last executing test programs: 3m36.29299102s ago: executing program 1 (id=1269): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x402) r4 = dup(r3) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000240)={0x23, 0x3, 0x12, 0x1, 0x0, 0x40, 0x0}) 3m36.243400871s ago: executing program 1 (id=1270): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) 3m36.155497422s ago: executing program 1 (id=1273): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x52d, &(0x7f0000000640)="$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") prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) openat$ppp(0xffffffffffffff9c, 0x0, 0x404101, 0x0) mkdir(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r0, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000380)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000010000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r3}, 0xc) 3m35.752177697s ago: executing program 1 (id=1281): socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) 3m35.603959359s ago: executing program 1 (id=1283): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r3, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) close_range(r2, 0xffffffffffffffff, 0x0) 3m35.405560962s ago: executing program 1 (id=1285): r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0x1, 0x4, 0x3f, 0x3202, @vifc_lcl_addr=@private=0xa010102, @remote}, 0x10) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x400}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='kfree\x00', r3, 0x0, 0x6}, 0x18) setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000040)={0x1, 0x8, 0x5, 0x5, @vifc_lcl_addr=@initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast}, 0x10) 3m35.390726982s ago: executing program 32 (id=1285): r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f0000000080)={0x1, 0x4, 0x3f, 0x3202, @vifc_lcl_addr=@private=0xa010102, @remote}, 0x10) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x400}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='kfree\x00', r3, 0x0, 0x6}, 0x18) setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000040)={0x1, 0x8, 0x5, 0x5, @vifc_lcl_addr=@initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast}, 0x10) 2.27749801s ago: executing program 5 (id=6126): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x15008}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454da, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}) 1.346341643s ago: executing program 5 (id=6145): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@ipv4_newrule={0xffffffffffffff0b, 0x1a, 0x1, 0x0, 0x25dfdbfd, {0x2, 0x0, 0x0, 0x1}}, 0x1c}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)=r2}, 0x20) socket$nl_route(0x10, 0x3, 0x0) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x6) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x10) write$tun(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="0123ffff0900fffe0cff4517002c0068000009119078ac1414bbe00000024e204e21001890780400000026d08d7bff01000000000000bc7a3c08ea52576f0b02b416f07c1e0aaafdcbe223ace290370d53120967257aab16d315"], 0x36) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x400, 0xffffffff, 0x6, 0x6, 0x0, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800, &(0x7f0000000880)={[{@errors_remount}, {@bsdgroups}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5e}}, {@noauto_da_alloc}, {@bsdgroups}, {@oldalloc}, {@nojournal_checksum}]}, 0x2, 0x459, &(0x7f0000000900)="$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") r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12, r4, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r5, 0x0, 0x30, 0x1, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)=[0x7], &(0x7f0000000500)=[0x2], 0x0, 0x1f}}, 0x3c) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=@newlink={0x48, 0x10, 0x401, 0x0, 0x4, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x343}}}}}}]}, 0x48}}, 0x0) 1.305343793s ago: executing program 5 (id=6147): syz_open_procfs(0x0, &(0x7f0000000180)='attr/prev\x00') r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, r2) r3 = add_key(&(0x7f0000000380)='logon\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000003c0)="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", 0xffffffab, r2) keyctl$chown(0x4, r3, 0xee00, 0xffffffffffffffff) keyctl$chown(0x4, r3, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) socket$inet6(0xa, 0x80002, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="05000000030000004d6d000000000000", @ANYRESOCT=r0, @ANYRES64=r4, @ANYBLOB="ad542d9e850c948703d808831d6272abfb433ae93a76f4a05ecdbe60dd2d59c394325180219e4aeb4b355c7af99f7b1c0eb39198e8bf881dd85607fa35f53f"], 0x48}}, 0x0) r6 = socket$pptp(0x18, 0x1, 0x2) close_range(r6, 0xffffffffffffffff, 0x0) 1.304689353s ago: executing program 5 (id=6148): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000d80000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/86, 0x328000, 0x1000, 0x22e}, 0x1c) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x41, 0x2) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_256={{0x304}, "7817765dc5914c3d", "c0a9b92b592a8e91a6934cb6b7b18f7a7a6eaa9cbd8ef3b0fbc326100136e976", "58a190f0", "2a1e833e7af32011"}, 0x38) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000280)=@gcm_256={{0x304}, "54164ace389ff5c0", "faad50724acb18aba4e3bc654d684ad9c694f3e96ca4b72643dd3689727968e9", "5cb6d054", "29a78ab9b0a4e8ae"}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000440)='kmem_cache_free\x00', r0}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x40, 0x10, 0x44b, 0x70bd2c, 0x25dfdbfd, {0x7a}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @gretap={{0xb}, {0x4}}}, @IFLA_ADDRESS={0xa}]}, 0x40}}, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCFLSH(r4, 0x5608, 0x0) ioctl$TIOCSSOFTCAR(r4, 0x541a, &(0x7f0000000180)=0x8bf) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000880)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) 1.304257173s ago: executing program 5 (id=6149): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000000900010073797a300000000078000000030a01030000000000000000050000000900010073797a300000000008000540000000001c000a800c00024000000000000000000c00014000000000000000000900030073797a3200000000280004"], 0xd4}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x1, 0x8, 0x201, 0x0, 0x0, {0x0, 0x0, 0x2}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x4004001) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$x25(0x9, 0x2, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0xbe, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "7b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af", "584cbf2649a50f2dbc43efa8698dfa871c51852e4451b57d037ad3c045942824251d7d17b5191584cdd4fbe40a27424d", "bcfd56f1375461caaa2f19935e6996c7096ffeeb0300000000000064", {"9a3bfbc1f39cb307b3472eb9cdb042d2", "643fcbb2c5a57df67d544af6e8dafe09"}}}}}}}, 0x0) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) pselect6(0x40, &(0x7f0000000200)={0x0, 0xfffffffffffffffe, 0xfffffffffffffffc, 0x3, 0x0, 0x0, 0x0, 0x1}, 0x0, &(0x7f0000000380)={0x1ff, 0x0, 0x0, 0x0, 0x8000000000000001, 0x1}, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmmsg(r2, &(0x7f00000057c0)=[{{0x0, 0x0, 0x0}, 0xa1}], 0x1, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000380)={0x20, 0x2, 0x1, 0x5, 0x0, 0x0, {0x5, 0x0, 0x8}, [@CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x401}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000841}, 0x8000) socket$inet(0x2, 0x4000000000000001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x14, 0x68}, [@ldst={0x6}]}, &(0x7f0000000080)='GPL\x00', 0xa, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000080)=0xc) 1.018929207s ago: executing program 3 (id=6166): bpf$PROG_LOAD(0x5, 0x0, 0x0) rseq(&(0x7f0000000300), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x11, &(0x7f0000000100)={[{@noblock_validity}, {@stripe={'stripe', 0x3d, 0x2}}, {@norecovery}, {@min_batch_time={'min_batch_time', 0x3d, 0x71d}}, {@abort}]}, 0x1, 