last executing test programs: 20m14.798583423s ago: executing program 2 (id=3): r0 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000002, 0x11012, r0, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x2000000b, 0x80, &(0x7f0000000240)={0x3, 0x0, 0xfffa, 0x4360}, 0x8, 0x6, 0x7d, 0x0, 0x1, 0x101, 0x0}) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4008550d, &(0x7f0000000000)) 20m14.713025184s ago: executing program 2 (id=6): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dcbeec0696c37b64e3b24da3183dbe97e805165c0f63cdc2e82818254950ee03568b88091e6a86450545c0e18e09"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r1, r0, 0x2, 0x0, @void}, 0x10) 20m14.322662s ago: executing program 2 (id=10): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x101a00, 0x0) fgetxattr(r2, &(0x7f00000002c0)=@known='security.selinux\x00', 0x0, 0x0) 20m14.040380994s ago: executing program 2 (id=13): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x8002, &(0x7f0000000300)={[{@noauto_da_alloc}, {@nodiscard}, {@quota}, {@orlov}, {@barrier_val={'barrier', 0x3d, 0x1}}]}, 0x11, 0x558, &(0x7f0000000c00)="$eJzs3c9vI1cdAPDvTH52d9vsQg9QAbtAYUGrtTfedlX10nIBoaoSouKAOGxD4o3C2nGIndKESKR/A0ggcYI/gQMSB6SeOHDjiMQBEOWAVCACbZA4GM14kriJw5rEsdn485Fm58ebme979s6852dnXgBj60ZE7ETEdES8GRFzxfakmOLVzpTt92h3e3Fvd3sxiXb7jb8leXq2LbqOyVwuzjkbEV/9UsQ3k+Nxm5tbDxdqtep6sV5u1dfKzc2t2yv1heXqcnW1Urk3f+/OS3dfrAysrNfrP3v/iyuvfe2Xv/j4e7/Z+fx3s2xdKdK6yzFInaJPHcTJTEbEa+cRbAQmivn0iPPB6aQR8aGI+FR+/c/FRP6/EwC4yNrtuWjPda8DABddmveBJWkpItK0aASUOn14z8altNZotm49aGysLnX6yq7GVPpgpVa9c23md9/Od55KsvX5PC1Pz9crR9bvRsS1iPjBzFP5emmxUVsaTZMHAMbe5e76PyL+OZOmpVJfh/b4Vg8AeGLMjjoDAMDQqf8BYPyo/wFg/PRR/xdf9u+ce14AgOHw+R8Axo/6HwDGj/ofAMbKV15/PZvae8Xzr5fe2tx42Hjr9lK1+bBU31gsLTbW10rLjcZy/sye+uPOV2s01uZfiI23y61qs1Vubm7drzc2Vlv38+d6369ODaVUAMB/c+36u79NImLn5afyKbrGclBXw8WWDnAv4MkycZaDNRDgiWa0LxhffVXheSPh1+eeF2A0ej7Me7bn4gf96H8I4ndG8H/l5kf77/83xjNcLHr2YXydrv//lYHnAxi+U/f//2Gw+QCGr91Ojo75P32QBABcSGf4CV/7e4NqhAAj9bjBvAfy/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABcMFci4luRpKV8LPA0+zctlSKejoirMZU8WKlV70TEM3E9IqZmsvX5UWcaADij9C9JMf7XzbnnrxxNnU7+NZPPI+I7P37jh28vtFrr89n2vx9sn9kfPqxyeNwZxhUEAPr3p352yuvvSjHv+iD/aHd7cX86xzwe8/4XDgYfXdzb3c6nTspktNvtdsRs3pa49I8kJotjZiPiuYiYGED8nXci4iO9yp/kfSNXi5FPu+NHEfvpocZPPxA/zdM68+zl+/AA8gLj5t3s/vNqr+svjRv5vPf1P5vfoc4uv//NRuzf+/a64k8WkSZ6xM+u+Rv9xnjhV18+trE910l7J+K5yV7xk4P4yQnxn+8z/u8/9onvv3JCWvsnETejd/zuWOVWfa3c3Ny6vVJfWK4uV1crlXvz9+68dPfFSjnvoy7v91Qf99eXbz1zUt6y8l86IX7nnb98pPzTB8d+ps/y//Tfb37jk4erM0fjf+7Tvd//Z/N579c/qxM/22f8hUs/P3H47iz+0gnlf9z7f6vP+O/9eWupz10BgCFobm49XKjVqutnWsg+hQ7iPMcWsiz2t/N+c/FsQf8Y+cLhy5JEEoMuV9YY62fnqfN6Vc99YfKgrTjYM389O+OQi5MOvBSnWYirxcKjYQUd3T0JGI7Di37UOQEAAAAAAAAAAAAAAE4yjL9hGnUZAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAuLj+EwAA//8GP8IF") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r1}, 0x10) syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000040)='./bus\x00', 0x85446c, 0x0, 0xff, 0x0, &(0x7f00000007c0)) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) 20m13.677894279s ago: executing program 2 (id=19): prlimit64(0x0, 0xe, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x23}, 0x37, r1}) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0x0, 0x97, 0x80000000, 0x2d, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast2, 0x80, 0x80, 0x3, 0x3}}) socket$inet_tcp(0x2, 0x1, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x1, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x12, r5, 0x45da7000) fcntl$setpipe(r3, 0x408, 0x7) 20m13.418721202s ago: executing program 2 (id=22): pivot_root(&(0x7f0000000580)='./cgroup.cpu/cpuset.cpus\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='net/ip_tables_targets\x00') umount2(&(0x7f0000000280)='./cgroup.cpu/cpuset.cpus\x00', 0x5) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r3}, &(0x7f0000001c00)=0x8000000, &(0x7f0000001c40)=r4}, 0x20) rt_sigaction(0x40, &(0x7f00000027c0)={&(0x7f0000002700)="f3dfd2c4237d390b35650fa8c4831d02fc06c42191d9eff3400f7edfc4e2dd288f00000000473c0167660f71e5d12e660f7f0e", 0x1, 0x0, {[0xab8]}}, 0x0, 0x8, &(0x7f00000028c0)) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='status\x00') lseek(r5, 0x9, 0x0) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) unshare(0x64000600) 20m13.418352882s ago: executing program 32 (id=22): pivot_root(&(0x7f0000000580)='./cgroup.cpu/cpuset.cpus\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='net/ip_tables_targets\x00') umount2(&(0x7f0000000280)='./cgroup.cpu/cpuset.cpus\x00', 0x5) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r3}, &(0x7f0000001c00)=0x8000000, &(0x7f0000001c40)=r4}, 0x20) rt_sigaction(0x40, &(0x7f00000027c0)={&(0x7f0000002700)="f3dfd2c4237d390b35650fa8c4831d02fc06c42191d9eff3400f7edfc4e2dd288f00000000473c0167660f71e5d12e660f7f0e", 0x1, 0x0, {[0xab8]}}, 0x0, 0x8, &(0x7f00000028c0)) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='status\x00') lseek(r5, 0x9, 0x0) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) unshare(0x64000600) 19m13.368559624s ago: executing program 4 (id=340): open(&(0x7f0000000080)='./file1\x00', 0x64842, 0xc4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r2}, &(0x7f00000001c0), &(0x7f0000000240)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000140)=@ethtool_sset_info={0x37, 0x5, 0x7f, [0x0]}}) 19m12.161068621s ago: executing program 4 (id=348): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) open_tree(0xffffffffffffff9c, 0x0, 0x89901) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0xb00, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x2000000, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xfff3}}}, 0x24}}, 0x0) 19m12.140039141s ago: executing program 4 (id=349): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000001940)={[{@nobarrier}]}, 0x1, 0x512, &(0x7f0000001400)="$eJzs3W1rZFcdAPD/vcmk2d3UTFVkLdgWW9ktujNJY9so0lYQfVVQ6/s1JpMQMsmEzKRuQtEsfgBBRAU/gG8EP4Ag+xFEWND3oqKI7upL3St35kbzMJMMySSzTn4/OJlz7sP5n3PJ3LkPh3sDuLJeioh3ImIsIl6NiOlielqk2OukfLnHjz5YzFMSWfbe35JIimn7deXl8Yi4Uaw2GRFf/0rEt5LjcZs7u2sL9XptqyhXW+ub1ebO7p3V9YWV2kptY25u9o35N+dfn5/JCufqZzki3vrSn370/Z99+a1ffebbv7/7l9vfyZv1hY912h0Ri+cK0EOn7lJ7W+zLt9HWRQQbkrw/pbFhtwIAgH7kx/gfjohPto//p2OsfTQHAAAAjJLs7an4VxKRAQAAACMrjYipSNJKMRZgKtK0UumM4f1oXE/rjWbr08uN7Y2lfF5EOUrp8mq9NlOMFS5HKcnLs8UY2/3ya0fKcxHxXET8cPpau1xZbNSXhn3xAwAAAK6IGy8ePv//53TazgMAAAAjptyzAAAAAIwKp/wAAAAw+pz/AwAAwEj76rvv5inbf4/30vs722uN9+8s1ZprlfXtxcpiY2uzstJorLSf2bd+Wn31RmPzs7Gxfa/aqjVb1ebO7t31xvZG6+7qoVdgAwAAAJfouRcf/C6JiL3PX2unKJ4DCHDIH4fdAGCQxobdAGBoxofdAGBoSqcuYQ8Boy45Zf7xwTuda4Xx64tpDwAAMHi3Pn78/v9EMe/0awPA/zNjfQDg6nF3D66u0llHAN4cdEuAYflQ5+OZXvN7Pryjj/v/nWsMWXamhgEAAAMz1U5JWimO06ciTSuViGfbrwUoJcur9dpMcX7w2+nSM3l5tr1mcuqYYQAAAAAAAAAAAAAAAAAAAAAAAACgI8uSyAAAAICRFpH+OWk/zT/i1vQrU4evDhx569dP3/vxvYVWa2s2YiL5+3Q+aSIiWj8ppr+WeSUAAAAAPAU65+nF5+ywWwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn86IPF/XSZcf/6xYgod4s/HpPtz8koRcT1fyQxfmC9JCLGBhB/735E3OwWP4knWZaVi1Z0i3/tguOX25ume/w0Im4MID5cZQ/y/c873b5/abzU/uz+/Rsv0nn13v+l/93/jfXY/zx7pNzL8w9/Ue0Z/37E8+Pd9z/78ZNO/EMh8sLLffbxm9/Y3e0640CV3eIfjFVtrW9Wmzu7d1bXF1ZqK7WNubnZN+bfnH99fqa6vFqvFX+7hvnBJ3755KT+X+8Rv3y4/8e2/yt99T6Lfz+89+gjnUKpW/zbL3f//b3ZI35a/PZ9qsjn82/t5/c6+YNe+PlvXjip/0s9+j95Sv9v99X/+NyrX/veH7rOObY1AIDL0NzZXVuo12tbJ2Qm+1jmkjNvPx3NGGAmno5mDCuTfbfz/3i+es65+rFMdp7Vx2MAzZg49j0di7NWmETs5XX1+Q8JAACMmP8d9J90BwkAAAAAAAAAAAAAAAAAAAC4SGd8LNlkRPS98NGYe8PpKgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAif4TAAD//4RX0Xo=") r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCFLSH(0xffffffffffffffff, 0x400455c8, 0x0) 19m12.031766682s ago: executing program 4 (id=352): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x8002, &(0x7f0000000300)={[{@noauto_da_alloc}, {@nodiscard}, {@quota}, {@orlov}, {@barrier_val={'barrier', 0x3d, 0x1}}]}, 0x11, 0x558, &(0x7f0000000c00)="$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") bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r0}, 0x10) syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000040)='./bus\x00', 0x85446c, 0x0, 0xff, 0x0, &(0x7f00000007c0)) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) 19m10.991985957s ago: executing program 4 (id=355): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800714, &(0x7f0000000500), 0xff, 0x485, &(0x7f0000001500)="$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") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0xa101, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sendmsg$inet6(r1, 0x0, 0x48000) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'filter\x00', 0x0, [0x0, 0x7, 0x2391eb4c, 0x1, 0x3]}, &(0x7f0000000040)=0x54) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000000c0)={0x4e00, 0x0, 0x730, 0xbdff, 0x10, "feeeff000000001b"}) 19m10.906590118s ago: executing program 4 (id=357): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r2) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='ns\x00') readlinkat(r3, &(0x7f0000000100)='./mnt\x00', &(0x7f0000000440)=""/163, 0xa3) 19m10.887334168s ago: executing program 33 (id=357): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r2) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='ns\x00') readlinkat(r3, &(0x7f0000000100)='./mnt\x00', &(0x7f0000000440)=""/163, 0xa3) 18m45.983571573s ago: executing program 5 (id=449): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) r1 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000002, 0x11012, r1, 0x0) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x2000000b, 0x80, &(0x7f0000000240)={0x3, 0x0, 0xfffa, 0x4360}, 0x8, 0x6, 0x7d, 0x0, 0x1, 0x101, 0x0}) 18m44.902277659s ago: executing program 5 (id=453): bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x3) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000480)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x10, 0x3}}}}}}, 0x0) 18m44.826824129s ago: executing program 5 (id=455): syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000400)='./bus\x00', 0x480, &(0x7f0000000100)=ANY=[], 0xfd, 0x2b9, &(0x7f0000000980)="$eJzs3E9rE08YwPEnadM/KW1y+PEDBfFBL3pZ2vgKgrQgBpTaiHoQpnajIWtSsjESEdubV19H8ehNsL6BXrx5Fy9FELz0IF3p/jHbEvtH227bfD9QdpqZJzOZ7IZnF2bW7715Wqu4VsW0JD2ikhZZlg2R/FYplAqPab88JHHLcnXsx+cLd+4/uFkslaZnVWeKc9cKqjpx8cPzl28vfWyN3X038X5Y1vIP178Xvqz9v3ZufXMuevdGS43ONxotM+/YulB1a5bqbcc2rq3Vums3t9VXnMbiYkdNfWE8u9i0XVdNvaM1u6OthraaHTWPTbWulmXpeFb6zcCBI8ors7OmeCSDQRJGe73YbBbNQM/K8spxDAoAAJwssfzfSwU5/rHk/0+qrlZdre+V/6flcPL/kWOZzdPGz/83eyaNOBsyWzcARZMNr9/tyP8BAAAAAAAAAAAAAAAAAAAAADgNNjwv53leLpUKjtHfcLhmJvo/6XHiaETf/4a37+8/leBwcchiC/dGRJzX7XK7HByD+mJFquKILZMZkZ/++RAKyjM3StOT6svLqrMUxvuLBIej+Ei+d/xUEK+x+KV2OSPZeP8Fycl/veMLO+IzItIuD8mVy7F4S3Ly6ZE0xJEF/7zurod6NaV6/VZpR/+jfjsAAAAAAM4CS3/Lb7//DXaTtCyNbpN31Acvdp8PSG6P5wMqq0PSjR+U84PJfW4AAAAAAPqJ23lRM45jNyn0LqT+MFH9OHVWuIvyro09z1vaavTvnaZF5CBRo7sP7CCFbyJyAiY8VsgcxgX79VnwJvtpnMSvEQAAAICj1E36kx4JAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD9a7+bh0Xt/2bvsVh3A8l8SgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBk+BUAAP//scoNhA==") getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x18) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) open_tree(0xffffffffffffff9c, 0x0, 0x81000) socket$inet(0x2, 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000003c0)=[{&(0x7f0000000340)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r2, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025", 0x1d}], 0x1) 18m44.221394158s ago: executing program 5 (id=463): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x8002, &(0x7f0000000300)={[{@noauto_da_alloc}, {@nodiscard}, {@quota}, {@orlov}, {@barrier_val={'barrier', 0x3d, 0x1}}]}, 0x11, 0x558, &(0x7f0000000c00)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000040)='./bus\x00', 0x85446c, 0x0, 0xff, 0x0, &(0x7f00000007c0)) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) 18m43.975147481s ago: executing program 5 (id=464): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) r1 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000002, 0x11012, r1, 0x0) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x2000000b, 0x80, &(0x7f0000000240)={0x3, 0x0, 0xfffa, 0x4360}, 0x8, 0x6, 0x7d, 0x0, 0x1, 0x101, 0x0}) 18m43.870564783s ago: executing program 5 (id=465): socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000600)=ANY=[], 0x2, 0x1509, &(0x7f0000001c40)="$eJzs3Au0jtXWOPA511oPm8Sb5L7mmg9vclkkSS4JiSRJjiS5JSRJkoTEJrckJCH3JPeQ3EJyv99yT5IjSZKQkGT9h079nXM63+l83znn842z52+MZ+w19/vO+c5nz733+zxrjL2/7jCoSr2qleowM/xT8E8fUgEgBQD6AkAWAIgAoGTWklkBh0IGjan/3IuIf60Hpl7pDsSVJPNP22T+aZvMP22T+adtMv+0Teaftsn80zaZvxBp2dZpua6RI+0e/3v7/yD7///nyPv/f5DDRUd/vr7odR3/Gyky/7RN5p+2yfzTNpl/2ibzT9tk/v/hIoCKf+dhmX/aJvMXIi270vvPclzZ40p//wkhhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGESBvOhcsMAPy6vtJ9CSGEEEIIIYQQ4l8npP/zKN2Va0QIIYQQQgghhBD/RggKNBiIIB2khxTIABnhKsgEV0NmyAIJuAaywrWQDa6D7JADckIuyA15IC9YIHDAEEM+yA9JuB4KwA1QEApBYSgCHopCMbgRisNNUAJuhpJwC5SCW6E0lIGyUA5ug/JwO1SAilAJ7oDKcCdUgapwF1SDu6E63AM14F6oCfdBLbgfasMfoA48AHXhQagHD0F9eBgaQENoBI2hyf8o/3noAi9AV+gGqdAdesCL0BN6QW/oA33hJegHL0N/eAUGwEAYBK/CYHgNhsDrMBSGwXB4A0bASBgFo2EMjIVx8CaMh7dgArwNE2ESTIYpMBWmwXR4B2bATJgF78JseA/mwFyYB/NhAbwPC2ERLIYPYAl8CEthGSyHFbASVsFqWANrYR2shw2wETbBZtgCW+Ej2AbbYQfshF2wG/bAx7AXPoF98Cnsh8/+Oj/L388/+1f5HREQUKFCgwbTYTpMwRTMiBkxE2bCzJgZE5jArJgVs2E2zI7ZMSfmxNyYG/NiXiQkZGTMh/kwiUksgAWwIBbEwlgYPXoshsWwON6EJbAElsSSWApLYWksg2WwHJbD8lgeK2AFrISVsDJWxipYBe/Cu/BurI7VsQbWwJpYE2thLayNtbEO1sG6WBfrYT2sj/WxATbARtgIm2ATbIpNsRk2wxbYAltiS2yFrbA1tsY22AbbYltsh+2wPbbHDtgBO2In7ITP4/P4Ar6A3bCy6o49sAf2xJ7YG/tgH3wJ++HL+DK+ggNwIA7CV/FVfA2H4BkcisNwOA7H8mokjsLRyGosjsNxOB7H4wScgBNxEk7CKTgVp+F0nI4zcCbOxHdxNr6H7+FcnIvzcQEuwIW4CBfjYlyCZ3EpLsPluAJX4ipciWtwLa7B9bgB1+Mm3IRbcAt+hB/hdtyOO3En7sbd+DF+jJ/gJzgA9+N+PIAH8CAexEN4CA/jYTyCR/AoHsVjeAyP43E8gSfxFJ7E03gaz+BZPIfn8Dyexwv4bO4v6+4utG4AqEuMMiqdSqdSVIrKqDKqTCqTyqwyq4RKqKwqq8qmsqnsKrvKqXKq3Cq3yqvyKlKkWMUqn8qnkiqpCqgCqqAqqAqrwsorr4qpYqq4Kq5KqBKqpLpFlVK3qtKqjGruy6lyqrxq4SuoiqqSqqQqqztVFVVVVVXVVDVVXVVXNVQNVVPVVLXU/aq26o698QF1aTL11ECsrwZhA9VQNVKN1Wv4iGqqhmAz1Vy1UI+pYTgUW6mmvrV6UrVRo7CtelqNxmdUezUWO6jnVEfVSXVWz6suqpnv+ut2p5qCPVUv1Vv1UTPwTnVpYlXUK2qAGqgGqVfVfHxNDVGvq6FqmBqu3lAj1Eg1So1WY9RYNU69qcart9QE9baaqCapyWqKmqqmqenqHTVDzVSz1LtqtnpPzVFz1Tw1Xy1Q76uFapFarD5QS9SHaqlapparFWqlWqVWqzVqrVqn1qsNaqPapDarLWqr+khtU9vVDrVT7VK71R71sdqrPlH71Kdqv/pMHVB/VAfV5+qQ+kIdVl+qI+ordVR9rY6pb9Rx9a06oU6qU+o7dVp9r86os+qc+kGdVz+qC+ondVEFBRq10lobHel0Or1O0Rl0Rn2VBn21zqyz6IS+RmfV1+ps+jqdXefQOXUunVvn0Xm11aSdZh3rfDq/TurrdQF9gy6oC+nCuoj2uqgupm/UxfVNuoS+WZfUt+hS+lZdWpfRZXU5fZsur2/XFXRFXUnfoSvrO3UVXVXfpavpu3V1fY+uoe/VNfV9upa+X9fWf9B19AO6rn5Q19MP6fr6Yd1AN9SNdGPdRD+im+pHdTPdXLfQj+mW+nHdSj+hW+sndRv9lG6rn9bt9DO6vX5Wd9DP6Y66k+6sf9IXddBddTedqrvrHvpF3VP30r11H91Xv6T76Zd1f/2KHqAH6kH6VT1Yv6aH6Nf1UD1MD9dv6BF6pB6lR+sxeqwep9/U4/VbeoJ+W0/Uk/RkPUVP1dN0718qzfoH8t/6G/n9f371LXqr/khv09v1Dr1T79K79R69R+/Ve/U+vU/v1/v1AX1AH9QH9SF9SB/Wh/URfUQf1Uf1MX1MH9fH9Ql9Uv+gv9On9ff6jD6rz+of9Hl9Xl/45WsABo0y2hgTmXQmvUkxGUxGc5XJZK42mU0WkzDXmKzmWpPNXGeymxwmp8llcps8Jq+xhowzbGKTz+Q3SXO9KWBuMAVNIVPYFDHeFDXFzI3/dP7v9dfENDFNTVPTzDQzLUwL09K0NK1MK9PatDZtTBvT1rQ17Uw70960Nx1MB9PRdDSdTWfTxXQxXU1Xk2pSTQ/zoulpepnepo/pa14y/Uw/09/0NwPMADPIDDKDzWAzxAwxQ81QM9wMNyPMCDPKjDJjzBgzzowz4814M8FMMBPNRDPZTDZTzVQz3Uw3M8wMM8vMMrPNbDPHzDHzzDyzwCwwC81Cs9gsNkvMErPULDPLzAqzwqwyq8was8asM+vMBrPBbDKbzFKz1Ww128w2s8PsMLvMLrPH7DF7zV6zz+wz+81+c8AcMAfNQXPIHDKHzWFzxBwxR81Rc8wcM8fNcXPCnDCnzClz2pw2Z8wZc86cM+fNeXPBXDAXzcVLl32RilRkIhOli9JFKVFKlDHKGGWKMkWZo8xRIkpEWaOsUbbouih7lCPKGeWKckd5olSwEUUu4iiO8kX5o2R0fVQguiEqGBWKCkdFIh8VjYpFN0bFo5uiEtHNUcnolqhUdGtUOioTlY3KRbdF5aPbowpRxahSdEdUObozqhJVje6KqkV3R9Wje6Ia0b1Rzei+qFZ0f1Q7+kNUJ3ogqhs9GNWLHorqRw9HDaKGUaOocdTkX1o/hDM5HvVdbTebarvbHvZF29P2sr1tH9vXvmT72Zdtf/uKHWAH2kH2VTvYvmaH2NftUDvMDrdv2BF2pB1lR9sxdqwdZ9+04+1bdoJ92060k+xkO8VOtdPsdPuOnWFn2ln2XTvbvmfn2Ll2np1vF9j37UK7yC62H9gl9kO71C6zy+0Ku9KusqvtGrvWrrPr7Qa70W6ym+0Wu9V+ZLfZ7XaH3Wl32d12j/3Y7rWf2H32U7vffmYP2D/ag/Zze8h+YQ/bL+0R+5U9ar+2x+w39rj91p6wJ+0p+509bb+3Z+xZe87+YM/bH+0F+5O9aMOli/tLb+9kyFA6SkcplEIZKSNlokyUmTJTghKUlbJSNspG2Sk75aSclJtyU17KS5cwMeWjfJSkJBWgAlSQClJhKkyePBWjYlScilMJKkElqSSVolJUmkpTWSpLt9FtdDvdThWpIt1Bd9CddCdVpapUjapRdapONagG1aSaVItqUW2qTXWoDtWlulSP6lF9qk8NqAE1okbUhJpQU2pKzagZtaAW1JJaUitqRa2pNbWhNtSW2lI7akftqT11oA7UkTpSZ+pMXagLdaWulEqp1IN6UE/qSb2pN/WlvtSP+lF/6k8DaAANokE0mAbTEBpCQ2kYDac3aASNpFE0msbQWBpH42g8jacJNIEm0kSaTJNpKk2l6TSdZtAMmkWzaDbNpjk0h+bRPFpAC2ghLaTFtJiW0BJaSktpOS2nlbSSVtNqWktraT2tp420kTbTZtpKW2kbbaMdtIN20S7aQ3toL+2lfbSP9tN+OkAH6CAdpEN0iA7TYTpCR+goHaVjdIyO03E6QSfoFJ2i03SaztAZOkfn6Dz9SBfoJ7pIgVKcgozuKpfJXe0yuywuxWVwl+IIAC7FOV0ul9vlcXmdddldjr+IyTlX0BVyhV0R511RV8zd+Ju4tCvjyrpy7jZX3t3uKvwmrubudtXdPa6Gu9dVdXf9RVzT3edquYdcbfewq+MaurqusavnHnL13cOugWvoGrnGrqV73LVyT7jW7knXxj31m3ihW+TWunVuvdvg9rpP3Dn3gzvqvnbn3Y+uq+vm+rqXXD/3suvvXnED3MDfxMPdG26EG+lGudFujBv7m3iym+KmumluunvHzXAzfxMvcO+72W6xm+Pmunlu/s/xpZ4Wuw/cEvehW+qWueVuhVvpVrnVbs3/73WF2+Q2uy1uj/vYbXPb3Q630+1yu3+OL53HPvep2+8+c0fcV+6g+9wdcsfcYfflz/Gl8zvmvnHH3bfuhDvpTrnv3Gn3vTvjzv58/pfO/Tv3k7voggNGVqzZcMTpOD2ncAbOyFdxJr6aM3MWTvA1nJWv5Wx8HWfnHJyTc3FuzsN52TKxY+aY83F+TvL1XIBv4IJciAtzEfZclIvxjVycb+ISfDOX5Fu4FN/KpbkMl+VyfBuX59u5AlfkSnwHVw6Bq3BVvour8d1cne/hGnwv1+T7uBbfz7X5D1yHH+C6/CDX44e4Pj/MDbghN+LG3IQf4ab8KDfj5tyCH+OW/Di34ie4NT/JbfgpbstPczt+htvzs9yBn+OO3Ik78/PchV/grtyNU7k79+AXuSf34t7ch/vyS9yPX+b+/AoP4IE8iF/lwfwaD+HXeSgP4+H8Bo/gkTyKR/MYHsvj+E0ez2/xBH6bJ/IknsxTeCpP4+n8Ds/gmTyL3+XZ/B7P4bk8j+fzAn6fF/IiXswf8BL+kJfyMl7OK3glr+LVvIbX8jpezxt4I2/izbyFt/JHvI238w7eybt4N+/hj3kvf8L7+FPez5/xAf4jH+TP+RB/wYf5Sz7CX/FR/pqP8Td8nL/lE3yST/F3fJq/5zN8ls/xD3yef+QL/BNf5MAQY6xiHZs4itPF6eOUOEOcMb4qzhRfHWeOs8SJ+Jo4a3xtnC2+Ls4e54hzxrni3HGeOG9sY4pdzHEc54vzx8n4+rhAfENcMC4UF46LxD4uGheLb4yLxzfFJeKb45LxLXGp+NYYUsvED91bLr4tLh/fHleIK8aV4jviyvGdcZW4anxXXC2+O64e3xPXiO+NS8T3xbXi++Pa8R/iOvEDcd34wbhe/FBcP344bhA3jBvFjeMm8SNx0/jRuFncPG4RPxa3jB+PW8VPxK3jJ+M28VO/+3hq3D3uEb8YvxiHcI/65T4xuTC5KLk4+UFySfLD5NLksuTy5IrkyuSq5OrkmuTa5Lrk+uSG5MbkpuTm5JZkCFXTg0evvPbGRz6dT+9TfAaf0V/lM/mrfWafxSf8NT6rv9Zn89f57D6Hz+lz+dw+j8/rrSfvPPvY5/P5fdJf7wv4G3xBX8gX9kW890V9Md/YN/FNfFP/qG/mm/sW/jH/mH/cP+6f8E/4J30b/5Rv65/27fwzvr1/1j/rn/MdfSff2T/vu/gXfFffzaf6VN/D9/A9fU/f2/f2fX1f38/38/19fz/AD/CD/CA/2A/2Q/wQP9QP9cP9cD/Cj/Cj/Cg/xo/x4/w4P96P9xP8BD/RT/ST/WQ/1U/10/10P8PP8LP8LD+74Gw/x8/x8/w8v8Av8Av9Qr/YL/ZL/BK/1C/1y/1yv9Kv9Kv9ar/Wr/Xr/Xq/0W/0m/1mv9Vv9dv8Nr/D7/C7/C6/x+/xe/1ev8/v8/v9fn/AH/AH/UF/yH/hD/sv/RH/lT/qv/bH/Df+uP/Wn/An/Sn/nT/tv/dn/Fl/zv/gz/sf/QX/k7/ogx+XeDMxPvFWYkLi7cTExKTE5MSUxNTEtMT0xDuJGYmZiVmJdxOzE+8l5iTmJuYl5icWJN5PLEwsSixOfJBYkvgwsTSxLLE8sSKxMrEqEUKebXHIF/KHZLg+FAg3hIKhUCgcigQfioZi4cZQPNwUSoSbQ8lwSygVbg2lQ5lQNjwcGoSGoVFoHJqER0LT8GhoFpqHFuGx0DI8HlqFJ0Lr8GRoE54KbcPToV14JrQPz4YO4bnQMXQKncPzoUt4IXQN3UJq6B56hBdDz9Ar9A59Qt/wUugXXg79wythQBgYBoVXw+DwWhgSXg9Dw7AwPLwRRoSRYVQYHcaEsWFceDOMD2+FCeHtMDFMCpPDlDA1TAvTwzthRpgZZoV3w+zwXpgT5oZ5YX5YEN4PC8OisDh8EJaED8PSsCwsDyvCyrAqrA5rwtqwLqwPG8LGsClsDlvC1vBR2Ba2hx1hZ9gVdoc94eOwN3wS9oVPw/7wWTgQ/hgOhs/DofBFOBy+DEfCV+Fo+DocC9+E4+HbcCKcDKfCd+F0+D6cCWfDufBDOB9+DBfCT+Gi/M2aEEIIIcQ/RP/O493/xufSAcCvt0Q9AODq7bkO/3XNjdn/tO6lcrdMAMCT3To88OtRuXJqauovz12qIco/FwASf1n/13gZtIDHoTU0h+J/s79eqtN5/p36yVsAMv5ZTgpcji/Xv+m/qP/IY8MXlorPZf079ecCFMx/OScDXI4v1y/xX9TP0fR3+s/w+TiAZn+Wkwkux5frF4NH4Slo/RfPFEIIIYQQQggh/qSXKtvu9+6fL92f5zaXc9LD5fj37s+FEEIIIYQQQghx5T3TqfMTj7Ru3bzdP7bAX/YF/ntZspDFf84iwy8/Ov9X+vk3La7kbyUhhBBCCCHEv8Pli/4r3YkQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCJF2/W/8O7ErfY5CCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCHElfb/AgAA//+wBDLo") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x200}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x3f00, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x6) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000980)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x6, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x1010040, &(0x7f00000003c0)={[{@noquota}, {@debug}, {@jqfmt_vfsv0}, {@noauto_da_alloc}, {@resgid}]}, 0x3, 0x4d7, &(0x7f0000001480)="$eJzs3d9rW9cdAPDvle3YSZzZ2faQBZaFLcMJWyQ7XhKzh8yDsT0FlmXvnmfLxli2jCUnsQnDYX/AYOwX61Of+lLocymU/AmlEGjfSyktoU3Shz60VZF01aSO/AtbVmJ9PnB8z/2h+/0em3uso3PRDaBjnY2I8YjoiogLETGQbs+kJdbrpXrc40d3p6oliUrl5qdJJOm2xrmSdHk8fVlfRPzpDxF/TZ6PW1pdm58sFPLL6XquvLCUK62uXZxbmJzNz+YXx0dHroxdHbs8Nrxvbb32u4/+84/Xfn/t7V/e/mDik/N/q6bVn+57th07sb7D4+pN76n9Lhq6I2J5N8FeYF1pe3ranQgAADtSfY///Yj4aUQ8+X+7swEAAABaofKb/vgyiagAAAAAh1amdg9sksmm9wL0RyaTzdbv4f1hHMsUiqXyL2aKK4vT9XtlB6MnMzNXyA+n9woPRk9SXR+p1Z+uX9qwPhoRJyPiXwNHa+vZqWJhut0ffgAAAECHOL5h/P/5QH38DwAAABwyg+1OAAAAAGg5438AAAA4/DYd/yfdB5sIAAAA0Ap/vH69WiqN519P31pdmS/eujidL81nF1amslPF5aXsbLE4W/vOvoXtzlcoFpd+FYsrd3LlfKmcK62uTSwUVxbLE7Xnek/kPScaAAAADt7Jn9x/P4mI9V8frZWqI+m+HYzVx1ubHdBKmd0dnrQqD+DgdbU7AaBt3OALnct8PLDNwP7fG9Z3+bEBAADwIhj60Z7m/80HwkvMQB46l/l/6Fzm/6Fzmf+HDte7/SF9m+14Z59zAQAAWqa/VpJMNp0L7I9MJpuNOFF7LEBPMjNXyA9HxPci4r2Bnt7q+ki7kwYAAAAAAAAAAAAAAAAAAAAAAACAl0ylkkQFAAAAONQiMh8n6YP8hwbO9W/8fOBI8sVAbRkRt1+5+d87k+Xy8kh1+2ffbi//L91+qbEFAAAAaKfGOL0xjgcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA/fT40d2pRjnIuA9/GxGDzeJ3R19t2ffmQEQce5JE9zOvSyKiax/ir9+LiFPN4ifVtGIwzWJj/ExEHG1z/OP7EB862f1q/zNevf56Nlx/mThbWza//rrTslcPz27W/2Ua/V+tn2vW/53Y+tR9jcrpB2/kNo1/L+J0d/P+pxE/2WP/+5c/r61ttq/yasTQNv9/qrFy5YWlXGl17eLcwuRsfja/ODo6cmXs6tjlseHczFwhn/5sGuOfP37r663af6xp/Hr/u1X7zz1/ut5mMb56cOfRD7aIf/5nzf/+p7aIX/3d/zz9P1DdP9Sor9frzzrz+rtntmr/9Cbt3+7vf36zk25w4cbfP9zhoQDAASitrs1PFgr55ZejElF/V/6i5KOispdKV8tD3Egv9F2/vL39EgAAsP+evulvdyYAAAAAAAAAAAAAAAAAAADQuVr+PWe93/1mgb72NRUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYEvfBAAA///DTM7p") 