz.4.1866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 189.497326][ T8455] audit: audit_backlog=65 > audit_backlog_limit=64 [ 189.508107][ T8455] audit: audit_lost=82 audit_rate_limit=0 audit_backlog_limit=64 [ 189.518082][ T8455] audit: backlog limit exceeded [ 189.646466][ T8463] netlink: 80 bytes leftover after parsing attributes in process `syz.4.1878'. [ 190.149715][ T8481] netlink: 80 bytes leftover after parsing attributes in process `syz.3.1885'. [ 190.308412][ T8493] netlink: 'syz.1.1890': attribute type 2 has an invalid length. [ 190.328702][ T8493] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1890'. [ 190.386199][ T8494] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1888'. [ 190.452515][ T8489] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1888'. [ 190.578638][ T8509] netlink: 80 bytes leftover after parsing attributes in process `syz.2.1897'. [ 191.535802][ T8541] xt_limit: Overflow, try lower: 65536/2147483648 [ 191.919919][ T8558] netlink: 80 bytes leftover after parsing attributes in process `syz.4.1917'. [ 193.698865][ T8621] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1940'. [ 193.738780][ T8631] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1940'. [ 194.163458][ T28] kauditd_printk_skb: 3779 callbacks suppressed [ 194.163473][ T28] audit: type=1326 audit(1773788031.431:79986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8648 comm="syz.4.1953" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe9b122c799 code=0x7ffc0000 [ 194.298876][ T8652] audit: audit_backlog=65 > audit_backlog_limit=64 [ 194.315529][ T8652] audit: audit_lost=86 audit_rate_limit=0 audit_backlog_limit=64 [ 194.327972][ T8652] audit: backlog limit exceeded [ 194.385840][ T8654] audit: audit_backlog=65 > audit_backlog_limit=64 [ 194.400126][ T8654] audit: audit_lost=87 audit_rate_limit=0 audit_backlog_limit=64 [ 194.426838][ T8654] audit: backlog limit exceeded [ 194.498171][ T8657] audit: audit_backlog=65 > audit_backlog_limit=64 [ 194.525227][ T8657] audit: audit_lost=88 audit_rate_limit=0 audit_backlog_limit=64 [ 194.551899][ T8657] audit: backlog limit exceeded [ 195.881241][ T8713] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1979'. [ 196.082006][ T8714] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1979'. [ 196.981587][ T8746] netlink: 80 bytes leftover after parsing attributes in process `syz.3.1993'. [ 197.408909][ T8779] xt_limit: Overflow, try lower: 65536/2147483648 [ 197.696464][ T8788] bond1: option ad_select: invalid value (4) [ 197.709844][ T8788] bond1 (unregistering): Released all slaves [ 198.517505][ T8841] xt_limit: Overflow, try lower: 65536/2147483648 [ 198.586212][ T8854] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2040'. [ 198.739553][ T8883] xt_limit: Overflow, try lower: 65536/2147483648 [ 198.830656][ T8896] netlink: 80 bytes leftover after parsing attributes in process `syz.4.2058'. [ 198.843549][ T8891] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.2044'. [ 198.928518][ T8886] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.2044'. [ 199.050181][ T8926] xt_limit: Overflow, try lower: 65536/2147483648 [ 199.065684][ T8928] netlink: 80 bytes leftover after parsing attributes in process `syz.3.2073'. [ 199.172062][ T28] kauditd_printk_skb: 4793 callbacks suppressed [ 199.172077][ T28] audit: type=1326 audit(1773788036.441:84781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8923 comm="syz.4.2071" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 199.226136][ T28] audit: type=1326 audit(1773788036.431:84780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8937 comm="syz.3.2076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0805dc799 code=0x7ffc0000 [ 199.282783][ T28] audit: type=1326 audit(1773788036.471:84782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8937 comm="syz.3.2076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0805dc799 code=0x7ffc0000 [ 199.324136][ T8947] audit: audit_backlog=65 > audit_backlog_limit=64 [ 199.330898][ T8947] audit: audit_lost=89 audit_rate_limit=0 audit_backlog_limit=64 [ 199.339302][ T28] audit: type=1326 audit(1773788036.471:84783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8937 comm="syz.3.2076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa0805dc799 code=0x7ffc0000 [ 199.363695][ T8947] audit: backlog limit exceeded [ 199.369148][ T8947] audit: audit_backlog=65 > audit_backlog_limit=64 [ 199.376334][ T8947] audit: audit_lost=90 audit_rate_limit=0 audit_backlog_limit=64 [ 199.384209][ T28] audit: type=1326 audit(1773788036.471:84784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8937 comm="syz.3.2076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0805dc799 code=0x7ffc0000 [ 199.408631][ T8947] netlink: 80 bytes leftover after parsing attributes in process `syz.2.2080'. [ 199.539686][ T8957] xt_limit: Overflow, try lower: 65536/2147483648 [ 199.544941][ T8958] netlink: 80 bytes leftover after parsing attributes in process `syz.2.2085'. [ 199.669565][ T8972] netlink: 80 bytes leftover after parsing attributes in process `syz.3.2092'. [ 199.812454][ T8986] netlink: 80 bytes leftover after parsing attributes in process `syz.3.2098'. [ 199.922599][ T8999] netlink: 80 bytes leftover after parsing attributes in process `syz.3.2104'. [ 200.035769][ T9018] netlink: 80 bytes leftover after parsing attributes in process `syz.3.2114'. [ 201.016107][ T9064] xt_limit: Overflow, try lower: 65536/2147483648 [ 201.782881][ T9086] xt_limit: Overflow, try lower: 65536/2147483648 [ 202.302032][ T9116] xt_limit: Overflow, try lower: 65536/2147483648 [ 202.723000][ T9149] xt_limit: Overflow, try lower: 65536/2147483648 [ 203.903712][ T9235] __nla_validate_parse: 6 callbacks suppressed [ 203.903727][ T9235] netlink: 80 bytes leftover after parsing attributes in process `syz.4.2200'. [ 204.025924][ T9251] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2207'. [ 204.136081][ T9265] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2213'. [ 204.181811][ T28] kauditd_printk_skb: 7608 callbacks suppressed [ 204.181826][ T28] audit: type=1326 audit(1773788041.441:92365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9187 comm="syz.1.2179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 204.205092][ T9276] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2219'. [ 204.219539][ T28] audit: type=1326 audit(1773788041.451:92366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9248 comm="syz.4.2206" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 204.248110][ T28] audit: type=1326 audit(1773788041.451:92367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9248 comm="syz.4.2206" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 204.257261][ T9281] audit: audit_backlog=65 > audit_backlog_limit=64 [ 204.272374][ T28] audit: type=1326 audit(1773788041.451:92368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9248 comm="syz.4.2206" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 204.286844][ T9281] audit: audit_lost=100 audit_rate_limit=0 audit_backlog_limit=64 [ 204.304687][ T28] audit: type=1400 audit(1773788041.451:92369): avc: denied { prog_load } for pid=9273 comm="syz.0.2218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 204.327896][ T9281] audit: backlog limit exceeded [ 204.330120][ T28] audit: type=1326 audit(1773788041.451:92370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9248 comm="syz.4.2206" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 204.357732][ T28] audit: type=1326 audit(1773788041.451:92371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9248 comm="syz.4.2206" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 204.447688][ T9296] netlink: 80 bytes leftover after parsing attributes in process `syz.1.2227'. [ 204.535619][ T9305] netlink: 80 bytes leftover after parsing attributes in process `syz.1.2231'. [ 204.806656][ T9326] netlink: 80 bytes leftover after parsing attributes in process `syz.3.2240'. [ 205.086889][ T9361] netlink: 80 bytes leftover after parsing attributes in process `syz.1.2256'. [ 206.247025][ T9423] netlink: 80 bytes leftover after parsing attributes in process `syz.3.2281'. [ 206.622842][ T9447] netlink: 80 bytes leftover after parsing attributes in process `syz.3.2293'. [ 209.191898][ T28] kauditd_printk_skb: 5681 callbacks suppressed [ 209.191922][ T28] audit: type=1326 audit(1773788046.461:98053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9546 comm="syz.4.2333" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 209.237464][ T9585] audit: audit_backlog=65 > audit_backlog_limit=64 [ 209.241922][ T9583] audit: audit_backlog=65 > audit_backlog_limit=64 [ 209.244051][ T9585] audit: audit_lost=101 audit_rate_limit=0 audit_backlog_limit=64 [ 209.258536][ T9585] audit: backlog limit exceeded [ 209.260799][ T9583] audit: audit_lost=102 audit_rate_limit=0 audit_backlog_limit=64 [ 209.266070][ T9585] audit: audit_backlog=65 > audit_backlog_limit=64 [ 209.275470][ T9583] audit: backlog limit exceeded [ 209.277950][ T28] audit: type=1326 audit(1773788046.461:98054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9546 comm="syz.4.2333" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 209.301831][ T9583] audit: audit_backlog=65 > audit_backlog_limit=64 [ 209.369245][ T9591] __nla_validate_parse: 1 callbacks suppressed [ 209.369261][ T9591] netlink: 80 bytes leftover after parsing attributes in process `syz.1.2354'. [ 209.962605][ T9628] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.2362'. [ 210.027585][ T9625] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.2362'. [ 210.063564][ T9632] netlink: 80 bytes leftover after parsing attributes in process `syz.1.2367'. [ 210.306442][ T9653] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2378'. [ 210.667541][ T9679] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.2382'. [ 210.747034][ T9675] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.2382'. [ 212.578132][ T9722] xt_limit: Overflow, try lower: 65536/2147483648 [ 212.818932][ T9750] xt_limit: Overflow, try lower: 65536/2147483648 [ 213.331658][ T9767] xt_limit: Overflow, try lower: 65536/2147483648 [ 213.606096][ T9772] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2422'. [ 213.708134][ T9779] xt_limit: Overflow, try lower: 65536/2147483648 [ 214.001588][ T9811] xt_limit: Overflow, try lower: 65536/2147483648 [ 214.202764][ T28] kauditd_printk_skb: 3509 callbacks suppressed [ 214.202779][ T28] audit: type=1326 audit(1773788051.471:101554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9768 comm="syz.4.2421" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 214.234626][ T28] audit: type=1326 audit(1773788051.511:101555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9768 comm="syz.4.2421" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fe9b11ecfce code=0x7ffc0000 [ 214.270958][ T28] audit: type=1326 audit(1773788051.531:101556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9768 