0x610, &(0x7f0000000a40)="$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") arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000080)) keyctl$search(0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) mlockall(0x2) mount$bind(&(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x2050a, 0x0) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmctl$SHM_LOCK(r0, 0xb) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x3000003, 0x200000006c832, r1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) stat(&(0x7f0000000340)='./file0/file0\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x56) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) 961.420947ms ago: executing program 4 (id=6169): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x3, 0x7, 0x8, 0x4008, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0x2) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000002c0)=0x1) ioctl$TIOCVHANGUP(r2, 0x5437, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x9, 0x4, 0x3c56, 0x1, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001280)={0xffffffffffffffff, 0x20, &(0x7f0000001240)={&(0x7f0000001140)=""/165, 0xa5, 0x0, &(0x7f0000001200)=""/56, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf79d}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = socket$netlink(0x10, 0x3, 0x4) writev(r6, &(0x7f0000000100)=[{&(0x7f0000000000)="580000001400192340834b80043f679a10ff3d425f020048017f4e32f61bcdf1e422000000000100800000000000001000aadc28da3457e792945f64009400050028925aaa000000c600000000000000feff2c707f8f00ff", 0x58}], 0x1) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$int_in(r7, 0x5452, &(0x7f0000000040)=0xffffffffffffffff) connect$llc(r7, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @broadcast}, 0x10) 960.573397ms ago: executing program 3 (id=6179): socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1e000000000000fa04004000068c6aeed082e68d548182ae3a61e0557b7083c9c9de85ee709c0f8c2cc76f5ac5523cf323bb0a272bbf7613209a694f6b7979e72aa09e8c5b4aac8c20807015ecc843b904f421c5e006cffa15f0d19fc8712ee107fdd7c609692bf23e84c2e15032444a183799529455437c1d32fbf91dda06fda94ae0ec4101ce0daa1acb333d6e4658d289b662f9582e5ffd690fa00a01"], 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000000000000000000000006b07b4693865000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socket$kcm(0x11, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sysfs$1(0x1, &(0x7f00000001c0)='sysfs\x00') 895.760178ms ago: executing program 3 (id=6172): syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x5, 0xf, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0xfffffff7}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r7, 0x1, 0x3d, 0xffffffffffffffff, &(0x7f0000000000)) fcntl$lock(r6, 0x26, &(0x7f0000000380)={0x1}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r8, 0x26, &(0x7f0000000380)={0x0, 0x0, 0x103ff}) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x80, 0x7}) 895.286458ms ago: executing program 4 (id=6173): socket$inet6(0xa, 0x2, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0), 0x88002, 0x0) pwritev(r0, &(0x7f00000000c0)=[{0x0, 0x4f}, {&(0x7f0000000140)="de", 0x1}], 0x2, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, 0x0) r2 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xf, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="58000000020605000000000000000000000000001400078005001400090000000800124008001f000500010006000000050005000200000005000400000000000900020073797a31000000000c000300686173683a6970"], 0x58}}, 0x0) sendmsg$kcm(r2, &(0x7f0000000040)={&(0x7f0000000280)=@caif=@dgm={0x25, 0x9, 0x9}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000580)="62042700590200000000002f1eafbcf706e12b30087f5c582d26116642c47a5f8786ee601e65ab3c06d4b8bf4a81cb3e247345af215542f41ddf82f618438a34f90186cee8441e2305e495d04ad68ab8fef69df82de6456fbb48b63f60c9c9097be968ea872c4801e5d0711b4373c7224ed7a9cbd49d40f82bdb6afc0036824be26fc96e49a70e90797e6caa1b38ddacb3cb2b3eac7c068a185b644582f25edfa3d6a46e2a894ca809a422a6a29bd7145bb6e7992570484d6a710292ea0c3f97b7cbff701684b13c5593262534a7af9eab48f2ca2d74d9a4de33", 