last executing test programs: 8m32.408983882s ago: executing program 32 (id=139): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x1a3c82) syz_open_dev$sg(&(0x7f0000000280), 0x0, 0x0) 8m25.171222405s ago: executing program 33 (id=307): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r1}, 0x10) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/5, 0x22c000, 0x800}, 0x20) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 8m18.886894687s ago: executing program 34 (id=423): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0xfffffffffffffdf4, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a00000004000000ff0f000004"], 0x48) 7m52.346304529s ago: executing program 35 (id=1212): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f00000003c0)='%-5lx \x00'}, 0x20) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) close_range(r1, 0xffffffffffffffff, 0x0) 7m14.840518333s ago: executing program 2 (id=2167): r0 = perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x1) 7m14.636003976s ago: executing program 2 (id=2160): openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00), 0x800, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x2101, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x4e00, 0x0, 0x730, 0xbdff, 0x10, "fdffffffffffffff"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x3, 0x0, 0x0, "0062ba7d82000000000000000000f7fffeff00"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0x17) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000700)=0x40) 7m14.275931071s ago: executing program 2 (id=2171): socketpair(0x1e, 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 7m12.872410189s ago: executing program 2 (id=2206): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r1 = open_tree(r0, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) umount2(&(0x7f0000000ec0)='./file0\x00', 0x2) 7m12.850619349s ago: executing program 2 (id=2207): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f00000000c0), 0xfc, 0x574, &(0x7f0000000e40)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) pwritev2(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)=ANY=[@ANYBLOB="06000000000000000153d3000000000005"]) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f0000000240), 0x1, 0x4b6, &(0x7f0000000540)="$eJzs3c9vVFsdAPDvvW1pKYUWJfFHVBBRNISZdoCGsMKNxhASI3HlAmo7NE1nOk1nirSyKP+DiSSu9E9wYeLChJV7d7pzgwsTVOILfclbzMudmZZSOm3fo8x96Xw+ycm9555hvt/D9J4zPW3nBNC3LkTERkSciIgHETHeuZ50Stxul+xxr189md189WQ2iWbz3n+TVnt2LXb8m8ypznOORMTPfhzxy+TduPW19cWZSqW80qkXG9XlYn1t/epCdWa+PF9eKpWmp6Ynb167UTqyvp6v/vHljxbu/Pwvf/7mi79t/ODXWVpjnbad/ThK7a4PbcfJDEbEnQ8RLAcDnf6cyDsRPpc0Ir4UERez+7+ZdzYAQC80m+PRHN9ZBwCOu7S1Bpakhc5awFikaaHQXsM7F6NppVZvXHlYW12aa6+VTcRQ+nChUp7srBVOxFCS1ada52/qpV31axFxNiJ+M3yyVS/M1ipzeb7xAYA+dmrX/P/RcHv+BwCOuZG8EwAAes78DwD9x/wPAP3H/A8A/cf8DwD9x/wPAP3H/A8AfeWnd+9mpbnZ+fzruUdrq4u1R1fnyvXFQnV1tjBbW1kuzNdq863P7Kke9HyVWm156nqsPi42yvVGsb62fr9aW11q3G99rvf98lBPegUA7Ofs+ef/SCJi49bJVokdezmYq+F4S/NOAMjNQN4JALkZzDsBIDe+xwf22KL3LV1/RejZ0ecC9Mblr1n/h35l/R/6l/V/6F/W/6F/NZuJPf8BoM9Y4wf8/B8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+u7FWSdJCZy/wsUjTQiHidERMxFDycKFSnoyIMxHx9+Gh4aw+lXfSAMB7Sv+ddPb/ujx+aWx364nk4+HWMSJ+9bt7v30802isTGXX/7d9vfGsc72UR/4AwEG25umteXzL61dPZrdKL/N5+cP25qJZ3M1OabcMxmDrOBJDETH6/6RTb8verwwcQfyNpxHx1b36n7TWRiY6O5/ujp/FPt3T+Olb8dNWW/uY/V98+QhygX7zPBt/bu91/6VxoXXc+/4faY1Q729r/Nt8Z/xLt8e/gS7j34XDxrj+1590bXsa8fXBveIn2/GTLvEvHTL+P7/xrYvd2pq/j7gce8ffGavYqC4X62vrVxeqM/Pl+fJSqTQ9NT1589qNUrG1Rl3cWql+139uXTmzX/9Hu8QfOaD/3z1k///wyYNffHuf+N//zt6v/7l94mdz4vcOGX9m9E9dt+/O4s916f9Br/+VQ8Z/8a/1uUM+FADogfra+uJMpVJecdKzk+y92xcgDSe5nWRfAUfxPF/5gKnmPTIBH9qbmz7vTAAAAAAAAAAAAAAAgG568QdPefcRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA4+vTAAAA//+0tdao") r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) pwrite64(r2, &(0x7f0000000140)='3', 0x1, 0xfeca) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 7m12.78159658s ago: executing program 2 (id=2210): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0, 0x0, 0x13}, 0x18) r1 = syz_io_uring_setup(0x121d, &(0x7f0000000500)={0x0, 0x7d0f, 0x80, 0x3, 0x34e}, &(0x7f0000000040)=0x0, &(0x7f00000002c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r4 = socket(0x2a, 0x2, 0x0) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0x50, 0x0, 0x0, 0x0, 0x23457}) io_uring_enter(r1, 0x47bc, 0x0, 0x0, 0x0, 0x0) 7m12.77352754s ago: executing program 36 (id=2210): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0, 0x0, 0x13}, 0x18) r1 = syz_io_uring_setup(0x121d, &(0x7f0000000500)={0x0, 0x7d0f, 0x80, 0x3, 0x34e}, &(0x7f0000000040)=0x0, &(0x7f00000002c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r4 = socket(0x2a, 0x2, 0x0) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0x50, 0x0, 0x0, 0x0, 0x23457}) io_uring_enter(r1, 0x47bc, 0x0, 0x0, 0x0, 0x0) 5m42.328856518s ago: executing program 8 (id=4468): r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) finit_module(r0, 0x0, 0x3) 5m42.280380249s ago: executing program 8 (id=4479): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) 5m41.549054738s ago: executing program 8 (id=4471): r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x100000001) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x1, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @dev}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) close(r0) 5m41.503562619s ago: executing program 8 (id=4473): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$bind(&(0x7f0000000200)='./file0\x00', &(0x7f0000000680)='./file0/../file0/../file0/../file0\x00', 0x0, 0x1333404, 0x0) chroot(&(0x7f0000000040)='./file0/../file0/../file0/../file0\x00') r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='./file0/../file0/../file0/../file0\x00') 5m41.42912498s ago: executing program 8 (id=4477): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x10, &(0x7f0000000600)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001140)={&(0x7f00000004c0)='mm_page_free\x00', r1, 0x0, 0x7ff}, 0x18) r2 = io_uring_setup(0x1694, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) mremap(&(0x7f00003eb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000003000/0x1000)=nil) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r2, 0x10, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0xf4369000) 5m41.345909481s ago: executing program 8 (id=4480): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22004006, &(0x7f00000010c0)={[{@jqfmt_vfsold}, {@nouid32}, {@nobh}, {@stripe={'stripe', 0x3d, 0xffff}}, {@block_validity}, {@grpjquota, 0x22}], [], 0x2}, 0xc4, 0x48b, &(0x7f0000001e00)="$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") creat(&(0x7f0000000380)='./file0\x00', 0xecf86c37d53049e1) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000700)) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b708"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="6000000002060103000000000000000000000004050001000700000013000300686173683a6e65742c696661636500000900020073797a30000000000500040000000000050005000a00000014000780050015000000000008001240"], 0x60}}, 0x0) 5m41.345760581s ago: executing program 37 (id=4480): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22004006, &(0x7f00000010c0)={[{@jqfmt_vfsold}, {@nouid32}, {@nobh}, {@stripe={'stripe', 0x3d, 0xffff}}, {@block_validity}, {@grpjquota, 0x22}], [], 0x2}, 0xc4, 0x48b, &(0x7f0000001e00)="$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") creat(&(0x7f0000000380)='./file0\x00', 0xecf86c37d53049e1) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000700)) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b708"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="6000000002060103000000000000000000000004050001000700000013000300686173683a6e65742c696661636500000900020073797a30000000000500040000000000050005000a00000014000780050015000000000008001240"], 0x60}}, 0x0) 4m38.631297631s ago: executing program 0 (id=5970): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 4m38.595626871s ago: executing program 0 (id=5971): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x137c}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) r4 = mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x6, 0x0) mq_timedreceive(r4, &(0x7f0000004600)=""/102381, 0xfffffceb, 0x0, 0x0) 4m38.586456021s ago: executing program 0 (id=5972): bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000003c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f00000004c0)="7cd1", 0x2}, {&(0x7f0000000540)}], 0x2, 0x0) 4m37.677194463s ago: executing program 0 (id=5992): prctl$PR_SET_SECUREBITS(0x1c, 0x2c) setuid(0xee00) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000180)='./file1\x00', 0x1218088, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xa, 0x2c2, &(0x7f00000008c0)="$eJzs3T+LI2UcB/DfZHOTUYuksBLhBrzC6nCvE5sscgfiVh4p1EIX7w5kE4Q7WPAPxqtsbSwsfAWC4Au5xncg2Ap2rrAwMpOZndk1uyayWXH382n24Xl+33meJxmySZEnH74823+Qx6OnX/wSWZZEbxzjOExiFL1ofBUnjL8JAOD/7LAo4vdiYZ1cEhHZ5pYFAGzQav//+23zp0tZFgCwQffffe/tnd3du+9kkcW92dcHk/KTffl3Mb7zKD6OaTyM12IYRxHV+4T6g3/ZvlcUxbyfl0ZxazY/mJTJ2QfP6uvv/BZR5bdjGKPjWPVuo8q/tXt3u4rng05+Xq7j+Xr+cZm/E8N48Th8In9nkc+7+Zik8eornfXfjmH8/FF8EtN4UC2izX+5nedvFt/+8fn75fLKfDI/mAyqulaxdZnPCwAAAAAAAAAAAAAAAAAAAAAAV9vtvDl8J78Zt2ZlV33+ztZRWtfUJaM2VY4vWknT1TkfqDQv4vvOkYJ5URe25/v046V+92BBAAAAAAAAAAAAAAAAAAAAuL6efPrZ/t50+vDxhTSa0wD6EfHn/Yh/e51xp+dmnF88qOfcm057dfNEzbO02xNbTU0Sce4yyk1c0MPyT43nTq+5afzwY7nBdS6YdXpeX77BG5vfV3N37e8ly+caRNOT1TfJd2lEW5PGinOlZw0Vsc7tly4dGq699/SFqjE/s6Y5B+Os67zx62K87klO7yKtHtWls9+oG534qXtjpec9skX8768VSXVax2BDr0QAAAAAAAAAAAAAAAAAAED77d8lg0/PjfYKXwUGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4Ipof/9/jca8Dq9QnMbjJ//xFgEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgG/goAAP///CFRHg==") sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2000007ff) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r1) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r2 = syz_open_procfs(r0, &(0x7f0000000400)='ns\x00') readlinkat(r2, &(0x7f0000000100)='./mnt\x00', &(0x7f0000000440)=""/163, 0xa3) 4m37.565804274s ago: executing program 0 (id=5994): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="01000000050000000200000007"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000380), &(0x7f00000007c0), 0x75, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 4m37.341439028s ago: executing program 0 (id=5998): socket$nl_route(0x10, 0x3, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x7}, 0x1c) listen(r0, 0xfffffffc) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x28, r3, 0x7, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}]}]}, 0x28}}, 0x0) 4m37.340790948s ago: executing program 38 (id=5998): socket$nl_route(0x10, 0x3, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x7}, 0x1c) listen(r0, 0xfffffffc) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x28, r3, 0x7, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}]}]}, 0x28}}, 0x0) 3m53.610770672s ago: executing program 5 (id=6994): sched_setscheduler(0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 3m52.98039475s ago: executing program 5 (id=6984): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0xffffffffffe, &(0x7f0000006680)) write$cgroup_pid(r3, &(0x7f00000005c0), 0x12) 3m52.869461802s ago: executing program 5 (id=6989): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x70, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r0, r2, 0xfffffffffffffc01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='kmem_cache_free\x00', r3, 0x0, 0x2}, 0x18) 3m51.932718414s ago: executing program 5 (id=7021): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x891018, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x101091, 0x0) umount2(&(0x7f0000000480)='./file0\x00', 0x0) 3m51.880619945s ago: executing program 5 (id=7012): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x2, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "87ee8ac6c46dad33", "2607080d7f4fcf00fd4ef2dece6c7c58", '\x00', '#\x00'}, 0x28) close_range(r0, 0xffffffffffffffff, 0x200000000000000) 3m51.47360874s ago: executing program 5 (id=7018): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000500000002"], 0x48) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000, 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000180), 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x0) 3m51.47336768s ago: executing program 39 (id=7018): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000500000002"], 0x48) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000, 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000180), 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x0) 2m53.451725219s ago: executing program 9 (id=8423): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0ff5b14104fe62cc60e413905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf2364149215108333719acd97cfa107d40224edc5465a93df8513a32ec450bebc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe511195418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4929330142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da8c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000dd11e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15f2a169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffff7f000010000000000000905ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400bee3dfc8fb24f67c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341b74abaa7c95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb232bbdb9dc33cbd7643866fde41f94290c2a5ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595270fb4021428ce970275d13b78100788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f76dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d2e959efc71f665c4d75cf2458e3322c9062ece84c99a061997a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99f0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d164118e4cbe02400000000ff0700000000cc9d8046c216c1f895778cb25122a2a998de44aeadea2a40da8daccf080842a4867217373934bbd42dcb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcd62981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba495aea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b60000000000001700d6d5210d7560eb92d6a97a27602b81f76386f1535b1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294059323e7a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd704e4214de5946932d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505466ac96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a428f1da1fc8df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1785eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba891cea599b079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be2f5656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fd78f9743af932cd6db49a47613808bad959719c0000000000378a921c7f7f6933c2e24c7e800003c9e8095e02985f28de0bbc76d58dd92606b1ef6486c85fa3e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6968d12418a4d2a0d086d8438d415d713acebc5b014e61a543a5a391f03daca80f08f0e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e112645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5000000000006065d6735eb7a00e127c000000000000000000000000000000a1c3da144589dcaddb71cf9374843e23f992a237a9040747e0434a8a643990b4059a98411ce867d1af7e8ea89f49e6f564d4dce8a7d6939a9214a7f39e83bd247e03a09dba000000000000000000000000aaf033d47249c8444bc13844cbf1be617d82b269e5ea0c0d525603c0ec543ea581f63893ae414a6683e941fdbdff03cfc5f8744583c0aa766a65321f907927a59d75b47f06895e8471ebc2840ce5bd054df223fb09b9c739ad64cfcfd2d498b0f11056f6c40874cb977c99b6bc1a8732198a17e610082b7ce0365f271b11d4b4a3d4c7d0bb273f406ecd4b26c93151c30f5a269991402d109becb1b9bafcb2b47e940000000000e540d8b0db3774effb7469a21f96e2594b2973ebf7a1bd9ace2ed4d6eb1735f85885be5be74dc2ea5d7d499bd28271b98f187f5879b16b409a04d78175cc8d0f707c822805d7011ed4b22419186dd2b22aadf15828db2ca19d79e1bf2f7989237ee5cb2e1eb7b2bfc92d3aa95a26f060935c4fee8b2d7d0bf3c6d82d04329164bd4ee0b8060183f36762b0440d9082d7c8b06e4c2024f77e1018758d28e7ee290f32a48bfc2aa10b3dba9bff00d2410f3477a8e0df689c880dc9a677cfaa16603527c06625a3363744cea5f2d350224cc0fea76c72ca08507235c67346722f20690fde0790f040f5fd3eff75f9b291cc5e9c686ebaadbe756c6fa039ff441e427ed12578d5cb041ebf729cfaa575cc852fbdb54e60435e6d62b9d270433b220ed9ff1ff042b8d3d866231c460765"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x1f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket(0x10, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback, 0xffffffff}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000340)=@gcm_128={{0x304}, "a6341a1a379332f5", "1fd33cb95d66a1781f31bff200010074", "e2266bd8", "d1b29b99d21d88a2"}, 0x28) writev(r2, &(0x7f00000030c0)=[{&(0x7f0000000a40)="fb", 0x1}], 0x1) close_range(r1, r2, 0x0) 2m53.42924962s ago: executing program 9 (id=8424): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000002900000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x660}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffd}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = socket(0x400000000010, 0x3, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newtfilter={0x90, 0x2c, 0xd27, 0x70bd28, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {}, {0x7}}, [@filter_kind_options=@f_fw={{0x7}, {0x5c, 0x2, [@TCA_FW_ACT={0x58, 0x4, [@m_nat={0x54, 0x1, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0xfffffbfe, 0x8, 0x10000000, 0xb, 0xff}, @broadcast, @multicast1, 0xff, 0x1}}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0xd, 0x8}}]}, 0x90}, 0x1, 0x0, 0x0, 0x4}, 0x4000800) 2m53.285231331s ago: executing program 9 (id=8426): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) msgrcv(0x0, 0x0, 0x0, 0x6, 0x0) r0 = socket$pppl2tp(0x18, 0x1, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x8, 0x0, 0x1003, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x32) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x180204}], 0x1) 2m52.385547023s ago: executing program 9 (id=8448): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setns(r1, 0x24020000) mount_setattr(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x9100, &(0x7f0000000200)={0x0, 0x0, 0x100000}, 0x20) 2m52.364242593s ago: executing program 9 (id=8449): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x18, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x800, 0x0, 0x0, @u32=0x4}, @nested={0xc, 0x8, 0x0, 0x1, [@typed={0x8, 0xc, 0x0, 0x0, @uid=r4}]}]}, 0x28}}, 0x0) 2m51.881915549s ago: executing program 9 (id=8453): getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) write$evdev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) 2m51.863654879s ago: executing program 40 (id=8453): getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) write$evdev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) 2.703383705s ago: executing program 3 (id=11445): socket$igmp6(0xa, 0x3, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x10) pipe2$9p(&(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='9p_protocol_dump\x00', r2}, 0x10) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x2b00, 0x0) ppoll(&(0x7f0000000600)=[{r3, 0x1400}], 0x1, 0x0, 0x0, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000080)={0x0, 0x4, 0x1, 0x5, 0x7}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af0ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x45, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2.660163715s ago: executing program 1 (id=11449): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) epoll_create(0x6) ppoll(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) write$rfkill(r4, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}, 0x8) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB=',\x00\x00\x00!