comm="syz.4.2421" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fe9b122c799 code=0x7ffc0000 [ 214.297232][ T28] audit: type=1326 audit(1773788051.531:101557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9768 comm="syz.4.2421" exe="/root/syz-executor" sig=0 arch=c000003e syscall=231 compat=0 ip=0x7fe9b122c799 code=0x7ffc0000 [ 214.320848][ T28] audit: type=1400 audit(1773788051.551:101558): avc: denied { create } for pid=9816 comm="syz.4.2439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 214.347839][ T28] audit: type=1400 audit(1773788051.551:101559): avc: denied { create } for pid=9816 comm="syz.4.2439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 214.367515][ T28] audit: type=1400 audit(1773788051.551:101560): avc: denied { open } for pid=9816 comm="syz.4.2439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 214.386941][ T28] audit: type=1326 audit(1773788051.551:101561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9816 comm="syz.4.2439" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe9b122c799 code=0x7ffc0000 [ 214.410357][ T9824] audit: audit_backlog=65 > audit_backlog_limit=64 [ 214.410545][ T28] audit: type=1326 audit(1773788051.551:101562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9816 comm="syz.4.2439" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe9b122c799 code=0x7ffc0000 [ 214.877606][ T9843] netlink: 80 bytes leftover after parsing attributes in process `syz.1.2447'. [ 215.091608][ T9868] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2462'. [ 215.280473][ T9896] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2474'. [ 215.399296][ T9919] netlink: 80 bytes leftover after parsing attributes in process `syz.1.2486'. [ 215.550906][ T9938] xt_limit: Overflow, try lower: 65536/2147483648 [ 215.634567][ T9947] netlink: 80 bytes leftover after parsing attributes in process `syz.2.2498'. [ 217.240453][T10060] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.2544'. [ 217.255347][T10050] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.2544'. [ 217.270398][T10062] xt_limit: Overflow, try lower: 65536/2147483648 [ 217.327498][T10064] xt_limit: Overflow, try lower: 65536/2147483648 [ 217.839933][T10089] xt_limit: Overflow, try lower: 65536/2147483648 [ 218.377756][T10099] xt_limit: Overflow, try lower: 65536/2147483648 [ 218.869575][T10141] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2586'. [ 219.113380][T10179] netlink: 80 bytes leftover after parsing attributes in process `syz.2.2602'. [ 219.211936][ T28] kauditd_printk_skb: 7601 callbacks suppressed [ 219.211952][ T28] audit: type=1326 audit(1773788056.481:109156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10189 comm="syz.1.2608" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7f243e18c799 code=0x7ffc0000 [ 219.267337][ T3311] audit: audit_backlog=65 > audit_backlog_limit=64 [ 219.271764][ T28] audit: type=1326 audit(1773788056.481:109157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10189 comm="syz.1.2608" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f243e18c799 code=0x7ffc0000 [ 219.274725][T10196] audit: audit_backlog=65 > audit_backlog_limit=64 [ 219.305555][ T3311] audit: audit_lost=110 audit_rate_limit=0 audit_backlog_limit=64 [ 219.313754][ T3311] audit: backlog limit exceeded [ 219.323033][T10198] audit: audit_backlog=65 > audit_backlog_limit=64 [ 219.328707][T10196] audit: audit_lost=111 audit_rate_limit=0 audit_backlog_limit=64 [ 219.329540][T10198] audit: audit_lost=112 audit_rate_limit=0 audit_backlog_limit=64 [ 219.329556][T10198] audit: backlog limit exceeded [ 219.406530][T10206] netlink: 80 bytes leftover after parsing attributes in process `syz.1.2616'. [ 219.895427][T10285] __nla_validate_parse: 3 callbacks suppressed [ 219.895443][T10285] netlink: 80 bytes leftover after parsing attributes in process `syz.3.2652'. [ 219.963641][T10294] netlink: 80 bytes leftover after parsing attributes in process `syz.4.2656'. [ 220.082498][T10319] netlink: 80 bytes leftover after parsing attributes in process `syz.1.2667'. [ 220.098497][T10322] xt_limit: Overflow, try lower: 65536/2147483648 [ 220.134998][T10327] netlink: 80 bytes leftover after parsing attributes in process `syz.1.2671'. [ 220.283420][T10353] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2683'. [ 220.411522][T10360] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2686'. [ 221.025033][T10389] netlink: 80 bytes leftover after parsing attributes in process `syz.4.2697'. [ 221.584778][T10436] xt_limit: Overflow, try lower: 65536/2147483648 [ 222.610384][T10504] netlink: 80 bytes leftover after parsing attributes in process `syz.3.2747'. [ 222.870532][T10531] netlink: 80 bytes leftover after parsing attributes in process `syz.3.2759'. [ 223.257006][T10556] netlink: 80 bytes leftover after parsing attributes in process `syz.4.2771'. [ 223.390713][T10574] xt_limit: Overflow, try lower: 65536/2147483648 [ 223.557700][T10603] xt_limit: Overflow, try lower: 65536/2147483648 [ 224.173543][T10637] xt_limit: Overflow, try lower: 65536/2147483648 [ 224.222780][ T28] kauditd_printk_skb: 6093 callbacks suppressed [ 224.222797][ T28] audit: type=1326 audit(1773788061.491:115172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10633 comm="syz.1.2806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 224.254479][ T28] audit: type=1326 audit(1773788061.531:115173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10633 comm="syz.1.2806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 