0xfe5f}, {&(0x7f0000000840)="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", 0x113}, {&(0x7f00000003c0)="0a985d7879f1bbff16c7d66e33657e452299fd0ef8c2afda588eb05891b7da030e01452a7986bea19b59c98dc2996c0ea09604d00ea48336d0c813d83025aca8623a5915ddddce2c11c5e374f2e0f387d2398fe0b899ff60dc7a73addcf253cf32aafbe2b9f90799e7fc583bdd9b564697ba988080270bdcea4714219a2d4c4b985418cc8fbcd2935f4e8b229fffb0d86fb286e3553a8b3ac02badc66ada5fceabe5f63c79da96e641a45901128063d6e1e31b11bcfbc3e70bd3c8c6c0bea0", 0xbf}], 0x3}, 0x8001) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYBLOB="792dc08e055fe275704ddeed55b16a917cfe47b70f25bce410dc7d4b4fc2984f1a08b5e083ff5d7ee22643affd1f78a6ba7f60e92fa6040a26f5816ae28b4f4d86ed249629d38be89e712f11eddec6915bc621b886af59d01765bc0a1223580b841d395d9f9439a8b07e7cc29e478e16308f1d2a2ddb", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='kmem_cache_free\x00', r4}, 0x18) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@multicast, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x33, 0x0, @private, @broadcast}, {0x0, 0x0, 0x8}}}}}, 0x0) mremap(&(0x7f0000dde000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000bb3000/0x1000)=nil) 876.243098ms ago: executing program 4 (id=6174): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r0}, 0x8) fsopen(&(0x7f0000000080)='securityfs\x00', 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) ptrace$peeksig(0x4209, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r5, &(0x7f0000000e00)=[{{&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@lsrr={0x83, 0x7, 0x4, [@loopback]}]}}}], 0x18}}], 0x1, 0x0) 822.058659ms ago: executing program 0 (id=6175): r0 = syz_open_dev$mouse(&(0x7f0000000040), 0x2, 0x2000) preadv2(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x9, 0x30) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f00000006c0), 0x1, 0x513, &(0x7f0000000c40)="$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") bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000020b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket(0x1, 0x4, 0x1) keyctl$restrict_keyring(0xf, 0xfffffffffffffffc, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x403, 0x70bd27, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8020}, [@IFLA_LINK={0x8}, @IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6, 0x1, 0x2}]}}}]}, 0x44}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYRES32=r0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x50) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x8000, &(0x7f0000000880)=ANY=[@ANYBLOB="002918d910d46be7099c66b02010b1f0b7c3dc1dabe625969fb0adc922385af53d57a1d35dd71c90d9dd649b53142dd3d4108b4c7db82e8475d5bb6fa2fa626cd92c7326ce1ba2f33b0aef2b2164e01d910058b51684696959ea7f5a607a6572d2640cf9312a07000000260e3651a0cbfd2c080990fb4c76e9e613a759863734a70d0600ec77e8ba76aacbb21e4b903aa4873a9951f269a9c0f87805a1a0cbdf6b8644a1de05a8d9dd9687d67c8af7f68cb59e60d1fbefb49b93d6b72cce4162edc4468a13987d94d428df36915621aeff6dc1358a7331fa69e05c417c2e1e6b8dc29c496c76d02dfc2d7b48616fb3f01b221f4f8f484a00090964922de8909a1f9f7ef655a12a68a56cb341a8fba4cd81cedec9cb518d13d2a2564427b63b037494748a24daa21fe1256df68d000b2778bf0437cc642cd83c5a1b34eeffdf93ecbd85bb340eeef68dd60101769c74f94d217264c171feea0305bfc87c36247d90b129a9973f00000001d99b195d2f75653a0193672783c6dbca5d1445110621d8095064f0a034f492cf5aa4767a772d6f4967722546bfd83d3202f76c20a9d7f40f9e7818d77129df7fd072804e0227ecaa03dddd303a318d6f7763ce011543587e6a306780ca2f37db7e8a5b64a5059ac91ff2110e40ea13d70e1504653ba9eebcf61b427797fb3fd79d2bb9aaa13c9729fe323c4ac222991981381e004684fb200b17d2f6ede181067662ad8a31f45b613869ca8fc5b1dbe62407a1f6dcb86a4c430210e9bcfca9b83283b87316c4d17f388e0bab0500000092a82e12f8e5348f11e7739033e9081bfc598746cf032fa55d0300470000000019ac65f89ca7d96da3ca2db52f8ec80462fddf42dbbca24b720000000000000000000000000000005214e7febdbc0033d6402c34aa96940474"], 0x1, 0x1221, &(0x7f0000002300)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) 