18m43.842600683s ago: executing program 34 (id=465): socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$exfat(&(0x7f0000000100), &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000600)=ANY=[], 0x2, 0x1509, &(0x7f0000001c40)="$eJzs3Au0jtXWOPA511oPm8Sb5L7mmg9vclkkSS4JiSRJjiS5JSRJkoTEJrckJCH3JPeQ3EJyv99yT5IjSZKQkGT9h079nXM63+l83znn842z52+MZ+w19/vO+c5nz733+zxrjL2/7jCoSr2qleowM/xT8E8fUgEgBQD6AkAWAIgAoGTWklkBh0IGjan/3IuIf60Hpl7pDsSVJPNP22T+aZvMP22T+adtMv+0Teaftsn80zaZvxBp2dZpua6RI+0e/3v7/yD7///nyPv/f5DDRUd/vr7odR3/Gyky/7RN5p+2yfzTNpl/2ibzT9tk/v/hIoCKf+dhmX/aJvMXIi270vvPclzZ40p//wkhhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGESBvOhcsMAPy6vtJ9CSGEEEIIIYQQ4l8npP/zKN2Va0QIIYQQQgghhBD/RggKNBiIIB2khxTIABnhKsgEV0NmyAIJuAaywrWQDa6D7JADckIuyA15IC9YIHDAEEM+yA9JuB4KwA1QEApBYSgCHopCMbgRisNNUAJuhpJwC5SCW6E0lIGyUA5ug/JwO1SAilAJ7oDKcCdUgapwF1SDu6E63AM14F6oCfdBLbgfasMfoA48AHXhQagHD0F9eBgaQENoBI2hyf8o/3noAi9AV+gGqdAdesCL0BN6QW/oA33hJegHL0N/eAUGwEAYBK/CYHgNhsDrMBSGwXB4A0bASBgFo2EMjIVx8CaMh7dgArwNE2ESTIYpMBWmwXR4B2bATJgF78JseA/mwFyYB/NhAbwPC2ERLIYPYAl8CEthGSyHFbASVsFqWANrYR2shw2wETbBZtgCW+Ej2AbbYQfshF2wG/bAx7AXPoF98Cnsh8/+Oj/L388/+1f5HREQUKFCgwbTYTpMwRTMiBkxE2bCzJgZE5jArJgVs2E2zI7ZMSfmxNyYG/NiXiQkZGTMh/kwiUksgAWwIBbEwlgYPXoshsWwON6EJbAElsSSWApLYWksg2WwHJbD8lgeK2AFrISVsDJWxipYBe/Cu/BurI7VsQbWwJpYE2thLayNtbEO1sG6WBfrYT2sj/WxATbARtgIm2ATbIpNsRk2wxbYAltiS2yFrbA1tsY22AbbYltsh+2wPbbHDtgBO2In7ITP4/P4Ar6A3bCy6o49sAf2xJ7YG/tgH3wJ++HL+DK+ggNwIA7CV/FVfA2H4BkcisNwOA7H8mokjsLRyGosjsNxOB7H4wScgBNxEk7CKTgVp+F0nI4zcCbOxHdxNr6H7+FcnIvzcQEuwIW4CBfjYlyCZ3EpLsPluAJX4ipciWtwLa7B9bgB1+Mm3IRbcAt+hB/hdtyOO3En7sbd+DF+jJ/gJzgA9+N+PIAH8CAexEN4CA/jYTyCR/AoHsVjeAyP43E8gSfxFJ7E03gaz+BZPIfn8Dyexwv4bO4v6+4utG4AqEuMMiqdSqdSVIrKqDKqTCqTyqwyq4RKqKwqq8qmsqnsKrvKqXKq3Cq3yqvyKlKkWMUqn8qnkiqpCqgCqqAqqAqrwsorr4qpYqq4Kq5KqBKqpLpFlVK3qtKqjGruy6lyqrxq4SuoiqqSqqQqqztVFVVVVVXVVDVVXVVXNVQNVVPVVLXU/aq26o698QF1aTL11ECsrwZhA9VQNVKN1Wv4iGqqhmAz1Vy1UI+pYTgUW6mmvrV6UrVRo7CtelqNxmdUezUWO6jnVEfVSXVWz6suqpnv+ut2p5qCPVUv1Vv1UTPwTnVpYlXUK2qAGqgGqVfVfHxNDVGvq6FqmBqu3lAj1Eg1So1WY9RYNU69qcart9QE9baaqCapyWqKmqqmqenqHTVDzVSz1LtqtnpPzVFz1Tw1Xy1Q76uFapFarD5QS9SHaqlapparFWqlWqVWqzVqrVqn1qsNaqPapDarLWqr+khtU9vVDrVT7VK71R71sdqrPlH71Kdqv/pMHVB/VAfV5+qQ+kIdVl+qI+ordVR9rY6pb9Rx9a06oU6qU+o7dVp9r86os+qc+kGdVz+qC+ondVEFBRq10lobHel0Or1O0Rl0Rn2VBn21zqyz6IS+RmfV1+ps+jqdXefQOXUunVvn0Xm11aSdZh3rfDq/TurrdQF9gy6oC+nCuoj2uqgupm/UxfVNuoS+WZfUt+hS+lZdWpfRZXU5fZsur2/XFXRFXUnfoSvrO3UVXVXfpavpu3V1fY+uoe/VNfV9upa+X9fWf9B19AO6rn5Q19MP6fr6Yd1AN9SNdGPdRD+im+pHdTPdXLfQj+mW+nHdSj+hW+sndRv9lG6rn9bt9DO6vX5Wd9DP6Y66k+6sf9IXddBddTedqrvrHvpF3VP30r11H91Xv6T76Zd1f/2KHqAH6kH6VT1Yv6aH6Nf1UD1MD9dv6BF6pB6lR+sxeqwep9/U4/VbeoJ+W0/Uk/RkPUVP1dN0718qzfoH8t/6G/n9f371LXqr/khv09v1Dr1T79K79R69R+/Ve/U+vU/v1/v1AX1AH9QH9SF9SB/Wh/URfUQf1Uf1MX1MH9fH9Ql9Uv+gv9On9ff6jD6rz+of9Hl9Xl/45WsABo0y2hgTmXQmvUkxGUxGc5XJZK42mU0WkzDXmKzmWpPNXGeymxwmp8llcps8Jq+xhowzbGKTz+Q3SXO9KWBuMAVNIVPYFDHeFDXFzI3/dP7v9dfENDFNTVPTzDQzLUwL09K0NK1MK9PatDZtTBvT1rQ17Uw70960Nx1MB9PRdDSdTWfTxXQxXU1Xk2pSTQ/zoulpepnepo/pa14y/Uw/09/0NwPMADPIDDKDzWAzxAwxQ81QM9wMNyPMCDPKjDJjzBgzzowz4814M8FMMBPNRDPZTDZTzVQz3Uw3M8wMM8vMMrPNbDPHzDHzzDyzwCwwC81Cs9gsNkvMErPULDPLzAqzwqwyq8was8asM+vMBrPBbDKbzFKz1Ww128w2s8PsMLvMLrPH7DF7zV6zz+wz+81+c8AcMAfNQXPIHDKHzWFzxBwxR81Rc8wcM8fNcXPCnDCnzClz2pw2Z8wZc86cM+fNeXPBXDAXzcVLl32RilRkIhOli9JFKVFKlDHKGGWKMkWZo8xRIkpEWaOsUbbouih7lCPKGeWKckd5olSwEUUu4iiO8kX5o2R0fVQguiEqGBWKCkdFIh8VjYpFN0bFo5uiEtHNUcnolqhUdGtUOioTlY3KRbdF5aPbowpRxahSdEdUObozqhJVje6KqkV3R9Wje6Ia0b1Rzei+qFZ0f1Q7+kNUJ3ogqhs9GNWLHorqRw9HDaKGUaOocdTkX1o/hDM5HvVdbTebarvbHvZF29P2sr1tH9vXvmT72Zdtf/uKHWAH2kH2VTvYvmaH2NftUDvMDrdv2BF2pB1lR9sxdqwdZ9+04+1bdoJ92060k+xkO8VOtdPsdPuOnWFn2ln2XTvbvmfn2Ll2np1vF9j37UK7yC62H9gl9kO71C6zy+0Ku9KusqvtGrvWrrPr7Qa70W6ym+0Wu9V+ZLfZ7XaH3Wl32d12j/3Y7rWf2H32U7vffmYP2D/ag/Zze8h+YQ/bL+0R+5U9ar+2x+w39rj91p6wJ+0p+509bb+3Z+xZe87+YM/bH+0F+5O9aMOli/tLb+9kyFA6SkcplEIZKSNlokyUmTJTghKUlbJSNspG2Sk75aSclJtyU17KS5cwMeWjfJSkJBWgAlSQClJhKkyePBWjYlScilMJKkElqSSVolJUmkpTWSpLt9FtdDvdThWpIt1Bd9CddCdVpapUjapRdapONagG1aSaVItqUW2qTXWoDtWlulSP6lF9qk8NqAE1okbUhJpQU2pKzagZtaAW1JJaUitqRa2pNbWhNtSW2lI7akftqT11oA7UkTpSZ+pMXagLdaWulEqp1IN6UE/qSb2pN/WlvtSP+lF/6k8DaAANokE0mAbTEBpCQ2kYDac3aASNpFE0msbQWBpH42g8jacJNIEm0kSaTJNpKk2l6TSdZtAMmkWzaDbNpjk0h+bRPFpAC2ghLaTFtJiW0BJaSktpOS2nlbSSVtNqWktraT2tp420kTbTZtpKW2kbbaMdtIN20S7aQ3toL+2lfbSP9tN+OkAH6CAdpEN0iA7TYTpCR+goHaVjdIyO03E6QSfoFJ2i03SaztAZOkfn6Dz9SBfoJ7pIgVKcgozuKpfJXe0yuywuxWVwl+IIAC7FOV0ul9vlcXmdddldjr+IyTlX0BVyhV0R511RV8zd+Ju4tCvjyrpy7jZX3t3uKvwmrubudtXdPa6Gu9dVdXf9RVzT3edquYdcbfewq+MaurqusavnHnL13cOugWvoGrnGrqV73LVyT7jW7knXxj31m3ihW+TWunVuvdvg9rpP3Dn3gzvqvnbn3Y+uq+vm+rqXXD/3suvvXnED3MDfxMPdG26EG+lGudFujBv7m3iym+KmumluunvHzXAzfxMvcO+72W6xm+Pmunlu/s/xpZ4Wuw/cEvehW+qWueVuhVvpVrnVbs3/73WF2+Q2uy1uj/vYbXPb3Q630+1yu3+OL53HPvep2+8+c0fcV+6g+9wdcsfcYfflz/Gl8zvmvnHH3bfuhDvpTrnv3Gn3vTvjzv58/pfO/Tv3k7voggNGVqzZcMTpOD2ncAbOyFdxJr6aM3MWTvA1nJWv5Wx8HWfnHJyTc3FuzsN52TKxY+aY83F+TvL1XIBv4IJciAtzEfZclIvxjVycb+ISfDOX5Fu4FN/KpbkMl+VyfBuX59u5AlfkSnwHVw6Bq3BVvour8d1cne/hGnwv1+T7uBbfz7X5D1yHH+C6/CDX44e4Pj/MDbghN+LG3IQf4ab8KDfj5tyCH+OW/Di34ie4NT/JbfgpbstPczt+htvzs9yBn+OO3Ik78/PchV/grtyNU7k79+AXuSf34t7ch/vyS9yPX+b+/AoP4IE8iF/lwfwaD+HXeSgP4+H8Bo/gkTyKR/MYHsvj+E0ez2/xBH6bJ/IknsxTeCpP4+n8Ds/gmTyL3+XZ/B7P4bk8j+fzAn6fF/IiXswf8BL+kJfyMl7OK3glr+LVvIbX8jpezxt4I2/izbyFt/JHvI238w7eybt4N+/hj3kvf8L7+FPez5/xAf4jH+TP+RB/wYf5Sz7CX/FR/pqP8Td8nL/lE3yST/F3fJq/5zN8ls/xD3yef+QL/BNf5MAQY6xiHZs4itPF6eOUOEOcMb4qzhRfHWeOs8SJ+Jo4a3xtnC2+Ls4e54hzxrni3HGeOG9sY4pdzHEc54vzx8n4+rhAfENcMC4UF46LxD4uGheLb4yLxzfFJeKb45LxLXGp+NYYUsvED91bLr4tLh/fHleIK8aV4jviyvGdcZW4anxXXC2+O64e3xPXiO+NS8T3xbXi++Pa8R/iOvEDcd34wbhe/FBcP344bhA3jBvFjeMm8SNx0/jRuFncPG4RPxa3jB+PW8VPxK3jJ+M28VO/+3hq3D3uEb8YvxiHcI/65T4xuTC5KLk4+UFySfLD5NLksuTy5IrkyuSq5OrkmuTa5Lrk+uSG5MbkpuTm5JZkCFXTg0evvPbGRz6dT+9TfAaf0V/lM/mrfWafxSf8NT6rv9Zn89f57D6Hz+lz+dw+j8/rrSfvPPvY5/P5fdJf7wv4G3xBX8gX9kW890V9Md/YN/FNfFP/qG/mm/sW/jH/mH/cP+6f8E/4J30b/5Rv65/27fwzvr1/1j/rn/MdfSff2T/vu/gXfFffzaf6VN/D9/A9fU/f2/f2fX1f38/38/19fz/AD/CD/CA/2A/2Q/wQP9QP9cP9cD/Cj/Cj/Cg/xo/x4/w4P96P9xP8BD/RT/ST/WQ/1U/10/10P8PP8LP8LD+74Gw/x8/x8/w8v8Av8Av9Qr/YL/ZL/BK/1C/1y/1yv9Kv9Kv9ar/Wr/Xr/Xq/0W/0m/1mv9Vv9dv8Nr/D7/C7/C6/x+/xe/1ev8/v8/v9fn/AH/AH/UF/yH/hD/sv/RH/lT/qv/bH/Df+uP/Wn/An/Sn/nT/tv/dn/Fl/zv/gz/sf/QX/k7/ogx+XeDMxPvFWYkLi7cTExKTE5MSUxNTEtMT0xDuJGYmZiVmJdxOzE+8l5iTmJuYl5icWJN5PLEwsSixOfJBYkvgwsTSxLLE8sSKxMrEqEUKebXHIF/KHZLg+FAg3hIKhUCgcigQfioZi4cZQPNwUSoSbQ8lwSygVbg2lQ5lQNjwcGoSGoVFoHJqER0LT8GhoFpqHFuGx0DI8HlqFJ0Lr8GRoE54KbcPToV14JrQPz4YO4bnQMXQKncPzoUt4IXQN3UJq6B56hBdDz9Ar9A59Qt/wUugXXg79wythQBgYBoVXw+DwWhgSXg9Dw7AwPLwRRoSRYVQYHcaEsWFceDOMD2+FCeHtMDFMCpPDlDA1TAvTwzthRpgZZoV3w+zwXpgT5oZ5YX5YEN4PC8OisDh8EJaED8PSsCwsDyvCyrAqrA5rwtqwLqwPG8LGsClsDlvC1vBR2Ba2hx1hZ9gVdoc94eOwN3wS9oVPw/7wWTgQ/hgOhs/DofBFOBy+DEfCV+Fo+DocC9+E4+HbcCKcDKfCd+F0+D6cCWfDufBDOB9+DBfCT+Gi/M2aEEIIIcQ/RP/O493/xufSAcCvt0Q9AODq7bkO/3XNjdn/tO6lcrdMAMCT3To88OtRuXJqauovz12qIco/FwASf1n/13gZtIDHoTU0h+J/s79eqtN5/p36yVsAMv5ZTgpcji/Xv+m/qP/IY8MXlorPZf079ecCFMx/OScDXI4v1y/xX9TP0fR3+s/w+TiAZn+Wkwkux5frF4NH4Slo/RfPFEIIIYQQQggh/qSXKtvu9+6fL92f5zaXc9LD5fj37s+FEEIIIYQQQghx5T3TqfMTj7Ru3bzdP7bAX/YF/ntZspDFf84iwy8/Ov9X+vk3La7kbyUhhBBCCCHEv8Pli/4r3YkQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCJF2/W/8O7ErfY5CCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCHElfb/AgAA//+wBDLo") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x200}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x3f00, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x6) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000980)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x6, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x1010040, &(0x7f00000003c0)={[{@noquota}, {@debug}, {@jqfmt_vfsv0}, {@noauto_da_alloc}, {@resgid}]}, 0x3, 0x4d7, &(0x7f0000001480)="$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") 6m28.723230338s ago: executing program 7 (id=4839): r0 = syz_open_procfs(0x0, &(0x7f0000002ac0)='net/ipv6_route\x00') preadv(r0, &(0x7f0000002240)=[{&(0x7f0000001180)=""/4096, 0x1000}], 0x1, 0x29d3, 0x0) 6m28.712324968s ago: executing program 7 (id=4841): bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32], 0x0, 0x6, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x1) mount(&(0x7f00000002c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) 6m28.702049728s ago: executing program 7 (id=4842): r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42}}}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000140)={0x10000042}, 0x10) sendmsg$tipc(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x4}}, 0x10, 0x0}, 0x10) 6m28.677988478s ago: executing program 7 (id=4843): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000400db00000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) getpid() setns(0xffffffffffffffff, 0x24020000) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='.\x00', 0x2) 6m28.677404789s ago: executing program 7 (id=4844): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0x20000000000003c3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x18) r2 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x201, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x11012, r2, 0x87838000) 6m28.546546851s ago: executing program 7 (id=4845): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="12010000090024206d041cc340000000000109022400010000a00009040000010301010009210008000122010009058103"], 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000e8f70000000000ff000044850000000e000000650000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40001d4}, 0x8840) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="7a0af8ff75257035bfa100000000000007010000f9ffffffb702000005000000bf130000000000008500000006000000b7000000000000009500000000000000b2595285faa6ead0169191d54f8196217fc560e2fc91f6da4dad4fdc2eb1b5986fc4a3f611a7c8edd3aa5d6ee7ab10b1a297cf528666d1ddd73f3047d248df061222193165274bc7f2382f6cda4bfdd45be583823c0f09621f3c1c65ee19ee875daf45006a4c4ea5e15b2f9618d547244a22000000000000db453620ce7243d1aebdb638d91dbef661935839c77edf2d34b12cd48a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector}, 0x94) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000007c0)=@newqdisc={0xb8, 0x24, 0xd0f, 0x3, 0x0, {0x60, 0x0, 0x0, r3, {0x0, 0x2}, {0xffff, 0xffff}, {0x4}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x88, 0x2, {{0x10, 0x3, 0x1, 0x3, 0x400, 0x8}, [@TCA_NETEM_LOSS={0x30, 0x5, 0x0, 0x1, [@NETEM_LOSS_GI={0x18, 0x1, {0x8, 0x7, 0x0, 0x8, 0x8001}}, @NETEM_LOSS_GE={0x14, 0x2, {0x10, 0xfffffffc, 0x0, 0xbac}}]}, @TCA_NETEM_CORRUPT={0xc, 0x4, {0x800, 0xc}}, @TCA_NETEM_DELAY_DIST={0x10, 0x2, "9f2b57f6fd6d293bfe5b6d9a"}, @TCA_NETEM_CORR={0x10, 0x1, {0x7, 0xd654, 0x101}}, @TCA_NETEM_REORDER={0xc, 0x3, {0x0, 0x3}}, @TCA_NETEM_LOSS={0x4}]}}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x40001d4}, 0x8840) syz_open_dev$usbmon(&(0x7f0000000340), 0x83, 0x80180) syz_open_dev$usbmon(&(0x7f0000000080), 0xb4, 0x145703) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x48}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r2, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, 0x0, 0x800, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x3, 0x17}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x3f}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x8044) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x3c, 0x66, 0x100, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {0xf, 0xa}, {0x6, 0x10}, {0xa, 0xffff}}, [{0x8, 0xb, 0x8}, {0x8}, {0x8, 0xb, 0x58a9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000100}, 0x4000001) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r5, 0x58}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), r2) capget(&(0x7f0000000000)={0x20080522}, 0xffffffffffffffff) syz_usb_control_io$hid(r0, &(0x7f0000000000)={0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="e3c50336ad6b40a5f698", @ANYRES8=r0, @ANYRESDEC=r0], 0x0, 0x0, 0x0}, 0x0) 6m28.546195391s ago: executing program 35 (id=4845): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="12010000090024206d041cc340000000000109022400010000a00009040000010301010009210008000122010009058103"], 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000e8f70000000000ff000044850000000e000000650000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40001d4}, 0x8840) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="7a0af8ff75257035bfa100000000000007010000f9ffffffb702000005000000bf130000000000008500000006000000b7000000000000009500000000000000b2595285faa6ead0169191d54f8196217fc560e2fc91f6da4dad4fdc2eb1b5986fc4a3f611a7c8edd3aa5d6ee7ab10b1a297cf528666d1ddd73f3047d248df061222193165274bc7f2382f6cda4bfdd45be583823c0f09621f3c1c65ee19ee875daf45006a4c4ea5e15b2f9618d547244a22000000000000db453620ce7243d1aebdb638d91dbef661935839c77edf2d34b12cd48a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector}, 0x94) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000007c0)=@newqdisc={0xb8, 0x24, 0xd0f, 0x3, 0x0, {0x60, 0x0, 0x0, r3, {0x0, 0x2}, {0xffff, 0xffff}, {0x4}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x88, 0x2, {{0x10, 0x3, 0x1, 0x3, 0x400, 0x8}, [@TCA_NETEM_LOSS={0x30, 0x5, 0x0, 0x1, [@NETEM_LOSS_GI={0x18, 0x1, {0x8, 0x7, 0x0, 0x8, 0x8001}}, @NETEM_LOSS_GE={0x14, 0x2, {0x10, 0xfffffffc, 0x0, 0xbac}}]}, @TCA_NETEM_CORRUPT={0xc, 0x4, {0x800, 0xc}}, @TCA_NETEM_DELAY_DIST={0x10, 0x2, "9f2b57f6fd6d293bfe5b6d9a"}, @TCA_NETEM_CORR={0x10, 0x1, {0x7, 0xd654, 0x101}}, @TCA_NETEM_REORDER={0xc, 0x3, {0x0, 0x3}}, @TCA_NETEM_LOSS={0x4}]}}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x40001d4}, 0x8840) syz_open_dev$usbmon(&(0x7f0000000340), 0x83, 0x80180) syz_open_dev$usbmon(&(0x7f0000000080), 0xb4, 0x145703) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x48}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r2, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, 0x0, 0x800, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x3, 0x17}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x3f}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x8044) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x3c, 0x66, 0x100, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {0xf, 0xa}, {0x6, 0x10}, {0xa, 0xffff}}, [{0x8, 0xb, 0x8}, {0x8}, {0x8, 0xb, 0x58a9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000100}, 0x4000001) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r5, 0x58}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), r2) capget(&(0x7f0000000000)={0x20080522}, 0xffffffffffffffff) syz_usb_control_io$hid(r0, &(0x7f0000000000)={0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="e3c50336ad6b40a5f698", @ANYRES8=r0, @ANYRESDEC=r0], 0x0, 0x0, 0x0}, 0x0) 3.685507284s ago: executing program 1 (id=8627): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000740)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) preadv(r2, &(0x7f0000000a80)=[{&(0x7f0000000180)=""/40, 0x28}, {&(0x7f00000007c0)=""/232, 0xe8}, {&(0x7f0000000480)=""/131, 0x83}, {&(0x7f00000008c0)=""/244, 0xf4}, {&(0x7f00000003c0)=""/78, 0x4e}, {&(0x7f00000009c0)=""/140, 0x8c}], 0x6, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x2000c10, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1}}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x30, 0x37, 0x64, 0x61, 0x61, 0x65, 0x62], 0x2d, [0x31, 0x38, 0x33, 0x64], 0x2d, [0x37, 0x31, 0x64], 0x2d, [0x35, 0x34, 0x66, 0x61], 0x2d, [0x33, 0x37, 0x36, 0x31, 0x30, 0x33, 0x37, 0x66]}}}, {@fsname={'fsname', 0x3d, 'debug_want_extra_isize'}}, {@obj_role={'obj_role', 0x3d, '\x00'}}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") setsockopt$sock_int(r5, 0x1, 0x23, &(0x7f00000001c0)=0x1, 0x4) socket$tipc(0x1e, 0x2, 0x0) r7 = syz_clone(0xc4200000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_NET_NS_PID={0x8, 0x13, r7}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x0) 2.836655227s ago: executing program 1 (id=8665): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2645}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x78) socket(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r9}, 0x10) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x40000, 0x0, {0x0, 0x0, 0x0, r8, {0x0, 0x3}, {0xffff, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0xe, 0x6, 0xffffff80, 0x4, 0x5, 0xc8b}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x404}, 0x0) 2.188358666s ago: executing program 0 (id=8670): socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x18) ptrace(0x10, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x48) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000d40)="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", 0x2000, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b708000002001e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mmap(&(0x7f00005b1000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0xc5d6f000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000d00)='sched_switch\x00', r5}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x28) r6 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10, &(0x7f0000000400)=[{&(0x7f00000004c0)='\b\x00', 0x2}, {&(0x7f0000000180)="96bc1480bb35", 0x6}, {0x0}, {&(0x7f0000000240)="a61d", 0x2}], 0x4, &(0x7f0000000340)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}], 0x18}, 0x24008004) 2.090832478s ago: executing program 6 (id=8673): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r3}, 0x18) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) 1.177251602s ago: executing program 0 (id=8674): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket(0x10, 0x3, 0x4) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setscheduler(0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000c800000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) statfs(&(0x7f0000000000)='./file1\x00', &(0x7f0000000600)=""/192) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 1.176680362s ago: executing program 1 (id=8675): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000040), &(0x7f0000000180)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r4) 1.175364012s ago: executing program 6 (id=8677): sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="240000000206010200000000000000000000000e0500000005"], 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8014) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021bc0000000c0a01010000000000000000070000000900020073797a31000000000900010073797a3000000000900003808c000080080003400000000280000b807c000180090001006c617374000000006c000280080001400000000508000140000000090c0002"], 0x140}}, 0x0) 1.132583192s ago: executing program 6 (id=8678): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000003000000050010000b00000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000380), &(0x7f0000000380), 0x2, r1}, 0x38) 1.124055652s ago: executing program 1 (id=8679): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) symlink(&(0x7f0000001780)='./file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') 1.116759733s ago: executing program 8 (id=8680): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, 0x0, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r4}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x100002, 0x0) ioctl$FIBMAP(r5, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000500)='mm_lru_activate\x00'}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 1.079949763s ago: executing program 1 (id=8681): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800001965ba917c62e1e69023000000000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r2}, 0x18) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) 1.074932113s ago: executing program 6 (id=8682): lseek(0xffffffffffffffff, 0x10001, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) memfd_create(&(0x7f0000000100)=';e\x00\x00\xa4\xd8\xe0\x9c\x7f9\x8aZ]3N\xbb\xe1^\x9c\xe1\x9b6s$0Y\xf8\x90\x00\x00\x00\x00\xd2~l\xf6\x12\xde\xdd\xd5\x1d\x96\xb0a\xf2\xcd\x16\xd8G\xae\xd9DZm\xabO\xad\x11%\x7f`@\x16c\xc0\xb6\x1f\xe3\x00\x1a_\xc7\xbf\xa7T\xbe\x13\x8b\xb3r\x8fL\xe6\xba\xe7\x18\xb4$BIj\xa3\xc9\xc6|\x9b\x88\xddPx\x02I\xde\xe8\xcd\x02\xc1\xedc2\x06\xcbM\xfb\x13jZ\x96\xeej\x9b\xe4XjN\xb9>\xdf3U\r \x8dh8T/h)\x90\xff\x8d\xd9\x89\xab\xf8P\xacYtk\xa3\xed\xfa*8\x13\b\xce\xf8z\xed\xadnz\x96\xa3\x9a9R\xd9]\xe11We\xfe3\xe06\x1a^\x04^\xef\xa3\x0fU\x9b1\xc6J\x83\x9d[\\a\xfd\xdc\xa1\xcd\xbe\x9b\xc5z7\xe8VP\x89\x16MK`\xe5\x137\b\x00\x00\x00\xd5\x01\xea\x98\xe6Z\x95j\xe3\x0ek>\x14\x80\rXS\xce\xf9\x0e\x89\xc4\xc6\x1bOm4Lla\r\xce\x17\xb5r&\xf3\x96\xbc\xc39\xa7\x95\xd9F\x17', 