224.279707][ T28] audit: type=1326 audit(1773788061.551:115174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10633 comm="syz.1.2806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 224.312935][ T28] audit: type=1326 audit(1773788061.551:115175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10633 comm="syz.1.2806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 224.337120][ T28] audit: type=1326 audit(1773788061.551:115176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10633 comm="syz.1.2806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 224.361443][ T28] audit: type=1326 audit(1773788061.551:115177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10633 comm="syz.1.2806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 224.385921][ T28] audit: type=1326 audit(1773788061.551:115178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10633 comm="syz.1.2806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 224.410167][ T28] audit: type=1326 audit(1773788061.551:115179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10633 comm="syz.1.2806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 224.462186][ T28] audit: type=1326 audit(1773788061.571:115180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10633 comm="syz.1.2806" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f243e14cfce code=0x7ffc0000 [ 224.486282][ T28] audit: type=1400 audit(1773788061.571:115181): avc: denied { open } for pid=10642 comm="syz.4.2810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 225.865021][T10811] __nla_validate_parse: 2 callbacks suppressed [ 225.865037][T10811] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2889'. [ 226.178480][T10836] xt_limit: Overflow, try lower: 65536/2147483648 [ 226.230132][T10840] netlink: 80 bytes leftover after parsing attributes in process `syz.2.2901'. [ 226.889652][T10887] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.2921'. [ 226.916439][T10890] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.2921'. [ 227.994930][T10954] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2951'. [ 228.077670][T10957] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2952'. [ 228.475372][T10976] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2962'. [ 228.521102][T10980] netlink: 32 bytes leftover after parsing attributes in process `syz.1.2964'. [ 229.232130][ T28] kauditd_printk_skb: 23017 callbacks suppressed [ 229.232146][ T28] audit: type=1400 audit(1773788066.501:129778): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 229.244488][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 229.268890][ T3311] audit: audit_backlog=65 > audit_backlog_limit=64 [ 229.281902][ T3311] audit: audit_lost=2946 audit_rate_limit=0 audit_backlog_limit=64 [ 229.298311][ T3311] audit: backlog limit exceeded [ 229.303711][ T28] audit: type=1400 audit(1773788066.501:129779): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 229.304299][ T3039] audit: audit_lost=2947 audit_rate_limit=0 audit_backlog_limit=64 [ 229.342771][T11033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 229.354841][T11033] audit: audit_lost=2948 audit_rate_limit=0 audit_backlog_limit=64 [ 229.369264][ T28] audit: type=1400 audit(1773788066.501:129780): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 230.689139][T11115] xt_limit: Overflow, try lower: 65536/2147483648 [ 230.794115][T11125] xt_limit: Overflow, try lower: 65536/2147483648 [ 230.913759][T11140] xt_limit: Overflow, try lower: 65536/2147483648 [ 231.180930][T11161] xt_limit: Overflow, try lower: 65536/2147483648 [ 231.531634][T11189] xt_limit: Overflow, try lower: 65536/2147483648 [ 234.171626][T11375] xt_limit: Overflow, try lower: 65536/2147483648 [ 234.242279][ T28] kauditd_printk_skb: 38969 callbacks suppressed [ 234.242317][ T28] audit: type=1326 audit(1773788071.511:167155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11322 comm="syz.0.3120" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 234.277418][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 234.279367][T11384] audit: audit_backlog=65 > audit_backlog_limit=64 [ 234.284079][ T3039] audit: audit_lost=3480 audit_rate_limit=0 audit_backlog_limit=64 [ 234.290808][T11384] audit: audit_lost=3481 audit_rate_limit=0 audit_backlog_limit=64 [ 234.306840][T11384] audit: backlog limit exceeded [ 234.307726][T11386] audit: audit_backlog=65 > audit_backlog_limit=64 [ 234.316432][ T28] audit: type=1326 audit(1773788071.511:167156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11349 comm="syz.3.3132" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fa08059cfce code=0x7ffc0000 [ 234.318341][ T3039] audit: backlog limit exceeded [ 234.347046][T11386] audit: audit_lost=3482 audit_rate_limit=0 audit_backlog_limit=64 [ 234.484873][T11402] xt_limit: Overflow, try lower: 65536/2147483648 [ 234.731275][T11432] xt_limit: Overflow, try lower: 65536/2147483648 [ 235.474198][T11450] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3178'. [ 235.513164][T11455] netlink: 80 bytes leftover after parsing attributes in process `syz.1.3180'. [ 235.562608][T11460] xt_limit: Overflow, try lower: 65536/2147483648 [ 235.997813][T11485] netlink: 80 bytes leftover after parsing attributes in process `syz.3.3192'. [ 236.045654][T11491] xt_limit: Overflow, try lower: 65536/2147483648 [ 236.314201][T11513] netlink: 80 bytes leftover after parsing attributes in process `syz.4.3206'. [ 236.366896][T11517] xt_limit: Overflow, try lower: 65536/2147483648 [ 236.588172][T11543] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.3217'. [ 236.635848][T11540] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.3217'. [ 236.824657][T11550] xt_limit: Overflow, try lower: 65536/2147483648 [ 237.613944][T11579] netlink: 'syz.0.3233': attribute type 1 has an invalid length. [ 237.656093][T11579] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 237.663331][T11579] IPv6: NLM_F_CREATE should be set when creating new route [ 237.670520][T11579] IPv6: NLM_F_CREATE should be set when creating new route [ 238.203362][T11598] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3241'. [ 239.063887][T11640] netlink: 80 bytes leftover after parsing attributes in process `syz.0.3261'. [ 239.251990][ T28] kauditd_printk_skb: 38609 callbacks suppressed [ 239.252007][ T28] audit: type=1400 audit(2000000000.400:204079): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 239.263350][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 239.291677][ T3039] audit: audit_lost=4045 audit_rate_limit=0 audit_backlog_limit=64 [ 239.299868][ T3039] audit: backlog limit exceeded [ 239.311936][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 239.316198][T11660] audit: audit_backlog=65 > audit_backlog_limit=64 [ 239.325282][ T28] audit: type=1400 audit(2000000000.400:204080): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 239.328173][ T3039] audit: audit_lost=4046 audit_rate_limit=0 audit_backlog_limit=64 [ 239.354882][ T3039] audit: backlog limit exceeded [ 239.361592][T11663] audit: audit_backlog=65 > audit_backlog_limit=64 [ 239.423276][T11660] xt_limit: Overflow, try lower: 65536/2147483648 [ 240.028073][T11725] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.3298'. [ 240.056526][T11723] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.3298'. [ 240.788015][T11756] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.3311'. [ 240.810396][T11755] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.3311'. [ 241.912367][T11794] netlink: 80 bytes leftover after parsing attributes in process `syz.1.3328'. [ 242.920377][T11828] netlink: 80 bytes leftover after parsing attributes in process `syz.3.3342'. [ 242.956783][T11832] netlink: 144 bytes leftover after parsing attributes in process `syz.1.3343'. [ 243.228392][T11851] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3352'. [ 243.337652][T11859] netlink: 80 bytes leftover after parsing attributes in process `syz.1.3356'. [ 243.786914][T11900] netlink: 80 bytes leftover after parsing attributes in process `syz.1.3371'. [ 244.171540][T11928] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3385'. [ 244.192246][T11928] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3385'. [ 244.261792][ T28] kauditd_printk_skb: 32222 callbacks suppressed [ 244.261807][ T28] audit: type=1400 audit(2000000005.410:232315): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 244.274932][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 244.297175][T11938] audit: audit_backlog=65 > audit_backlog_limit=64 [ 244.304056][T11938] audit: audit_lost=5377 audit_rate_limit=0 audit_backlog_limit=64 [ 244.315312][T11942] audit: audit_backlog=65 > audit_backlog_limit=64 [ 244.321746][T11938] audit: backlog limit exceeded [ 244.322007][ T3039] audit: audit_lost=5378 audit_rate_limit=0 audit_backlog_limit=64 [ 244.332112][T11938] audit: audit_backlog=65 > audit_backlog_limit=64 [ 244.335723][T11942] audit: audit_lost=5379 audit_rate_limit=0 audit_backlog_limit=64 [ 244.349359][ T28] audit: type=1400 audit(2000000005.410:232316): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 244.493553][T11956] xt_limit: Overflow, try lower: 65536/2147483648 [ 245.751752][T12039] xt_limit: Overflow, try lower: 65536/2147483648 [ 245.940120][T12053] __nla_validate_parse: 2 callbacks suppressed [ 245.940134][T12053] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3440'. [ 246.164659][T12056] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.3441'. [ 246.196742][T12059] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.3441'. [ 247.516200][T12111] xt_limit: Overflow, try lower: 65536/2147483648 [ 247.540739][T12113] A٨: renamed from lo (while UP) [ 247.680534][T12125] netlink: 71 bytes leftover after parsing attributes in process `syz.3.3471'. [ 247.842202][T12143] xt_limit: Overflow, try lower: 65536/2147483648 [ 248.988200][T12222] xt_limit: Overflow, try lower: 65536/2147483648 [ 249.192847][T12232] ip6gretap0: entered promiscuous mode [ 249.268743][T12238] vlan2: entered promiscuous mode [ 249.273930][ T28] kauditd_printk_skb: 31881 callbacks suppressed [ 249.273944][ T28] audit: type=1400 audit(2000000010.420:262601): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 249.280091][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 249.290484][ T28] audit: type=1400 audit(2000000010.420:262602): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 249.301995][T12238] macvlan0: entered promiscuous mode [ 249.318863][ T28] audit: type=1400 audit(2000000010.420:262603): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 249.340443][ T3039] audit: audit_lost=5912 audit_rate_limit=0 audit_backlog_limit=64 [ 249.355753][ T28] audit: type=1400 audit(2000000010.420:262604): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 249.366399][ T3039] audit: backlog limit exceeded [ 249.391457][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 249.392190][T12242] audit: audit_backlog=65 > audit_backlog_limit=64 [ 249.398240][ T3039] audit: audit_lost=5913 audit_rate_limit=0 audit_backlog_limit=64 [ 249.917415][T12262] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.3531'. [ 249.965032][T12270] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.3531'. [ 250.093853][T12293] netlink: 80 bytes leftover after parsing attributes in process `syz.0.3547'. [ 250.375886][T12319] netlink: 80 bytes leftover after parsing attributes in process `syz.2.3558'. [ 250.488204][T12326] netlink: 80 bytes leftover after parsing attributes in process `syz.3.3561'. [ 251.102021][T12347] xt_limit: Overflow, try lower: 65536/2147483648 [ 251.178572][T12357] netlink: 80 bytes leftover after parsing attributes in process `syz.2.3576'. [ 251.410804][T12373] xt_limit: Overflow, try lower: 65536/2147483648 [ 251.576154][T12387] netlink: 80 bytes leftover after parsing attributes in process `syz.3.3589'. [ 251.707836][T12394] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.3588'. [ 251.744932][T12388] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.3588'. [ 251.836060][T12399] 8021q: adding VLAN 0 to HW filter on device ipvlan2 [ 251.917905][T12401] vlan2: entered promiscuous mode [ 251.933668][T12401] bridge0: entered promiscuous mode [ 252.039735][T12403] xt_limit: Overflow, try lower: 65536/2147483648 [ 252.117120][T12408] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3598'. [ 252.447523][T12427] xt_limit: Overflow, try lower: 65536/2147483648 [ 253.260174][T12453] IPv6: NLM_F_CREATE should be specified when creating new route [ 253.441200][T12463] lo speed is unknown, defaulting to 1000 [ 253.512528][T12473] netlink: 80 bytes leftover after parsing attributes in process `syz.4.3628'. [ 253.667214][T12487] xt_limit: Overflow, try lower: 65536/2147483648 [ 253.799390][T12497] IPv6: NLM_F_CREATE should be specified when creating new route [ 253.931032][T12500] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.3632'. [ 253.962134][T12495] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.3632'. [ 254.137353][T12518] xt_limit: Overflow, try lower: 65536/2147483648 [ 254.281854][ T28] kauditd_printk_skb: 28423 callbacks suppressed [ 254.281893][ T28] audit: type=1400 audit(2000000015.430:286732): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 254.323523][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 254.330081][ T3039] audit: audit_lost=7346 audit_rate_limit=0 audit_backlog_limit=64 [ 254.338889][ T3311] audit: audit_backlog=65 > audit_backlog_limit=64 [ 254.351738][ T3039] audit: backlog limit exceeded [ 254.352075][ T3311] audit: audit_lost=7347 audit_rate_limit=0 audit_backlog_limit=64 [ 254.361792][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 254.381281][ T28] audit: type=1326 audit(2000000015.430:286733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12521 comm="syz.1.3649" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f243e18c799 code=0x7ffc0000 [ 254.405594][ T3039] audit: audit_lost=7348 audit_rate_limit=0 audit_backlog_limit=64 [ 254.421993][ T3039] audit: backlog limit exceeded [ 254.840214][T12541] netlink: 'syz.1.3656': attribute type 5 has an invalid length. [ 254.868187][T12546] xt_limit: Overflow, try lower: 65536/2147483648 [ 255.066073][T12573] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.3665'. [ 255.075985][T12562] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.3665'. [ 255.175761][T12582] xt_limit: Overflow, try lower: 65536/2147483648 [ 256.463048][T12646] netem: unknown loss type 0 [ 256.467835][T12646] netem: change failed [ 256.613434][T12654] netlink: 71 bytes leftover after parsing attributes in process `syz.1.3710'. [ 256.958998][T12677] xt_limit: Overflow, try lower: 65536/2147483648 [ 257.442011][T12696] netlink: 80 bytes leftover after parsing attributes in process `syz.1.3728'. [ 257.760216][T12712] xt_limit: Overflow, try lower: 65536/2147483648 [ 257.881440][T12721] netlink: 80 bytes leftover after parsing attributes in process `syz.0.3739'. [ 258.203093][T12732] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.3740'. [ 258.219904][T12729] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.3740'. [ 258.450578][T12745] netlink: 27 bytes leftover after parsing attributes in process `syz.3.3747'. [ 258.548830][T12747] xt_limit: Overflow, try lower: 65536/2147483648 [ 258.706243][T12751] netlink: 80 bytes leftover after parsing attributes in process `syz.3.3751'. [ 259.292079][ T28] kauditd_printk_skb: 22046 callbacks suppressed [ 259.292095][ T28] audit: type=1400 audit(2000000020.440:306829): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 259.305957][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 259.333464][T12773] audit: audit_backlog=65 > audit_backlog_limit=64 [ 259.340290][T12773] audit: audit_lost=7999 audit_rate_limit=0 audit_backlog_limit=64 [ 259.348645][ T28] audit: type=1400 audit(2000000020.440:306830): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 259.357675][ T3039] audit: audit_lost=8000 audit_rate_limit=0 audit_backlog_limit=64 [ 259.378503][T12775] audit: audit_backlog=65 > audit_backlog_limit=64 [ 259.391983][T12776] audit: audit_backlog=65 > audit_backlog_limit=64 [ 259.399680][ T3039] audit: backlog limit exceeded [ 259.406492][T12778] audit: audit_backlog=65 > audit_backlog_limit=64 [ 259.443053][T12776] xt_limit: Overflow, try lower: 65536/2147483648 [ 259.832911][T12796] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.3769'. [ 