\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4048040}, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = dup(r5) ioctl$TIOCL_SETSEL(r6, 0x541c, &(0x7f0000001900)={0x2, {0x2, 0xa00, 0x0, 0x101, 0x100}}) 2.097615003s ago: executing program 7 (id=11459): socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a0000000300000008000000"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r0}, 0x0, &(0x7f00000003c0)='%-010d \x00'}, 0x20) writev(r0, &(0x7f0000000080), 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x602, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x9000) socketpair$unix(0x1, 0x3, 0x0, 0x0) r1 = syz_io_uring_setup(0x82e, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r1, 0x16, 0x0, 0x1) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, 0x0, 0x20000810) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) flock(r2, 0x5) r3 = gettid() accept$packet(r2, 0x0, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) flock(r4, 0x2) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/locks\x00', 0x0, 0x0) 1.853042056s ago: executing program 3 (id=11464): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0xa, 0x0, &(0x7f0000000240)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000000, @void, @value}, 0x94) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x17, &(0x7f0000000040)=0xe, 0x36) setsockopt$inet_int(r4, 0x0, 0x17, &(0x7f0000000100)=0xfffffe01, 0x3) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x19, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000002000000000000000000e0ff18120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018310000050000000000000000000000851000000800000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010000808500000006000000186200000c000000000000000700000018390000030000000000000000000000185b000006000000000000000000000095000000000000002b9e824fc0177d4ee6b561d698ce2be0babce378584a29448e88a0d9921ae2b7ce2f5b98a11abf73752d2ffff3eae06248ad339d48dd2f98fbb494059af0f0873198ac9b6f"], &(0x7f0000000000)='GPL\x00', 0x80, 0xe, &(0x7f0000000180)=""/14, 0x0, 0x57, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x2, 0xc, 0xa, 0x412}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000400), &(0x7f0000000440)=[{0x4, 0x2, 0xe, 0x2}, {0x5, 0x5, 0xb, 0xa}], 0x10, 0xffffffff, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', r8, 0x0, 0xf7}, 0x18) r9 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$nl_xfrm(0x10, 0x3, 0x6) bind$bt_hci(r9, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x2, &(0x7f0000002400)=0x0) io_submit(r10, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2000000000, 0x4, 0x0, 0x1, 0x0, r9, &(0x7f0000000040)="0200ffff0000", 0x6, 0x0, 0x0, 0x2}]) 1.852767566s ago: executing program 6 (id=11465): mq_open(&(0x7f000084dff0)='rmdF\x17\x16\xbc\xec', 0x6e93ebbbcc0884f2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r2}, 0x10) socket$inet6_sctp(0xa, 0x1, 0x84) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c00000003080102000000074441980000000000050003"], 0x1c}, 0x1, 0x0, 0x0, 0x50}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000180), 0xfea7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) r7 = openat$cgroup_ro(r3, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r9, @ANYBLOB="ff830500000700ffffff", @ANYRES8=r4], 0x4}}, 0x0) sendfile(r8, r7, 0x0, 0x100000005) 1.804211967s ago: executing program 6 (id=11466): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) epoll_create(0x6) ppoll(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) write$rfkill(r4, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}, 0x8) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB=',\x00\x00\x00!\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4048040}, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = dup(r5) ioctl$TIOCL_SETSEL(r6, 0x541c, &(0x7f0000001900)={0x2, {0x2, 0xa00, 0x0, 0x101, 0x100}}) 1.803700177s ago: executing program 1 (id=11467): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000100)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x8020) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@mcast2, @in=@multicast1, 0x2000, 0x4, 0x4e22, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}, {0x1, 0x7fffffff, 0x100000000, 0x800000000000006, 0x1, 0x400004, 0x4}, {0x1, 0x8, 0x0, 0x7}, 0xe, 0x0, 0x1, 0x0, 0x3}, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x0, 0x32}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x35}, 0xfffffffe, 0x4, 0x2, 0x0, 0xfffffffc, 0x6}}, 0xe8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000004000000baed0000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe3, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'nr0\x00'}) syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xfffffffd, @loopback}, 0x1c) 1.803224547s ago: executing program 1 (id=11468): prctl$PR_SET_SECUREBITS(0x1c, 0x1d) faccessat2(0xffffffffffffffff, 0x0, 0x4, 0x1000) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000003680)='sched_switch\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) lsm_set_self_attr(0x64, 0x0, 0xe3, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback}, 0x1c) r5 = fcntl$dupfd(r3, 0x0, r3) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000440)={0x16, 0x98, 0xfa00, {&(0x7f0000000140)={0xffffffffffffffff}, 0x3, r1, 0x30, 0x0, @ib={0x1b, 0x8, 0x6b4, {"19d17c9bb7e5452cfe663bba8d2d37a8"}, 0xf034, 0x5, 0x6}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x3, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000000e40)=[{{0x0, 0x0, &(0x7f0000002c40)=[{&(0x7f00000002c0)=';', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000380)="12", 0x1}], 0x1}}], 0x2, 0x10) syz_usb_disconnect(0xffffffffffffffff) shutdown(r4, 0x2) 1.757875987s ago: executing program 3 (id=11469): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_io_uring_setup(0x49a, &(0x7f0000000400)={0x0, 0x79af, 0x3180, 0x7fff, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r6}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x3a366d1c952a243b, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2003, 0x1}) io_uring_enter(r3, 0x627, 0x4c1, 0x43, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=@newqdisc={0x54, 0x10, 0x1, 0x16000000, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xfff1}, {0xe, 0x1}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0xfffffffc}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0xe0000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x20642, 0x36) pwritev2(0xffffffffffffffff, &(0x7f0000000240)=[{0x0}], 0x1, 0x7800, 0x0, 0x3) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r8, &(0x7f00000002c0)=[{&(0x7f0000000000)='9', 0x1}, {&(0x7f00000019c0)="b0", 0x1}], 0x2) syz_open_procfs(0x0, &(0x7f00000003c0)='net/nf_conntrack\x00') eventfd2(0x7, 0x80001) eventfd(0x9) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={r0}, 0x4) 1.757315107s ago: executing program 3 (id=11470): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'hsr0\x00'}) socket$netlink(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0xfffffffffffffdd0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7fff}, 0x18) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40006, 0x520, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff01, 0x8}, 0xc4c, 0x0, 0x0, 0x0, 0x8, 0x0, 0xb, 0x0, 0x0, 0x0, 0x3fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000008000000000000005000100070000000900020073797a30000000001400078008001240000000000500150004000000050005000000000005000400000000000d000300686173683a6d6163"], 0x5c}}, 0x0) sendmsg$IPSET_CMD_ADD(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000009c0)={0x54, 0x9, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6}, @IPSET_ATTR_ADT={0x24, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @local}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x8401}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0x44000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000980)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x18) unshare(0x2000400) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) fcntl$setpipe(r3, 0x407, 0x2000000) r6 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "5d9bc136c963254c661fb620148b6f72ca6ae2a44829bfa79ec13499f8ec9077d85d879711d98bb1687ad36dfe5f14a7b0ce15c1e6be0e7ecabfdfde0dfa00b1"}, 0x48, 0xffffffffffffffff) keyctl$KEYCTL_WATCH_KEY(0x6, r6, 0xffffffffffffffff, 0xfffffffdffffffff) statx(r3, &(0x7f0000000500)='./file0\x00', 0x400, 0x1, &(0x7f0000000580)) 1.697886998s ago: executing program 3 (id=11471): bpf$MAP_CREATE(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = syz_io_uring_setup(0x3c63, &(0x7f0000000140)={0x0, 0xfffffffe, 0x10100, 0x2, 0x4000000}, 0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(0x0, r6, 0x0) io_uring_enter(r5, 0x2df0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETSF(r4, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x40, 0x80, "7a58beca39ed2d5a99bbc4bff0ebd3e9bd5a8e"}) r7 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sched_switch\x00', r9}, 0x18) unshare(0x60000480) 1.245863593s ago: executing program 7 (id=11472): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001380)={0x18, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x72, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0040, &(0x7f0000001480)={[{@errors_continue}, {@resuid}, {@noload}, {@dioread_lock}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2}}, {@lazytime}]}, 0xfe, 0x479, &(0x7f00000004c0)="$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") msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000002c0)=""/4096) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000012c0)={'erspan0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0xf100156bf4814fbb, 0x700, 0xaf07, 0x3ff, {{0x6, 0x4, 0x2, 0x37, 0x18, 0x66, 0x0, 0x1, 0x2f, 0x0, @rand_addr=0x64010102, @private=0xa010102, {[@generic={0x88, 0x4, "4de9"}]}}}}}) stat(&(0x7f0000001300)='./file0/file0\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001580)={{{@in6=@private2, @in6=@mcast1, 0x4e22, 0xd, 0x4e24, 0x2, 0x2, 0xa0, 0x0, 0x84, r3, r4}, {0x5, 0x6, 0x100000000, 0x1, 0x0, 0x10, 0x8, 0x3}, {0x0, 0x1, 0x1, 0x8}, 0xcc5, 0x6e6bb8, 0x0, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x4d3, 0x2b}, 0xa, @in6=@loopback, 0x3506, 0x1, 0x2, 0x42, 0x4, 0x93f9, 0x5}}, 0xe8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) syz_open_dev$sg(&(0x7f0000000280), 0x0, 0x0) 1.157947194s ago: executing program 7 (id=11474): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) epoll_create(0x6) ppoll(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) write$rfkill(r4, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}, 0x8) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB=',\x00\x00\x00!\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4048040}, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = dup(r5) ioctl$TIOCL_SETSEL(r6, 0x541c, &(0x7f0000001900)={0x2, {0x2, 0xa00, 0x0, 0x101, 0x100}}) 1.068916836s ago: executing program 1 (id=11476): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f00000006c0), 0x1, 0x512, &(0x7f0000000c40)="$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") r0 = open(&(0x7f0000000300)='.\x02\x00', 0x14927e, 0x44) r1 = openat(0xffffffffffffff9c, 0x0, 0x183341, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}]}, 0x34}}, 0xc800) sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x14, r2, 0xe27, 0x0, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x0) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x327d1e1e4016e9b4}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, r2, 0x400, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x80) r4 = getpid() sched_setaffinity(r4, 0x8, &(0x7f00000002c0)=0x3) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000040)) socket$nl_xfrm(0x10, 0x3, 0x6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) unshare(0x22020600) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') fallocate(r0, 0x0, 0x0, 0x1001f0) 985.179927ms ago: executing program 6 (id=11478): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) epoll_create(0x6) ppoll(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) write$rfkill(r4, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}, 0x8) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB=',\x00\x00\x00!\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4048040}, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = dup(r5) ioctl$TIOCL_SETSEL(r6, 0x541c, &(0x7f0000001900)={0x2, {0x2, 0xa00, 0x0, 0x101, 0x100}}) 807.554069ms ago: executing program 3 (id=11482): recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000280)=@rc, 0x80, &(0x7f0000000640)=[{&(0x7f0000000480)=""/176, 0xb0}, {&(0x7f0000000140)=""/54, 0x36}, {0x0}], 0x3}, 0x0) ftruncate(0xffffffffffffffff, 0x88801) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socket$inet_udplite(0x2, 0x2, 0x88) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) io_uring_setup(0x1783, &(0x7f0000000640)={0x0, 0xfffffffe, 0x800, 0x400, 0x2b4}) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x204000, 0x67) faccessat2(r0, 0x0, 0x2, 0x1300) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r1, 0x25, &(0x7f0000000000)={0x1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r2, 0x7, &(0x7f0000000380)={0x0, 0x2, 0x103fe, 0x2}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0xa, 0x4e20, 0xb4ea, @ipv4={'\x00', '\xff\xff', @local}, 0xdc88}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="140000000000000029000000080000000104000000000000c62556dbb346c8ad9eebc957fca7aef54fa4b14af1ae7226b9f7dd3cbda08a3f977a26b83a9b885cd956eac1c84f2da6d26a07cb0b918f49df5ce38b694610ea83bc1eb2113291d5ef06d9c067b9d91ff9b1c0747896dde40a79c690042c5be9ae64737892599ba6d7"], 0x18}, 0x20040080) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ifreq(r3, 0x8949, &(0x7f0000000000)={'bond0\x00', @ifru_names='erspan0\x00'}) r4 = accept4$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@id, &(0x7f0000000140)=0x10, 0x800) setsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f00000001c0)=0x3, 0x4) r5 = socket$rds(0x15, 0x5, 0x0) bind$rds(r5, &(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x2b) sendmsg$rds(r5, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0xf00, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) 806.923849ms ago: executing program 4 (id=11483): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="880000000101010100000000000000000a0000000c0019"], 0x88}}, 0x24044004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r2 = fsopen(&(0x7f0000000400)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000000240)=',-\x10*\x00', &(0x7f0000000380)='$\x00', 0x0) close(r2) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r4 = openat$selinux_policy(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r4, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[], 0xffb8) setsockopt(0xffffffffffffffff, 0x84, 0x81, &(0x7f0000000280)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x401, @loopback}], 0x1c) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f00000004c0)="240000001a005f041cf9f4070008eeff80100002024800000000000008000f4000000000", 0x24) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000200)=0x1e) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r6}, 0x18) open(&(0x7f0000000140)='./file1\x00', 0x66842, 0x21) mkdirat(0xffffffffffffffff, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="b1", 0x1, 0x400c0d4, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x60}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0x28, 0x3, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 759.10032ms ago: executing program 4 (id=11484): r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000002, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ceb000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlock(&(0x7f0000e4a000/0x1000)=nil, 0x1000) r1 = socket$unix(0x1, 0x1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0x1}, 0x18) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) munmap(&(0x7f00003fe000/0xc00000)=nil, 0xc00000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00'}, 0x10) socket$tipc(0x1e, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x169a82, 0x109) sendfile(r3, r3, 0x0, 0xb) sendmsg$NFT_BATCH(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000078000000030a01010000000000000000010000000900030073797a310000000028000480080002400000000208000140000000051400030076657468315f746f5f626174616476000900010073797a300000000008000a4000000002"], 0xc0}}, 0x8000) socket(0x10, 0x3, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) write$rfkill(0xffffffffffffffff, &(0x7f0000000080)={0x5, 0x8, 0x3, 0x1}, 0x8) 591.560282ms ago: executing program 4 (id=11485): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c000006000000000000f183850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x1c, r3, 0x65aebf9dafbebb59, 0x0, 0x0, {{}, {@val={0x8, 0x12b, 0xffffffff}, @void, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x400c080}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) r5 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x8, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r7}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) r9 = dup2(r5, r5) write$tun(r9, 0x0, 0x46) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r10 = open_tree(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x81901) move_mount(r10, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x262) 529.871103ms ago: executing program 4 (id=11486): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f00000006c0), 0x1, 0x512, &(0x7f0000000c40)="$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") r0 = open(&(0x7f0000000300)='.\x02\x00', 0x14927e, 0x44) r1 = openat(0xffffffffffffff9c, 0x0, 0x183341, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}]}, 0x34}}, 0xc800) sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x14, r2, 0xe27, 0x0, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x0) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x327d1e1e4016e9b4}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x6c, r2, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'wg0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x1}, 0x80) r4 = getpid() sched_setaffinity(r4, 0x8, &(0x7f00000002c0)=0x3) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000040)) socket$nl_xfrm(0x10, 0x3, 0x6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) unshare(0x22020600) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') fallocate(r0, 0x0, 0x0, 0x1001f0) 529.603123ms ago: executing program 4 (id=11487): socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x4, 0x20}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1, 0x1}, &(0x7f0000000100)=0x8) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$nci(r2, 0x0, 0xfffffeea) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0d0000000a00000004000000050000", @ANYRES32=r3, @ANYBLOB="000000000000000040000000000000000000000040fd697e4bcd69fe6ec75ccb421ee8a8380ed77577c058af995cdc3f3bf3938cdcfb094f103f05a6e44e37cd7c5b5440", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) r5 = open$dir(0x0, 0x0, 0x51) ioperm(0x0, 0x5, 0x9) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) modify_ldt$write(0x1, &(0x7f0000000080)={0x1000, 0x1000, 0xfffffffffffffffe}, 0x10) sendfile(0xffffffffffffffff, r5, 0x0, 0xe065) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x2) write$binfmt_aout(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="03040000b500000000000000feefffff"], 0xc8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="d800000010008104687da3aa7143a0b8c81d080b25000000e8fe55a11800150006001400000000120800030043000040a8002b000a00014006046109d67f6f94007134cf6ee0a000a0e408e8d8ef52a9d7c7c0b7a196e6f66112c88a2ddddbbb219c6c09136dd481c4a918d1bcf0f938baa5d060a517898516277ce06bbace80177ccbec4c2ee5a7cef4260027836b0d17a58af5d6d93424841f468430dfe1d9d322fe7c0aaa16b8ddc64193071e9f8775730d16a4683f785025ccc89e00360db70100000040fad95667e006dcabced7ad654fac9609f4fb", 0xd8}], 0x1}, 0x4004) 520.111023ms ago: executing program 4 (id=11488): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) epoll_create(0x6) ppoll(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) write$rfkill(r4, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}, 0x8) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB=',\x00\x00\x00!