0x0) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x414, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2a1, &(0x7f0000000f40)="$eJzs3MFqE18Ux/Hzb/pv0pQ2EURQUA+60c3QxgfQIC2IAaU2RV0IUzvRkDEpM0MlIjYbcetzFJfuBPUFuhE37t0VQXDThTjiTKZN2rSmbdLE9PuBck9y7o+5bdNyUuis3339pFRwjYLpyVBCZUikJhsi6T9V3X/1dSioR6RRTS6P/fhy9s69+zezudz0rOpMdu5KRlUnzr9/+vzNhY/e2PzbiXdxWUs/WP+e+bp2au30+q+5x0VXi66WK56aulCpeOaCbeli0S0Zqrdty3QtLZZdy2nqF+zK0lJVzfLieHLJsVxXzXJVS1ZVvYp6TlXNR2axrIZh6HhSjrfhNvbkV2dnzeyubT/W0ROh60ZbPek42VrrZn71CM4EAAD6zN7zfzjr7z7/5+bDtcPzvwjzf5fUmh79Zf7HQHCcrJms//w2Y/4HAAAAAAAAAAAAAAAAAAAAAOBfsOH7Kd/3U9EafcRFJCEi0eNenxPdccDv/9UeHRcd1vCPewkR+9VyfjkfrmE/W5Ci2GLJpKTkZ/B6qAvrmRu56UkNpOWDvVLPryznYxKP8pF0q/y5E1NhXpvz/0uy8foZScnJ1tfPtMyPyKWLDXlDUvLpoVTElsXgdb2VfzGlev1Wblt+NNgHAAAAAMAgMHTTjvfvQT/YkJCd/TC/j78PbHt/PSxn2rlFJQAAAAAAODS3+qxk2rblHKCIi8gh4oNaxKQvjrGtuCYifXCMoyoSIhI+oweJf9uMt5Xy29gzLCI9/7Lso+j1byYAAAAAnbY19O8j9PllF08EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDx0+79wKL9O1pRY494w+ViR/4JAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAH3kdwAAAP//R8IgDA==") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) mkdir(&(0x7f0000000200)='./file0\x00', 0x50) 975.277475ms ago: executing program 6 (id=8683): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 354.846974ms ago: executing program 3 (id=8691): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) symlink(&(0x7f0000001780)='./file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') 352.952564ms ago: executing program 3 (id=8692): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000003000000050010000b00000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000380), &(0x7f0000000380), 0x2, r1}, 0x38) 339.411534ms ago: executing program 3 (id=8693): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 321.664244ms ago: executing program 3 (id=8694): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000240)=0x100000001, 0x59) connect$inet6(r1, &(0x7f0000000200)={0xa, 0xffff, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x304}, "0002002000", "07f217bd74511e465bbbd5de01000000f9044677d4d588363d63af84db44be59", "00f8ff00", "8ce63ecbc640735f"}, 0x38) sendto$inet6(r1, &(0x7f0000000280)='S', 0x1, 0x8000, 0x0, 0x0) close(r1) 307.782875ms ago: executing program 3 (id=8695): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, &(0x7f0000000340)}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x280008a, &(0x7f00000007c0)=ANY=[@ANYBLOB="6e6f6e756d7461696c3d302c73686f72746e616d653d77696e39352c73686f72746e616d653d6c6f7765722c696f636861727365743d64656661756c742c756e695f786c6174653d302c6e6f6e756d7461696c3d302c757466383d302c616c6c6f775f7574696d653d30303030303030303030303030303030303030303030322c726f6469722c73686f72866e616d653d6d697865642c73686f72746e616d653d6d697865642c73686f72746e616d653d77696e39352c7569643d", @ANYRESHEX=0x0, @ANYBLOB=',uni_xlate=0,utf8=0,shortname=mixed,uni_xlate=0,shortname=winnt,\x00'], 0x96, 0x2a9, &(0x7f0000000500)="$eJzs3T9ra2UYAPDnpGkSdEgEJxE8oINTabu6pEgLxUxKBnXQYluQJggtFPyDsZOri6OriyC4+SVc/AaCq+BmwcKRk5xjkt40N+m9ae+f32/p2/c8z3ue9/QtpcN58vGr/ZPDNI4vvvojGo0kKu1ox2USrahE6ZuY0v4uAICn2WWWxd/ZyDJ5SUQ0VlcWALBCS//9/2XlJQEAK/be+x+8s9Pp7L6bpo3Y63973s3/s8+/jq7vHMen0Yuj2IxmXEVk/xuN97IsG1TTXCve6A/Ou3lm/6PfivV3/ooY5m9FM1rDqen8/c7uVjoykT/I63ihuH87z9+OZrw84/77nd3tGfnRrcWbr0/UvxHN+P2T+Cx6cTgsYpQflYivt9L07ez7f778MC8vz08G5936MG4sW7vjHw0AAAAAAAAAAAAAAAAAAAAAAM+wjaJ3Tj2G/XvyqaL/ztpV/s16pKXWdH+eUX5SLnStP9Agix/K/jybaZpmReA4vxqvVKN6P7sGAAAAAAAAAAAAAAAAAACAJ8vZ51+cHPR6R6ePZVB2Ayhf67/tOu2JmddifnB9fK9KMZyzcqyVMUnE3DLyTSxc879F24PbPbqXbqr5p58XXufHh++9GKwvEPOIg/J0nRwks59hPcqZRnlIfp2MqcWC96rddClb6vjVZl5qLr332ovDwWBOTCTzCnvrz9GTK2aS67uoDZ/qzPT1YjCRPh3TWPw8578pD0h06wAAAAAAAAAAAAAAAAAAgJUav/Q74+LF3NRKVl9ZWQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwp8af/7/EYFAkLxBci9Oze94iAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAz4H/AgAA///uD2MO") bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, '\x00', 0x44}, 0x2}, 0x1c) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x6) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0xc) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="4c00000010004b0422000000000000007a000000", @ANYRES32=0x0, @ANYBLOB], 0x4c}, 0x1, 0x0, 0x0, 0x200400a0}, 0x0) 288.084525ms ago: executing program 0 (id=8696): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="300000003e000701fcfffffffddbdf25047c0000100036800c00020007009300000000000c0001"], 0x30}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) 234.586616ms ago: executing program 0 (id=8697): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xbe, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x1000, "7b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af", "584cbf2649a50f2dbc43efa8698dfa871c51852e4451b57d037ad3c045942824251d7d17b5191584cdd4fbe40a27424d", "bcfd56f1375461caaa2f19935e6996c7096ffeeb0300000000000064", {"9a3bfbc1f39cb307b3472eb9cdb042d2", "643fcbb2c5a57df67d544af6e8dafe09"}}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3}, 0x94) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r1}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}, 0x5}], 0x1, 0x10000, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x300, 0x2, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f0000000240)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) 223.049056ms ago: executing program 8 (id=8698): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) 208.814956ms ago: executing program 0 (id=8699): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r3, 0x0}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) dup(0xffffffffffffffff) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'veth0_macvtap\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r9}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) ioperm(0x0, 0xd, 0x4000000000000020) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x1, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff000000009408000000001700638af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000008"], &(0x7f0000005d80)='syzkaller\x00', 0xc}, 0x94) r10 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r10, 0x6, 0x0, 0x0, 0x0) r11 = fsmount(r10, 0x0, 0x6) symlinkat(&(0x7f0000000400)='./file0/../file0\x00', r11, &(0x7f00000003c0)='./file0\x00') readlinkat(r11, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000780)=""/198, 0xc6) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)=@getchain={0x24, 0x11, 0x1, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0xffee}, {0xfff1, 0xffff}, {0x0, 0xe}}}, 0x24}}, 0x40000) 154.645927ms ago: executing program 8 (id=8700): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000040), &(0x7f0000000180)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r3) 127.797437ms ago: executing program 8 (id=8701): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000400)='io_uring_create\x00', r1}, 0x18) io_uring_setup(0x1de0, &(0x7f00000000c0)={0x0, 0x45d6}) 105.381518ms ago: executing program 8 (id=8702): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) symlink(&(0x7f0000001780)='./file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') 87.062298ms ago: executing program 1 (id=8703): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) unshare(0x22020400) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[], 0x0, 0x37}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r6, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0xd, 0x4, 0x4, 0x7, 0x0, r7, 0x0, '\x00', 0x0, r5, 0x0, 0x1}, 0x48) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r8, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) lseek(r2, 0x8000000000000000, 0x0) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) r9 = socket(0x1, 0x80802, 0x0) connect$inet6(r9, &(0x7f0000000000)={0xa, 0x4e22, 0xa, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) sendto$inet(r8, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r8, &(0x7f0000000180)="2cf51cc5b4c70ade7011eb6f9e58d80f5784d217f705baa568167807e72bb55f05ae4824c8f4a6762d31e7cff8eb48270c358715", 0x34, 0xc804, 0x0, 0x0) sendto$inet(r8, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 80.582648ms ago: executing program 8 (id=8704): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = socket(0x400000000010, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a00)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000007c0)=@newtfilter={0x84, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r5, {0x0, 0x3}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x9, 0x9, 0x1, 0x80000001}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x0) 22.915509ms ago: executing program 0 (id=8705): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 3.123109ms ago: executing program 6 (id=8706): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe2(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid}]}}) 0s ago: executing program 3 (id=8707): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000400)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x6f, r3, 0x1, 0x0, 0x0, {{}, {0x0, 0x6}}}, 0xfd53}, 0x1, 0x0, 0x0, 0x40000}, 0x0) kernel console output (not intermixed with test programs): 0] audit: type=1326 audit(1751390720.074:3647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17436 comm="syz.1.5861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6d0be1f929 code=0x7ffc0000 [ 986.889138][ T30] audit: type=1326 audit(1751390720.074:3648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17436 comm="syz.1.5861" exe="/root/syz-executor" sig=0 arch=c000003e syscall=144 compat=0 ip=0x7f6d0be1f929 code=0x7ffc0000 [ 988.139100][T17456] netlink: 'syz.0.5866': attribute type 16 has an invalid length. [ 988.219788][T17456] netlink: 'syz.0.5866': attribute type 17 has an invalid length. [ 988.431000][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 988.458410][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 988.498072][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 988.548699][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 988.572322][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 988.598697][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 988.690032][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 988.703165][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 988.735997][T17470] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5873'. [ 989.298969][T17490] tipc: Enabled bearer , priority 0 [ 989.306987][T17489] tipc: Disabling bearer [ 989.524516][ T30] kauditd_printk_skb: 25 callbacks suppressed [ 989.524532][ T30] audit: type=1400 audit(1751390722.984:3674): avc: denied { mounton } for pid=17499 comm="syz.3.5885" path="/36/file0" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 989.534657][T17500] incfs: Can't find or create .index dir in ./file0 [ 989.560484][T17500] incfs: mount failed -14 [ 990.465085][ T30] audit: type=1400 audit(1751390722.994:3675): avc: denied { write } for pid=17499 comm="syz.3.5885" name="/" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 990.486715][ T30] audit: type=1400 audit(1751390722.994:3676): avc: denied { add_name } for pid=17499 comm="syz.3.5885" name=".index" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 990.515562][ T30] audit: type=1400 audit(1751390722.994:3677): avc: denied { create } for pid=17499 comm="syz.3.5885" name=".index" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 990.536095][ T30] audit: type=1400 audit(1751390722.994:3678): avc: denied { associate } for pid=17499 comm="syz.3.5885" name=".index" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 990.558923][ T30] audit: type=1400 audit(1751390723.504:3679): avc: denied { module_request } for pid=17503 comm="syz.6.5887" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 990.585200][ T30] audit: type=1400 audit(1751390723.634:3680): avc: denied { ioctl } for pid=17497 comm="syz.0.5883" path="socket:[72041]" dev="sockfs" ino=72041 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 990.627891][ T30] audit: type=1400 audit(1751390724.004:3681): avc: denied { unmount } for pid=16980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 990.696271][T17525] netlink: 96 bytes leftover after parsing attributes in process `syz.1.5895'. [ 990.747792][T17527] tipc: Started in network mode [ 990.753492][T17527] tipc: Node identity c66b513dccbd, cluster identity 4711 [ 990.768343][ T30] audit: type=1400 audit(1751390724.234:3682): avc: denied { setopt } for pid=17530 comm="syz.1.5897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 990.792194][T17527] tipc: Enabled bearer , priority 0 [ 990.799700][ T30] audit: type=1326 audit(1751390724.254:3683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17514 comm="syz.6.5891" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fb115887929 code=0x0 [ 990.909789][T17526] tipc: Disabling bearer [ 991.508543][T17545] overlayfs: failed to resolve './file1': -2 [ 991.862941][T17554] tipc: New replicast peer: 0.0.255.255 [ 991.869135][T17554] tipc: Enabled bearer , priority 10 [ 992.442960][T17566] netlink: 96 bytes leftover after parsing attributes in process `syz.0.5908'. [ 992.686416][T17582] netlink: 24 bytes leftover after parsing attributes in process `syz.6.5915'. [ 993.266654][T17599] netlink: 40 bytes leftover after parsing attributes in process `syz.8.5921'. [ 993.848757][T17628] syz.6.5934[17628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 993.848848][T17628] syz.6.5934[17628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 993.874379][T17630] netlink: 32 bytes leftover after parsing attributes in process `syz.6.5935'. [ 994.550572][T17657] netlink: 32 bytes leftover after parsing attributes in process `syz.8.5947'. [ 994.747728][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 994.754736][T17666] overlayfs: failed to clone lowerpath [ 994.761685][ T30] audit: type=1400 audit(1751390728.204:3698): avc: denied { mount } for pid=17662 comm="syz.1.5950" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 995.344094][T17686] netlink: 96 bytes leftover after parsing attributes in process `syz.3.5959'. [ 995.389088][ T30] audit: type=1400 audit(1751390728.854:3699): avc: denied { read write } for pid=17687 comm="syz.3.5960" name="fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 995.420500][T17688] xt_bpf: check failed: parse error [ 995.422517][ T30] audit: type=1400 audit(1751390728.874:3700): avc: denied { open } for pid=17687 comm="syz.3.5960" path="/dev/fuse" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 995.455217][ T30] audit: type=1400 audit(1751390728.874:3701): avc: denied { mount } for pid=17687 comm="syz.3.5960" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 995.568198][ T30] audit: type=1400 audit(1751390728.954:3702): avc: denied { unmount } for pid=17687 comm="syz.3.5960" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 995.641453][ T30] audit: type=1326 audit(1751390729.104:3703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17704 comm="syz.1.5966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6d0be1f929 code=0x7ffc0000 [ 995.668619][ T30] audit: type=1326 audit(1751390729.124:3704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17704 comm="syz.1.5966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6d0be1f929 code=0x7ffc0000 [ 995.705750][T17702] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 995.715750][ T30] audit: type=1326 audit(1751390729.124:3705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17704 comm="syz.1.5966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6d0be1f929 code=0x7ffc0000 [ 995.739827][ T30] audit: type=1326 audit(1751390729.124:3706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17704 comm="syz.1.5966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6d0be1f929 code=0x7ffc0000 [ 995.804096][ T30] audit: type=1326 audit(1751390729.124:3707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17704 comm="syz.1.5966" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6d0be1f929 code=0x7ffc0000 [ 996.105216][T17749] netlink: 96 bytes leftover after parsing attributes in process `syz.6.5987'. [ 996.438705][T17767] syz.6.5995[17767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 996.438782][T17767] syz.6.5995[17767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 996.580455][T17772] tipc: Enabling of bearer rejected, already enabled [ 996.817135][T17780] netlink: 96 bytes leftover after parsing attributes in process `syz.0.6001'. [ 996.943785][T17792] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6005'. [ 996.969169][T17781] bridge0: port 1(bridge_slave_0) entered blocking state [ 996.976416][T17781] bridge0: port 1(bridge_slave_0) entered disabled state [ 996.991505][T17781] device bridge_slave_0 entered promiscuous mode [ 997.004816][T17781] bridge0: port 2(bridge_slave_1) entered blocking state [ 997.012092][T17781] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.020521][T17781] device bridge_slave_1 entered promiscuous mode [ 997.020673][T17793] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 997.097740][T17781] bridge0: port 2(bridge_slave_1) entered blocking state [ 997.104860][T17781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 997.112314][T17781] bridge0: port 1(bridge_slave_0) entered blocking state [ 997.119363][T17781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 997.147304][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 997.155185][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.163419][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 997.171296][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 997.185322][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 997.195235][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 997.202342][ T303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 997.334405][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 997.450248][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 997.457346][ T303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 997.474083][T15090] tipc: Disabling bearer [ 997.479581][T15090] tipc: Disabling bearer [ 997.487552][T15090] tipc: Left network mode [ 997.499078][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 997.515398][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 997.532258][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 997.544256][T17781] device veth0_vlan entered promiscuous mode [ 997.551106][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 997.572585][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 997.581643][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 997.589635][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 997.597637][T17781] device veth1_macvtap entered promiscuous mode [ 997.618351][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 997.634097][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 998.249234][T17817] netlink: 96 bytes leftover after parsing attributes in process `syz.1.6013'. [ 998.278332][T17821] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6015'. [ 998.329345][T17819] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 998.574776][T17845] netlink: 96 bytes leftover after parsing attributes in process `syz.6.6025'. [ 999.250946][T15090] device bridge_slave_1 left promiscuous mode [ 999.267374][T15090] bridge0: port 2(bridge_slave_1) entered disabled state [ 999.292373][T15090] device bridge_slave_0 left promiscuous mode [ 999.313383][T15090] bridge0: port 1(bridge_slave_0) entered disabled state [ 999.375206][T15090] device veth1_macvtap left promiscuous mode [ 999.383914][T15090] device veth0_vlan left promiscuous mode [ 999.518485][T17866] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1000.332793][ T30] kauditd_printk_skb: 163 callbacks suppressed [ 1000.359125][ T30] audit: type=1326 audit(1751390733.704:3871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17862 comm="syz.1.6031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1000.941765][T17881] netlink: 24 bytes leftover after parsing attributes in process `syz.0.6037'. [ 1001.086898][T17903] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6045'. [ 1001.957771][T17905] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1002.093764][ T30] audit: type=1326 audit(1751390735.554:3872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17917 comm="syz.3.6050" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1002.118610][ T30] audit: type=1326 audit(1751390735.554:3873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17917 comm="syz.3.6050" exe="/root/syz-executor" sig=0 arch=c000003e syscall=285 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1002.142499][ T30] audit: type=1326 audit(1751390735.554:3874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17917 comm="syz.3.6050" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1002.166513][ T30] audit: type=1326 audit(1751390735.554:3875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17917 comm="syz.3.6050" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1002.190378][ T30] audit: type=1326 audit(1751390735.554:3876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17917 comm="syz.3.6050" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1002.214402][ T30] audit: type=1326 audit(1751390735.554:3877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17917 comm="syz.3.6050" exe="/root/syz-executor" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1002.240611][ T30] audit: type=1326 audit(1751390735.554:3878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17917 comm="syz.3.6050" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1002.270885][ T30] audit: type=1326 audit(1751390735.554:3879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17917 comm="syz.3.6050" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1002.304532][ T30] audit: type=1400 audit(1751390735.754:3880): avc: denied { write } for pid=17933 comm="syz.6.6057" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1002.399685][T17938] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1003.434157][T17960] tipc: Enabling of bearer rejected, already enabled [ 1005.781191][ T30] audit: type=1400 audit(1751390739.244:3881): avc: denied { unmount } for pid=17147 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1007.348587][T18003] tipc: Enabling of bearer rejected, already enabled [ 1007.427916][ T26] usb 2-1: new high-speed USB device number 55 using dummy_hcd [ 1007.558264][T18019] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1007.572724][ T30] audit: type=1400 audit(1751390741.034:3882): avc: denied { read } for pid=18027 comm="syz.6.6090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1007.864144][T18024] overlayfs: failed to clone upperpath [ 1008.251955][ T30] audit: type=1400 audit(1751390741.714:3883): avc: denied { create } for pid=18040 comm="syz.1.6096" dev="anon_inodefs" ino=73453 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1008.274244][ T30] audit: type=1400 audit(1751390741.714:3884): avc: denied { ioctl } for pid=18040 comm="syz.1.6096" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=73453 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1008.451129][T18053] netlink: 44 bytes leftover after parsing attributes in process `syz.1.6100'. [ 1009.024333][T18059] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6101'. [ 1009.034637][ T30] audit: type=1400 audit(1751390742.484:3885): avc: denied { create } for pid=18054 comm="syz.8.6101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1009.074598][ T30] audit: type=1400 audit(1751390742.484:3886): avc: denied { write } for pid=18054 comm="syz.8.6101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1009.142301][ T30] audit: type=1400 audit(1751390742.584:3887): avc: denied { sys_admin } for pid=18057 comm="syz.1.6102" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1013.753143][T18148] netlink: 36 bytes leftover after parsing attributes in process `syz.1.6133'. [ 1014.297870][ T30] audit: type=1400 audit(1751390747.744:3888): avc: denied { mount } for pid=18147 comm="syz.1.6133" name="/" dev="ramfs" ino=73579 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1014.361059][ T30] audit: type=1400 audit(1751390747.784:3889): avc: denied { write } for pid=18154 comm="syz.0.6136" path="socket:[74064]" dev="sockfs" ino=74064 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1016.421772][ T30] audit: type=1400 audit(1751390749.884:3890): avc: denied { read write } for pid=18195 comm="syz.0.6151" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1016.489146][ T30] audit: type=1400 audit(1751390749.914:3891): avc: denied { open } for pid=18195 comm="syz.0.6151" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1016.757552][T18211] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1018.149615][T18238] netlink: 40 bytes leftover after parsing attributes in process `syz.3.6166'. [ 1019.172386][T18248] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1020.130365][ T30] audit: type=1400 audit(1751390752.994:3892): avc: denied { associate } for pid=18252 comm="syz.6.6169" name="core" scontext=root:object_r:etc_runtime_t tcontext=system_u:object_r:root_t tclass=filesystem permissive=1 [ 1020.213007][T18280] netlink: 40 bytes leftover after parsing attributes in process `syz.8.6178'. [ 1020.519627][T18288] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1021.055573][ T30] audit: type=1326 audit(1751390754.514:3893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18294 comm="syz.8.6183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1021.171022][ T30] audit: type=1326 audit(1751390754.544:3894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18294 comm="syz.8.6183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1021.194603][ T30] audit: type=1326 audit(1751390754.544:3895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18294 comm="syz.8.6183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1021.238040][ T30] audit: type=1326 audit(1751390754.554:3896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18294 comm="syz.8.6183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1021.286364][T18287] overlayfs: failed to clone upperpath [ 1021.297927][ T30] audit: type=1326 audit(1751390754.554:3897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18294 comm="syz.8.6183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1021.371631][ T30] audit: type=1326 audit(1751390754.554:3898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18294 comm="syz.8.6183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1021.395526][ T30] audit: type=1326 audit(1751390754.554:3899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18294 comm="syz.8.6183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1021.427819][ T30] audit: type=1326 audit(1751390754.554:3900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18294 comm="syz.8.6183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1021.540413][ T30] audit: type=1326 audit(1751390754.554:3901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18294 comm="syz.8.6183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1024.106893][T18337] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6192'. [ 1024.534575][T18351] netlink: 40 bytes leftover after parsing attributes in process `syz.3.6201'. [ 1025.025421][T18373] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1026.384096][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 1026.402260][ T30] audit: type=1326 audit(1751390759.664:3906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18378 comm="syz.0.6210" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9914bd0929 code=0x0 [ 1027.277823][ T30] audit: type=1400 audit(1751390760.724:3907): avc: denied { bind } for pid=18413 comm="syz.0.6224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1027.333411][ T30] audit: type=1400 audit(1751390760.794:3908): avc: denied { setopt } for pid=18413 comm="syz.0.6224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1027.419774][ T30] audit: type=1326 audit(1751390760.884:3909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18424 comm="syz.0.6231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1027.445691][ T30] audit: type=1326 audit(1751390760.884:3910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18424 comm="syz.0.6231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1027.478523][ T30] audit: type=1326 audit(1751390760.904:3911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18424 comm="syz.0.6231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1027.512273][ T30] audit: type=1326 audit(1751390760.904:3912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18424 comm="syz.0.6231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1027.543739][ T30] audit: type=1326 audit(1751390760.904:3913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18424 comm="syz.0.6231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1027.590116][ T30] audit: type=1326 audit(1751390760.904:3914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18424 comm="syz.0.6231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1027.689917][ T30] audit: type=1326 audit(1751390760.904:3915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18424 comm="syz.0.6231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1028.554644][T18444] netlink: 96 bytes leftover after parsing attributes in process `syz.3.6238'. [ 1028.875890][T18460] netlink: 32 bytes leftover after parsing attributes in process `syz.1.6242'. [ 1030.480189][T18495] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1031.588633][ T30] kauditd_printk_skb: 31 callbacks suppressed [ 1031.642003][ T30] audit: type=1326 audit(1751390763.754:3947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18493 comm="syz.6.6257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb115887929 code=0x7ffc0000 [ 1031.735978][ T30] audit: type=1326 audit(1751390763.754:3948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18493 comm="syz.6.6257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb115887929 code=0x7ffc0000 [ 1031.748213][T18505] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6261'. [ 1031.760420][ T30] audit: type=1326 audit(1751390763.924:3949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18493 comm="syz.6.6257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7fb115887929 code=0x7ffc0000 [ 1031.792697][ T30] audit: type=1326 audit(1751390763.924:3950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18493 comm="syz.6.6257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb115887929 code=0x7ffc0000 [ 1031.816699][ T30] audit: type=1326 audit(1751390763.924:3951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18493 comm="syz.6.6257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb115887929 code=0x7ffc0000 [ 1032.060723][T18506] netlink: 68 bytes leftover after parsing attributes in process `syz.3.6256'. [ 1032.134310][ T30] audit: type=1326 audit(1751390763.924:3952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18493 comm="syz.6.6257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7fb115887929 code=0x7ffc0000 [ 1032.168276][ T30] audit: type=1326 audit(1751390763.924:3953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18493 comm="syz.6.6257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb115887929 code=0x7ffc0000 [ 1032.251164][ T30] audit: type=1326 audit(1751390763.924:3954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18493 comm="syz.6.6257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb115887929 code=0x7ffc0000 [ 1032.278896][T18502] tipc: Cannot configure node identity twice [ 1032.285005][T18502] tipc: Cannot configure node identity twice [ 1032.302148][ T30] audit: type=1326 audit(1751390763.924:3955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18493 comm="syz.6.6257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7fb115887929 code=0x7ffc0000 [ 1032.335642][ T30] audit: type=1326 audit(1751390765.054:3956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18493 comm="syz.6.6257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb115887929 code=0x7ffc0000 [ 1035.690430][T18561] SELinux: Context is not valid (left unmapped). [ 1036.809588][T18606] netlink: 12 bytes leftover after parsing attributes in process `syz.0.6298'. [ 1036.918010][ T30] kauditd_printk_skb: 39 callbacks suppressed [ 1036.918026][ T30] audit: type=1400 audit(1751390770.374:3996): avc: denied { create } for pid=18609 comm="syz.8.6301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1036.978414][ T30] audit: type=1400 audit(1751390770.374:3997): avc: denied { connect } for pid=18609 comm="syz.8.6301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1037.017842][ T30] audit: type=1400 audit(1751390770.374:3998): avc: denied { write } for pid=18609 comm="syz.8.6301" path="socket:[74634]" dev="sockfs" ino=74634 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1037.057795][ T30] audit: type=1326 audit(1751390770.434:3999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18614 comm="syz.0.6303" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9914bd0929 code=0x0 [ 1038.517164][ T30] audit: type=1326 audit(1751390771.974:4000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18648 comm="syz.0.6316" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1038.551933][ T30] audit: type=1326 audit(1751390772.014:4001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18648 comm="syz.0.6316" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1038.576718][T18644] 9pnet: Could not find request transport: fd0x0000000000000003 [ 1038.592219][ T30] audit: type=1326 audit(1751390772.054:4002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18648 comm="syz.0.6316" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1038.619268][ T30] audit: type=1326 audit(1751390772.054:4003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18648 comm="syz.0.6316" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1038.643510][ T30] audit: type=1326 audit(1751390772.054:4004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18648 comm="syz.0.6316" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1038.668118][ T30] audit: type=1326 audit(1751390772.054:4005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18648 comm="syz.0.6316" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1038.881955][T18652] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1039.055103][T18670] tipc: New replicast peer: 172.30.1.1 [ 1039.066080][T18670] tipc: Enabled bearer , priority 10 [ 1040.280692][ T26] tipc: Node number set to 181817661 [ 1040.547517][T18696] netlink: 56 bytes leftover after parsing attributes in process `syz.1.6332'. [ 1040.877637][T18725] tipc: Enabling of bearer rejected, already enabled [ 1041.441356][T18730] netlink: 56 bytes leftover after parsing attributes in process `syz.3.6345'. [ 1041.716801][T18736] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6348'. [ 1042.106593][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 1042.106608][ T30] audit: type=1400 audit(1751390775.564:4015): avc: denied { ioctl } for pid=18768 comm="syz.8.6362" path="socket:[75284]" dev="sockfs" ino=75284 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1042.164459][ T30] audit: type=1326 audit(1751390775.624:4016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18772 comm="syz.8.6364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1042.188325][ T30] audit: type=1326 audit(1751390775.624:4017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18772 comm="syz.8.6364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1042.212581][ T30] audit: type=1326 audit(1751390775.634:4018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18772 comm="syz.8.6364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1042.236936][ T30] audit: type=1326 audit(1751390775.634:4019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18772 comm="syz.8.6364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1042.262655][ T30] audit: type=1326 audit(1751390775.634:4020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18772 comm="syz.8.6364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1042.286882][ T30] audit: type=1326 audit(1751390775.634:4021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18772 comm="syz.8.6364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1042.356944][ T30] audit: type=1326 audit(1751390775.634:4022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18772 comm="syz.8.6364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1042.380953][ T30] audit: type=1326 audit(1751390775.634:4023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18772 comm="syz.8.6364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1042.408807][ T30] audit: type=1326 audit(1751390775.634:4024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18772 comm="syz.8.6364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1042.542521][T18787] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1044.685224][T18822] netlink: 56 bytes leftover after parsing attributes in process `syz.8.6382'. [ 1045.629436][T18856] netlink: 56 bytes leftover after parsing attributes in process `syz.0.6398'. [ 1047.688353][T18894] netlink: 56 bytes leftover after parsing attributes in process `syz.6.6410'. [ 1048.427826][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 1048.427847][ T30] audit: type=1326 audit(1751390781.874:4060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18902 comm="syz.1.6413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1048.523276][ T30] audit: type=1326 audit(1751390781.874:4061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18902 comm="syz.1.6413" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1049.035423][T18937] netlink: 56 bytes leftover after parsing attributes in process `syz.6.6428'. [ 1050.791722][ T30] audit: type=1326 audit(1751390784.254:4062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18961 comm="syz.3.6438" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7ffa3aaae929 code=0x0 [ 1050.893327][T18990] netlink: 24 bytes leftover after parsing attributes in process `syz.6.6448'. [ 1051.112745][ T30] audit: type=1400 audit(1751390784.564:4063): avc: denied { remount } for pid=18991 comm="syz.8.6449" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1053.101573][T19025] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1060.177798][ T30] audit: type=1326 audit(1751390793.634:4064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19288 comm="syz.0.6566" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1060.217984][ T30] audit: type=1326 audit(1751390793.634:4065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19288 comm="syz.0.6566" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1060.264900][ T30] audit: type=1326 audit(1751390793.634:4066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19288 comm="syz.0.6566" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1060.288892][ T30] audit: type=1326 audit(1751390793.644:4067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19288 comm="syz.0.6566" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1060.345051][ T30] audit: type=1326 audit(1751390793.644:4068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19288 comm="syz.0.6566" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1060.384488][ T30] audit: type=1326 audit(1751390793.644:4069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19288 comm="syz.0.6566" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1060.414440][ T30] audit: type=1326 audit(1751390793.644:4070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19288 comm="syz.0.6566" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1060.458065][ T30] audit: type=1326 audit(1751390793.644:4071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19288 comm="syz.0.6566" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1060.593428][ T30] audit: type=1326 audit(1751390793.644:4072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19288 comm="syz.0.6566" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1060.749502][ T30] audit: type=1326 audit(1751390793.644:4073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19288 comm="syz.0.6566" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1061.555117][T19328] overlayfs: failed to clone upperpath [ 1062.145493][T19344] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6580'. [ 1062.440115][T19352] tipc: Started in network mode [ 1062.445093][T19352] tipc: Node identity ac14140f, cluster identity 4711 [ 1062.475670][T19352] tipc: New replicast peer: 172.30.1.2 [ 1062.502608][T19352] tipc: Enabled bearer , priority 10 [ 1063.292515][T19367] tipc: Enabling of bearer rejected, failed to enable media [ 1064.314827][ T301] tipc: Node number set to 2886997007 [ 1064.649197][T19407] netlink: 40 bytes leftover after parsing attributes in process `syz.8.6606'. [ 1066.309757][T19437] netlink: 'syz.8.6616': attribute type 2 has an invalid length. [ 1066.407858][T19440] netlink: 40 bytes leftover after parsing attributes in process `syz.8.6617'. [ 1066.657197][T19449] netlink: 'syz.8.6621': attribute type 15 has an invalid length. [ 1066.802445][T19459] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6625'. [ 1066.930461][T19469] tipc: Enabling of bearer rejected, failed to enable media [ 1066.948260][T19471] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6631'. [ 