259.855572][T12798] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.3769'. [ 260.256445][T12824] xt_limit: Overflow, try lower: 65536/2147483648 [ 261.309076][T12852] netlink: 16 bytes leftover after parsing attributes in process `syz.2.3793'. [ 261.625132][T12873] xt_limit: Overflow, try lower: 65536/2147483648 [ 261.641886][T12875] netlink: 80 bytes leftover after parsing attributes in process `syz.3.3804'. [ 261.734651][T12881] netlink: 80 bytes leftover after parsing attributes in process `syz.2.3806'. [ 261.949003][T12899] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.3807'. [ 262.002966][T12890] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.3807'. [ 262.101476][T12909] netlink: 80 bytes leftover after parsing attributes in process `syz.0.3815'. [ 262.258631][T12911] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.3812'. [ 262.314734][T12902] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.3812'. [ 262.468432][T12920] netlink: 'syz.0.3819': attribute type 1 has an invalid length. [ 262.866445][T12941] xt_limit: Overflow, try lower: 65536/2147483648 [ 262.978143][T12947] lo speed is unknown, defaulting to 1000 [ 263.090270][T12958] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3834'. [ 263.115525][T12958] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3834'. [ 264.302228][ T28] kauditd_printk_skb: 27850 callbacks suppressed [ 264.302243][ T28] audit: type=1326 audit(2000000025.450:331887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12999 comm="syz.0.3853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 264.343421][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 264.350395][ T3039] audit: audit_lost=8933 audit_rate_limit=0 audit_backlog_limit=64 [ 264.358891][ T3039] audit: backlog limit exceeded [ 264.364066][ T28] audit: type=1326 audit(2000000025.450:331888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12999 comm="syz.0.3853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 264.389672][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 264.396793][ T3039] audit: audit_lost=8934 audit_rate_limit=0 audit_backlog_limit=64 [ 264.404932][ T3039] audit: backlog limit exceeded [ 264.409858][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 264.416772][ T28] audit: type=1326 audit(2000000025.450:331889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12999 comm="syz.0.3853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f50ce17cfce code=0x7ffc0000 [ 264.457133][T13016] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.3857'. [ 266.963588][T13129] __nla_validate_parse: 4 callbacks suppressed [ 266.963604][T13129] netlink: 80 bytes leftover after parsing attributes in process `syz.2.3911'. [ 268.704747][T13225] netlink: 80 bytes leftover after parsing attributes in process `syz.2.3954'. [ 269.242259][T13243] pimreg0: tun_chr_ioctl cmd 1074025681 [ 269.316225][ T28] kauditd_printk_skb: 24264 callbacks suppressed [ 269.316242][ T28] audit: type=1400 audit(2000000030.460:354169): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 269.326499][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 269.361782][T13248] audit: audit_backlog=65 > audit_backlog_limit=64 [ 269.369756][T13250] audit: audit_backlog=65 > audit_backlog_limit=64 [ 269.383097][T13250] audit: audit_lost=9597 audit_rate_limit=0 audit_backlog_limit=64 [ 269.391238][T13252] audit: audit_backlog=65 > audit_backlog_limit=64 [ 269.401762][T13250] audit: backlog limit exceeded [ 269.402660][ T28] audit: type=1400 audit(2000000030.460:354170): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 269.411871][ T3039] audit: audit_lost=9598 audit_rate_limit=0 audit_backlog_limit=64 [ 269.436170][T13248] audit: audit_lost=9599 audit_rate_limit=0 audit_backlog_limit=64 [ 269.445746][T13250] netlink: 80 bytes leftover after parsing attributes in process `syz.0.3965'. [ 269.733239][T13278] netlink: 'syz.2.3977': attribute type 25 has an invalid length. [ 269.740039][T13280] netlink: 80 bytes leftover after parsing attributes in process `syz.4.3978'. [ 270.007030][T13312] netlink: 80 bytes leftover after parsing attributes in process `syz.2.3993'. [ 270.248271][T13330] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4012'. [ 270.434995][T13352] xt_limit: Overflow, try lower: 65536/2147483648 [ 270.755209][T13387] xt_limit: Overflow, try lower: 65536/2147483648 [ 271.201592][T13404] xt_limit: Overflow, try lower: 65536/2147483648 [ 272.054720][T13464] xt_limit: Overflow, try lower: 65536/2147483648 [ 272.169602][T13476] netlink: 80 bytes leftover after parsing attributes in process `syz.0.4065'. [ 272.703912][T13500] xt_limit: Overflow, try lower: 65536/2147483648 [ 272.927127][T13511] netlink: 80 bytes leftover after parsing attributes in process `syz.1.4078'. [ 273.328735][T13533] xt_limit: Overflow, try lower: 65536/2147483648 [ 273.423151][T13543] xt_limit: Overflow, try lower: 65536/2147483648 [ 273.491943][T13547] netlink: 'syz.2.4095': attribute type 10 has an invalid length. [ 273.507458][T13547] netlink: 24 bytes leftover after parsing attributes in process `syz.2.4095'. [ 273.533661][T13547] : entered promiscuous mode [ 273.555078][T13547] bridge0: port 3() entered blocking state [ 273.577953][T13547] bridge0: port 3() entered disabled state [ 273.604204][T13547] : entered allmulticast mode [ 273.608991][T13547] bridge0: entered allmulticast mode [ 273.634667][T13547] : left allmulticast mode [ 273.639186][T13547] bridge0: left allmulticast