\x00'], 0x2c}, 0x1, 0x0, 0x0, 0x4048040}, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = dup(r5) ioctl$TIOCL_SETSEL(r6, 0x541c, &(0x7f0000001900)={0x2, {0x2, 0xa00, 0x0, 0x101, 0x100}}) 349.188815ms ago: executing program 7 (id=11489): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) semtimedop(0x0, &(0x7f00000003c0)=[{0x2, 0x4, 0x1800}], 0x1, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x2}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/rt_acct\x00') connect$pppoe(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x44000) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000280)=0x1, 0x4) r1 = io_uring_setup(0x3eaf, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x15) mkdir(&(0x7f0000000080)='./file0\x00', 0x83) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r2}, &(0x7f0000000400), &(0x7f0000000440)=r3}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000100)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x101400, 0x13) umount2(&(0x7f00000002c0)='./file0\x00', 0x2) 242.847927ms ago: executing program 7 (id=11490): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000100)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x8020) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@mcast2, @in=@multicast1, 0x2000, 0x4, 0x4e22, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}, {0x1, 0x7fffffff, 0x100000000, 0x800000000000006, 0x1, 0x400004, 0x4}, {0x1, 0x8, 0x0, 0x7}, 0xe, 0x0, 0x1, 0x0, 0x3}, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x0, 0x32}, 0x2, @in6=@dev={0xfe, 0x80, '\x00', 0x35}, 0xfffffffe, 0x4, 0x2, 0x0, 0xfffffffc, 0x6}}, 0xe8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000004000000baed0000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe3, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'nr0\x00'}) syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xfffffffd, @loopback}, 0x1c) 242.533307ms ago: executing program 7 (id=11491): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f00000001c0)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}]}, &(0x7f0000000300)='GPL\x00', 0x9, 0x1, &(0x7f0000000340)=""/1, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) io_submit(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f0000000400)='./file0\x00', 0x410c84, &(0x7f00000003c0)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4}}]}, 0x1, 0x775, &(0x7f0000001180)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x88882, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = inotify_init() r4 = creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) r5 = inotify_add_watch(r3, &(0x7f0000000240)='./file0\x00', 0x8c7) write$binfmt_elf32(r4, &(0x7f0000000040)=ANY=[@ANYRES64=r5], 0x69) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007000000181100", @ANYBLOB="0000000000000000b7"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(r4) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0xc, &(0x7f0000000680)=ANY=[@ANYRESOCT=r6, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r7 = openat$binfmt_register(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) write$binfmt_register(r7, &(0x7f0000000000)={0x3a, 'syz3', 0x3a, 'E', 0x3a, 0x6, 0x3a, 'E', 0x3a, '@{@$\x9a$^', 0x3a, './file2', 0x3a, [0x46, 0x43, 0x43]}, 0x32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write(r2, &(0x7f0000004200)='t', 0x1) sendfile(r2, r1, 0x0, 0x3ffff) sendfile(r2, r1, 0x0, 0x7ffff000) 173.818037ms ago: executing program 1 (id=11492): r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='veth0\x00', 0x10) r1 = socket$netlink(0x10, 0x3, 0x8000000004) r2 = bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x4, &(0x7f00000001c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = perf_event_open(&(0x7f0000000380)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xece7, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x1007, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r4, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc7d7}, 0x0, 0x0, r4, 0xa) r5 = socket$inet_dccp(0x2, 0x6, 0x0) recvfrom$inet(r5, &(0x7f00000004c0)=""/186, 0xba, 0x2100, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) r7 = socket$inet_udp(0x2, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) mlock2(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0) munlockall() setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x0, 0x11, 0x148, 0x0, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}, {0x0, 0x0, 0x81}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) socket$packet(0x11, 0x3, 0x300) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @broadcast, @multicast2}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@empty, @in6=@local, 0x4e23, 0x1, 0x4e21, 0x1ff, 0xa, 0xa0, 0x20, 0x1, r8, 0xffffffffffffffff}, {0x80, 0xfdaa, 0xa1, 0x7, 0x69325a3e, 0x5b2, 0x5, 0x7fff}, {0x10000, 0x6, 0x7fff, 0x80000000}, 0x3, 0x6e6bb8, 0x1, 0x1, 0x1, 0x1}, {{@in6=@dev={0xfe, 0x80, '\x00', 0x16}, 0x4d3, 0x33}, 0x2, @in=@rand_addr=0x64010102, 0x3500, 0x3, 0x3, 0x6, 0x9, 0xfffffffb, 0x54b}}, 0xe8) writev(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)="580000001500add427323b472545b45602117fffffff81000e224e217f000001925aa80020007b00090080007f000001e809000000ff0000f03ac71006000000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 173.316387ms ago: executing program 1 (id=11493): syz_mount_image$iso9660(&(0x7f00000025c0), &(0x7f0000000800)='./file0\x00', 0x221488e, &(0x7f00000002c0)=ANY=[], 0xfd, 0x6c8, &(0x7f0000000840)="$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") socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) socket(0x28, 0x5, 0x0) socket(0x28, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0x1, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x5f8, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) vmsplice(r2, &(0x7f00000005c0)=[{&(0x7f0000000180)="04", 0x1}], 0x1, 0x6) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, 0x0) write(r0, 0x0, 0x0) getpid() syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @broadcast, @void, {@ipv4={0x800, @dccp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x12}, {[@noop, @ssrr={0x89, 0x3, 0x63}]}}, {{0xffff, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, "0bc0f7", 0x0, "de9560"}}}}}}, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x2c, r6, 0x301, 0x0, 0x25dfdbfb, {0x1c}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}]}]}, 0x2c}}, 0x40006) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xe942, 0x0) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r7, 0x5425, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 128.190718ms ago: executing program 6 (id=11494): r0 = openat(0xffffffffffffff9c, 0x0, 0x2c41, 0x24) flock(r0, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) flock(r1, 0x1) unshare(0x20000600) socket$packet(0x11, 0x2, 0x300) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r3, &(0x7f0000000080), 0x1c) recvmmsg(r3, &(0x7f0000000a40)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000b00)=""/81, 0x51}], 0x1}}], 0x1, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) recvfrom$inet6(r3, 0x0, 0x0, 0x2, 0x0, 0x0) flock(r1, 0x2) 99.847689ms ago: executing program 6 (id=11495): openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="1c0000001a009b8a140000003b9b301f00"/28, 0x1c) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) lsetxattr$security_selinux(&(0x7f0000000400)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)='system_u:object_r:user_cron_spool_t:s0\x00', 0x27, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write(r2, &(0x7f00000004c0)="5fc3a42b54c06336aba24960fc3a8dc7de4769061356a7cb1c699037403f9351c3c3e60b367a26afbf02a077544d8531d9ffc72e33b43119e034258f8886ed2b952e3e023201242cb640543d217d53b70531b556c7d456d1235fee9b697764ab863e604aaf43268ae3e5e66a20001a69b4d39dd95b4608dc410b35d8d3666752ddb53a66aa7cf4", 0x87) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) set_mempolicy(0x4, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x480, &(0x7f0000000000), 0x1, 0x786, &(0x7f0000000f80)="$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") bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r4}, 0x10) syslog(0x2, &(0x7f0000001940)=""/94, 0x5e) unlinkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x0) syz_open_dev$loop(&(0x7f0000000100), 0xd79, 0x0) 0s ago: executing program 6 (id=11496): r0 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x24) flock(r0, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) flock(r1, 0x1) unshare(0x20000600) socket$packet(0x11, 0x2, 0x300) gettid() timer_create(0x0, 0x0, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) recvmmsg(r2, &(0x7f0000000a40)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000b00)=""/81, 0x51}], 0x1}}], 0x1, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) recvfrom$inet6(r2, 0x0, 0x0, 0x2, 0x0, 0x0) flock(r1, 0x2) kernel console output (not intermixed with test programs): chr_file permissive=1 [ 376.865680][T26055] smc: net device bond0 applied user defined pnetid SYZ0 [ 376.882477][T26055] smc: net device bond0 erased user defined pnetid SYZ0 [ 376.897138][ T29] audit: type=1400 audit(1746354967.894:21865): avc: denied { write } for pid=26050 comm="syz.6.8496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 376.952460][ T29] audit: type=1400 audit(1746354967.894:21866): avc: denied { nlmsg_write } for pid=26050 comm="syz.6.8496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 377.021419][ T29] audit: type=1400 audit(1746354967.984:21867): avc: denied { create } for pid=26058 comm="syz.6.8499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 377.041112][ T29] audit: type=1400 audit(1746354967.994:21868): avc: denied { connect } for pid=26058 comm="syz.6.8499" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 377.061753][ T29] audit: type=1400 audit(1746354968.004:21869): avc: denied { ioctl } for pid=26058 comm="syz.6.8499" path="socket:[82688]" dev="sockfs" ino=82688 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 377.086569][ T29] audit: type=1400 audit(1746354968.004:21870): avc: denied { write } for pid=26058 comm="syz.6.8499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 377.155737][T26067] SELinux: failed to load policy [ 377.174297][ T29] audit: type=1400 audit(1746354968.154:21871): avc: denied { load_policy } for pid=26064 comm="syz.6.8503" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 377.329774][T26087] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8511'. [ 377.347720][T26087] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8511'. [ 377.362112][ T29] audit: type=1400 audit(1746354968.364:21872): avc: denied { write } for pid=26088 comm="syz.7.8512" name="cgroup.subtree_control" dev="cgroup2" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 377.519181][T26110] netlink: 71 bytes leftover after parsing attributes in process `syz.3.8522'. [ 377.562485][T26114] netlink: 8 bytes leftover after parsing attributes in process `syz.7.8524'. [ 377.574955][T26114] netlink: 972 bytes leftover after parsing attributes in process `syz.7.8524'. [ 378.186651][T26137] netlink: 'syz.4.8530': attribute type 10 has an invalid length. [ 378.194800][T26137] netlink: 40 bytes leftover after parsing attributes in process `syz.4.8530'. [ 378.218376][T26137] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 378.226706][T26137] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 378.240283][T26137] team0: Failed to send port change of device geneve1 via netlink (err -105) [ 378.243635][T26139] netlink: 71 bytes leftover after parsing attributes in process `syz.6.8534'. [ 378.251331][T26137] team0: Failed to send options change via netlink (err -105) [ 378.265707][T26137] team0: Port device geneve1 added [ 378.280902][T26132] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 378.311180][T26141] syzkaller0: entered allmulticast mode [ 378.327198][T26141] syzkaller0: entered promiscuous mode [ 378.336918][T26141] syzkaller0 (unregistering): left promiscuous mode [ 378.344488][T26141] syzkaller0 (unregistering): left allmulticast mode [ 378.413326][T26132] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 378.436898][T26160] netlink: 'syz.1.8543': attribute type 10 has an invalid length. [ 378.453843][T26160] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 378.479523][T26132] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 378.492518][T26132] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 378.506009][T26132] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 378.527398][T26132] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 378.556129][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x1 [ 378.564096][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.571923][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.579698][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.591717][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.599902][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.609592][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.617406][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.625796][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.633663][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x2 [ 378.641570][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.649340][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.657691][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.665797][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.673589][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.682209][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.690222][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.697997][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.705846][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.714241][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.722263][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.730330][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.738090][T26180] binfmt_misc: register: failed to install interpreter file ./file2 [ 378.746703][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.754599][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.762431][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.771105][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.778929][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.786790][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.787202][T26185] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8552'. [ 378.794658][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.794687][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.794708][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.794730][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.835868][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.843775][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.851644][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.859422][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.867845][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.867876][T26189] netlink: 'syz.4.8555': attribute type 11 has an invalid length. [ 378.875641][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.875670][ T9934] hid-generic 0000:0000:20000000.001B: unknown main item tag 0x0 [ 378.879186][ T9934] hid-generic 0000:0000:20000000.001B: hidraw0: HID v0.01 Device [syz0] on syz1 [ 378.884358][T26189] netlink: 448 bytes leftover after parsing attributes in process `syz.4.8555'. [ 379.647939][T26251] netlink: 'syz.1.8581': attribute type 1 has an invalid length. [ 379.678916][T26254] SELinux: policydb version 0 does not match my version range 15-34 [ 379.697760][T26254] SELinux: failed to load policy [ 379.790788][T26260] vhci_hcd: invalid port number 96 [ 379.796025][T26260] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 380.288811][T26285] IPVS: Unknown mcast interface: vcan0 [ 380.316415][T26289] pim6reg1: entered promiscuous mode [ 380.322091][T26289] pim6reg1: entered allmulticast mode [ 380.724818][T26318] sch_tbf: burst 0 is lower than device lo mtu (18) ! [ 380.944101][T26341] SELinux: ebitmap: truncated map [ 380.952135][T26341] SELinux: failed to load policy [ 380.981138][T26343] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 381.036984][T26343] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 381.085149][T26343] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 381.165232][T26343] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 381.237502][T26343] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 381.260974][T26343] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 381.273430][T26343] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 381.285839][T26343] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 381.383932][T26356] __nla_validate_parse: 4 callbacks suppressed [ 381.383949][T26356] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8624'. [ 381.410872][T26356] bridge_slave_1: left allmulticast mode [ 381.416582][T26356] bridge_slave_1: left promiscuous mode [ 381.422463][T26356] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.435090][T26356] bridge_slave_0: left allmulticast mode [ 381.441085][T26356] bridge_slave_0: left promiscuous mode [ 381.446815][T26356] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.495913][T26365] 9pnet: p9_errstr2errno: server reported unknown error 18446744073709 [ 381.738081][ T29] kauditd_printk_skb: 140 callbacks suppressed [ 381.738099][ T29] audit: type=1400 audit(1746354972.734:22013): avc: denied { ioctl } for pid=26384 comm="syz.1.8637" path="socket:[84630]" dev="sockfs" ino=84630 ioctlcmd=0x48d2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 381.795361][T26388] tipc: Enabled bearer , priority 0 [ 381.803175][T26388] tipc: Disabling bearer [ 381.829630][ T29] audit: type=1400 audit(1746354972.824:22014): avc: denied { read append } for pid=26378 comm="syz.6.8644" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 381.854848][ T29] audit: type=1400 audit(1746354972.824:22015): avc: denied { open } for pid=26378 comm="syz.6.8644" path="/dev/sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 381.879229][ T29] audit: type=1400 audit(1746354972.864:22016): avc: denied { write } for pid=26378 comm="syz.6.8644" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 381.958814][ T29] audit: type=1400 audit(1746354972.954:22017): avc: denied { create } for pid=26394 comm="syz.1.8641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 381.982019][ T29] audit: type=1400 audit(1746354972.954:22018): avc: denied { connect } for pid=26394 comm="syz.1.8641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 382.160396][T13442] page_pool_release_retry() stalled pool shutdown: id 176, 2 inflight 60 sec [ 382.238247][ T29] audit: type=1400 audit(1746354973.234:22019): avc: denied { mounton } for pid=26401 comm="syz.7.8645" path="/1662/bus" dev="tmpfs" ino=8690 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 382.272249][ T29] audit: type=1400 audit(1746354973.274:22020): avc: denied { unmount } for pid=4969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 382.297637][ T29] audit: type=1400 audit(1746354973.294:22021): avc: denied { create } for pid=26403 comm="syz.7.8646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 382.322006][ T29] audit: type=1400 audit(1746354973.294:22022): avc: denied { create } for pid=26403 comm="syz.7.8646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 382.404113][T26408] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 382.544452][T26417] tipc: Enabled bearer , priority 0 [ 382.555883][T26417] tipc: Disabling bearer [ 382.646511][T26423] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 383.463099][T26457] syzkaller0: entered promiscuous mode [ 383.468647][T26457] syzkaller0: entered allmulticast mode [ 383.541177][T26463] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8670'. [ 383.612653][T26474] pim6reg1: entered promiscuous mode [ 383.618066][T26474] pim6reg1: entered allmulticast mode [ 383.791527][T26485] ÿÿÿÿ: entered allmulticast mode [ 383.796757][T26485] tunl0: entered allmulticast mode [ 383.802299][T26485] gre0: entered allmulticast mode [ 383.807398][T26485] gretap0: entered allmulticast mode [ 383.813060][T26485] erspan0: entered allmulticast mode [ 383.818475][T26485] ip_vti0: entered allmulticast mode [ 383.823913][T26485] ip6_vti0: entered allmulticast mode [ 383.829375][T26485] sit0: entered allmulticast mode [ 383.834597][T26485] ip6tnl0: entered allmulticast mode [ 383.840035][T26485] ip6gre0: entered