1067.487554][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 1067.487570][ T30] audit: type=1326 audit(1751390800.944:4079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19484 comm="syz.8.6637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1067.611130][ T30] audit: type=1326 audit(1751390800.944:4080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19484 comm="syz.8.6637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1067.667774][ T30] audit: type=1326 audit(1751390800.984:4081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19484 comm="syz.8.6637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=277 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1067.750870][T19498] tipc: Enabling of bearer rejected, failed to enable media [ 1067.783546][ T30] audit: type=1326 audit(1751390800.984:4082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19484 comm="syz.8.6637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1068.047633][ T30] audit: type=1326 audit(1751390800.984:4083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19484 comm="syz.8.6637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1068.191268][ T30] audit: type=1326 audit(1751390801.464:4084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19500 comm="syz.1.6643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1068.406004][ T30] audit: type=1326 audit(1751390801.464:4085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19500 comm="syz.1.6643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1069.247992][ T30] audit: type=1326 audit(1751390801.464:4086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19500 comm="syz.1.6643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1069.307874][T19518] netlink: 96 bytes leftover after parsing attributes in process `syz.1.6650'. [ 1069.377471][ T30] audit: type=1326 audit(1751390801.464:4087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19500 comm="syz.1.6643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1069.496436][ T30] audit: type=1326 audit(1751390801.464:4088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19500 comm="syz.1.6643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1069.616277][T19530] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6655'. [ 1069.911033][T19546] netlink: 24 bytes leftover after parsing attributes in process `syz.6.6662'. [ 1070.429380][T19564] netlink: 28 bytes leftover after parsing attributes in process `syz.8.6668'. [ 1072.766415][T19600] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6680'. [ 1073.751774][T19617] tipc: Enabling of bearer rejected, failed to enable media [ 1073.908017][T19620] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6684'. [ 1074.149503][T19625] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1074.748837][T19653] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1075.687185][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 1075.687201][ T30] audit: type=1400 audit(1751390809.144:4110): avc: denied { ioctl } for pid=19667 comm="syz.0.6706" path="socket:[77900]" dev="sockfs" ino=77900 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1077.482807][T19706] tipc: Enabling of bearer rejected, failed to enable media [ 1077.500528][ T30] audit: type=1400 audit(1751390810.964:4111): avc: denied { write } for pid=19712 comm="syz.1.6724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1080.560076][T19757] tipc: Enabling of bearer rejected, failed to enable media [ 1081.608548][ T30] audit: type=1400 audit(2000000000.050:4112): avc: denied { watch } for pid=19768 comm="syz.6.6743" path="/598/file1" dev="tmpfs" ino=3158 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1081.956973][T19787] tipc: Enabling of bearer rejected, failed to enable media [ 1082.546248][ T30] audit: type=1400 audit(2000000001.050:4113): avc: denied { bind } for pid=19798 comm="syz.3.6755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1082.999054][ T30] audit: type=1326 audit(2000000001.510:4114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19811 comm="syz.0.6758" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1083.206511][ T303] tipc: Disabling bearer [ 1083.212265][ T303] tipc: Left network mode [ 1083.247789][ T30] audit: type=1326 audit(2000000001.540:4115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19811 comm="syz.0.6758" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1083.351035][ T30] audit: type=1326 audit(2000000001.610:4116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19811 comm="syz.0.6758" exe="/root/syz-executor" sig=0 arch=c000003e syscall=277 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1083.429783][ T30] audit: type=1326 audit(2000000001.610:4117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19811 comm="syz.0.6758" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1083.734824][ T30] audit: type=1326 audit(2000000001.610:4118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19811 comm="syz.0.6758" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1084.024257][T19823] bridge0: port 1(bridge_slave_0) entered blocking state [ 1084.066571][T19823] bridge0: port 1(bridge_slave_0) entered disabled state [ 1084.109812][T19823] device bridge_slave_0 entered promiscuous mode [ 1084.141860][T19842] netlink: 96 bytes leftover after parsing attributes in process `syz.8.6767'. [ 1084.161791][T19823] bridge0: port 2(bridge_slave_1) entered blocking state [ 1084.177830][T19823] bridge0: port 2(bridge_slave_1) entered disabled state [ 1084.205787][T19823] device bridge_slave_1 entered promiscuous mode [ 1084.366466][ T30] audit: type=1326 audit(2000000002.870:4119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19856 comm="syz.8.6774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1084.724929][ T30] audit: type=1326 audit(2000000002.900:4120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19856 comm="syz.8.6774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=277 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1084.751162][ T30] audit: type=1326 audit(2000000002.900:4121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19856 comm="syz.8.6774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1084.751420][ T303] device bridge_slave_1 left promiscuous mode [ 1084.819575][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 1084.837941][ T303] device bridge_slave_0 left promiscuous mode [ 1084.844153][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 1084.869178][ T303] device veth1_macvtap left promiscuous mode [ 1084.878002][ T303] device veth0_vlan left promiscuous mode [ 1084.887098][T19862] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1085.396350][T19884] netlink: 24 bytes leftover after parsing attributes in process `syz.1.6784'. [ 1085.933792][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1085.941609][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1085.965996][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1085.975742][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1085.985168][T15090] bridge0: port 1(bridge_slave_0) entered blocking state [ 1085.992274][T15090] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1086.001076][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1086.010997][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1086.021896][T15090] bridge0: port 2(bridge_slave_1) entered blocking state [ 1086.028970][T15090] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1086.068959][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1086.098320][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1086.180033][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1086.209571][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1086.376554][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1086.476311][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1086.493845][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1086.578559][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1086.601865][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1086.644647][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1086.690469][T19823] device veth0_vlan entered promiscuous mode [ 1086.712428][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1086.728560][T19823] device veth1_macvtap entered promiscuous mode [ 1086.760113][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1086.773641][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1086.807249][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1086.819740][T19912] netlink: 24 bytes leftover after parsing attributes in process `syz.3.6795'. [ 1086.839447][T15090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1086.848535][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 1086.848551][ T30] audit: type=1326 audit(2000000005.360:4140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19913 comm="syz.1.6796" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1086.915459][ T30] audit: type=1326 audit(2000000005.360:4141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19913 comm="syz.1.6796" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1086.941995][ T30] audit: type=1326 audit(2000000005.390:4142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19913 comm="syz.1.6796" exe="/root/syz-executor" sig=0 arch=c000003e syscall=277 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1086.990289][ T30] audit: type=1326 audit(2000000005.390:4143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19913 comm="syz.1.6796" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1087.446261][ T30] audit: type=1326 audit(2000000005.390:4144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19913 comm="syz.1.6796" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1087.521517][ T30] audit: type=1326 audit(2000000005.560:4145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19926 comm="syz.0.6800" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1087.566992][ T30] audit: type=1326 audit(2000000005.560:4146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19926 comm="syz.0.6800" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1087.637509][ T30] audit: type=1326 audit(2000000005.560:4147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19926 comm="syz.0.6800" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1087.662720][ T30] audit: type=1326 audit(2000000005.560:4148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19926 comm="syz.0.6800" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1087.832123][T19951] netlink: 24 bytes leftover after parsing attributes in process `syz.6.6809'. [ 1087.954608][ T30] audit: type=1326 audit(2000000005.560:4149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19926 comm="syz.0.6800" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1088.136104][T19965] tipc: Started in network mode [ 1088.163229][T19965] tipc: Node identity ac14140f, cluster identity 4711 [ 1088.194604][T19965] tipc: New replicast peer: 172.30.1.7 [ 1088.213440][T19965] tipc: Enabled bearer , priority 10 [ 1088.988472][T19991] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6823'. [ 1089.411619][ T301] tipc: Node number set to 2886997007 [ 1089.577475][T19995] sch_tbf: burst 88 is lower than device syz_tun mtu (1514) ! [ 1090.125464][T19992] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6822'. [ 1090.377627][T20020] netlink: 24 bytes leftover after parsing attributes in process `syz.0.6832'. [ 1091.020483][T20032] tipc: Enabling of bearer rejected, already enabled [ 1092.018486][T20054] netlink: 24 bytes leftover after parsing attributes in process `syz.0.6844'. [ 1092.060285][T20060] tipc: Enabling of bearer rejected, failed to enable media [ 1092.145035][T20066] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6848'. [ 1092.445188][T20071] tipc: Enabling of bearer rejected, already enabled [ 1092.632511][T20092] tipc: Enabling of bearer rejected, failed to enable media [ 1092.658187][ T30] kauditd_printk_skb: 17 callbacks suppressed [ 1092.658204][ T30] audit: type=1400 audit(2000000011.170:4167): avc: denied { setopt } for pid=20093 comm="syz.0.6861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1092.694285][T20080] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6854'. [ 1092.715612][ T30] audit: type=1326 audit(2000000011.220:4168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20095 comm="syz.3.6862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1092.739425][ T30] audit: type=1326 audit(2000000011.220:4169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20095 comm="syz.3.6862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1092.775939][ T30] audit: type=1326 audit(2000000011.270:4170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20095 comm="syz.3.6862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1092.799754][ T30] audit: type=1326 audit(2000000011.270:4171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20095 comm="syz.3.6862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1092.825581][ T30] audit: type=1326 audit(2000000011.270:4172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20095 comm="syz.3.6862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1092.960902][T20103] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1093.156438][ T30] audit: type=1326 audit(2000000011.270:4173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20095 comm="syz.3.6862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1093.181530][ T30] audit: type=1326 audit(2000000011.270:4174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20095 comm="syz.3.6862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1093.776149][ T30] audit: type=1326 audit(2000000011.270:4175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20095 comm="syz.3.6862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1093.848186][ T30] audit: type=1326 audit(2000000011.270:4176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20095 comm="syz.3.6862" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1094.392125][T20135] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1094.934137][T20171] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1095.382033][T20182] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6893'. [ 1095.611923][T20191] netlink: 24 bytes leftover after parsing attributes in process `syz.0.6897'. [ 1096.323431][T20224] netlink: 24 bytes leftover after parsing attributes in process `syz.8.6912'. [ 1096.942581][T20250] syz.3.6923[20250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1096.942663][T20250] syz.3.6923[20250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1096.955890][T20250] syz.3.6923[20250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1096.967527][T20250] syz.3.6923[20250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1099.523812][T20317] tipc: Enabling of bearer rejected, failed to enable media [ 1099.555748][T20322] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6950'. [ 1099.790753][T20338] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1099.895559][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 1099.895575][ T30] audit: type=1326 audit(2000000018.400:4200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20346 comm="syz.1.6958" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1099.925950][ T30] audit: type=1326 audit(2000000018.410:4201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20346 comm="syz.1.6958" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1099.950416][ T30] audit: type=1326 audit(2000000018.410:4202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20346 comm="syz.1.6958" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1099.974488][ T30] audit: type=1326 audit(2000000018.410:4203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20346 comm="syz.1.6958" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1099.998374][ T30] audit: type=1326 audit(2000000018.410:4204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20346 comm="syz.1.6958" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1100.022302][ T30] audit: type=1326 audit(2000000018.410:4205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20346 comm="syz.1.6958" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1100.046425][ T30] audit: type=1326 audit(2000000018.410:4206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20346 comm="syz.1.6958" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1100.070243][ T30] audit: type=1326 audit(2000000018.410:4207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20346 comm="syz.1.6958" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1100.094301][ T30] audit: type=1326 audit(2000000018.410:4208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20346 comm="syz.1.6958" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1100.118255][ T30] audit: type=1326 audit(2000000018.410:4209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20346 comm="syz.1.6958" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1100.156048][T20360] tipc: Enabling of bearer rejected, failed to enable media [ 1100.174567][T20362] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6964'. [ 1100.775033][T20377] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1101.150436][T20390] netlink: 96 bytes leftover after parsing attributes in process `syz.1.6974'. [ 1101.323599][T20415] netlink: 96 bytes leftover after parsing attributes in process `syz.8.6987'. [ 1102.841747][T20449] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6997'. [ 1102.989126][T20450] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1104.194858][T20481] netlink: 28 bytes leftover after parsing attributes in process `syz.3.7009'. [ 1104.838775][T20494] netlink: 24 bytes leftover after parsing attributes in process `syz.0.7015'. [ 1105.288336][T20508] tipc: Enabling of bearer rejected, already enabled [ 1105.998501][ T30] kauditd_printk_skb: 34 callbacks suppressed [ 1105.998800][ T30] audit: type=1326 audit(2000000024.510:4244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20520 comm="syz.8.7025" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fa20923c929 code=0x0 [ 1106.262799][ T30] audit: type=1326 audit(2000000024.770:4245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20532 comm="syz.0.7030" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9914bd0929 code=0x0 [ 1107.902730][T20563] SELinux: security_context_str_to_sid(user_u) failed for (dev ?, type ?) errno=-22 [ 1107.912827][T20563] SELinux: security_context_str_to_sid(user_u) failed for (dev incremental-fs, type incremental-fs) errno=-22 [ 1108.912357][ T30] audit: type=1400 audit(2000000026.410:4246): avc: denied { remount } for pid=20553 comm="syz.6.7038" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1109.216400][T20571] netlink: 96 bytes leftover after parsing attributes in process `syz.6.7043'. [ 1109.242027][ T30] audit: type=1400 audit(2000000026.620:4247): avc: denied { read } for pid=20553 comm="syz.6.7038" name="event0" dev="devtmpfs" ino=256 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1109.371076][ T30] audit: type=1400 audit(2000000026.620:4248): avc: denied { open } for pid=20553 comm="syz.6.7038" path="/dev/input/event0" dev="devtmpfs" ino=256 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1109.395819][ T30] audit: type=1326 audit(2000000027.780:4249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20573 comm="syz.8.7045" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1109.439973][ T30] audit: type=1326 audit(2000000027.780:4250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20573 comm="syz.8.7045" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1109.555138][ T30] audit: type=1326 audit(2000000027.780:4251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20573 comm="syz.8.7045" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1109.687166][ T30] audit: type=1326 audit(2000000027.780:4252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20573 comm="syz.8.7045" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1109.832382][ T30] audit: type=1326 audit(2000000027.780:4253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20573 comm="syz.8.7045" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1110.475014][T20609] netlink: 96 bytes leftover after parsing attributes in process `syz.0.7057'. [ 1111.310942][T20632] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1111.874066][T20649] netlink: 96 bytes leftover after parsing attributes in process `syz.8.7070'. [ 1112.116518][T20664] tipc: Enabling of bearer rejected, already enabled [ 1112.437991][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 1112.438035][ T30] audit: type=1400 audit(2000000030.940:4262): avc: denied { read } for pid=20674 