620.996072ms ago: executing program 0 (id=6177): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x1, @perf_bp={0x0, 0x13}, 0x2, 0xffffffff, 0x6, 0x6, 0x4, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000001823", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d08000b000000e8fe55a1180015000600142603600e1209000d00e8030000a80016000a0003", 0x37}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="d8000000210081044e81f782db44b90402", 0x11}], 0x1}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x33fe0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x4) r6 = socket(0x10, 0x3, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x10d, 0xa3, &(0x7f0000000000), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newqdisc={0x74, 0x24, 0xf0b, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, r7, {0x0, 0x1}, {0xffff, 0xffff}, {0xd, 0xc}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x20, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0x4}, @TCA_CAKE_BASE_RATE64={0xc, 0x2, 0x6}, @TCA_CAKE_RTT={0x8, 0x7, 0x3}]}}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x5, 0x5, 0x12, 0x400, 0x1, 0x200}}, {0x4}}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x44004}, 0x0) ioctl$VT_ACTIVATE(r5, 0x4b4a, 0xffffffffffffff15) 618.280232ms ago: executing program 2 (id=6178): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}, 0x18) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000540)='./bus\x00', 0x8800, &(0x7f00000006c0)={[{@errors_remount}, {@sysvgroups}, {@minixdf}]}, 0x1, 0x50c, &(0x7f0000001000)="$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") r0 = open(&(0x7f00000002c0)='./file2\x00', 0x10d242, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'wg0\x00'}) inotify_init1(0x80400) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000300)={'gre0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_alloc\x00', r2}, 0x10) creat(&(0x7f0000000080)='./bus\x00', 0xf9) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}, {0x0, 0x1}}, [@qdisc_kind_options=@q_cake={{0x9}, {0xc, 0x2, [@TCA_CAKE_OVERHEAD={0x8, 0x6, 0x23}]}}]}, 0x3c}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r0, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0], 0x0, 0xaa, &(0x7f0000000680), 0x0, 0x0, 0x0, &(0x7f0000000740), 0x8, 0xe9, 0x8, 0x0, 0x0}}, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, 0x0, 0x400c0) 595.078692ms ago: executing program 2 (id=6180): socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000580)=ANY=[], 0x34}, 0x1, 0x0, 0x0, 0x48c0}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000240000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x94b9}, 0x18) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x143042, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000300000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 575.871242ms ago: executing program 2 (id=6181): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x8, 0x3, 0x498, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x3f0, 0xffffffff, 0xffffffff, 0x3f0, 0xffffffff, 0xb, 0x0, {[{{@ipv6={@dev={0xfe, 0x80, '\x00', 0x1a}, @dev={0xfe, 0x80, '\x00', 0x28}, [0xffffff00, 0xffffff00, 0x0, 0xff000000], [0xff, 0x0, 0x9f19fd7a5e924fa7, 0xff], 'macvtap0\x00', 'bridge0\x00', {0xff}, {0xff}, 0x2b, 0x7, 0x5, 0x10}, 0x0, 0x1a0, 0x1c0, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0x20}, {0x81, 0x0, 0x24, 0x0, 'syz1\x00'}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x1a0, 0x208, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000dfff75390000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r3}, 0x10) r4 = io_uring_setup(0x5bec, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000140), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x8008551d, &(0x7f0000000300)={0x6652, 0x7, [{0xc, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x9}, {0xe}, {0xa}, {0xd}]}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r6}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) r7 = msgget$private(0x0, 