allmulticast mode [ 383.845604][T26485] ip6gretap0: entered allmulticast mode [ 383.934952][T26485] nlmon0: entered allmulticast mode [ 383.940476][T26485] vxcan0: entered allmulticast mode [ 383.945737][T26485] vxcan1: entered allmulticast mode [ 383.951115][T26485] wg1: entered allmulticast mode [ 384.028760][T26485] wg2: left promiscuous mode [ 384.042863][T26485] veth1_to_bridge: entered allmulticast mode [ 384.049028][T26485] bridge_slave_1: entered allmulticast mode [ 384.055208][T26485] veth0_to_bond: entered allmulticast mode [ 384.061154][T26485] bond_slave_0: entered allmulticast mode [ 384.067089][T26485] veth1_to_bond: entered allmulticast mode [ 384.072998][T26485] bond_slave_1: entered allmulticast mode [ 384.078826][T26485] veth0_to_team: entered allmulticast mode [ 384.084762][T26485] team_slave_0: entered allmulticast mode [ 384.090711][T26485] veth1_to_team: entered allmulticast mode [ 384.096622][T26485] team_slave_1: entered allmulticast mode [ 384.102513][T26485] veth0_to_batadv: entered allmulticast mode [ 384.108562][T26485] batadv_slave_0: entered allmulticast mode [ 384.114657][T26485] veth1_to_batadv: entered allmulticast mode [ 384.120847][T26485] batadv_slave_1: entered allmulticast mode [ 384.126852][T26485] xfrm0: entered allmulticast mode [ 384.132103][T26485] veth0_to_hsr: entered allmulticast mode [ 384.137888][T26485] hsr_slave_0: entered allmulticast mode [ 384.143651][T26485] veth1_virt_wifi: entered allmulticast mode [ 384.149745][T26485] veth0_virt_wifi: entered allmulticast mode [ 384.155876][T26485] geneve0: entered allmulticast mode [ 384.161291][T26485] geneve1: entered allmulticast mode [ 384.166736][T26485] bridge1: entered allmulticast mode [ 384.172195][T26485] veth2: entered allmulticast mode [ 384.177390][T26485] veth3: entered allmulticast mode [ 384.182587][T26485] ip6gre1: entered allmulticast mode [ 384.187936][T26485] veth4: entered allmulticast mode [ 384.193210][T26485] veth5: entered allmulticast mode [ 384.198420][T26485] gretap1: entered allmulticast mode [ 384.203850][T26485] bridge2: entered allmulticast mode [ 384.209260][T26485] veth6: entered allmulticast mode [ 384.214509][T26485] veth7: entered allmulticast mode [ 384.219775][T26485] bridge3: entered allmulticast mode [ 384.225231][T26485] bridge4: entered allmulticast mode [ 384.230676][T26485] ip6tnl1: entered allmulticast mode [ 384.236103][T26485] veth8: entered allmulticast mode [ 384.241511][T26485] veth9: entered allmulticast mode [ 384.246817][T26485] veth10: entered allmulticast mode [ 384.252179][T26485] veth11: entered allmulticast mode [ 384.257438][T26485] bridge5: entered allmulticast mode [ 384.262979][T26485] gre1: entered allmulticast mode [ 384.268075][T26485] veth12: entered allmulticast mode [ 384.273439][T26485] veth13: entered allmulticast mode [ 384.278774][T26485] bridge6: entered allmulticast mode [ 384.284314][T26485] gre2: entered allmulticast mode [ 384.289531][T26485] gre3: entered allmulticast mode [ 384.294696][T26485] bridge7: entered allmulticast mode [ 384.300060][T26485] sit1: entered allmulticast mode [ 384.305211][T26485] bridge8: entered allmulticast mode [ 384.310619][T26485] bridge9: entered allmulticast mode [ 384.316011][T26485] bond0: entered allmulticast mode [ 384.321353][T26485] ip6gre2: entered allmulticast mode [ 384.326846][T26485] bridge10: entered allmulticast mode [ 384.332424][T26485] veth14: entered allmulticast mode [ 384.337765][T26485] veth15: entered allmulticast mode [ 384.343157][T26485] ip6_vti1: entered allmulticast mode [ 384.348891][T26485] netdevsim netdevsim7 eth0: entered allmulticast mode [ 384.356084][T26485] netdevsim netdevsim7 eth1: entered allmulticast mode [ 384.363082][T26485] netdevsim netdevsim7 eth2: entered allmulticast mode [ 384.370022][T26485] netdevsim netdevsim7 eth3: entered allmulticast mode [ 384.377284][T26485] veth0: entered allmulticast mode [ 384.382507][T26485] veth1: entered allmulticast mode [ 384.636506][T26499] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 384.646541][T13439] kernel write not supported for file /3844/comm (pid: 13439 comm: kworker/0:11) [ 384.983591][T26529] IPv4: Oversized IP packet from 127.202.26.0 [ 385.531454][T26545] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 385.671144][T26553] ref_ctr_offset mismatch. inode: 0xd1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x8 [ 385.694964][T26550] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 385.708508][T13433] IPVS: starting estimator thread 0... [ 385.800967][T26557] IPVS: using max 2784 ests per chain, 139200 per kthread [ 386.058335][T26581] ref_ctr increment failed for inode: 0x694 offset: 0x9 ref_ctr_offset: 0x82 of mm: 0xffff888118fadd80 [ 386.071309][T26580] uprobe: syz.6.8715:26580 failed to unregister, leaking uprobe [ 386.217674][T26589] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8719'. [ 386.337726][T26600] batman_adv: Cannot find parent device. Skipping batadv-on-batadv check for ip6gretap1 [ 386.918947][ T29] kauditd_printk_skb: 143 callbacks suppressed [ 386.918964][ T29] audit: type=1326 audit(1746354977.914:22166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26630 comm="syz.4.8735" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f2bd381e969 code=0x0 [ 386.954871][ T29] audit: type=1400 audit(1746354977.954:22167): avc: denied { read } for pid=26632 comm="syz.1.8745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 387.002823][T26634] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8735'. [ 387.065535][ T29] audit: type=1326 audit(1746354978.064:22168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26638 comm="syz.1.8737" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 387.104542][ T29] audit: type=1326 audit(1746354978.094:22169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26638 comm="syz.1.8737" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 387.160420][ T29] audit: type=1326 audit(1746354978.104:22170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26638 comm="syz.1.8737" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 387.184156][ T29] audit: type=1326 audit(1746354978.104:22171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26638 comm="syz.1.8737" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 387.207750][ T29] audit: type=1326 audit(1746354978.134:22172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26638 comm="syz.1.8737" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 387.231417][ T29] audit: type=1326 audit(1746354978.134:22173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26638 comm="syz.1.8737" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 387.255075][ T29] audit: type=1326 audit(1746354978.144:22174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26638 comm="syz.1.8737" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 387.278797][ T29] audit: type=1326 audit(1746354978.144:22175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26638 comm="syz.1.8737" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 387.354109][T26643] siw: device registration error -23 [ 387.821823][T26670] vlan0: entered allmulticast mode [ 387.830461][T26672] xt_hashlimit: size too large, truncated to 1048576 [ 387.837194][T26672] xt_hashlimit: Unknown mode mask 80FF, kernel too old? [ 388.086445][T26679] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 388.552974][T26699] xt_hashlimit: size too large, truncated to 1048576 [ 389.006605][T26718] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8771'. [ 389.030235][T26718] netlink: 972 bytes leftover after parsing attributes in process `syz.4.8771'. [ 389.189567][T26728] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8774'. [ 390.385639][T26806] pim6reg1: entered promiscuous mode [ 390.391641][T26806] pim6reg1: entered allmulticast mode [ 390.421830][T26812] vhci_hcd vhci_hcd.0: pdev(7) rhport(0) sockfd(3) [ 390.428432][T26812] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 390.436730][T26812] vhci_hcd vhci_hcd.0: Device attached [ 390.554069][T26813] vhci_hcd: cannot find a urb of seqnum 1996056727 max seqnum 0 [ 390.562054][ T6814] vhci_hcd: stop threads [ 390.566350][ T6814] vhci_hcd: release socket [ 390.570991][ T6814] vhci_hcd: disconnect device [ 390.620209][ T9934] vhci_hcd: vhci_device speed not set [ 390.674448][T26827] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 391.019040][T26835] netlink: 'syz.3.8816': attribute type 13 has an invalid length. [ 391.088910][T26835] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 391.103653][T26835] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 391.132748][T26835] netdevsim netdevsim3 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 391.141446][T26835] netdevsim netdevsim3 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 391.149827][T26835] netdevsim netdevsim3 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 391.158281][T26835] netdevsim netdevsim3 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 391.530541][T26880] ref_ctr_offset mismatch. inode: 0x6e8 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0xa [ 391.631122][T26884] netlink: 'syz.4.8837': attribute type 27 has an invalid length. [ 391.690736][T26884] !: left promiscuous mode [ 391.710628][T26884] 0ªX¹¦À: left allmulticast mode [ 391.717020][T26884] wg2: left promiscuous mode [ 391.721796][T26884] wg2: left allmulticast mode [ 391.740571][T26884] netdevsim netdevsim4 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 391.749152][T26884] netdevsim netdevsim4 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 391.757678][T26884] netdevsim netdevsim4 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 391.766239][T26884] netdevsim netdevsim4 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 391.827838][T26884] bond2: left promiscuous mode [ 391.832708][T26884] bond2: left allmulticast mode [ 391.852865][T26884] ip6gre2: left allmulticast mode [ 391.864018][T26887] tipc: Cannot configure node identity twice [ 391.892453][T26891] pim6reg1: entered promiscuous mode [ 391.897805][T26891] pim6reg1: entered allmulticast mode [ 391.989585][ T29] kauditd_printk_skb: 139 callbacks suppressed [ 391.989601][ T29] audit: type=1400 audit(1746354982.984:22315): avc: denied { bind } for pid=26902 comm="syz.4.8844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 392.047851][T26905] pim6reg1: entered promiscuous mode [ 392.053580][T26905] pim6reg1: entered allmulticast mode [ 392.094308][T26903] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 392.175539][T26913] ip6gre1: entered allmulticast mode [ 392.241601][ T29] audit: type=1400 audit(1746354983.244:22316): avc: denied { sqpoll } for pid=26923 comm="syz.7.8852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 392.262727][T26928] dns_resolver: Unsupported server list version (0) [ 392.278517][ T29] audit: type=1400 audit(1746354983.274:22317): avc: denied { read } for pid=26930 comm="syz.4.8855" name="nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 392.328293][T26934] tipc: Enabled bearer , priority 0 [ 392.340274][ T29] audit: type=1400 audit(1746354983.304:22318): avc: denied { open } for pid=26930 comm="syz.4.8855" path="/dev/nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 392.365042][T26922] tipc: Resetting bearer [ 392.376363][T26933] SELinux: ebitmap: truncated map [ 392.383095][T26933] SELinux: failed to load policy [ 392.389405][T26922] tipc: Disabling bearer [ 392.470234][ T29] audit: type=1400 audit(1746354983.464:22319): avc: denied { kexec_image_load } for pid=26938 comm="syz.3.8858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 392.561198][T26948] netlink: 24 bytes leftover after parsing attributes in process `syz.3.8862'. [ 392.562267][ T29] audit: type=1400 audit(1746354983.554:22320): avc: denied { write } for pid=26945 comm="syz.1.8861" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 392.591985][ T29] audit: type=1400 audit(1746354983.554:22321): avc: denied { open } for pid=26945 comm="syz.1.8861" path="/412/file0" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 392.644715][T26953] netlink: 28 bytes leftover after parsing attributes in process `syz.3.8865'. [ 392.654084][T26953] netlink: 28 bytes leftover after parsing attributes in process `syz.3.8865'. [ 392.665828][T26953] ip6gretap0: entered promiscuous mode [ 392.673527][T26953] syz_tun: entered promiscuous mode [ 392.681815][T26953] hsr1: Slave A (ip6gretap0) is not up; please bring it up to get a fully working HSR network [ 392.692254][T26953] hsr1: Slave B (syz_tun) is not up; please bring it up to get a fully working HSR network [ 392.736004][T26957] pim6reg1: entered promiscuous mode [ 392.742136][T26957] pim6reg1: entered allmulticast mode [ 392.860744][T26961] Falling back ldisc for ttyS3. [ 392.969570][ T29] audit: type=1326 audit(1746354983.964:22322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26965 comm="syz.1.8869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 392.993661][ T29] audit: type=1326 audit(1746354983.964:22323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26965 comm="syz.1.8869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 393.017618][ T29] audit: type=1326 audit(1746354983.964:22324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26965 comm="syz.1.8869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 393.286722][T26983] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 394.053420][T27024] serio: Serial port ptm0 [ 394.128126][T27034] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 394.675120][T27073] syzkaller0: entered promiscuous mode [ 394.680683][T27073] syzkaller0: entered allmulticast mode [ 394.793797][T27086] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 394.799775][T27086] syzkaller0: Linktype set failed because interface is up [ 395.621889][T27127] syzkaller0: entered promiscuous mode [ 395.627489][T27127] syzkaller0: entered allmulticast mode [ 395.750419][T27131] Falling back ldisc for ttyS3. [ 395.887424][T27150] syzkaller0: entered promiscuous mode [ 395.892974][T27150] syzkaller0: entered allmulticast mode [ 396.566885][T27218] pim6reg1: entered promiscuous mode [ 396.572382][T27218] pim6reg1: entered allmulticast mode [ 396.634125][T27226] pim6reg1: entered promiscuous mode [ 396.639581][T27226] pim6reg1: entered allmulticast mode [ 396.997761][ T29] kauditd_printk_skb: 1099 callbacks suppressed [ 396.997777][ T29] audit: type=1400 audit(1746354987.994:23424): avc: denied { create } for pid=27272 comm="syz.4.8999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 397.025823][ T29] audit: type=1400 audit(1746354987.994:23425): avc: denied { create } for pid=27272 comm="syz.4.8999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 397.046617][ T29] audit: type=1400 audit(1746354987.994:23426): avc: denied { create } for pid=27272 comm="syz.4.8999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 397.067278][ T29] audit: type=1400 audit(1746354987.994:23427): avc: denied { create } for pid=27272 comm="syz.4.8999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 397.092850][ T29] audit: type=1400 audit(1746354988.044:23428): avc: denied { map_create } for pid=27275 comm="syz.4.9000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.112306][ T29] audit: type=1400 audit(1746354988.044:23429): avc: denied { prog_load } for pid=27275 comm="syz.4.9000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.131641][ T29] audit: type=1400 audit(1746354988.044:23430): avc: denied { prog_load } for pid=27275 comm="syz.4.9000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.288271][ T29] audit: type=1400 audit(1746354988.284:23431): avc: denied { map_create } for pid=27278 comm="syz.4.9001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.311591][ T29] audit: type=1400 audit(1746354988.284:23432): avc: denied { prog_load } for pid=27278 comm="syz.4.9001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 397.331629][ T29] audit: type=1400 audit(1746354988.284:23433): avc: denied { prog_load } for pid=27278 comm="syz.4.9001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 398.614097][T27394] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 398.708885][T27402] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 401.340908][T27546] syzkaller0: entered promiscuous mode [ 401.346469][T27546] syzkaller0: entered allmulticast mode [ 401.526472][T27559] pim6reg1: entered promiscuous mode [ 401.532553][T27559] pim6reg1: entered allmulticast mode [ 401.759364][T27583] IPVS: set_ctl: invalid protocol: 12 172.20.20.13:20004 [ 402.002514][ T29] kauditd_printk_skb: 675 callbacks suppressed [ 402.002608][ T29] audit: type=1400 audit(1746354993.004:24109): avc: denied { map_create } for pid=27601 comm="syz.6.9143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 402.050781][ T29] audit: type=1400 audit(1746354993.004:24110): avc: denied { prog_load } for pid=27601 comm="syz.6.9143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 402.091706][ T29] audit: type=1400 audit(1746354993.094:24111): avc: denied { read write } for pid=4969 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 402.126913][ T29] audit: type=1400 audit(1746354993.124:24112): avc: denied { prog_load } for pid=27608 comm="syz.7.9145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 402.183347][ T29] audit: type=1400 audit(1746354993.124:24113): avc: denied { map_create } for pid=27608 comm="syz.7.9145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 402.203334][ T29] audit: type=1400 audit(1746354993.124:24114): avc: denied { prog_load } for pid=27608 comm="syz.7.9145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 402.222647][ T29] audit: type=1400 audit(1746354993.124:24115): avc: denied { prog_load } for pid=27608 comm="syz.7.9145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 402.242534][ T29] audit: type=1400 audit(1746354993.144:24116): avc: denied { read write } for pid=4969 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 402.267059][ T29] audit: type=1400 audit(1746354993.154:24117): avc: denied { mounton } for pid=27612 comm="syz.7.9146" path="/1779/file0" dev="tmpfs" ino=9299 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 402.290583][ T29] audit: type=1400 audit(1746354993.174:24118): avc: denied { read write } for pid=4969 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 402.354785][T27616] syzkaller0: entered promiscuous mode [ 403.834479][T27700] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 405.005647][T27777] netlink: 'syz.3.9219': attribute type 29 has an invalid length. [ 405.013703][T27777] netlink: 8 bytes leftover after parsing attributes in process `syz.3.9219'. [ 405.027284][T27776] netlink: 8 bytes leftover after parsing attributes in process `syz.6.9221'. [ 406.016558][T27843] pim6reg1: entered promiscuous mode [ 406.022074][T27843] pim6reg1: entered allmulticast mode [ 406.769676][T27886] pim6reg1: entered promiscuous mode [ 406.775070][T27886] pim6reg1: entered allmulticast mode [ 406.949224][T27914] pim6reg1: entered promiscuous mode [ 406.954750][T27914] pim6reg1: entered allmulticast mode [ 407.014577][ T29] kauditd_printk_skb: 794 callbacks suppressed [ 407.014595][ T29] audit: type=1400 audit(1746354998.014:24913): avc: denied { prog_load } for pid=27927 comm="syz.7.9284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 407.045540][ T29] audit: type=1400 audit(1746354998.014:24914): avc: denied { prog_load } for pid=27927 comm="syz.7.9284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 407.086453][ T29] audit: type=1400 audit(1746354998.064:24915): avc: denied { mounton } for pid=27929 comm="syz.6.9285" path="/457/file0" dev="tmpfs" ino=2405 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 407.109412][ T29] audit: type=1400 audit(1746354998.064:24916): avc: denied { mounton } for pid=27929 comm="syz.6.9285" path="/457/file0" dev="tmpfs" ino=2405 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 407.132322][ T29] audit: type=1400 audit(1746354998.064:24917): avc: denied { mounton } for pid=27929 comm="syz.6.9285" path="/457/file0/file0" dev="tmpfs" ino=2406 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 