comm="syz.6.7083" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 1112.568076][ T30] audit: type=1400 audit(2000000030.950:4263): avc: denied { open } for pid=20674 comm="syz.6.7083" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 1112.592046][ T30] audit: type=1400 audit(2000000031.060:4264): avc: denied { ioctl } for pid=20674 comm="syz.6.7083" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 1113.789485][ T30] audit: type=1400 audit(2000000032.280:4265): avc: denied { write } for pid=20674 comm="syz.6.7083" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 1113.832003][ T30] audit: type=1326 audit(2000000032.340:4266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20676 comm="syz.0.7084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1113.887784][ T30] audit: type=1326 audit(2000000032.340:4267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20676 comm="syz.0.7084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1113.910545][T20693] netlink: 24 bytes leftover after parsing attributes in process `syz.6.7090'. [ 1113.923346][T20690] netlink: 96 bytes leftover after parsing attributes in process `syz.8.7087'. [ 1114.127984][ T30] audit: type=1326 audit(2000000032.630:4268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20695 comm="syz.6.7092" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f6baf0f2929 code=0x0 [ 1114.466363][ T30] audit: type=1326 audit(2000000032.970:4269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20721 comm="syz.8.7104" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1114.490388][ T30] audit: type=1326 audit(2000000032.990:4270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20721 comm="syz.8.7104" exe="/root/syz-executor" sig=0 arch=c000003e syscall=277 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1116.490075][ T30] audit: type=1326 audit(2000000032.990:4271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20721 comm="syz.8.7104" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1116.956505][T20760] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1117.647175][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 1117.647192][ T30] audit: type=1326 audit(2000000036.150:4275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20781 comm="syz.8.7129" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1117.717860][ T30] audit: type=1326 audit(2000000036.190:4276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20781 comm="syz.8.7129" exe="/root/syz-executor" sig=0 arch=c000003e syscall=277 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1117.741916][ T30] audit: type=1326 audit(2000000036.190:4277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20781 comm="syz.8.7129" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa20923c929 code=0x7ffc0000 [ 1117.818332][T20800] netlink: 28 bytes leftover after parsing attributes in process `syz.8.7137'. [ 1118.137994][ T30] audit: type=1326 audit(2000000036.590:4278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20789 comm="syz.3.7133" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1118.162175][ T30] audit: type=1326 audit(2000000036.590:4279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20789 comm="syz.3.7133" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1118.779253][ T30] audit: type=1326 audit(2000000037.290:4280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20815 comm="syz.3.7143" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7ffa3aaae929 code=0x0 [ 1118.900265][T20831] netlink: 28 bytes leftover after parsing attributes in process `syz.0.7149'. [ 1119.510535][ T30] audit: type=1326 audit(2000000038.020:4281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20835 comm="syz.8.7151" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fa20923c929 code=0x0 [ 1121.142182][ T30] audit: type=1326 audit(2000000038.730:4282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20862 comm="syz.0.7163" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9914bd0929 code=0x0 [ 1122.231877][ T30] audit: type=1326 audit(2000000040.740:4283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20896 comm="syz.6.7174" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f6baf0f2929 code=0x0 [ 1123.856666][ T30] audit: type=1326 audit(2000000042.330:4284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20903 comm="syz.3.7176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1123.884700][ T30] audit: type=1326 audit(2000000042.330:4285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20903 comm="syz.3.7176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1124.297635][T20920] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7182'. [ 1125.290903][T20953] tipc: Enabling of bearer rejected, already enabled [ 1125.584716][ T30] audit: type=1326 audit(2000000044.090:4286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20941 comm="syz.1.7191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1125.629714][ T30] audit: type=1326 audit(2000000044.090:4287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20941 comm="syz.1.7191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1126.388026][T20981] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7204'. [ 1127.593567][T21008] netlink: 24 bytes leftover after parsing attributes in process `syz.1.7214'. [ 1129.433816][T21048] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1129.838918][T21054] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7230'. [ 1130.234719][ T30] audit: type=1400 audit(2000000048.740:4288): avc: denied { write } for pid=21075 comm="syz.6.7239" name="fib_trie" dev="proc" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1131.582245][T21080] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1132.113970][T21113] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1134.632399][T21192] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1138.314358][ T30] audit: type=1326 audit(2000000056.820:4289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21258 comm="syz.8.7311" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fa20923c929 code=0x0 [ 1139.221649][T21289] netlink: 8 bytes leftover after parsing attributes in process `syz.6.7322'. [ 1140.113069][ T30] audit: type=1326 audit(2000000058.620:4290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21323 comm="syz.0.7336" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9914bd0929 code=0x0 [ 1140.185049][T21343] netlink: 24 bytes leftover after parsing attributes in process `syz.1.7342'. [ 1140.406666][ T30] audit: type=1326 audit(2000000058.910:4291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21350 comm="syz.1.7346" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fb6359cc929 code=0x0 [ 1140.742834][T21349] netlink: 8 bytes leftover after parsing attributes in process `syz.8.7344'. [ 1140.990526][T21375] netlink: 24 bytes leftover after parsing attributes in process `syz.0.7356'. [ 1141.296697][T21405] netlink: 24 bytes leftover after parsing attributes in process `syz.1.7369'. [ 1141.610433][T21408] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7370'. [ 1142.219959][ T30] audit: type=1326 audit(2000000060.730:4292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21424 comm="syz.3.7377" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7ffa3aaae929 code=0x0 [ 1144.982038][T21448] netlink: 28 bytes leftover after parsing attributes in process `syz.3.7385'. [ 1145.018316][T21435] netlink: 8 bytes leftover after parsing attributes in process `syz.6.7382'. [ 1145.307892][ T30] audit: type=1326 audit(2000000063.810:4293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21469 comm="syz.1.7395" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fb6359cc929 code=0x0 [ 1145.355512][T21483] netlink: 28 bytes leftover after parsing attributes in process `syz.3.7399'. [ 1146.652606][T21512] netlink: 28 bytes leftover after parsing attributes in process `syz.6.7410'. [ 1146.713408][T21513] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7407'. [ 1146.876321][T21520] syz.0.7413[21520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1146.876423][T21520] syz.0.7413[21520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1147.153054][ T30] audit: type=1326 audit(2000000065.600:4294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21514 comm="syz.6.7412" exe="/root/syz-executor" sig=9 arch=c000003e syscall=39 compat=0 ip=0x7f6baf0e98e7 code=0x0 [ 1151.038897][ T30] audit: type=1326 audit(2000000069.540:4295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21615 comm="syz.0.7453" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9914bd0929 code=0x0 [ 1153.525208][ T30] audit: type=1326 audit(2000000072.030:4296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21666 comm="syz.0.7472" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9914bd0929 code=0x0 [ 1154.885882][T21713] netlink: 28 bytes leftover after parsing attributes in process `syz.6.7492'. [ 1156.327443][T21749] netlink: 28 bytes leftover after parsing attributes in process `syz.8.7505'. [ 1156.895972][T21786] netlink: 28 bytes leftover after parsing attributes in process `syz.3.7518'. [ 1157.537254][T21820] netlink: 28 bytes leftover after parsing attributes in process `syz.6.7533'. [ 1158.827089][T21851] netlink: 28 bytes leftover after parsing attributes in process `syz.1.7545'. [ 1159.282075][ T30] audit: type=1400 audit(2000000077.790:4297): avc: denied { relabelfrom } for pid=21868 comm="syz.6.7553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1159.322526][ T30] audit: type=1400 audit(2000000077.820:4298): avc: denied { relabelto } for pid=21868 comm="syz.6.7553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1159.578813][T21885] SELinux: security_context_str_to_sid(user_u) failed for (dev ?, type ?) errno=-22 [ 1159.588478][T21885] SELinux: security_context_str_to_sid(user_u) failed for (dev incremental-fs, type incremental-fs) errno=-22 [ 1162.155731][T21966] netlink: 28 bytes leftover after parsing attributes in process `syz.8.7589'. [ 1162.376107][T21981] tipc: Enabling of bearer rejected, already enabled [ 1162.422944][ T30] audit: type=1400 audit(2000000080.930:4299): avc: denied { read } for pid=21989 comm="syz.6.7599" name="kvm" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1162.480933][ T30] audit: type=1400 audit(2000000080.930:4300): avc: denied { open } for pid=21989 comm="syz.6.7599" path="/dev/kvm" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1162.585604][ T30] audit: type=1400 audit(2000000080.930:4301): avc: denied { ioctl } for pid=21989 comm="syz.6.7599" path="/dev/kvm" dev="devtmpfs" ino=82 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1162.619009][T22001] netlink: 28 bytes leftover after parsing attributes in process `syz.1.7602'. [ 1162.657313][ T30] audit: type=1400 audit(2000000081.080:4302): avc: denied { write } for pid=21989 comm="syz.6.7599" name="kvm" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1163.228906][T22022] netlink: 8 bytes leftover after parsing attributes in process `syz.6.7612'. [ 1163.278681][T22034] netlink: 28 bytes leftover after parsing attributes in process `syz.3.7616'. [ 1163.579616][T22054] SELinux: security_context_str_to_sid(user_u) failed for (dev ?, type ?) errno=-22 [ 1163.589082][T22054] SELinux: security_context_str_to_sid(user_u) failed for (dev incremental-fs, type incremental-fs) errno=-22 [ 1164.283197][T22061] netlink: 28 bytes leftover after parsing attributes in process `syz.3.7629'. [ 1164.371701][T22074] netlink: 8 bytes leftover after parsing attributes in process `syz.6.7628'. [ 1164.515656][ T30] audit: type=1326 audit(2000000083.020:4303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22070 comm="syz.8.7633" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fa20923c929 code=0x0 [ 1166.454007][ T30] audit: type=1326 audit(2000000084.930:4304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22084 comm="syz.6.7639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1166.481965][T22098] netlink: 28 bytes leftover after parsing attributes in process `syz.0.7643'. [ 1166.494083][ T30] audit: type=1326 audit(2000000084.930:4305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22084 comm="syz.6.7639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1167.026866][ T30] audit: type=1326 audit(2000000085.530:4306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22117 comm="syz.0.7651" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9914bd0929 code=0x0 [ 1167.034211][T22128] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7648'. [ 1168.959834][T22177] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7671'. [ 1170.242031][T22259] tipc: Enabling of bearer rejected, already enabled [ 1170.810855][T22284] netlink: 28 bytes leftover after parsing attributes in process `syz.0.7716'. [ 1171.404575][ T30] audit: type=1400 audit(2000000089.910:4307): avc: denied { lock } for pid=22307 comm="syz.3.7726" path="socket:[84414]" dev="sockfs" ino=84414 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 1171.580771][T22316] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1171.991615][T22354] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1172.134022][T22379] netlink: 28 bytes leftover after parsing attributes in process `syz.1.7757'. [ 1172.401914][T22399] syz.1.7766[22399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1172.402258][T22399] syz.1.7766[22399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1173.296848][T22420] bridge0: port 1(bridge_slave_0) entered blocking state [ 1173.327918][T22420] bridge0: port 1(bridge_slave_0) entered disabled state [ 1173.335611][T22420] device bridge_slave_0 entered promiscuous mode [ 1173.358636][T22420] bridge0: port 2(bridge_slave_1) entered blocking state [ 1173.378605][T22420] bridge0: port 2(bridge_slave_1) entered disabled state [ 1173.386223][T22420] device bridge_slave_1 entered promiscuous mode [ 1173.734289][T22420] bridge0: port 2(bridge_slave_1) entered blocking state [ 1173.741402][T22420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1173.748727][T22420] bridge0: port 1(bridge_slave_0) entered blocking state [ 1173.755759][T22420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1173.953829][T22093] bridge0: port 1(bridge_slave_0) entered disabled state [ 1173.962215][T22093] bridge0: port 2(bridge_slave_1) entered disabled state [ 1173.970849][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1173.989092][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1174.009725][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1174.021452][T22093] bridge0: port 1(bridge_slave_0) entered blocking state [ 1174.028534][T22093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1174.094209][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1174.104182][T22093] bridge0: port 2(bridge_slave_1) entered blocking state [ 1174.111280][T22093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1174.144675][T22420] device veth0_vlan entered promiscuous mode [ 1174.158892][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1174.175758][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1174.193458][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1174.210447][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1174.226354][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1174.237575][ T30] audit: type=1326 audit(2000000092.740:4308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22456 comm="syz.0.7789" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1174.267678][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1174.285624][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1174.299834][ T30] audit: type=1326 audit(2000000092.770:4309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22456 comm="syz.0.7789" exe="/root/syz-executor" sig=0 arch=c000003e syscall=126 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1174.324983][T22420] device veth1_macvtap entered promiscuous mode [ 1174.338921][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1174.347665][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1174.369964][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1174.381221][ T30] audit: type=1326 audit(2000000092.770:4310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22456 comm="syz.0.7789" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1174.412640][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1174.442103][ T30] audit: type=1326 audit(2000000092.790:4311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22458 comm="syz.0.7790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1174.515791][ T30] audit: type=1326 audit(2000000092.790:4312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22458 comm="syz.0.7790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1174.540497][ T30] audit: type=1326 audit(2000000092.790:4313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22458 comm="syz.0.7790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1174.570627][T22466] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1174.578762][ T30] audit: type=1326 audit(2000000092.800:4314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22458 comm="syz.0.7790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=286 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1174.602791][ T30] audit: type=1326 audit(2000000092.800:4315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22458 comm="syz.0.7790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1174.610007][T22478] netlink: 12 bytes leftover after parsing attributes in process `syz.0.7798'. [ 1174.626986][ T30] audit: type=1326 audit(2000000092.800:4316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22458 comm="syz.0.7790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1178.368236][ T30] kauditd_printk_skb: 57 callbacks suppressed [ 1178.368254][ T30] audit: type=1326 audit(2000000096.880:4374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22531 comm="syz.3.7817" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7ffa3aaae929 code=0x0 [ 1179.031219][ T30] audit: type=1326 audit(2000000097.540:4375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22587 comm="syz.3.7841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1179.090793][ T30] audit: type=1326 audit(2000000097.540:4376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22587 comm="syz.3.7841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1179.159322][ T30] audit: type=1326 audit(2000000097.560:4377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22587 comm="syz.3.7841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1179.183175][ T30] audit: type=1326 audit(2000000097.560:4378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22587 comm="syz.3.7841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1179.206981][ T30] audit: type=1326 audit(2000000097.560:4379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22587 comm="syz.3.7841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=81 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1179.232455][ T30] audit: type=1326 audit(2000000097.560:4380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22587 comm="syz.3.7841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1179.264639][ T30] audit: type=1326 audit(2000000097.560:4381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22587 comm="syz.3.7841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1179.288611][ T30] audit: type=1326 audit(2000000097.750:4382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22595 comm="syz.0.7845" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9914bd0929 code=0x0 [ 1179.529243][T22645] tipc: Started in network mode [ 1179.535333][T22645] tipc: Node identity ac14140f, cluster identity 4711 [ 1179.544530][T22645] tipc: New replicast peer: 172.30.1.9 [ 1179.552464][T22645] tipc: Enabled bearer , priority 10 [ 1179.961092][T22656] SELinux: security_context_str_to_sid(user_u) failed for (dev ?, type ?) errno=-22 [ 1179.970699][T22656] SELinux: security_context_str_to_sid(user_u) failed for (dev incremental-fs, type incremental-fs) errno=-22 [ 1180.365292][T22680] netlink: 28 bytes leftover after parsing attributes in process `syz.8.7882'. [ 1180.375531][T22672] netlink: 8 bytes leftover after parsing attributes in process `syz.6.7878'. [ 1180.406890][T22680] sch_tbf: burst 88 is lower than device vlan1 mtu (1514) ! [ 1180.557998][ T30] audit: type=1326 audit(2000000099.070:4383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22682 comm="syz.0.7883" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9914bd0929 code=0x0 [ 1180.675497][ T26] tipc: Node number set to 2886997007 [ 1181.713482][T22715] netlink: 8 bytes leftover after parsing attributes in process `syz.6.7896'. [ 1182.675253][T22745] netlink: 12 bytes leftover after parsing attributes