0x10) msgctl$MSG_INFO(r7, 0xc, &(0x7f0000000000)=""/221) sendmsg$sock(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000b00)="0141f3e5a1d5ad4d87b1aa88490b52282a8833e63421eccac5edf7f24682a633bb2977d846a6acb3f19a00c18c6939d13b743ce5a78e62a86abaa97d1500d444ab5ea184d0f7af80eea4dd4bb14fe29f84daf386be37a178cd9bdfba1501b12096102943a1d35db6", 0x68}, {&(0x7f0000000b80)="4d766254bf10ddbdab8a43bcfb5106305a87f5c61dd2b97c293ff5535406c9a0529429378e1f1c35ac2c7bce11e0df6f751935b5e09df79cdfdbeca03fa6db08dc5738e869c8fabfb804ea8c70380d8b6c01fe22809ab3bae4448d791b6ce1d3359b61640bcc61374a84020321d0bdd2bdc182", 0x73}, {&(0x7f0000000c00)="5257cb4743147f119992dd756cc6dfb9aa31b98efc4b4087277ea30c75a7ae38d6e68e306a0a2fb5f78d8d712dc8df56f9ebc8fca7be0aadaf79eca158cdab3a6a15eb2c259b2bc01d7b634d4940da4288b4c8f504e90573f2a10c9e986807ce89b3ca9e7c7ebb2f7827e4fd0f542ea94f5e3aa3a9cb83d1f89ddefb48d4b6f2f46f456606384945ed7fc74044689750d476698f79b195ddcfd7be8a9e9f32f6d3c230bd", 0xa4}, {&(0x7f0000000cc0)="cd18b71c7153236a65b5c2dd2311deecea621b05ca386d582a0aa48422503907d1053952003b683b281f78986b33dd17914bf8d4555c72f0294cfb816ab2bac0798841b7a7843015a0fd5d3d1849bd7ebfe17af0f193c5a66213f5040a2b130bc02732e8ec53735fcc51ad81d128a08f40b97b", 0x73}, {&(0x7f0000000d40)="8969380abd5c55cd179ace689ffd4f5ac5376722f36461b76c991535f78e283ed09b20e90648de561c8cc8a3bdde072d75acab81fb7e20a4b0f2cf9452e2fb6b49be", 0x42}, {&(0x7f0000000e00)="27c470dba733b969be207a65cd244a2db7f1b5fe820cea85ba8ca4ff82c935146ae869bc484bb1c8db269a1ed5e68c1a3b0321d179646cc14bf62258668adfc25a28156c50aed5d63f3e6603c0f1d310377dc456ea92ca3c53916c50861f1175a4287fb2", 0x64}], 0x6, &(0x7f0000000f00)=[@txtime={{0x18, 0x1, 0x3d, 0x8a7}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffffb}}], 0x30}, 0x40001) 528.490133ms ago: executing program 2 (id=6182): socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1e000000000000fa04004000068c6aeed082e68d548182ae3a61e0557b7083c9c9de85ee709c0f8c2cc76f5ac5523cf323bb0a272bbf7613209a694f6b7979e72aa09e8c5b4aac8c20807015ecc843b904f421c5e006cffa15f0d19fc8712ee107fdd7c609692bf23e84c2e15032444a183799529455437c1d32fbf91dda06fda94ae0ec4101ce0daa1acb333d6e4658d289b662f9582e5ffd690fa00a01"], 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000000000000000000000006b07b4693865000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socket$kcm(0x11, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) sysfs$1(0x1, &(0x7f00000001c0)='sysfs\x00') 527.992543ms ago: executing program 0 (id=6183): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x3, 0x7, 0x8, 0x4008, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20400, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0x2) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000002c0)=0x1) ioctl$TIOCVHANGUP(r2, 0x5437, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x9, 0x4, 0x3c56, 0x1, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001280)={0xffffffffffffffff, 0x20, &(0x7f0000001240)={&(0x7f0000001140)=""/165, 0xa5, 0x0, &(0x7f0000001200)=""/56, 0x38}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf79d}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = socket$netlink(0x10, 0x3, 0x4) writev(r6, &(0x7f0000000100)=[{&(0x7f0000000000)="580000001400192340834b80043f679a10ff3d425f020048017f4e32f61bcdf1e422000000000100800000000000001000aadc28da3457e792945f64009400050028925aaa000000c600000000000000feff2c707f8f00ff", 0x58}], 0x1) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$int_in(r7, 0x5452, &(0x7f0000000040)=0xffffffffffffffff) connect$llc(r7, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @broadcast}, 0x10) 527.534563ms ago: executing program 4 (id=6184): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad433ec50000000f00008095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r1 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r1, &(0x7f0000000040), 0xc) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x2) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="03010000b5"], 0xc8) r3 = syz_io_uring_setup(0xf2e, &(0x7f00000000c0)={0x0, 0x3725, 0x0, 0x0, 0x37c}, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r3, 0x47ba, 0x3e80, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x4004, @fd_index=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}) io_uring_enter(0xffffffffffffffff, 0x3516, 0x0, 0x0, 0x0, 0x0) r6 = socket(0x10, 0x3, 0x0) connect$netlink(r6, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) sendmsg$nl_route(r6, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@bridge_getlink={0x34, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'wg0\x00'}]}, 0x34}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r7 = socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000000300)={@mcast1, @mcast2, @loopback, 0x2, 0x0, 0x0, 0x0, 0x7, 0xca0167}) 527.235973ms ago: executing program 2 (id=6185): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000040000000c0000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sysfs$1(0x1, &(0x7f00000001c0)='sysfs\x00') kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000200)={0xffff, 0x0, 0x0, 0x800a, 0x2, "5f7300fbffffff00"}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) syz_open_dev$usbfs(&(0x7f0000002000), 0xd, 0x20041) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)='\\\\@[*#)\x00', 0xfffffffffffffffe) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000003c0)={'icmp6\x00'}, &(0x7f0000000500)=0x1e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='mm_page_alloc\x00', r1}, 0x10) unshare(0x66000080) 461.393983ms ago: executing program 4 (id=6186): r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f00000000c0)={{0x4, 0x30}, 0x100, './file0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2c) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r4, 0x402, 0x8000003d) r5 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r5, 0x402, 0x8000003d) close_range(r4, r5, 0x0) setuid(0xee00) r6 = syz_pidfd_open(r3, 0x0) move_pages(0x0, 0x20a0, &(0x7f0000000040), &(0x7f0000001180), &(0x7f0000000000), 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="240000001900010000000000000000001c140000fe0400010000000008000100"], 0x24}, 0x1, 0x0, 0x0, 0x40010}, 0x0) pidfd_send_signal(r6, 0x2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newqdisc={0x50, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x24, 0x2, [@TCA_HTB_DIRECT_QLEN={0x8, 0x5, 0x81}, @TCA_HTB_INIT={0x18, 0x2, {0x3, 0x1, 0x1}}]}}]}, 0x50}}, 0x0) 446.488164ms ago: executing program 5 (id=6187): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000020b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='sched_switch\x00'}, 0x18) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000140)={0x14, {{0x29, 0x0, 0x8000000, @private2}}}, 0x88) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) timer_getoverrun(0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r4, &(0x7f0000004200)='t', 0x1) sendfile(r4, r2, 0x0, 0x3ffff) sendfile(r4, r2, 0x0, 0x7ffff000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 423.625094ms ago: executing program 4 (id=6188): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) clock_nanosleep(0xfffffff2, 0xca9a3b, &(0x7f0000000000)={0x77359400}, 0xfffffffffffffffe) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x14) fcntl$setsig(r2, 0xa, 0x13) fcntl$setlease(r2, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) unshare(0x8000000) r3 = semget$private(0x0, 0x1, 0x4ac0c2fc29e33682) semtimedop(r3, &(0x7f0000000100)=[{0x0, 0x1000, 0x1000}], 0x1, 0x0) unshare(0x2c040000) 417.375504ms ago: executing program 0 (id=6189): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0xfffffff9, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000040), &(0x7f00000003c0)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendto$packet(r0, &(0x7f0000000180)="0b031407e0ff640f0200475400f6a13bb1000e", 0x13, 0x0, &(0x7f0000000140), 0x14) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x0) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000c40)={0x0, 