407.155865][ T29] audit: type=1400 audit(1746354998.064:24918): avc: denied { mounton } for pid=27929 comm="syz.6.9285" path="/457/file0/file1" dev="tmpfs" ino=2407 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 407.179324][ T29] audit: type=1400 audit(1746354998.064:24919): avc: denied { mounton } for pid=27929 comm="syz.6.9285" path="/457/file0/file0" dev="tmpfs" ino=2406 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 407.202726][ T29] audit: type=1400 audit(1746354998.064:24920): avc: denied { remount } for pid=27929 comm="syz.6.9285" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 407.222726][ T29] audit: type=1400 audit(1746354998.074:24921): avc: denied { prog_load } for pid=27933 comm="syz.3.9287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 407.241966][ T29] audit: type=1400 audit(1746354998.084:24922): avc: denied { prog_load } for pid=27931 comm="syz.1.9286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 408.625345][T27998] syzkaller0: entered promiscuous mode [ 408.630931][T27998] syzkaller0: entered allmulticast mode [ 409.168705][T28029] syzkaller0: entered promiscuous mode [ 409.174312][T28029] syzkaller0: entered allmulticast mode [ 409.546483][T28055] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 410.281095][T28085] netlink: 16 bytes leftover after parsing attributes in process `syz.1.9347'. [ 410.985492][T28142] serio: Serial port ptm2 [ 411.348888][T28151] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 412.249153][ T29] kauditd_printk_skb: 1070 callbacks suppressed [ 412.249170][ T29] audit: type=1400 audit(1746355003.244:25993): avc: denied { open } for pid=28195 comm="syz.4.9391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 412.333008][ T29] audit: type=1400 audit(1746355003.244:25994): avc: denied { allowed } for pid=28195 comm="syz.4.9391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 412.340967][T28202] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 412.353086][ T29] audit: type=1400 audit(1746355003.244:25995): avc: denied { create } for pid=28195 comm="syz.4.9391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=0 [ 412.378230][ T29] audit: type=1400 audit(1746355003.244:25996): avc: denied { create } for pid=28195 comm="syz.4.9391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=0 [ 412.398652][ T29] audit: type=1400 audit(1746355003.264:25997): avc: denied { open } for pid=28197 comm="syz.4.9392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 412.418157][ T29] audit: type=1400 audit(1746355003.264:25998): avc: denied { map_create } for pid=28197 comm="syz.4.9392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 412.438096][ T29] audit: type=1400 audit(1746355003.264:25999): avc: denied { prog_load } for pid=28197 comm="syz.4.9392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 412.457472][ T29] audit: type=1400 audit(1746355003.264:26000): avc: denied { map_create } for pid=28197 comm="syz.4.9392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 412.477502][ T29] audit: type=1400 audit(1746355003.264:26001): avc: denied { prog_load } for pid=28197 comm="syz.4.9392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 412.496789][ T29] audit: type=1400 audit(1746355003.264:26002): avc: denied { map_create } for pid=28197 comm="syz.4.9392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 413.039940][T28228] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 413.990333][T28272] syzkaller0: entered promiscuous mode [ 413.995922][T28272] syzkaller0: entered allmulticast mode [ 414.113435][T28277] syzkaller0: entered promiscuous mode [ 414.118960][T28277] syzkaller0: entered allmulticast mode [ 416.886893][T28363] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 417.218594][T28386] syzkaller0: entered promiscuous mode [ 417.224190][T28386] syzkaller0: entered allmulticast mode [ 417.225572][T28389] netlink: 8 bytes leftover after parsing attributes in process `syz.7.9464'. [ 417.260975][ T29] kauditd_printk_skb: 420 callbacks suppressed [ 417.260990][ T29] audit: type=1400 audit(1746355008.254:26402): avc: denied { map_create } for pid=28390 comm="syz.3.9467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 417.330265][ T29] audit: type=1400 audit(1746355008.294:26403): avc: denied { read write } for pid=4969 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 417.354712][ T29] audit: type=1400 audit(1746355008.294:26404): avc: denied { prog_load } for pid=28390 comm="syz.3.9467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 417.374038][ T29] audit: type=1400 audit(1746355008.304:26405): avc: denied { map_create } for pid=28390 comm="syz.3.9467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 417.393425][ T29] audit: type=1400 audit(1746355008.304:26406): avc: denied { open } for pid=28390 comm="syz.3.9467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 417.412950][ T29] audit: type=1400 audit(1746355008.304:26407): avc: denied { open } for pid=28390 comm="syz.3.9467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 417.432437][ T29] audit: type=1400 audit(1746355008.314:26408): avc: denied { prog_load } for pid=28390 comm="syz.3.9467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 417.451668][ T29] audit: type=1400 audit(1746355008.314:26409): avc: denied { open } for pid=28392 comm="syz.7.9468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 417.471094][ T29] audit: type=1400 audit(1746355008.314:26410): avc: denied { map_create } for pid=28390 comm="syz.3.9467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 417.490461][ T29] audit: type=1400 audit(1746355008.314:26411): avc: denied { prog_load } for pid=28390 comm="syz.3.9467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 417.811386][T28416] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 419.495476][T28463] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 419.668617][T28470] syzkaller0: entered promiscuous mode [ 419.674220][T28470] syzkaller0: entered allmulticast mode [ 420.081362][T28487] debugfs: Directory 'ttyS3' with parent 'caif_serial' already present! [ 420.112161][T28485] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 420.187815][T28491] syzkaller0: entered promiscuous mode [ 420.193828][T28491] syzkaller0: entered allmulticast mode [ 420.319782][T28501] syzkaller0: entered allmulticast mode [ 420.615719][T28517] syzkaller0: entered promiscuous mode [ 420.621323][T28517] syzkaller0: entered allmulticast mode [ 420.931603][T28528] xt_connbytes: Forcing CT accounting to be enabled [ 420.938280][T28528] Cannot find add_set index 0 as target [ 421.707553][T13430] IPVS: starting estimator thread 0... [ 421.810284][T28560] IPVS: using max 2400 ests per chain, 120000 per kthread [ 422.289491][ T29] kauditd_printk_skb: 690 callbacks suppressed [ 422.289509][ T29] audit: type=1400 audit(1746355013.284:27102): avc: denied { execmem } for pid=28588 comm="syz.3.9548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 422.338954][ T29] audit: type=1400 audit(1746355013.334:27103): avc: denied { name_bind } for pid=28590 comm="syz.6.9549" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 422.361318][ T29] audit: type=1400 audit(1746355013.334:27104): avc: denied { prog_load } for pid=28590 comm="syz.6.9549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 422.380694][ T29] audit: type=1400 audit(1746355013.364:27105): avc: denied { prog_load } for pid=28588 comm="syz.3.9548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 422.400029][ T29] audit: type=1400 audit(1746355013.364:27106): avc: denied { create } for pid=28588 comm="syz.3.9548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 422.420071][ T29] audit: type=1400 audit(1746355013.404:27107): avc: denied { open } for pid=28590 comm="syz.6.9549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 422.631427][ T29] audit: type=1400 audit(1746355013.634:27108): avc: denied { create } for pid=28594 comm="syz.6.9550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 422.651384][ T29] audit: type=1400 audit(1746355013.634:27109): avc: denied { map_create } for pid=28594 comm="syz.6.9550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 422.670822][ T29] audit: type=1400 audit(1746355013.634:27110): avc: denied { create } for pid=28594 comm="syz.6.9550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 422.702740][ T29] audit: type=1400 audit(1746355013.674:27111): avc: denied { create } for pid=28596 comm="syz.6.9551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 422.715809][T28597] syzkaller0: entered promiscuous mode [ 422.728804][T28597] syzkaller0: entered allmulticast mode [ 422.874574][T28610] macsec0: entered promiscuous mode [ 423.828971][T28655] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 424.211336][T28680] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 424.889979][T28710] debugfs: Directory 'ttyS3' with parent 'caif_serial' already present! [ 424.912608][T28707] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 425.524403][T28737] syzkaller0: entered promiscuous mode [ 425.529989][T28737] syzkaller0: entered allmulticast mode [ 425.631955][T28741] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 425.805466][T28753] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 425.928312][T28768] futex_wake_op: syz.6.9622 tries to shift op by -1; fix this program [ 426.077354][T28779] syzkaller0: entered promiscuous mode [ 426.083537][T28779] syzkaller0: entered allmulticast mode [ 427.312672][ T29] kauditd_printk_skb: 768 callbacks suppressed [ 427.312689][ T29] audit: type=1400 audit(1746355018.314:27880): avc: denied { read write } for pid=4969 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 427.392155][ T29] audit: type=1400 audit(1746355018.354:27881): avc: denied { create } for pid=28849 comm="syz.7.9658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 427.413595][ T29] audit: type=1400 audit(1746355018.364:27882): avc: denied { prog_load } for pid=28849 comm="syz.7.9658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 427.433132][ T29] audit: type=1326 audit(1746355018.364:27883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28849 comm="syz.7.9658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2f71a7e969 code=0x7ffc0000 [ 427.457385][ T29] audit: type=1326 audit(1746355018.364:27884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28849 comm="syz.7.9658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2f71a7e969 code=0x7ffc0000 [ 427.481848][ T29] audit: type=1326 audit(1746355018.364:27885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28849 comm="syz.7.9658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f2f71a7e969 code=0x7ffc0000 [ 427.505390][ T29] audit: type=1326 audit(1746355018.364:27886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28849 comm="syz.7.9658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2f71a7e969 code=0x7ffc0000 [ 427.529706][ T29] audit: type=1326 audit(1746355018.364:27887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28849 comm="syz.7.9658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2f71a7e969 code=0x7ffc0000 [ 427.554049][ T29] audit: type=1326 audit(1746355018.364:27888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28849 comm="syz.7.9658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f2f71a7e969 code=0x7ffc0000 [ 427.577570][ T29] audit: type=1326 audit(1746355018.364:27889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28849 comm="syz.7.9658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2f71a7e969 code=0x7ffc0000 [ 427.875509][T28885] syzkaller0: entered promiscuous mode [ 427.881179][T28885] syzkaller0: entered allmulticast mode [ 428.090550][T28895] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 430.294758][T28991] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 430.471065][T29000] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 431.142231][T29028] syzkaller0: entered promiscuous mode [ 431.147827][T29028] syzkaller0: entered allmulticast mode [ 432.377402][T29086] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 432.609673][ T29] kauditd_printk_skb: 658 callbacks suppressed [ 432.609688][ T29] audit: type=1400 audit(1746355023.604:28548): avc: denied { read write } for pid=4969 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 432.668584][ T29] audit: type=1400 audit(1746355023.644:28549): avc: denied { open } for pid=29089 comm="syz.7.9755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 432.724723][ T29] audit: type=1400 audit(1746355023.664:28550): avc: denied { map_create } for pid=29089 comm="syz.7.9755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 432.744681][ T29] audit: type=1400 audit(1746355023.664:28551): avc: denied { prog_load } for pid=29089 comm="syz.7.9755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 432.764162][ T29] audit: type=1400 audit(1746355023.664:28552): avc: denied { prog_load } for pid=29089 comm="syz.7.9755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 432.784169][ T29] audit: type=1400 audit(1746355023.664:28553): avc: denied { create } for pid=29089 comm="syz.7.9755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 432.804075][ T29] audit: type=1400 audit(1746355023.664:28554): avc: denied { prog_load } for pid=29089 comm="syz.7.9755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 432.823886][ T29] audit: type=1400 audit(1746355023.694:28555): avc: denied { read write } for pid=4969 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 432.848320][ T29] audit: type=1400 audit(1746355023.704:28556): avc: denied { create } for pid=29091 comm="syz.7.9756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 432.868466][ T29] audit: type=1400 audit(1746355023.714:28557): avc: denied { read write } for pid=29091 comm="syz.7.9756" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 433.144173][T29097] syzkaller0: entered promiscuous mode [ 433.149710][T29097] syzkaller0: entered allmulticast mode [ 433.159118][T29098] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 433.364392][T29124] x_tables: ip6_tables: mh match: only valid for protocol 135 [ 433.393152][T13442] IPVS: starting estimator thread 0... [ 433.480197][T29125] IPVS: using max 2976 ests per chain, 148800 per kthread [ 434.855660][T29168] syzkaller0: entered promiscuous mode [ 434.861408][T29168] syzkaller0: entered allmulticast mode [ 435.025691][T29186] xt_CT: You must specify a L4 protocol and not use inversions on it [ 435.149217][T29189] syzkaller0: entered promiscuous mode [ 435.154932][T29189] syzkaller0: entered allmulticast mode [ 435.934790][T29208] syzkaller0: entered promiscuous mode [ 435.940370][T29208] syzkaller0: entered allmulticast mode [ 437.610457][ T29] kauditd_printk_skb: 571 callbacks suppressed [ 437.610474][ T29] audit: type=1326 audit(1746355028.614:29129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29225 comm="syz.7.9810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2f71a75927 code=0x7ffc0000 [ 437.640343][ T29] audit: type=1326 audit(1746355028.614:29130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29225 comm="syz.7.9810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f2f71a1ab39 code=0x7ffc0000 [ 437.663933][ T29] audit: type=1326 audit(1746355028.614:29131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29225 comm="syz.7.9810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f2f71a7e969 code=0x7ffc0000 [ 437.696197][ T29] audit: type=1400 audit(1746355028.644:29132): avc: denied { prog_load } for pid=29240 comm="syz.1.9816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 437.715580][ T29] audit: type=1326 audit(1746355028.694:29133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29225 comm="syz.7.9810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2f71a75927 code=0x7ffc0000 [ 437.739111][ T29] audit: type=1326 audit(1746355028.694:29134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29225 comm="syz.7.9810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f2f71a1ab39 code=0x7ffc0000 [ 437.762679][ T29] audit: type=1326 audit(1746355028.694:29135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29225 comm="syz.7.9810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f2f71a7e969 code=0x7ffc0000 [ 437.786210][ T29] audit: type=1326 audit(1746355028.694:29136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29225 comm="syz.7.9810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2f71a75927 code=0x7ffc0000 [ 437.809736][ T29] audit: type=1326 audit(1746355028.694:29137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29225 comm="syz.7.9810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f2f71a1ab39 code=0x7ffc0000 [ 437.833249][ T29] audit: type=1326 audit(1746355028.694:29138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29225 comm="syz.7.9810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f2f71a7e969 code=0x7ffc0000 [ 438.708977][T29277] serio: Serial port ptm2 [ 438.868891][T29280] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 439.000812][T29292] syzkaller0: entered promiscuous mode [ 439.006399][T29292] syzkaller0: entered allmulticast mode [ 440.398920][T29357] SELinux: syz.1.9865 (29357) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 442.689799][ T29] kauditd_printk_skb: 676 callbacks suppressed [ 442.689817][ T29] audit: type=1400 audit(1746355033.684:29809): avc: denied { node_bind } for pid=29461 comm="syz.6.9909" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=0 [ 442.741918][ T29] audit: type=1400 audit(1746355033.724:29810): avc: denied { create } for pid=29461 comm="syz.6.9909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=0 [ 442.811810][ T29] audit: type=1400 audit(1746355033.784:29811): avc: denied { read } for pid=29463 comm="syz.6.9910" dev="nsfs" ino=4026543657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 442.833823][ T29] audit: type=1400 audit(1746355033.784:29812): avc: denied { map_create } for pid=29463 comm="syz.6.9910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 442.853317][ T29] audit: type=1400 audit(1746355033.784:29813): avc: denied { prog_load } for pid=29463 comm="syz.6.9910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 442.873541][ T29] audit: type=1400 audit(1746355033.784:29814): avc: denied { prog_load } for pid=29463 comm="syz.6.9910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 442.873567][ T29] audit: type=1400 audit(1746355033.784:29815): avc: denied { open } for pid=29463 comm="syz.6.9910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 442.913148][ T29] audit: type=1400 audit(1746355033.794:29816): avc: denied { map_create } for pid=29463 comm="syz.6.9910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 442.932515][ T29] audit: type=1400 audit(1746355033.794:29817): avc: denied { prog_load } for pid=29463 comm="syz.6.9910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 442.952566][ T29] audit: type=1400 audit(1746355033.794:29818): avc: denied { allowed } for pid=29463 comm="syz.6.9910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 443.211377][T29484] serio: Serial port ptm3 [ 443.762046][T29507] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 444.997389][T29540] xt_limit: Overflow, try lower: 65536/2147483648 [ 445.094397][T29547] syzkaller0: entered promiscuous mode [ 445.100031][T29547] syzkaller0: entered allmulticast mode [ 445.370106][T29570] sit0: entered allmulticast mode [ 445.375900][T29570] sit0: entered promiscuous mode [ 445.777946][T29580] vhci_hcd vhci_hcd.0: pdev(7) rhport(0) sockfd(3) [ 445.784521][T29580] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 445.792274][T29580] vhci_hcd vhci_hcd.0: Device attached [ 445.804591][T29581] vhci_hcd: connection closed [ 445.804825][ T6781] vhci_hcd: stop threads [ 445.813936][ T6781] vhci_hcd: release socket [ 445.818377][ T6781] vhci_hcd: disconnect device [ 446.363484][T29601] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 447.138080][T29624] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 447.726273][ T29] kauditd_printk_skb: 422 callbacks suppressed [ 447.726289][ T29] audit: type=1400 audit(1746355038.724:30241): avc: denied { map_create } for pid=29648 