in process `syz.8.7908'. [ 1182.684775][T22745] netlink: 12 bytes leftover after parsing attributes in process `syz.8.7908'. [ 1182.694282][T22745] netlink: 40 bytes leftover after parsing attributes in process `syz.8.7908'. [ 1182.713682][T22745] netlink: 40 bytes leftover after parsing attributes in process `syz.8.7908'. [ 1183.401633][T22793] 9pnet: Insufficient options for proto=fd [ 1183.421069][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 1183.421083][ T30] audit: type=1400 audit(2000000101.930:4394): avc: denied { block_suspend } for pid=22788 comm="syz.6.7926" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1185.389758][ T30] audit: type=1326 audit(2000000103.900:4395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22818 comm="syz.3.7935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1185.463841][ T30] audit: type=1326 audit(2000000103.900:4396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22818 comm="syz.3.7935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1185.490780][ T30] audit: type=1326 audit(2000000103.920:4397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22818 comm="syz.3.7935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1185.569889][T22836] netlink: 28 bytes leftover after parsing attributes in process `syz.6.7942'. [ 1185.585323][ T30] audit: type=1326 audit(2000000103.920:4398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22818 comm="syz.3.7935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1185.610437][ T30] audit: type=1326 audit(2000000103.920:4399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22818 comm="syz.3.7935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1185.644485][ T30] audit: type=1326 audit(2000000103.920:4400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22818 comm="syz.3.7935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1185.668872][ T30] audit: type=1326 audit(2000000103.920:4401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22818 comm="syz.3.7935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1185.693552][ T30] audit: type=1326 audit(2000000103.920:4402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22818 comm="syz.3.7935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1185.727476][ T30] audit: type=1326 audit(2000000103.920:4403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22818 comm="syz.3.7935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7ffa3aaae929 code=0x7ffc0000 [ 1185.752943][T22840] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1185.935421][T22876] tmpfs: Unsupported parameter 'mpol' [ 1186.592341][T22914] tipc: Enabling of bearer rejected, already enabled [ 1187.612963][T22938] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1187.932106][T22964] tipc: Enabling of bearer rejected, already enabled [ 1188.759985][T22977] SELinux: security_context_str_to_sid(user_u) failed for (dev ?, type ?) errno=-22 [ 1188.769663][T22977] SELinux: security_context_str_to_sid(user_u) failed for (dev incremental-fs, type incremental-fs) errno=-22 [ 1188.861877][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 1188.861895][ T30] audit: type=1400 audit(2000000107.370:4442): avc: denied { ioctl } for pid=22987 comm="syz.8.8006" path="socket:[86282]" dev="sockfs" ino=86282 ioctlcmd=0x8922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1189.502860][T23028] netlink: 28 bytes leftover after parsing attributes in process `syz.1.8022'. [ 1190.061107][T23048] tipc: Enabling of bearer rejected, already enabled [ 1190.302594][T23054] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1190.508963][T23059] netlink: 28 bytes leftover after parsing attributes in process `syz.8.8033'. [ 1190.802938][ T30] audit: type=1400 audit(2000000109.310:4443): avc: denied { ioctl } for pid=23062 comm="syz.3.8035" path="socket:[87256]" dev="sockfs" ino=87256 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1190.803435][T23063] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8035'. [ 1190.862385][ T30] audit: type=1400 audit(2000000109.310:4444): avc: denied { bind } for pid=23062 comm="syz.3.8035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1191.021450][T23083] netlink: 28 bytes leftover after parsing attributes in process `syz.3.8039'. [ 1191.145089][T23090] netlink: 28 bytes leftover after parsing attributes in process `syz.0.8045'. [ 1191.462272][T23099] netlink: 'syz.0.8049': attribute type 3 has an invalid length. [ 1191.470302][T23099] netlink: 'syz.0.8049': attribute type 3 has an invalid length. [ 1191.632368][T23108] tipc: Enabling of bearer rejected, already enabled [ 1191.984468][T23121] netlink: 28 bytes leftover after parsing attributes in process `syz.1.8057'. [ 1193.075874][ T30] audit: type=1326 audit(2000000111.580:4445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23145 comm="syz.6.8067" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1193.143691][ T30] audit: type=1326 audit(2000000111.580:4446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23145 comm="syz.6.8067" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1193.197526][ T30] audit: type=1326 audit(2000000111.610:4447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23145 comm="syz.6.8067" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1193.221504][ T30] audit: type=1326 audit(2000000111.610:4448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23145 comm="syz.6.8067" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1193.245148][ T30] audit: type=1326 audit(2000000111.610:4449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23145 comm="syz.6.8067" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1193.269644][ T30] audit: type=1326 audit(2000000111.610:4450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23145 comm="syz.6.8067" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1193.293556][ T30] audit: type=1326 audit(2000000111.610:4451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23145 comm="syz.6.8067" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1193.469448][T23155] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1194.089466][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 1194.089483][ T30] audit: type=1400 audit(2000000112.600:4456): avc: denied { read } for pid=23197 comm="syz.6.8090" name="usbmon0" dev="devtmpfs" ino=155 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1194.121416][ T30] audit: type=1400 audit(2000000112.600:4457): avc: denied { open } for pid=23197 comm="syz.6.8090" path="/dev/usbmon0" dev="devtmpfs" ino=155 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1194.712609][ T30] audit: type=1400 audit(2000000112.600:4458): avc: denied { ioctl } for pid=23197 comm="syz.6.8090" path="/dev/usbmon0" dev="devtmpfs" ino=155 ioctlcmd=0x9206 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1195.001940][ T30] audit: type=1326 audit(2000000113.160:4459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23201 comm="syz.8.8092" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f18a42c3929 code=0x0 [ 1195.241889][T23243] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8109'. [ 1195.407290][ T30] audit: type=1326 audit(2000000113.910:4460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23250 comm="syz.0.8113" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9914bd0929 code=0x0 [ 1195.965858][T23268] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1196.043405][ T30] audit: type=1400 audit(2000000114.550:4461): avc: denied { create } for pid=23272 comm="syz.1.8121" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1196.070100][ T30] audit: type=1400 audit(2000000114.550:4462): avc: denied { write } for pid=23272 comm="syz.1.8121" name="file0" dev="tmpfs" ino=2174 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1196.093346][ T30] audit: type=1400 audit(2000000114.550:4463): avc: denied { open } for pid=23272 comm="syz.1.8121" path="/421/file0" dev="tmpfs" ino=2174 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1196.116687][T23277] netlink: 28 bytes leftover after parsing attributes in process `syz.1.8122'. [ 1196.299572][ T30] audit: type=1400 audit(2000000114.580:4464): avc: denied { unlink } for pid=17781 comm="syz-executor" name="file0" dev="tmpfs" ino=2174 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1197.255895][ T30] audit: type=1326 audit(2000000115.760:4465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23318 comm="syz.1.8141" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fb6359cc929 code=0x0 [ 1197.604177][T23324] netlink: 8 bytes leftover after parsing attributes in process `syz.6.8142'. [ 1198.244278][T23364] netlink: 96 bytes leftover after parsing attributes in process `syz.8.8158'. [ 1198.288384][T23371] netlink: 'syz.8.8161': attribute type 4 has an invalid length. [ 1198.300070][T23371] netlink: 'syz.8.8161': attribute type 4 has an invalid length. [ 1199.332586][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1199.332600][ T30] audit: type=1326 audit(2000000117.840:4468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23396 comm="syz.0.8171" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9914bd0929 code=0x0 [ 1199.376059][ T30] audit: type=1400 audit(2000000117.880:4469): avc: denied { write } for pid=23397 comm="syz.8.8172" name="001" dev="devtmpfs" ino=184 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1199.401527][T23402] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8171'. [ 1199.410820][T23402] device bridge_slave_1 left promiscuous mode [ 1199.418731][T23402] bridge0: port 2(bridge_slave_1) entered disabled state [ 1199.429799][T23402] device bridge_slave_0 left promiscuous mode [ 1199.437007][T23402] bridge0: port 1(bridge_slave_0) entered disabled state [ 1199.479205][T23404] netlink: 'syz.3.8174': attribute type 13 has an invalid length. [ 1199.527565][T23404] bridge0: port 2(bridge_slave_1) entered disabled state [ 1199.534785][T23404] bridge0: port 1(bridge_slave_0) entered disabled state [ 1200.047011][T23416] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1200.200795][ T30] audit: type=1326 audit(2000000118.710:4470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23427 comm="syz.0.8183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1200.242939][ T30] audit: type=1326 audit(2000000118.740:4471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23427 comm="syz.0.8183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=196 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1200.300504][T23437] tipc: Enabling of bearer rejected, already enabled [ 1200.309071][ T30] audit: type=1326 audit(2000000118.740:4472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23427 comm="syz.0.8183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1200.414479][ T30] audit: type=1326 audit(2000000118.920:4473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23439 comm="syz.0.8187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1200.447255][ T30] audit: type=1326 audit(2000000118.950:4474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23439 comm="syz.0.8187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=213 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1200.477214][ T30] audit: type=1326 audit(2000000118.950:4475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23439 comm="syz.0.8187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1200.595554][ T30] audit: type=1326 audit(2000000118.950:4476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23439 comm="syz.0.8187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1200.627364][ T30] audit: type=1326 audit(2000000118.980:4477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23439 comm="syz.0.8187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9914bd0929 code=0x7ffc0000 [ 1202.318585][T23505] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8213'. [ 1203.485536][T23559] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8236'. [ 1203.613766][T23579] netlink: 9 bytes leftover after parsing attributes in process `syz.3.8245'. [ 1203.624664][T23580] syz.8.8246[23580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1203.624744][T23580] syz.8.8246[23580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1203.636632][T23579] 0·: renamed from macsec0 [ 1203.657036][T23579] A link change request failed with some changes committed already. Interface 70· may have been left with an inconsistent configuration, please check. [ 1203.672572][T23580] netlink: 20 bytes leftover after parsing attributes in process `syz.8.8246'. [ 1203.689594][T23580] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 1203.697020][T23580] IPv6: NLM_F_CREATE should be set when creating new route [ 1203.877148][ T8743] tipc: Subscription rejected, illegal request [ 1204.334669][T23623] 9pnet: Could not find request transport: rdma [ 1205.607875][T23666] SELinux: security_context_str_to_sid(user_u) failed for (dev ?, type ?) errno=-22 [ 1205.628779][T23666] SELinux: security_context_str_to_sid(user_u) failed for (dev incremental-fs, type incremental-fs) errno=-22 [ 1205.666007][T23674] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8285'. [ 1206.267007][T23653] 9pnet: p9_fd_create_tcp (23653): problem connecting socket to 127.0.0.1 [ 1206.277133][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 1206.277144][ T30] audit: type=1400 audit(2000000124.790:4497): avc: denied { bind } for pid=23708 comm="syz.1.8300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1206.360060][ T30] audit: type=1326 audit(2000000124.870:4498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23716 comm="syz.6.8304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1206.398482][ T30] audit: type=1326 audit(2000000124.870:4499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23716 comm="syz.6.8304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1206.425468][ T30] audit: type=1326 audit(2000000124.870:4500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23716 comm="syz.6.8304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1206.451966][ T30] audit: type=1326 audit(2000000124.870:4501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23716 comm="syz.6.8304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1206.477242][ T30] audit: type=1326 audit(2000000124.900:4502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23716 comm="syz.6.8304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1206.501191][ T30] audit: type=1326 audit(2000000124.900:4503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23716 comm="syz.6.8304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1206.533086][ T30] audit: type=1326 audit(2000000124.900:4504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23716 comm="syz.6.8304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1206.563953][ T30] audit: type=1326 audit(2000000124.900:4505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23716 comm="syz.6.8304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1207.238392][ T30] audit: type=1326 audit(2000000124.900:4506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23716 comm="syz.6.8304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1207.840152][T23746] SELinux: security_context_str_to_sid(user_u) failed for (dev ?, type ?) errno=-22 [ 1207.851255][T23746] SELinux: security_context_str_to_sid(user_u) failed for (dev incremental-fs, type incremental-fs) errno=-22 [ 1208.823342][T23775] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8326'. [ 1208.931166][T23795] netlink: 12 bytes leftover after parsing attributes in process `syz.0.8335'. [ 1208.942218][T23795] netlink: 28 bytes leftover after parsing attributes in process `syz.0.8335'. [ 1209.473954][T23818] SELinux: security_context_str_to_sid(user_u) failed for (dev ?, type ?) errno=-22 [ 1209.492031][T23818] SELinux: security_context_str_to_sid(user_u) failed for (dev incremental-fs, type incremental-fs) errno=-22 [ 1209.565128][T23817] netlink: 8 bytes leftover after parsing attributes in process `syz.6.8342'. [ 1210.048690][T23842] netlink: 68 bytes leftover after parsing attributes in process `syz.3.8353'. [ 1210.129304][T23842] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8353'. [ 1210.874219][T23876] 9pnet: Could not find request transport: rdma [ 1211.491563][T23915] syz.3.8382[23915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1211.491637][T23915] syz.3.8382[23915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1212.070984][T23901] 9pnet: p9_fd_create_tcp (23901): problem connecting socket to 127.0.0.1 [ 1212.208872][T23936] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1213.498180][T23958] netlink: 8 bytes leftover after parsing attributes in process `syz.0.8397'. [ 1213.596310][T23976] syz.3.8406[23976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1213.596394][T23976] syz.3.8406[23976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1213.683057][ T30] kauditd_printk_skb: 68 callbacks suppressed [ 1213.683075][ T30] audit: type=1326 audit(2000000132.190:4575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23973 comm="syz.1.8405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1214.052352][ T30] audit: type=1326 audit(2000000132.190:4576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23973 comm="syz.1.8405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1214.076510][ T30] audit: type=1326 audit(2000000132.240:4577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23973 comm="syz.1.8405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1214.124253][ T30] audit: type=1326 audit(2000000132.240:4578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23973 comm="syz.1.8405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1214.163539][ T30] audit: type=1326 audit(2000000132.240:4579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23973 comm="syz.1.8405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1214.189751][ T30] audit: type=1326 audit(2000000132.240:4580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23973 comm="syz.1.8405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=82 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1214.217801][T24015] netlink: 24 bytes leftover after parsing attributes in process `syz.1.8422'. [ 1214.227885][ T30] audit: type=1326 audit(2000000132.240:4581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23973 comm="syz.1.8405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1214.257816][T24015] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8422'. [ 1214.268025][ T30] audit: type=1326 audit(2000000132.240:4582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23973 comm="syz.1.8405" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1214.295594][T24018] netlink: 28 bytes leftover after parsing attributes in process `syz.6.8425'. [ 1214.304858][ T30] audit: type=1400 audit(2000000132.720:4583): avc: denied { create } for pid=24012 comm="syz.1.8422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1214.356196][T24015] device veth1_macvtap left promiscuous mode [ 1214.365533][T24015] device veth1_macvtap entered promiscuous mode [ 1214.373526][T24015] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8422'. [ 1214.756016][T24039] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8429'. [ 1215.088781][T24061] mmap: syz.0.8438 (24061) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 1216.973500][ T30] audit: type=1326 audit(2000000135.480:4584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24072 comm="syz.1.8441" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1220.295947][T24112] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1221.870862][T24163] netem: change failed [ 1223.918818][T24212] netlink: 16 bytes leftover after parsing attributes in process `syz.8.8494'. [ 1223.941596][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 1223.941612][ T30] audit: type=1326 audit(2000000142.450:4590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24209 comm="syz.6.8492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1223.948035][T24217] syz.3.8495[24217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1223.981238][ T30] audit: type=1326 audit(2000000142.450:4591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24209 comm="syz.6.8492" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1223.993063][T24217] syz.3.8495[24217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1224.022543][ T30] audit: type=1326 audit(2000000142.450:4592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24209 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1224.089611][ T30] audit: type=1326 audit(2000000142.450:4593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24209 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1224.113929][ T30] audit: type=1326 