mode [ 274.035035][T13562] netlink: 80 bytes leftover after parsing attributes in process `syz.1.4099'. [ 274.128845][T13575] xt_limit: Overflow, try lower: 65536/2147483648 [ 274.321752][ T3039] audit_log_start: 31151 callbacks suppressed [ 274.321768][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 274.322555][T13595] audit: audit_backlog=65 > audit_backlog_limit=64 [ 274.335587][T13591] audit: audit_backlog=65 > audit_backlog_limit=64 [ 274.341568][T13595] audit: audit_lost=10774 audit_rate_limit=0 audit_backlog_limit=64 [ 274.355982][ T28] audit: type=1326 audit(2000000035.450:381799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13589 comm="syz.0.4112" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50ce1bc799 code=0x7ffc0000 [ 274.358202][ T3039] audit: audit_lost=10775 audit_rate_limit=0 audit_backlog_limit=64 [ 274.392100][T13595] audit: backlog limit exceeded [ 274.411996][T13597] audit: audit_backlog=65 > audit_backlog_limit=64 [ 274.418522][T13597] audit: audit_lost=10776 audit_rate_limit=0 audit_backlog_limit=64 [ 274.428564][ T28] audit: type=1400 audit(2000000035.450:381800): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 275.081098][T13616] xt_limit: Overflow, try lower: 65536/2147483648 [ 275.255513][T13629] tap0: tun_chr_ioctl cmd 1074025677 [ 275.266362][T13629] tap0: linktype set to 805 [ 275.527063][T13641] xt_limit: Overflow, try lower: 65536/2147483648 [ 275.735387][T13649] ================================================================== [ 275.743489][T13649] BUG: KCSAN: data-race in __process_echoes / n_tty_write [ 275.750623][T13649] [ 275.752988][T13649] write to 0xffffc90000ee1280 of 8 bytes by task 3965 on cpu 1: [ 275.760785][T13649] __process_echoes+0x63e/0x6b0 [ 275.765759][T13649] n_tty_receive_buf_common+0x918/0xc10 [ 275.771397][T13649] n_tty_receive_buf2+0x33/0x40 [ 275.776267][T13649] tty_ldisc_receive_buf+0x66/0xf0 [ 275.781390][T13649] tty_port_default_receive_buf+0x59/0x90 [ 275.787120][T13649] flush_to_ldisc+0x148/0x340 [ 275.791824][T13649] process_scheduled_works+0x513/0xa10 [ 275.797395][T13649] worker_thread+0x58a/0x780 [ 275.802175][T13649] kthread+0x22a/0x280 [ 275.806244][T13649] ret_from_fork+0x150/0x360 [ 275.810844][T13649] ret_from_fork_asm+0x1a/0x30 [ 275.815624][T13649] [ 275.817932][T13649] read to 0xffffc90000ee1280 of 8 bytes by task 13649 on cpu 0: [ 275.825808][T13649] n_tty_write+0x188/0xc20 [ 275.830231][T13649] file_tty_write+0x378/0x690 [ 275.835226][T13649] tty_write+0x25/0x30 [ 275.839395][T13649] iter_file_splice_write+0x6c4/0xa80 [ 275.844876][T13649] direct_splice_actor+0x156/0x2a0 [ 275.850101][T13649] splice_direct_to_actor+0x311/0x670 [ 275.855565][T13649] do_splice_direct+0x119/0x1a0 [ 275.860419][T13649] do_sendfile+0x382/0x650 [ 275.864846][T13649] __x64_sys_sendfile64+0x105/0x150 [ 275.870052][T13649] x64_sys_call+0x2dc4/0x3020 [ 275.874825][T13649] do_syscall_64+0x12c/0x370 [ 275.879422][T13649] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 275.885323][T13649] [ 275.887630][T13649] value changed: 0x000000000000001c -> 0x0000000000000027 [ 275.894725][T13649] [ 275.897040][T13649] Reported by Kernel Concurrency Sanitizer on: [ 275.903198][T13649] CPU: 0 UID: 0 PID: 13649 Comm: syz.1.4136 Not tainted syzkaller #0 PREEMPT(full) [ 275.912563][T13649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 275.922613][T13649] ================================================================== [ 279.331729][ T28] kauditd_printk_skb: 57963 callbacks suppressed [ 279.331769][ T28] audit: type=1400 audit(2000000040.470:421592): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 279.347835][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 279.359432][ T28] audit: type=1400 audit(2000000040.480:421593): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 279.368669][ T3039] audit: audit_lost=16834 audit_rate_limit=0 audit_backlog_limit=64 [ 279.387767][ T28] audit: type=1400 audit(2000000040.480:421594): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 279.395620][ T3039] audit: backlog limit exceeded [ 279.416592][ T28] audit: type=1400 audit(2000000040.480:421595): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 279.422069][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 279.442857][ T28] audit: type=1400 audit(2000000040.480:421596): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 279.449208][ T3039] audit: audit_lost=16835 audit_rate_limit=0 audit_backlog_limit=64 [ 284.341785][ T28] kauditd_printk_skb: 53545 callbacks suppressed [ 284.341803][ T28] audit: type=1400 audit(2000000045.480:475141): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 284.357775][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 284.369624][ T28] audit: type=1400 audit(2000000045.490:475142): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 284.376387][ T3039] audit: audit_lost=16836 audit_rate_limit=0 audit_backlog_limit=64 [ 284.398397][ T28] audit: type=1400 audit(2000000045.490:475143): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 284.405470][ T3039] audit: backlog limit exceeded [ 284.426532][ T28] audit: type=1400 audit(2000000045.490:475144): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 284.431999][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 284.453076][ T28] audit: type=1400 audit(2000000045.490:475145): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 284.459381][ T3039] audit: audit_lost=16837 audit_rate_limit=0 audit_backlog_limit=64