comm="syz.3.9982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 447.781211][ T29] audit: type=1400 audit(1746355038.754:30242): avc: denied { prog_load } for pid=29648 comm="syz.3.9982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 447.801107][ T29] audit: type=1400 audit(1746355038.754:30243): avc: denied { prog_load } for pid=29648 comm="syz.3.9982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 447.820425][ T29] audit: type=1400 audit(1746355038.754:30244): avc: denied { map_create } for pid=29648 comm="syz.3.9982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 447.840336][ T29] audit: type=1400 audit(1746355038.754:30245): avc: denied { map_create } for pid=29648 comm="syz.3.9982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 447.859803][ T29] audit: type=1400 audit(1746355038.754:30246): avc: denied { prog_load } for pid=29648 comm="syz.3.9982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 447.879584][ T29] audit: type=1400 audit(1746355038.754:30247): avc: denied { map_create } for pid=29648 comm="syz.3.9982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 447.899061][ T29] audit: type=1400 audit(1746355038.754:30248): avc: denied { prog_load } for pid=29648 comm="syz.3.9982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 447.918898][ T29] audit: type=1400 audit(1746355038.754:30249): avc: denied { open } for pid=29648 comm="syz.3.9982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 447.938599][ T29] audit: type=1400 audit(1746355038.754:30250): avc: denied { open } for pid=29648 comm="syz.3.9982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 448.458835][T29673] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(4) [ 448.465459][T29673] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 448.473139][T29673] vhci_hcd vhci_hcd.0: Device attached [ 448.499686][T29673] vhci_hcd vhci_hcd.0: pdev(6) rhport(1) sockfd(6) [ 448.506251][T29673] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 448.513722][T29673] vhci_hcd vhci_hcd.0: Device attached [ 448.530008][T29674] vhci_hcd: connection closed [ 448.533212][ T6803] vhci_hcd: stop threads [ 448.542247][ T6803] vhci_hcd: release socket [ 448.546670][ T6803] vhci_hcd: disconnect device [ 448.560482][T29676] vhci_hcd: connection closed [ 448.583434][ T6803] vhci_hcd: stop threads [ 448.592482][ T6803] vhci_hcd: release socket [ 448.597013][ T6803] vhci_hcd: disconnect device [ 448.755351][T29684] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 450.160510][T29739] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 450.553143][T29751] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 450.855085][T29761] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 451.217018][T29774] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 451.968923][T29793] binfmt_misc: register: failed to install interpreter file ./file2 [ 452.246214][T29809] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 452.732834][ T29] kauditd_printk_skb: 521 callbacks suppressed [ 452.732850][ T29] audit: type=1400 audit(1746355043.734:30772): avc: denied { prog_load } for pid=29825 comm="syz.7.10051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 452.758928][ T29] audit: type=1400 audit(1746355043.734:30773): avc: denied { prog_load } for pid=29825 comm="syz.7.10051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 452.778338][ T29] audit: type=1400 audit(1746355043.734:30774): avc: denied { create } for pid=29825 comm="syz.7.10051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 452.798356][ T29] audit: type=1400 audit(1746355043.734:30775): avc: denied { create } for pid=29825 comm="syz.7.10051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 452.818240][ T29] audit: type=1400 audit(1746355043.734:30776): avc: denied { map_create } for pid=29825 comm="syz.7.10051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 452.837644][ T29] audit: type=1400 audit(1746355043.734:30777): avc: denied { prog_load } for pid=29825 comm="syz.7.10051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 452.857074][ T29] audit: type=1400 audit(1746355043.734:30778): avc: denied { allowed } for pid=29825 comm="syz.7.10051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 452.876834][ T29] audit: type=1400 audit(1746355043.734:30779): avc: denied { map_create } for pid=29825 comm="syz.7.10051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 452.896361][ T29] audit: type=1400 audit(1746355043.764:30780): avc: denied { read write } for pid=4969 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 452.920789][ T29] audit: type=1400 audit(1746355043.764:30781): avc: denied { map_create } for pid=29827 comm="syz.7.10052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 454.345486][T29921] xt_hashlimit: invalid interval [ 455.941922][T29968] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 456.175132][T29979] xt_hashlimit: invalid interval [ 456.267549][T29980] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 457.459424][T30031] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 457.652185][T30033] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 457.817779][ T29] kauditd_printk_skb: 682 callbacks suppressed [ 457.817854][ T29] audit: type=1400 audit(1746355048.814:31464): avc: denied { map_create } for pid=30036 comm="syz.3.10141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 457.885926][ T29] audit: type=1400 audit(1746355048.854:31465): avc: denied { read } for pid=30036 comm="syz.3.10141" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 457.909424][ T29] audit: type=1400 audit(1746355048.854:31466): avc: denied { open } for pid=30036 comm="syz.3.10141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 457.929121][ T29] audit: type=1400 audit(1746355048.854:31467): avc: denied { map_create } for pid=30036 comm="syz.3.10141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 457.949231][ T29] audit: type=1400 audit(1746355048.854:31468): avc: denied { prog_load } for pid=30036 comm="syz.3.10141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 457.968607][ T29] audit: type=1400 audit(1746355048.854:31469): avc: denied { prog_load } for pid=30036 comm="syz.3.10141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 457.988500][ T29] audit: type=1400 audit(1746355048.854:31470): avc: denied { prog_load } for pid=30036 comm="syz.3.10141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 458.007886][ T29] audit: type=1400 audit(1746355048.884:31471): avc: denied { open } for pid=30038 comm="syz.3.10142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 458.028080][ T29] audit: type=1400 audit(1746355048.884:31472): avc: denied { prog_load } for pid=30038 comm="syz.3.10142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 458.047465][ T29] audit: type=1400 audit(1746355048.884:31473): avc: denied { open } for pid=30038 comm="syz.3.10142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 460.112721][T30097] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 460.757933][T30111] serio: Serial port ptm3 [ 462.805733][T30161] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 462.830602][ T29] kauditd_printk_skb: 568 callbacks suppressed [ 462.830619][ T29] audit: type=1400 audit(1746355053.834:32042): avc: denied { prog_load } for pid=30162 comm="syz.4.10186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 462.875133][ T29] audit: type=1400 audit(1746355053.864:32043): avc: denied { map_create } for pid=30162 comm="syz.4.10186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 462.894743][ T29] audit: type=1400 audit(1746355053.864:32044): avc: denied { create } for pid=30162 comm="syz.4.10186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 462.914700][ T29] audit: type=1400 audit(1746355053.864:32045): avc: denied { open } for pid=30162 comm="syz.4.10186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 462.934246][ T29] audit: type=1400 audit(1746355053.864:32046): avc: denied { map_create } for pid=30162 comm="syz.4.10186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 462.953783][ T29] audit: type=1400 audit(1746355053.864:32047): avc: denied { map_create } for pid=30162 comm="syz.4.10186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 462.973327][ T29] audit: type=1400 audit(1746355053.864:32048): avc: denied { prog_load } for pid=30162 comm="syz.4.10186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 462.992765][ T29] audit: type=1400 audit(1746355053.864:32049): avc: denied { prog_load } for pid=30162 comm="syz.4.10186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 463.012137][ T29] audit: type=1400 audit(1746355053.864:32050): avc: denied { prog_load } for pid=30162 comm="syz.4.10186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 463.031521][ T29] audit: type=1400 audit(1746355053.864:32051): avc: denied { prog_load } for pid=30162 comm="syz.4.10186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 464.862386][T30245] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 465.576526][T30283] syzkaller0: entered promiscuous mode [ 465.582194][T30283] syzkaller0: entered allmulticast mode [ 465.745636][T30297] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 467.581621][T30361] bond0: (slave veth0_to_hsr): Enslaving as an active interface with an up link [ 468.162854][ T29] kauditd_printk_skb: 970 callbacks suppressed [ 468.162871][ T29] audit: type=1400 audit(1746355059.164:33022): avc: denied { create } for pid=30383 comm="syz.3.10275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 468.194388][ T29] audit: type=1400 audit(1746355059.164:33023): avc: denied { prog_load } for pid=30383 comm="syz.3.10275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 468.246253][ T29] audit: type=1400 audit(1746355059.244:33024): avc: denied { mounton } for pid=30385 comm="syz.6.10277" path="/682/file0" dev="tmpfs" ino=3591 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 468.269225][ T29] audit: type=1400 audit(1746355059.244:33025): avc: denied { remount } for pid=30385 comm="syz.6.10277" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 468.289303][ T29] audit: type=1400 audit(1746355059.244:33026): avc: denied { create } for pid=30385 comm="syz.6.10277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 468.309130][ T29] audit: type=1400 audit(1746355059.244:33027): avc: denied { watch watch_reads } for pid=30385 comm="syz.6.10277" path="/682" dev="tmpfs" ino=3586 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 468.333918][ T29] audit: type=1400 audit(1746355059.244:33028): avc: denied { map_create } for pid=30386 comm="syz.4.10276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 468.353532][ T29] audit: type=1400 audit(1746355059.244:33029): avc: denied { prog_load } for pid=30386 comm="syz.4.10276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 468.373065][ T29] audit: type=1400 audit(1746355059.314:33030): avc: denied { create } for pid=30389 comm="syz.4.10278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 468.392955][ T29] audit: type=1400 audit(1746355059.314:33031): avc: denied { create } for pid=30389 comm="syz.4.10278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 468.733574][T30405] syzkaller0: entered promiscuous mode [ 468.739193][T30405] syzkaller0: entered allmulticast mode [ 469.018459][T30419] ipt_rpfilter: unknown options [ 469.290398][ T168] unregister_netdevice: waiting for batadv_slave_0 to become free. Usage count = 2 [ 469.300091][ T168] ref_tracker: batadv_slave_0@ffff888117e98550 has 1/1 users at [ 469.300091][ T168] netdev_get_by_index+0x13e/0x1b0 [ 469.300091][ T168] fib6_nh_init+0xeb/0x15a0 [ 469.300091][ T168] rtm_new_nexthop+0x1db8/0x4510 [ 469.300091][ T168] rtnetlink_rcv_msg+0x5fb/0x6d0 [ 469.300091][ T168] netlink_rcv_skb+0x120/0x220 [ 469.300091][ T168] rtnetlink_rcv+0x1c/0x30 [ 469.300091][ T168] netlink_unicast+0x59e/0x670 [ 469.300091][ T168] netlink_sendmsg+0x58b/0x6b0 [ 469.300091][ T168] __sock_sendmsg+0x142/0x180 [ 469.300091][ T168] ____sys_sendmsg+0x31e/0x4e0 [ 469.300091][ T168] ___sys_sendmsg+0x17b/0x1d0 [ 469.300091][ T168] __x64_sys_sendmsg+0xd4/0x160 [ 469.300091][ T168] x64_sys_call+0x2999/0x2fb0 [ 469.300091][ T168] do_syscall_64+0xd0/0x1a0 [ 469.300091][ T168] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 469.300091][ T168] [ 469.424230][T30437] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 469.798493][T30476] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 469.853757][T30476] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 471.907727][T30581] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 471.914345][T30581] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 471.921927][T30581] vhci_hcd vhci_hcd.0: Device attached [ 471.929672][T30582] vhci_hcd: connection closed [ 471.929906][ T6814] vhci_hcd: stop threads [ 471.939781][ T6814] vhci_hcd: release socket [ 471.944229][ T6814] vhci_hcd: disconnect device [ 472.189086][T30593] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 472.195626][T30593] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 472.203284][T30593] vhci_hcd vhci_hcd.0: Device attached [ 472.210661][T30593] vhci_hcd vhci_hcd.0: pdev(1) rhport(1) sockfd(6) [ 472.217235][T30593] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 472.224662][T30593] vhci_hcd vhci_hcd.0: Device attached [ 472.232808][T30596] vhci_hcd: connection closed [ 472.232828][T30594] vhci_hcd: connection closed [ 472.232991][ T6814] vhci_hcd: stop threads [ 472.246542][ T6814] vhci_hcd: release socket [ 472.251002][ T6814] vhci_hcd: disconnect device [ 472.255812][ T6814] vhci_hcd: stop threads [ 472.260046][ T6814] vhci_hcd: release socket [ 472.264476][ T6814] vhci_hcd: disconnect device [ 472.474900][T30599] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 472.790055][T30626] ÿÿÿÿÿÿ: renamed from vlan1 [ 473.385440][ T29] kauditd_printk_skb: 1027 callbacks suppressed [ 473.385453][ T29] audit: type=1400 audit(1746355064.384:34059): avc: denied { create } for pid=30636 comm="syz.3.10378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 473.412791][ T29] audit: type=1400 audit(1746355064.384:34060): avc: denied { open } for pid=30636 comm="syz.3.10378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 473.433099][ T29] audit: type=1400 audit(1746355064.384:34061): avc: denied { prog_load } for pid=30636 comm="syz.3.10378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 473.452712][ T29] audit: type=1400 audit(1746355064.384:34062): avc: denied { prog_load } for pid=30636 comm="syz.3.10378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 473.472900][ T29] audit: type=1400 audit(1746355064.384:34063): avc: denied { create } for pid=30636 comm="syz.3.10378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 473.493467][ T29] audit: type=1326 audit(1746355064.384:34064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30636 comm="syz.3.10378" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f1fc2e969 code=0x7ffc0000 [ 473.517480][ T29] audit: type=1326 audit(1746355064.384:34065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30636 comm="syz.3.10378" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f1fc2e969 code=0x7ffc0000 [ 473.541889][ T29] audit: type=1326 audit(1746355064.384:34066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30636 comm="syz.3.10378" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7f1fc2e969 code=0x7ffc0000 [ 473.565602][ T29] audit: type=1400 audit(1746355064.384:34067): avc: denied { map_create } for pid=30636 comm="syz.3.10378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 473.585551][ T29] audit: type=1326 audit(1746355064.384:34068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30636 comm="syz.3.10378" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f1fc2e969 code=0x7ffc0000 [ 475.436160][T30689] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 477.878215][T30751] bond0: (slave veth0_to_hsr): Enslaving as an active interface with an up link [ 478.517202][ T29] kauditd_printk_skb: 454 callbacks suppressed [ 478.517221][ T29] audit: type=1400 audit(1746355069.514:34523): avc: denied { open } for pid=30774 comm="syz.6.10431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 478.547818][ T29] audit: type=1400 audit(1746355069.524:34524): avc: denied { map_create } for pid=30776 comm="syz.1.10432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 478.567490][ T29] audit: type=1400 audit(1746355069.524:34525): avc: denied { prog_load } for pid=30776 comm="syz.1.10432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 478.586738][T30775] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 478.586916][ T29] audit: type=1400 audit(1746355069.524:34526): avc: denied { map_create } for pid=30776 comm="syz.1.10432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 478.612381][ T29] audit: type=1400 audit(1746355069.524:34527): avc: denied { prog_load } for pid=30776 comm="syz.1.10432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 478.631786][ T29] audit: type=1400 audit(1746355069.524:34528): avc: denied { allowed } for pid=30776 comm="syz.1.10432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 478.651542][ T29] audit: type=1400 audit(1746355069.524:34529): avc: denied { create } for pid=30776 comm="syz.1.10432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 478.672332][ T29] audit: type=1400 audit(1746355069.524:34530): avc: denied { create } for pid=30776 comm="syz.1.10432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 478.693081][ T29] audit: type=1400 audit(1746355069.524:34531): avc: denied { create } for pid=30776 comm="syz.1.10432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 478.713999][ T29] audit: type=1400 audit(1746355069.544:34532): avc: denied { map_create } for pid=30774 comm="syz.6.10431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 478.781979][T30787] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 478.848680][T30793] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 478.856308][T30793] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 479.632349][T30812] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 480.809533][T30862] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 481.551669][T30888] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 482.842708][T30930] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 483.554207][ T29] kauditd_printk_skb: 424 callbacks suppressed [ 483.554221][ T29] audit: type=1400 audit(1746355074.554:34957): avc: denied { create } for pid=30950 comm="syz.1.10500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 483.584719][ T29] audit: type=1400 audit(1746355074.554:34958): avc: denied { map_create } for pid=30950 comm="syz.1.10500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 483.604897][ T29] audit: type=1400 audit(1746355074.554:34959): avc: denied { prog_load } for pid=30950 comm="syz.1.10500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 483.624246][ T29] audit: type=1400 audit(1746355074.554:34960): avc: denied { prog_load } for pid=30950 comm="syz.1.10500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 483.663776][ T29] audit: type=1400 audit(1746355074.654:34961): avc: denied { prog_load } for pid=30952 comm="syz.1.10502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 483.683695][ T29] audit: type=1400 audit(1746355074.654:34962): avc: denied { write } for pid=30952 comm="syz.1.10502" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 483.707771][ T29] audit: type=1400 audit(1746355074.654:34963): avc: denied { map_create } for pid=30952 comm="syz.1.10502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 483.727377][ T29] audit: type=1400 audit(1746355074.664:34964): avc: denied { map_create } for pid=30954 comm="syz.6.10503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 483.747700][ T29] audit: type=1400 audit(1746355074.664:34965): avc: denied { prog_load } for pid=30954 comm="syz.6.10503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 483.767422][ T29] audit: type=1400 audit(1746355074.664:34966): avc: denied { module_request } for pid=30954 comm="syz.6.10503" kmod="netdev-syz_tun" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 