audit(2000000142.450:4594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24209 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1224.160351][ T30] audit: type=1326 audit(2000000142.490:4595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24209 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1224.213184][ T30] audit: type=1326 audit(2000000142.490:4596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24209 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1224.237358][ T30] audit: type=1326 audit(2000000142.490:4597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24209 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1224.274547][ T30] audit: type=1326 audit(2000000142.490:4598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24209 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1224.310851][ T30] audit: type=1326 audit(2000000142.490:4599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24209 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6baf0f2929 code=0x7ffc0000 [ 1225.020421][T24256] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1227.565917][T24300] usb usb1: usbfs: interface 0 claimed by hub while 'syz.6.8528' sets config #1 [ 1229.276359][ T30] kauditd_printk_skb: 112 callbacks suppressed [ 1229.276376][ T30] audit: type=1326 audit(2000000147.780:4712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24346 comm="syz.1.8546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1229.345957][ T30] audit: type=1326 audit(2000000147.780:4713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24346 comm="syz.1.8546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1229.375020][ T30] audit: type=1326 audit(2000000147.780:4714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24346 comm="syz.1.8546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1229.401759][ T30] audit: type=1326 audit(2000000147.780:4715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24346 comm="syz.1.8546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1229.453068][T24365] tipc: Enabling of bearer rejected, already enabled [ 1229.469963][ T30] audit: type=1326 audit(2000000147.780:4716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24346 comm="syz.1.8546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1230.590052][ T30] audit: type=1326 audit(2000000147.780:4717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24346 comm="syz.1.8546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1230.622468][ T30] audit: type=1326 audit(2000000147.790:4718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24346 comm="syz.1.8546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1230.677274][ T30] audit: type=1326 audit(2000000147.790:4719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24346 comm="syz.1.8546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1230.712026][ T30] audit: type=1326 audit(2000000147.790:4720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24346 comm="syz.1.8546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1230.773034][ T30] audit: type=1326 audit(2000000147.790:4721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24346 comm="syz.1.8546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=33 compat=0 ip=0x7fb6359cc929 code=0x7ffc0000 [ 1231.425485][T17167] tipc: Disabling bearer [ 1231.431483][T17167] tipc: Left network mode [ 1233.702422][T24433] bridge0: port 1(bridge_slave_0) entered blocking state [ 1233.716530][T24433] bridge0: port 1(bridge_slave_0) entered disabled state [ 1233.734453][T24433] device bridge_slave_0 entered promiscuous mode [ 1233.838297][T24433] bridge0: port 2(bridge_slave_1) entered blocking state [ 1233.845384][T24433] bridge0: port 2(bridge_slave_1) entered disabled state [ 1233.878015][T24433] device bridge_slave_1 entered promiscuous mode [ 1234.075634][T24460] tipc: Enabling of bearer rejected, already enabled [ 1234.252134][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1234.264177][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1234.592955][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1234.610654][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1234.619976][T22093] bridge0: port 1(bridge_slave_0) entered blocking state [ 1234.627052][T22093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1234.639158][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1234.652453][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1234.662756][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1234.671517][T22093] bridge0: port 2(bridge_slave_1) entered blocking state [ 1234.678591][T22093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1234.701539][T17167] device bridge_slave_1 left promiscuous mode [ 1234.704497][ T30] kauditd_printk_skb: 109 callbacks suppressed [ 1234.704514][ T30] audit: type=1400 audit(2000000153.210:4831): avc: denied { read } for pid=24486 comm="syz.6.8601" dev="nsfs" ino=4026532380 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1234.728619][T17167] bridge0: port 2(bridge_slave_1) entered disabled state [ 1234.738621][ T30] audit: type=1400 audit(2000000153.240:4832): avc: denied { open } for pid=24486 comm="syz.6.8601" path="net:[4026532380]" dev="nsfs" ino=4026532380 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1234.766770][ T30] audit: type=1400 audit(2000000153.240:4833): avc: denied { create } for pid=24486 comm="syz.6.8601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1234.766839][T17167] device bridge_slave_0 left promiscuous mode [ 1234.797925][ T30] audit: type=1400 audit(2000000153.310:4834): avc: denied { ioctl } for pid=24486 comm="syz.6.8601" path="socket:[91250]" dev="sockfs" ino=91250 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1234.823439][T17167] bridge0: port 1(bridge_slave_0) entered disabled state [ 1234.850484][T24487] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1234.856729][ T30] audit: type=1400 audit(2000000153.350:4835): avc: denied { create } for pid=24486 comm="syz.6.8601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1234.886782][ T30] audit: type=1400 audit(2000000153.360:4836): avc: denied { write } for pid=24486 comm="syz.6.8601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1234.907071][ T30] audit: type=1400 audit(2000000153.360:4837): avc: denied { nlmsg_write } for pid=24486 comm="syz.6.8601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1234.928086][ T30] audit: type=1400 audit(2000000153.360:4838): avc: denied { create } for pid=24486 comm="syz.6.8601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1234.948278][ T30] audit: type=1400 audit(2000000153.410:4839): avc: denied { ioctl } for pid=24491 comm="syz.1.8602" path="socket:[91257]" dev="sockfs" ino=91257 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1235.175282][ T30] audit: type=1400 audit(2000000153.680:4840): avc: denied { name_bind } for pid=24494 comm="syz.0.8603" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1235.208152][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1235.216470][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1235.224738][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1235.233423][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1235.247531][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1235.255963][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1235.267542][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1235.275639][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1235.285176][T24433] device veth0_vlan entered promiscuous mode [ 1235.292395][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1235.306380][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1235.322126][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1235.331663][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1235.341685][T24433] device veth1_macvtap entered promiscuous mode [ 1235.348638][T24508] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1235.363974][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1235.374126][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1235.383544][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1235.400573][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1235.409004][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1237.114096][T24565] syz.6.8630[24565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1237.114171][T24565] syz.6.8630[24565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1237.128674][T24565] netlink: 12 bytes leftover after parsing attributes in process `syz.6.8630'. [ 1237.549361][T24617] hub 1-0:1.0: USB hub found [ 1237.554155][T24617] hub 1-0:1.0: 1 port detected [ 1240.198238][ T30] kauditd_printk_skb: 101 callbacks suppressed [ 1240.198344][ T30] audit: type=1326 audit(2000000158.690:4942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24679 comm="syz.8.8680" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f18a42c3929 code=0x0 [ 1240.323117][T24703] 9pnet: Insufficient options for proto=fd [ 1240.357314][ T30] audit: type=1400 audit(2000000158.860:4943): avc: denied { read write } for pid=24706 comm="syz.3.8690" name="uhid" dev="devtmpfs" ino=263 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1240.382407][ T30] audit: type=1400 audit(2000000158.860:4944): avc: denied { open } for pid=24706 comm="syz.3.8690" path="/dev/uhid" dev="devtmpfs" ino=263 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1240.513898][ T30] audit: type=1400 audit(2000000159.020:4945): avc: denied { name_bind } for pid=24720 comm="syz.0.8697" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1240.576099][T24725] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8699'. [ 1240.577890][ T30] audit: type=1400 audit(2000000159.080:4946): avc: denied { ioctl } for pid=24724 comm="syz.0.8699" path="socket:[91742]" dev="sockfs" ino=91742 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1240.661206][T24717] netlink: 44 bytes leftover after parsing attributes in process `syz.3.8695'. [ 1240.758584][T24737] ================================================================== [ 1240.766841][T24737] BUG: KASAN: slab-out-of-bounds in tc_setup_flow_action+0x870/0x3240 [ 1240.775072][T24737] Read of size 8 at addr ffff888127a6d1c0 by task syz.8.8704/24737 [ 1240.782977][T24737] [ 1240.785315][T24737] CPU: 1 PID: 24737 Comm: syz.8.8704 Not tainted 5.15.185-syzkaller-00032-g0d918fa8e88d #0 [ 1240.795286][T24737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1240.805347][T24737] Call Trace: [ 1240.808630][T24737] [ 1240.811564][T24737] __dump_stack+0x21/0x30 [ 1240.815901][T24737] dump_stack_lvl+0xee/0x150 [ 1240.820510][T24737] ? show_regs_print_info+0x20/0x20 [ 1240.825712][T24737] ? load_image+0x3a0/0x3a0 [ 1240.830218][T24737] print_address_description+0x7f/0x2c0 [ 1240.835806][T24737] ? tc_setup_flow_action+0x870/0x3240 [ 1240.841268][T24737] kasan_report+0xf1/0x140 [ 1240.845685][T24737] ? tc_setup_flow_action+0x870/0x3240 [ 1240.851146][T24737] __asan_report_load8_noabort+0x14/0x20 [ 1240.856777][T24737] tc_setup_flow_action+0x870/0x3240 [ 1240.862065][T24737] mall_replace_hw_filter+0x293/0x820 [ 1240.867447][T24737] ? pcpu_block_update_hint_alloc+0x8c1/0xc50 [ 1240.873514][T24737] ? mall_set_parms+0x520/0x520 [ 1240.878451][T24737] ? tcf_exts_destroy+0xb0/0xb0 [ 1240.883310][T24737] ? mall_set_parms+0x1e8/0x520 [ 1240.888163][T24737] mall_change+0x526/0x740 [ 1240.892594][T24737] ? __kasan_check_write+0x14/0x20 [ 1240.897720][T24737] ? mall_get+0xa0/0xa0 [ 1240.901888][T24737] ? tcf_chain_tp_insert_unique+0xac1/0xc10 [ 1240.907873][T24737] tc_new_tfilter+0x12a2/0x1870 [ 1240.912817][T24737] ? tcf_gate_entry_destructor+0x20/0x20 [ 1240.918451][T24737] ? security_capable+0x87/0xb0 [ 1240.923301][T24737] ? ns_capable+0x8c/0xf0 [ 1240.927632][T24737] ? netlink_net_capable+0x125/0x160 [ 1240.932925][T24737] ? tcf_gate_entry_destructor+0x20/0x20 [ 1240.938561][T24737] rtnetlink_rcv_msg+0x81b/0xb90 [ 1240.943505][T24737] ? rtnetlink_bind+0x80/0x80 [ 1240.948184][T24737] ? memcpy+0x56/0x70 [ 1240.952170][T24737] ? avc_has_perm_noaudit+0x2f4/0x460 [ 1240.957656][T24737] ? arch_stack_walk+0xee/0x140 [ 1240.962533][T24737] ? avc_denied+0x1b0/0x1b0 [ 1240.967042][T24737] ? stack_trace_save+0x98/0xe0 [ 1240.971898][T24737] ? avc_has_perm+0x158/0x240 [ 1240.976582][T24737] ? avc_has_perm_noaudit+0x460/0x460 [ 1240.981959][T24737] ? x64_sys_call+0x4b/0x9a0 [ 1240.986680][T24737] ? selinux_nlmsg_lookup+0x416/0x4c0 [ 1240.992081][T24737] netlink_rcv_skb+0x1e0/0x430 [ 1240.996950][T24737] ? rtnetlink_bind+0x80/0x80 [ 1241.001651][T24737] ? netlink_ack+0xb60/0xb60 [ 1241.006254][T24737] ? __netlink_lookup+0x387/0x3b0 [ 1241.011288][T24737] rtnetlink_rcv+0x1c/0x20 [ 1241.015801][T24737] netlink_unicast+0x87c/0xa40 [ 1241.020572][T24737] netlink_sendmsg+0x86a/0xb70 [ 1241.025349][T24737] ? netlink_getsockopt+0x530/0x530 [ 1241.030561][T24737] ? security_socket_sendmsg+0x82/0xa0 [ 1241.036028][T24737] ? netlink_getsockopt+0x530/0x530 [ 1241.041230][T24737] ____sys_sendmsg+0x5a2/0x8c0 [ 1241.045998][T24737] ? __sys_sendmsg_sock+0x40/0x40 [ 1241.051021][T24737] ? import_iovec+0x7c/0xb0 [ 1241.055525][T24737] ___sys_sendmsg+0x1f0/0x260 [ 1241.060206][T24737] ? __sys_sendmsg+0x250/0x250 [ 1241.064972][T24737] ? sock_show_fdinfo+0xa0/0xa0 [ 1241.069823][T24737] ? __fdget+0x1a1/0x230 [ 1241.074066][T24737] __x64_sys_sendmsg+0x1e2/0x2a0 [ 1241.079006][T24737] ? ___sys_sendmsg+0x260/0x260 [ 1241.083866][T24737] ? __kasan_check_write+0x14/0x20 [ 1241.088978][T24737] ? switch_fpu_return+0x15d/0x2c0 [ 1241.094092][T24737] x64_sys_call+0x4b/0x9a0 [ 1241.098516][T24737] do_syscall_64+0x4c/0xa0 [ 1241.102931][T24737] ? clear_bhb_loop+0x50/0xa0 [ 1241.107610][T24737] ? clear_bhb_loop+0x50/0xa0 [ 1241.112291][T24737] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1241.118199][T24737] RIP: 0033:0x7f18a42c3929 [ 1241.122624][T24737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1241.142237][T24737] RSP: 002b:00007f18a292c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1241.150671][T24737] RAX: ffffffffffffffda RBX: 00007f18a44eafa0 RCX: 00007f18a42c3929 [ 1241.158654][T24737] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 0000000000000005 [ 1241.166634][T24737] RBP: 00007f18a4345b39 R08: 0000000000000000 R09: 0000000000000000 [ 1241.174606][T24737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1241.182583][T24737] R13: 0000000000000000 R14: 00007f18a44eafa0 R15: 00007fffc701dd78 [ 1241.190565][T24737] [ 1241.193582][T24737] [ 1241.195904][T24737] Allocated by task 24737: [ 1241.200415][T24737] __kasan_kmalloc+0xda/0x110 [ 1241.205095][T24737] __kmalloc+0x13d/0x2c0 [ 1241.209348][T24737] tcf_idr_create+0x5f/0x790 [ 1241.213967][T24737] tcf_idr_create_from_flags+0x61/0x70 [ 1241.219436][T24737] tcf_gact_init+0x346/0x580 [ 1241.224029][T24737] tcf_action_init_1+0x3f7/0x6a0 [ 1241.228969][T24737] tcf_action_init+0x1e9/0x710 [ 1241.233731][T24737] tcf_exts_validate+0x217/0x520 [ 1241.238664][T24737] mall_set_parms+0x48/0x520 [ 1241.243262][T24737] mall_change+0x45a/0x740 [ 1241.247682][T24737] tc_new_tfilter+0x12a2/0x1870 [ 1241.252534][T24737] rtnetlink_rcv_msg+0x81b/0xb90 [ 1241.257469][T24737] netlink_rcv_skb+0x1e0/0x430 [ 1241.262233][T24737] rtnetlink_rcv+0x1c/0x20 [ 1241.266652][T24737] netlink_unicast+0x87c/0xa40 [ 1241.271412][T24737] netlink_sendmsg+0x86a/0xb70 [ 1241.276175][T24737] ____sys_sendmsg+0x5a2/0x8c0 [ 1241.280940][T24737] ___sys_sendmsg+0x1f0/0x260 [ 1241.285632][T24737] __x64_sys_sendmsg+0x1e2/0x2a0 [ 1241.290564][T24737] x64_sys_call+0x4b/0x9a0 [ 1241.294989][T24737] do_syscall_64+0x4c/0xa0 [ 1241.299406][T24737] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1241.305296][T24737] [ 1241.307619][T24737] Last potentially related work creation: [ 1241.313448][T24737] kasan_save_stack+0x3a/0x60 [ 1241.318129][T24737] __kasan_record_aux_stack+0xd2/0x100 [ 1241.323588][T24737] kasan_record_aux_stack_noalloc+0xb/0x10 [ 1241.329389][T24737] kvfree_call_rcu+0xae/0x7e0 [ 1241.334066][T24737] br_multicast_destroy_mdb_entry+0x90/0xb0 [ 1241.339964][T24737] br_multicast_dev_del+0x567/0x5f0 [ 1241.345357][T24737] br_dev_uninit+0x1e/0x70 [ 1241.349790][T24737] unregister_netdevice_many+0x1385/0x1990 [ 1241.355609][T24737] default_device_exit_batch+0x330/0x390 [ 1241.361249][T24737] cleanup_net+0x602/0xad0 [ 1241.365671][T24737] process_one_work+0x6be/0xba0 [ 1241.370522][T24737] worker_thread+0xa59/0x1200 [ 1241.375199][T24737] kthread+0x411/0x500 [ 1241.379267][T24737] ret_from_fork+0x1f/0x30 [ 1241.383687][T24737] [ 1241.386004][T24737] Second to last potentially related work creation: [ 1241.392600][T24737] kasan_save_stack+0x3a/0x60 [ 1241.397277][T24737] __kasan_record_aux_stack+0xd2/0x100 [ 1241.402737][T24737] kasan_record_aux_stack_noalloc+0xb/0x10 [ 1241.408719][T24737] call_rcu+0xf6/0xf60 [ 1241.412784][T24737] replace+0x1b7/0x4c0 [ 1241.416941][T24737] resize+0x14a9/0x1c70 [ 1241.421098][T24737] fib_remove_alias+0x4f8/0x730 [ 1241.425947][T24737] fib_table_delete+0xf37/0x1160 [ 1241.430877][T24737] fib_del_ifaddr+0x15dd/0x1b90 [ 1241.435727][T24737] fib_inetaddr_event+0xc9/0x310 [ 1241.440660][T24737] blocking_notifier_call_chain+0xba/0x140 [ 1241.446467][T24737] __inet_del_ifa+0x81f/0xd90 [ 1241.451153][T24737] inetdev_event+0x65a/0x10a0 [ 1241.455826][T24737] raw_notifier_call_chain+0x90/0x100 [ 1241.461192][T24737] unregister_netdevice_many+0xfb8/0x1990 [ 1241.466915][T24737] default_device_exit_batch+0x330/0x390 [ 1241.472544][T24737] cleanup_net+0x602/0xad0 [ 1241.476955][T24737] process_one_work+0x6be/0xba0 [ 1241.481803][T24737] worker_thread+0xa59/0x1200 [ 1241.486474][T24737] kthread+0x411/0x500 [ 1241.490542][T24737] ret_from_fork+0x1f/0x30 [ 1241.494961][T24737] [ 1241.497281][T24737] The buggy address belongs to the object at ffff888127a6d100 [ 1241.497281][T24737] which belongs to the cache kmalloc-192 of size 192 [ 1241.511328][T24737] The buggy address is located 0 bytes to the right of [ 1241.511328][T24737] 192-byte region [ffff888127a6d100, ffff888127a6d1c0) [ 1241.524950][T24737] The buggy address belongs to the page: [ 1241.530589][T24737] page:ffffea00049e9b40 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x127a6d [ 1241.540824][T24737] flags: 0x4000000000000200(slab|zone=1) [ 1241.546461][T24737] raw: 4000000000000200 ffffea00042a4280 0000000300000003 ffff888100042c00 [ 1241.555039][T24737] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 1241.563615][T24737] page dumped because: kasan: bad access detected [ 1241.570020][T24737] page_owner tracks the page as allocated [ 1241.575727][T24737] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 281, ts 24172665563, free_ts 0 [ 1241.590829][T24737] post_alloc_hook+0x192/0x1b0 [ 1241.595592][T24737] prep_new_page+0x1c/0x110 [ 1241.600211][T24737] get_page_from_freelist+0x2cc5/0x2d50 [ 1241.605767][T24737] __alloc_pages+0x18f/0x440 [ 1241.610360][T24737] new_slab+0xa1/0x4d0 [ 1241.614430][T24737] ___slab_alloc+0x381/0x810 [ 1241.619022][T24737] __slab_alloc+0x49/0x90 [ 1241.623351][T24737] __kmalloc_track_caller+0x169/0x2c0 [ 1241.628725][T24737] kmemdup+0x26/0x60 [ 1241.632620][T24737] neigh_parms_alloc+0x8d/0x4f0 [ 1241.637471][T24737] ipv6_add_dev+0x32a/0x1150 [ 1241.642055][T24737] addrconf_notify+0x582/0xde0 [ 1241.646816][T24737] raw_notifier_call_chain+0x90/0x100 [ 1241.652186][T24737] call_netdevice_notifiers+0x111/0x190 [ 1241.657840][T24737] register_netdevice+0x1039/0x13a0 [ 1241.663043][T24737] veth_newlink+0x8ed/0xda0 [ 1241.667552][T24737] page_owner free stack trace missing [ 1241.672915][T24737] [ 1241.675238][T24737] Memory state around the buggy address: [ 1241.680877][T24737] ffff888127a6d080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1241.688944][T24737] ffff888127a6d100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1241.697011][T24737] >ffff888127a6d180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1241.705065][T24737] ^ [ 1241.711211][T24737] ffff888127a6d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1241.719264][T24737] ffff888127a6d280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1241.727316][T24737] ================================================================== [ 1241.735362][T24737] Disabling lock debugging due to kernel taint [ 1241.765558][ T30] audit: type=1400 audit(2000000160.270:4947): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1241.790875][ T30] audit: type=1400 audit(2000000160.280:4948): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1241.814833][ T30] audit: type=1400 audit(2000000160.280:4949): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1241.838494][ T30] audit: type=1400 audit(2000000160.280:4950): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1241.876696][ T30] audit: type=1400 audit(2000000160.280:4951): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1