483.789528][T30964] binfmt_misc: register: failed to install interpreter file ./file2 [ 484.929199][T31020] xt_CT: You must specify a L4 protocol and not use inversions on it [ 485.962164][T31064] netlink: 'syz.7.10547': attribute type 29 has an invalid length. [ 485.975654][T31064] IPv6: syztnl0: Disabled Multicast RS [ 485.983033][T31064] netlink: 'syz.7.10547': attribute type 29 has an invalid length. [ 485.994556][T31064] netlink: 'syz.7.10547': attribute type 29 has an invalid length. [ 486.004037][T31064] netlink: 'syz.7.10547': attribute type 29 has an invalid length. [ 486.014970][T31064] netlink: 'syz.7.10547': attribute type 29 has an invalid length. [ 486.023328][T31064] netlink: 'syz.7.10547': attribute type 29 has an invalid length. [ 486.034970][T31064] netlink: 'syz.7.10547': attribute type 29 has an invalid length. [ 486.046209][T31064] netlink: 'syz.7.10547': attribute type 29 has an invalid length. [ 486.055438][T31064] netlink: 'syz.7.10547': attribute type 29 has an invalid length. [ 486.063869][T31064] netlink: 'syz.7.10547': attribute type 29 has an invalid length. [ 486.876155][T31096] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 488.200388][T31139] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 488.564605][ T29] kauditd_printk_skb: 1060 callbacks suppressed [ 488.564623][ T29] audit: type=1400 audit(1746355079.564:36027): avc: denied { mount } for pid=31153 comm="syz.6.10582" name="/" dev="ramfs" ino=101076 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=0 [ 488.630244][ T29] audit: type=1400 audit(1746355079.564:36028): avc: denied { read write } for pid=31153 comm="syz.6.10582" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 488.654681][ T29] audit: type=1400 audit(1746355079.604:36029): avc: denied { map_create } for pid=31155 comm="syz.4.10583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 488.727849][ T29] audit: type=1400 audit(1746355079.724:36030): avc: denied { prog_load } for pid=31155 comm="syz.4.10583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 488.766945][ T29] audit: type=1400 audit(1746355079.754:36031): avc: denied { map_create } for pid=31155 comm="syz.4.10583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 488.786931][ T29] audit: type=1400 audit(1746355079.754:36032): avc: denied { prog_load } for pid=31155 comm="syz.4.10583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 488.806274][ T29] audit: type=1400 audit(1746355079.754:36033): avc: denied { prog_load } for pid=31155 comm="syz.4.10583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 488.826075][ T29] audit: type=1400 audit(1746355079.754:36034): avc: denied { read write } for pid=31155 comm="syz.4.10583" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 488.850477][ T29] audit: type=1400 audit(1746355079.794:36035): avc: denied { create } for pid=31159 comm="syz.6.10584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 488.872069][ T29] audit: type=1400 audit(1746355079.794:36036): avc: denied { create } for pid=31159 comm="syz.6.10584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 489.963521][T31194] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 490.067143][T31197] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 490.442354][T31207] bridge0: entered allmulticast mode [ 490.461296][T31207] macsec0: entered promiscuous mode [ 491.411631][T31235] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 491.570729][T31242] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 493.237985][T31311] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 493.574135][ T29] kauditd_printk_skb: 708 callbacks suppressed [ 493.574152][ T29] audit: type=1326 audit(1746355597.578:36745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31318 comm="syz.4.10644" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2bd3815927 code=0x7ffc0000 [ 493.607382][ T29] audit: type=1400 audit(1746355597.588:36746): avc: denied { read write } for pid=4969 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 493.631902][ T29] audit: type=1326 audit(1746355597.608:36747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31318 comm="syz.4.10644" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f2bd37bab39 code=0x7ffc0000 [ 493.655500][ T29] audit: type=1326 audit(1746355597.608:36748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31318 comm="syz.4.10644" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2bd3815927 code=0x7ffc0000 [ 493.679229][ T29] audit: type=1326 audit(1746355597.608:36749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31318 comm="syz.4.10644" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f2bd37bab39 code=0x7ffc0000 [ 493.702857][ T29] audit: type=1326 audit(1746355597.608:36750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31318 comm="syz.4.10644" exe="/root/syz-executor" sig=0 arch=c000003e syscall=275 compat=0 ip=0x7f2bd381e969 code=0x7ffc0000 [ 493.729438][T31324] netlink: 16402 bytes leftover after parsing attributes in process `syz.7.10646'. [ 493.739406][T31323] netlink: 16402 bytes leftover after parsing attributes in process `syz.7.10646'. [ 493.752144][ T29] audit: type=1326 audit(1746355597.618:36751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31318 comm="syz.4.10644" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2bd3815927 code=0x7ffc0000 [ 493.775895][ T29] audit: type=1326 audit(1746355597.618:36752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31318 comm="syz.4.10644" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f2bd37bab39 code=0x7ffc0000 [ 493.799493][ T29] audit: type=1326 audit(1746355597.618:36753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31318 comm="syz.4.10644" exe="/root/syz-executor" sig=0 arch=c000003e syscall=275 compat=0 ip=0x7f2bd381e969 code=0x7ffc0000 [ 493.823312][ T29] audit: type=1326 audit(1746355597.628:36754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31318 comm="syz.4.10644" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2bd3815927 code=0x7ffc0000 [ 494.447114][T31345] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 498.590545][ T29] kauditd_printk_skb: 848 callbacks suppressed [ 498.590562][ T29] audit: type=1400 audit(1746355602.598:37603): avc: denied { prog_load } for pid=31494 comm="syz.3.10716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 498.686158][ T29] audit: type=1400 audit(1746355602.598:37604): avc: denied { create } for pid=31493 comm="syz.4.10715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 498.707350][ T29] audit: type=1400 audit(1746355602.598:37605): avc: denied { map_create } for pid=31493 comm="syz.4.10715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 498.726922][ T29] audit: type=1400 audit(1746355602.598:37606): avc: denied { prog_load } for pid=31493 comm="syz.4.10715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 498.746364][ T29] audit: type=1400 audit(1746355602.598:37607): avc: denied { prog_load } for pid=31493 comm="syz.4.10715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 498.765869][ T29] audit: type=1400 audit(1746355602.598:37608): avc: denied { prog_load } for pid=31493 comm="syz.4.10715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 498.785249][ T29] audit: type=1400 audit(1746355602.598:37609): avc: denied { map_create } for pid=31493 comm="syz.4.10715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 498.804790][ T29] audit: type=1400 audit(1746355602.628:37610): avc: denied { create } for pid=31494 comm="syz.3.10716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 498.824497][ T29] audit: type=1400 audit(1746355602.628:37611): avc: denied { prog_load } for pid=31494 comm="syz.3.10716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 498.844006][ T29] audit: type=1400 audit(1746355602.648:37612): avc: denied { bpf } for pid=31494 comm="syz.3.10716" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 499.988345][T31536] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 500.066473][T31535] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 500.360830][T31552] vhci_hcd vhci_hcd.0: pdev(7) rhport(0) sockfd(9) [ 500.367472][T31552] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 500.374981][T31552] vhci_hcd vhci_hcd.0: Device attached [ 500.415715][T31557] vhci_hcd vhci_hcd.0: pdev(7) rhport(1) sockfd(12) [ 500.422366][T31557] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 500.429939][T31557] vhci_hcd vhci_hcd.0: Device attached [ 500.457381][T31552] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 500.466400][T31552] vhci_hcd vhci_hcd.0: pdev(7) rhport(3) sockfd(15) [ 500.473074][T31552] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 500.480642][T31552] vhci_hcd vhci_hcd.0: Device attached [ 500.490052][T31552] vhci_hcd vhci_hcd.0: pdev(7) rhport(4) sockfd(17) [ 500.496690][T31552] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 500.504991][T31552] vhci_hcd vhci_hcd.0: Device attached [ 500.514120][T31552] vhci_hcd vhci_hcd.0: pdev(7) rhport(5) sockfd(19) [ 500.520822][T31552] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 500.528485][T31552] vhci_hcd vhci_hcd.0: Device attached [ 500.537073][T31552] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 500.546554][T31564] vhci_hcd: connection closed [ 500.546623][T31566] vhci_hcd: connection closed [ 500.546752][T31568] vhci_hcd: connection closed [ 500.551471][ T6803] vhci_hcd: stop threads [ 500.551484][ T6803] vhci_hcd: release socket [ 500.558179][T31558] vhci_hcd: connection closed [ 500.561659][ T6803] vhci_hcd: disconnect device [ 500.566049][T31553] vhci_hcd: connection closed [ 500.574782][ T6803] vhci_hcd: stop threads [ 500.588263][ T6803] vhci_hcd: release socket [ 500.593782][ T6803] vhci_hcd: disconnect device [ 500.598607][T13430] vhci_hcd: vhci_device speed not set [ 500.598635][ T6803] vhci_hcd: stop threads [ 500.608367][ T6803] vhci_hcd: release socket [ 500.612841][ T6803] vhci_hcd: disconnect device [ 500.617615][ T6803] vhci_hcd: stop threads [ 500.622398][ T6803] vhci_hcd: release socket [ 500.626835][ T6803] vhci_hcd: disconnect device [ 500.631739][ T6803] vhci_hcd: stop threads [ 500.635974][ T6803] vhci_hcd: release socket [ 500.640547][ T6803] vhci_hcd: disconnect device [ 500.670212][T13430] usb 15-1: new high-speed USB device number 3 using vhci_hcd [ 500.677837][T13430] usb 15-1: enqueue for inactive port 0 [ 500.683999][T13430] usb 15-1: enqueue for inactive port 0 [ 500.689717][T13430] usb 15-1: enqueue for inactive port 0 [ 500.760168][T13430] vhci_hcd: vhci_device speed not set [ 501.180356][T31591] netlink: 8 bytes leftover after parsing attributes in process `syz.7.10750'. [ 501.202696][T31593] netlink: 20 bytes leftover after parsing attributes in process `syz.7.10751'. [ 501.476481][T31619] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 503.610168][ T29] kauditd_printk_skb: 736 callbacks suppressed [ 503.610188][ T29] audit: type=1400 audit(1746355607.608:38349): avc: denied { map_create } for pid=31689 comm="syz.6.10793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 503.635803][ T29] audit: type=1400 audit(1746355607.608:38350): avc: denied { prog_load } for pid=31689 comm="syz.6.10793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 503.693335][ T29] audit: type=1400 audit(1746355607.658:38351): avc: denied { prog_load } for pid=31689 comm="syz.6.10793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 503.712801][ T29] audit: type=1400 audit(1746355607.658:38352): avc: denied { prog_load } for pid=31689 comm="syz.6.10793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 503.732646][ T29] audit: type=1400 audit(1746355607.658:38353): avc: denied { create } for pid=31689 comm="syz.6.10793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=0 [ 503.775827][ T29] audit: type=1400 audit(1746355607.778:38354): avc: denied { prog_load } for pid=31692 comm="syz.3.10794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 503.808078][ T29] audit: type=1400 audit(1746355607.808:38355): avc: denied { create } for pid=31693 comm="syz.4.10795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 503.829651][ T29] audit: type=1326 audit(1746355607.808:38356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31692 comm="syz.3.10794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f1fc2e969 code=0x7ffc0000 [ 503.854133][ T29] audit: type=1326 audit(1746355607.808:38357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31692 comm="syz.3.10794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f1fc2e969 code=0x7ffc0000 [ 503.877803][ T29] audit: type=1326 audit(1746355607.808:38358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31692 comm="syz.3.10794" exe="/root/syz-executor" sig=0 arch=c000003e syscall=428 compat=0 ip=0x7f7f1fc2e969 code=0x7ffc0000 [ 504.264175][T31712] netlink: 60 bytes leftover after parsing attributes in process `syz.3.10802'. [ 504.274213][T31709] netlink: 60 bytes leftover after parsing attributes in process `syz.3.10802'. [ 504.356419][T31728] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 505.219051][T31771] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 507.189839][T31865] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 507.337169][T31875] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 507.736289][T13442] Process accounting resumed [ 507.803533][T31893] serio: Serial port ptm3 [ 508.739525][ T29] kauditd_printk_skb: 1025 callbacks suppressed [ 508.739539][ T29] audit: type=1400 audit(1746355612.738:39384): avc: denied { prog_load } for pid=31938 comm="syz.3.10896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 508.765874][ T29] audit: type=1400 audit(1746355612.738:39385): avc: denied { create } for pid=31938 comm="syz.3.10896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 508.787042][ T29] audit: type=1400 audit(1746355612.738:39386): avc: denied { read } for pid=31938 comm="syz.3.10896" dev="nsfs" ino=4026546182 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 508.804149][T31940] ipt_rpfilter: unknown options [ 508.808654][ T29] audit: type=1400 audit(1746355612.758:39387): avc: denied { map_create } for pid=31938 comm="syz.3.10896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 508.833572][ T29] audit: type=1400 audit(1746355612.778:39388): avc: denied { prog_load } for pid=31934 comm="syz.4.10895" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 508.853274][ T29] audit: type=1400 audit(1746355612.808:39389): avc: denied { read } for pid=31938 comm="syz.3.10896" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 508.876550][ T29] audit: type=1400 audit(1746355612.808:39390): avc: denied { open } for pid=31938 comm="syz.3.10896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 508.876573][ T29] audit: type=1400 audit(1746355612.808:39391): avc: denied { map_create } for pid=31938 comm="syz.3.10896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 508.876634][ T29] audit: type=1400 audit(1746355612.808:39392): avc: denied { prog_load } for pid=31938 comm="syz.3.10896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 508.935585][ T29] audit: type=1400 audit(1746355612.808:39393): avc: denied { prog_load } for pid=31938 comm="syz.3.10896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 509.038746][T31958] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31958 comm=syz.7.10905 [ 509.661282][T31986] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 509.957817][T32010] ALSA: seq fatal error: cannot create timer (-19) [ 509.984099][T32001] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 511.375057][T32095] x_tables: ip6_tables: rpfilter.0 match: invalid size 8 (kernel) != (user) 48 [ 512.053451][T32133] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 513.331230][T32161] xt_TCPMSS: Only works on TCP SYN packets [ 514.063406][ T29] kauditd_printk_skb: 1295 callbacks suppressed [ 514.063425][ T29] audit: type=1400 audit(1746355618.068:40689): avc: denied { prog_load } for pid=32172 comm="syz.3.10993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 514.123465][ T29] audit: type=1400 audit(1746355618.098:40690): avc: denied { execmem } for pid=32172 comm="syz.3.10993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 514.143166][ T29] audit: type=1400 audit(1746355618.098:40691): avc: denied { create } for pid=32172 comm="syz.3.10993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 514.164294][ T29] audit: type=1400 audit(1746355618.098:40692): avc: denied { bpf } for pid=32172 comm="syz.3.10993" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 514.185191][ T29] audit: type=1400 audit(1746355618.098:40693): avc: denied { prog_load } for pid=32172 comm="syz.3.10993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 514.204551][ T29] audit: type=1400 audit(1746355618.098:40694): avc: denied { prog_load } for pid=32172 comm="syz.3.10993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 514.223958][ T29] audit: type=1400 audit(1746355618.098:40695): avc: denied { map_create } for pid=32172 comm="syz.3.10993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 514.243514][ T29] audit: type=1400 audit(1746355618.098:40696): avc: denied { prog_load } for pid=32172 comm="syz.3.10993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 514.262868][ T29] audit: type=1400 audit(1746355618.098:40697): avc: denied { module_request } for pid=32172 comm="syz.3.10993" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 514.285506][ T29] audit: type=1400 audit(1746355618.098:40698): avc: denied { sys_module } for pid=32172 comm="syz.3.10993" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 514.520077][T32194] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 516.218545][T32261] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 516.689224][T32288] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 516.987484][T32314] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 518.416497][T32372] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 519.061446][T32397] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 519.096373][ T29] kauditd_printk_skb: 1335 callbacks suppressed [ 519.096390][ T29] audit: type=1326 audit(1746355623.098:42034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32393 comm="syz.4.11079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f2bd381e969 code=0x7ffc0000 [ 519.157835][ T29] audit: type=1326 audit(1746355623.158:42035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32391 comm="syz.4.11079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2bd381e969 code=0x7ffc0000 [ 519.181607][ T29] audit: type=1326 audit(1746355623.158:42036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32391 comm="syz.4.11079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2bd381e969 code=0x7ffc0000 [ 519.205406][ T29] audit: type=1326 audit(1746355623.158:42037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32396 comm="syz.3.11081" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f1fc2e969 code=0x7ffc0000 [ 519.229115][ T29] audit: type=1326 audit(1746355623.158:42038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32396 comm="syz.3.11081" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7f1fc2e969 code=0x7ffc0000 [ 519.252862][ T29] audit: type=1326 audit(1746355623.158:42039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32391 comm="syz.4.11079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=272 compat=0 ip=0x7f2bd381e969 code=0x7ffc0000 [ 519.276583][ T29] audit: type=1326 audit(1746355623.158:42040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32391 comm="syz.4.11079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2bd381e969 code=0x7ffc0000 [ 519.300381][ T29] audit: type=1326 audit(1746355623.158:42041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32391 comm="syz.4.11079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2bd381e969 code=0x7ffc0000 [ 519.324094][ T29] audit: type=1326 audit(1746355623.158:42042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32391 comm="syz.4.11079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2bd381e969 code=0x7ffc0000 [ 519.347864][ T29] audit: type=1326 audit(1746355623.158:42043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32391 comm="syz.4.11079" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2bd381e969 code=0x7ffc0000 [ 520.627981][T32444] binfmt_misc: register: failed to install interpreter file ./file2 [ 521.977122][T32493] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 522.163425][T32508] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 522.563204][T32535] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(9) [ 522.569772][T32535] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 522.577221][T32535] vhci_hcd vhci_hcd.0: Device attached [ 522.584639][T32535] vhci_hcd vhci_hcd.0: pdev(1) rhport(1) sockfd(11) [ 522.591259][T32535] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 522.598904][T32535] vhci_hcd vhci_hcd.0: Device attached [ 522.605233][T32535] vhci_hcd vhci_hcd.0: pdev(1) rhport(2) sockfd(13) [ 522.611852][T32535] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 522.619460][T32535] vhci_hcd vhci_hcd.0: Device attached [ 522.625573][T32535] vhci_hcd vhci_hcd.0: pdev(1) rhport(3) sockfd(15) [ 522.632182][T32535] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 522.639785][T32535] vhci_hcd vhci_hcd.0: Device attached [ 522.646306][T32544] vhci_hcd: connection closed [ 522.646333][T32540] vhci_hcd: connection closed [ 522.646341][T32536] vhci_hcd: connection closed [ 522.651197][T32538] vhci_hcd: connection closed [ 522.651566][ T6750] vhci_hcd: stop threads [ 522.651576][ T6750] vhci_hcd: release socket [ 522.651585][ T6750] vhci_hcd: disconnect device [ 522.651654][ T6750] vhci_hcd: stop threads [ 522.651662][ T6750] vhci_hcd: release socket [ 522.687761][ T6750] vhci_hcd: disconnect device [ 522.692732][ T6750] vhci_hcd: stop threads [ 522.697089][ T6750] vhci_hcd: release socket [ 522.701578][ T6750] vhci_hcd: disconnect device [ 522.706390][ T6750] vhci_hcd: stop threads [ 522.710675][ T6750] vhci_hcd: release socket [ 522.715076][ T6750] vhci_hcd: disconnect device [ 522.994169][T32547] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 524.105944][ T29] kauditd_printk_skb: 949 callbacks suppressed [ 524.105962][ T29] audit: type=1400 audit(1746355628.108:42993): avc: denied { create } for pid=32588 comm="syz.6.11154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=0 [ 524.168594][ T29] audit: type=1326 audit(1746355628.138:42994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32588 comm="syz.6.11154" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4fb09de969 code=0x7ffc0000 [ 524.192954][ T29] audit: type=1326 audit(1746355628.138:42995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32588 comm="syz.6.11154" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4fb09de969 code=0x7ffc0000 [ 524.216749][ T29] audit: type=1326 audit(1746355628.138:42996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32588 comm="syz.6.11154" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f4fb09de969 code=0x7ffc0000 [ 524.241067][ T29] audit: type=1326 audit(1746355628.138:42997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32588 comm="syz.6.11154" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4fb09de969 code=0x7ffc0000 [ 524.264875][ T29] audit: type=1326 audit(1746355628.138:42998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32588 comm="syz.6.11154" exe="/root/syz-executor" sig=0 arch=c000003e syscall=64 compat=0 ip=0x7f4fb09de969 code=0x7ffc0000 [ 524.289068][ T29] audit: type=1326 audit(1746355628.138:42999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32588 comm="syz.6.11154" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4fb09de969 code=0x7ffc0000 [ 524.313326][ T29] audit: type=1326 audit(1746355628.138:43000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32588 comm="syz.6.11154" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4fb09de969 code=0x7ffc0000 [ 524.337150][ T29] audit: type=1326 audit(1746355628.138:43001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32588 comm="syz.6.11154" exe="/root/syz-executor" sig=0 arch=c000003e syscall=220 compat=0 ip=0x7f4fb09de969 code=0x7ffc0000 [ 524.361493][ T29] audit: type=1326 audit(1746355628.138:43002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32588 comm="syz.6.11154" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4fb09de969 code=0x7ffc0000 [ 524.982651][T32606] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 525.083174][T32613] @ÿ: renamed from bond_slave_0 [ 527.017455][T13430] Process accounting resumed [ 527.236594][T32708] validate_nla: 20 callbacks suppressed [ 527.236608][T32708] netlink: 'syz.4.11209': attribute type 3 has an invalid length. [ 527.250507][T32708] netlink: 132 bytes leftover after parsing attributes in process `syz.4.11209'. [ 528.470000][T32748] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 529.118799][ T29] kauditd_printk_skb: 931 callbacks suppressed [ 529.118816][ T29] audit: type=1326 audit(1746355633.118:43934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32765 comm="syz.3.11225" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f7f1fc25927 code=0x7ffc0000 [ 529.158252][ T29] audit: type=1326 audit(1746355633.128:43935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32765 comm="syz.3.11225" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f7f1fbcab39 code=0x7ffc0000 [ 529.182524][ T29] audit: type=1326 audit(1746355633.128:43936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32765 comm="syz.3.11225" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f7f1fc2e969 code=0x7ffc0000 [ 529.206285][ T29] audit: type=1326 audit(1746355633.158:43937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32765 comm="syz.3.11225" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f7f1fc25927 code=0x7ffc0000 [ 529.230513][ T29] audit: type=1326 audit(1746355633.158:43938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32765 comm="syz.3.11225" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f7f1fbcab39 code=0x7ffc0000 [ 529.254178][ T29] audit: type=1326 audit(1746355633.158:43939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32765 comm="syz.3.11225" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f7f1fc2e969 code=0x7ffc0000 [ 529.278980][ T29] audit: type=1326 audit(1746355633.158:43940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32765 comm="syz.3.11225" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f7f1fc25927 code=0x7ffc0000 [ 529.303292][ T29] audit: type=1326 audit(1746355633.158:43941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32765 comm="syz.3.11225" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f7f1fbcab39 code=0x7ffc0000 [ 529.327108][ T29] audit: type=1326 audit(1746355633.158:43942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32765 comm="syz.3.11225" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f7f1fc2e969 code=0x7ffc0000 [ 529.351283][ T29] audit: type=1326 audit(1746355633.158:43943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32765 comm="syz.3.11225" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f7f1fc25927 code=0x7ffc0000 [ 529.681225][ T332] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 533.398449][ T463] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 533.830023][T13442] Process accounting resumed [ 533.972705][ T484] xt_CHECKSUM: unsupported CHECKSUM operation 68 [ 534.140142][ T29] kauditd_printk_skb: 1064 callbacks suppressed [ 534.140160][ T29] audit: type=1326 audit(1746355638.138:45008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=486 comm="syz.1.11294" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 534.180383][ T29] audit: type=1400 audit(1746355638.188:45009): avc: denied { map_create } for pid=500 comm="syz.3.11301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 534.202453][ T29] audit: type=1400 audit(1746355638.188:45010): avc: denied { prog_load } for pid=500 comm="syz.3.11301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 534.221850][ T29] audit: type=1400 audit(1746355638.188:45011): avc: denied { prog_load } for pid=500 comm="syz.3.11301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 534.248725][ T29] audit: type=1326 audit(1746355638.208:45012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=483 comm="syz.1.11294" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 534.272437][ T29] audit: type=1326 audit(1746355638.208:45013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=483 comm="syz.1.11294" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 534.295973][ T29] audit: type=1326 audit(1746355638.228:45014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=483 comm="syz.1.11294" exe="/root/syz-executor" sig=0 arch=c000003e syscall=272 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 534.301846][ T509] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 534.319452][ T29] audit: type=1326 audit(1746355638.228:45015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=483 comm="syz.1.11294" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 534.319479][ T29] audit: type=1326 audit(1746355638.228:45016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=483 comm="syz.1.11294" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 534.319565][ T29] audit: type=1326 audit(1746355638.228:45017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=483 comm="syz.1.11294" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdb6578e969 code=0x7ffc0000 [ 534.420896][T23335] Process accounting resumed [ 534.523922][ T522] netlink: 'syz.6.11319': attribute type 3 has an invalid length. [ 534.531890][ T522] netlink: 132 bytes leftover after parsing attributes in process `syz.6.11319'. [ 534.592054][ T520] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 534.788886][ T531] xt_CHECKSUM: unsupported CHECKSUM operation 68 [ 535.214235][ T547] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 536.031908][ T574] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 536.095996][ T576] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 536.229997][ T585] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 536.609520][ T601] x_tables: ip_tables: REDIRECT target: used from hooks POSTROUTING, but only usable from PREROUTING/OUTPUT [ 538.042662][ T658] SELinux: syz.7.11358 (658) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 539.111605][ T690] syzkaller0: entered promiscuous mode [ 539.117154][ T690] syzkaller0: entered allmulticast mode [ 539.142928][ T690] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 539.152371][ T29] kauditd_printk_skb: 1037 callbacks suppressed [ 539.152389][ T29] audit: type=1400 audit(1746355643.158:46055): avc: denied { prog_load } for pid=696 comm="syz.3.11373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 539.179957][ T29] audit: type=1400 audit(1746355643.188:46056): avc: denied { execmem } for pid=696 comm="syz.3.11373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 539.231383][ T29] audit: type=1400 audit(1746355643.238:46057): avc: denied { create } for pid=696 comm="syz.3.11373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 539.257961][ T29] audit: type=1400 audit(1746355643.258:46058): avc: denied { execute } for pid=696 comm="syz.3.11373" name="file0" dev="tmpfs" ino=2676 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 539.281218][ T29] audit: type=1400 audit(1746355643.258:46059): avc: denied { module_request } for pid=696 comm="syz.3.11373" kmod="netdev-netdevsim0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 539.303665][ T29] audit: type=1400 audit(1746355643.258:46060): avc: denied { sys_module } for pid=696 comm="syz.3.11373" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 539.325874][ T29] audit: type=1400 audit(1746355643.288:46061): avc: denied { map_create } for pid=699 comm="syz.4.11374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 539.346566][ T29] audit: type=1400 audit(1746355643.348:46062): avc: denied { open } for pid=699 comm="syz.4.11374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 539.366605][ T29] audit: type=1400 audit(1746355643.348:46063): avc: denied { prog_load } for pid=699 comm="syz.4.11374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 539.368411][ T700] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 539.455649][ T29] audit: type=1400 audit(1746355643.348:46064): avc: denied { create } for pid=699 comm="syz.4.11374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 540.287932][ T731] macsec0: entered allmulticast mode [ 540.293879][ T731] veth1_macvtap: entered allmulticast mode [ 540.301959][ T731] veth1_macvtap: left allmulticast mode [ 540.307646][ T731] macsec0: left allmulticast mode [ 540.483280][ T753] syzkaller0: entered promiscuous mode [ 540.488908][ T753] syzkaller0: entered allmulticast mode [ 540.597673][ T760] macsec0: entered allmulticast mode [ 540.603059][ T760] veth1_macvtap: entered allmulticast mode [ 540.622404][ T760] veth1_macvtap: left allmulticast mode [ 540.630010][ T760] macsec0: left allmulticast mode [ 541.412482][ T787] syzkaller0: entered promiscuous mode [ 541.418018][ T787] syzkaller0: entered allmulticast mode [ 541.453050][ T785] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 541.752512][ T804] vhci_hcd vhci_hcd.0: pdev(7) rhport(0) sockfd(9) [ 541.759075][ T804] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 541.767154][ T804] vhci_hcd vhci_hcd.0: Device attached [ 541.803899][ T811] vhci_hcd vhci_hcd.0: pdev(7) rhport(1) sockfd(12) [ 541.810625][ T811] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 541.818071][ T811] vhci_hcd vhci_hcd.0: Device attached [ 541.853313][ T804] vhci_hcd vhci_hcd.0: pdev(7) rhport(2) sockfd(11) [ 541.860025][ T804] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 541.864953][ T815] SELinux: syz.3.11417 (815) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 541.867685][ T804] vhci_hcd vhci_hcd.0: Device attached [ 541.903734][ T811] vhci_hcd vhci_hcd.0: pdev(7) rhport(3) sockfd(14) [ 541.910378][ T811] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 541.918051][ T811] vhci_hcd vhci_hcd.0: Device attached [ 541.958793][ T804] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 541.967114][T13430] vhci_hcd: vhci_device speed not set [ 541.986094][ T804] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 542.003443][ T804] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 542.024481][ T804] vhci_hcd vhci_hcd.0: pdev(7) rhport(7) sockfd(23) [ 542.031121][ T804] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 542.039331][ T804] vhci_hcd vhci_hcd.0: Device attached [ 542.044923][T13430] usb 15-1: new full-speed USB device number 4 using vhci_hcd [ 542.074369][ T822] vhci_hcd: connection closed [ 542.074509][ T818] vhci_hcd: connection closed [ 542.079553][ T816] vhci_hcd: connection closed [ 542.079703][ T807] vhci_hcd: connection reset by peer [ 542.084630][ T812] vhci_hcd: connection closed [ 542.089643][ T6750] vhci_hcd: stop threads [ 542.103576][ T6750] vhci_hcd: release socket [ 542.108015][ T6750] vhci_hcd: disconnect device [ 542.135119][ T6750] vhci_hcd: stop threads [ 542.139485][ T6750] vhci_hcd: release socket [ 542.144116][ T6750] vhci_hcd: disconnect device [ 542.159163][ T6750] vhci_hcd: stop threads [ 542.163483][ T6750] vhci_hcd: release socket [ 542.167984][ T6750] vhci_hcd: disconnect device [ 542.183650][ T6750] vhci_hcd: stop threads [ 542.187942][ T6750] vhci_hcd: release socket [ 542.192454][ T6750] vhci_hcd: disconnect device [ 542.197469][ T6750] vhci_hcd: stop threads [ 542.201880][ T6750] vhci_hcd: release socket [ 542.206364][ T6750] vhci_hcd: disconnect device [ 542.647930][ T839] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 543.376814][ T873] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 543.729344][ T902] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 543.739099][ T902] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 544.195923][ T29] kauditd_printk_skb: 1385 callbacks suppressed [ 544.195940][ T29] audit: type=1400 audit(1746355648.198:47450): avc: denied { create } for pid=922 comm="syz.7.11459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 544.231356][ T29] audit: type=1400 audit(1746355648.228:47451): avc: denied { map_create } for pid=924 comm="syz.4.11461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 544.251405][ T29] audit: type=1400 audit(1746355648.228:47452): avc: denied { prog_load } for pid=924 comm="syz.4.11461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 544.270856][ T29] audit: type=1400 audit(1746355648.228:47453): avc: denied { module_request } for pid=924 comm="syz.4.11461" kmod="netdev-syz_tun" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 544.293694][ T29] audit: type=1400 audit(1746355648.228:47454): avc: denied { sys_module } for pid=924 comm="syz.4.11461" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 544.293717][ T29] audit: type=1400 audit(1746355648.228:47455): avc: denied { create } for pid=922 comm="syz.7.11459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 544.293738][ T29] audit: type=1400 audit(1746355648.228:47456): avc: denied { map_create } for pid=922 comm="syz.7.11459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 544.293759][ T29] audit: type=1400 audit(1746355648.228:47457): avc: denied { prog_load } for pid=922 comm="syz.7.11459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 544.293805][ T29] audit: type=1400 audit(1746355648.228:47458): avc: denied { prog_load } for pid=922 comm="syz.7.11459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 544.293866][ T29] audit: type=1400 audit(1746355648.228:47459): avc: denied { prog_load } for pid=922 comm="syz.7.11459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 544.363247][ T931] Falling back ldisc for ttyS3. [ 544.875826][ T954] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 545.094074][ T958] SELinux: syz.4.11473 (958) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 545.973280][ T1000] ÿÿÿÿ speed is unknown, defaulting to 1000 [ 546.059536][ T1006] binfmt_misc: register: failed to install interpreter file ./file2 [ 546.082089][ T1008] xt_hashlimit: max too large, truncated to 1048576 [ 546.730182][ T1011] ================================================================== [ 546.738310][ T1011] BUG: KCSAN: data-race in atime_needs_update / touch_atime [ 546.745643][ T1011] [ 546.747983][ T1011] write to 0xffff8881181749a8 of 4 bytes by task 1006 on cpu 0: [ 546.755625][ T1011] touch_atime+0x1e8/0x330 [ 546.760076][ T1011] shmem_file_splice_read+0x582/0x5d0 [ 546.765480][ T1011] splice_direct_to_actor+0x26c/0x680 [ 546.770866][ T1011] do_splice_direct+0xda/0x150 [ 546.775643][ T1011] do_sendfile+0x380/0x640 [ 546.780088][ T1011] __x64_sys_sendfile64+0x105/0x150 [ 546.785317][ T1011] x64_sys_call+0xb39/0x2fb0 [ 546.789928][ T1011] do_syscall_64+0xd0/0x1a0 [ 546.794448][ T1011] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 546.800358][ T1011] [ 546.802696][ T1011] read to 0xffff8881181749a8 of 4 bytes by task 1011 on cpu 1: [ 546.810251][ T1011] atime_needs_update+0x25f/0x3e0 [ 546.815311][ T1011] touch_atime+0x4a/0x330 [ 546.819673][ T1011] shmem_file_splice_read+0x582/0x5d0 [ 546.825076][ T1011] splice_direct_to_actor+0x26c/0x680 [ 546.830465][ T1011] do_splice_direct+0xda/0x150 [ 546.835251][ T1011] do_sendfile+0x380/0x640 [ 546.839692][ T1011] __x64_sys_sendfile64+0x105/0x150 [ 546.844913][ T1011] x64_sys_call+0xb39/0x2fb0 [ 546.849529][ T1011] do_syscall_64+0xd0/0x1a0 [ 546.854056][ T1011] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 546.859978][ T1011] [ 546.862314][ T1011] value changed: 0x2b70b048 -> 0x2c0946c8 [ 546.868034][ T1011] [ 546.870381][ T1011] Reported by Kernel Concurrency Sanitizer on: [ 546.876547][ T1011] CPU: 1 UID: 0 PID: 1011 Comm: syz.7.11491 Tainted: G W 6.15.0-rc4-syzkaller-00296-ge8ab83e34bdc #0 PREEMPT(voluntary) [ 546.890647][ T1011] Tainted: [W]=WARN [ 546.894458][ T1011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 546.904536][ T1011] ================================================================== [ 547.120202][T13430] usb 15-1: enqueue for inactive port 0 [ 547.125867][T13430] usb 15-1: enqueue for inactive port 0 [ 547.200776][T13430] vhci_hcd: vhci_device speed not set