0xfe72}) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) fallocate(r4, 0x0, 0x0, 0x2c2) ioctl$MON_IOCX_GETX(r3, 0x80089203, &(0x7f0000000a40)={0x0, 0x0}) syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) 343.016655ms ago: executing program 0 (id=6190): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x8008000000010, &(0x7f00000003c0)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e0", 0xb8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sigaltstack(&(0x7f0000001b80)={&(0x7f0000000b80)=""/4096, 0x1, 0x1000}, 0x0) sigaltstack(&(0x7f0000001dc0)={0x0, 0x80000002}, &(0x7f0000001e40)={0x0}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000001040)=@nat={'nat\x00', 0x8, 0x5, 0x6c0, 0x390, 0xf0, 0xffffffff, 0x2a0, 0x390, 0x5f0, 0x5f0, 0xffffffff, 0x5f0, 0x5f0, 0x5, 0x0, {[{{@uncond, 0xb7030000, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x1d, @ipv6=@private1, @ipv6=@private0, @port, @gre_key}}}, {{@uncond, 0x0, 0x168, 0x1b0, 0x0, {}, [@common=@unspec=@conntrack2={{0xc0}, {{@ipv4=@dev, [], @ipv6=@private1, [], @ipv6=@private1, [], @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x1, @ipv4, @ipv6=@local, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast1, @local, [], [], 'wg1\x00', 'virt_wifi0\x00'}, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@multicast1, @gre_key, @icmp_id}}}, {{@ipv6={@rand_addr=' \x01\x00', @ipv4={'\x00', '\xff\xff', @empty}, [], [], 'dummy0\x00', 'syzkaller0\x00'}, 0x0, 0x218, 0x260, 0x0, {}, [@common=@inet=@sctp={{0x148}}, @common=@mh={{0x28}, {"0c06"}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x726) signalfd(0xffffffffffffffff, &(0x7f0000000080)={[0x9]}, 0x8) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x200000000000011, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="02120000020000"], 0x10}}, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 342.103646ms ago: executing program 0 (id=6191): socket$nl_route(0x10, 0x3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x10, &(0x7f00000004c0)={[{@i_version}, {@nodiscard}, {@min_batch_time={'min_batch_time', 0x3d, 0x3ff}}]}, 0x1, 0x3f7, &(0x7f0000003080)="$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") creat(&(0x7f00000000c0)='./file1\x00', 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000400000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000003000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r0}, 0x10) r1 = gettid() capset(0x0, &(0x7f0000000140)) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000096c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@newtaction={0x74, 0x30, 0xb, 0x0, 0x0, {}, [{0x60, 0x1, [@m_vlan={0x5c, 0x1, 0x0, 0x0, {{0x9}, {0x30, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{0x9, 0x9, 0x2, 0x400000}, 0x3}}, @TCA_VLAN_PUSH_VLAN_ID={0x6}, @TCA_VLAN_PARMS={0x0, 0x2, {{0x4, 0x5, 0x5, 0x6, 0x6}, 0x1}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}]}]}, 0xd6}, 0x1, 0x0, 0x0, 0x8000}, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x3, 0x2, 0x400}, {0x2, 0x2, 0x1000}, {0x2, 0x3, 0x1800}, {0x2, 0x5540, 0x800}, {0x0, 0xe, 0x3000}, {0x1, 0x9, 0x800}, {0x2, 0xfbbd, 0x800}], 0x7, &(0x7f00000006c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=@updpolicy={0xbc, 0x19, 0x1, 0x0, 0x0, {{@in=@private, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x4}]}, 0xbc}}, 0x40080) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) socket$nl_generic(0x10, 0x3, 0x10) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r3 = mq_open(&(0x7f0000000380)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\x01\x00\x00\x00a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|\x00\x17\xc0\xa3\xd5\xf9\xaa\x98/\xa4v\xe4)I\xf3+[e\x95\x89\x99\xca\x8e\xc5\xd3\\T\xf0\x1a|5\xfff\xff\x99\xa4\xbb\x9e#oR\xa4\xf1\xba\x04c\xb3-\xf7R\xb85\xb5\xdb\xe9?\xfa/\xdf\xb4R\xbfx=\v_j\x8e\xb0\'\xf4\xe5\xff!\xe1\xbf\x82e\xb1\x9b\x8d\xf3L\t\xd21\x9cbwV\xc8\xcc\xe4\x96M_w\xbc\xdf9\b\r\xf6\x95\xae\xb5,\x92\x8c\xc0DQm\x80\xd1w\xa2\x1a\x12Z\xe5\xf4H\xf7D\n\x96J\x93\xfb\xf0$\x9f\xf7\xa2\xae$O\xa3\xb6\xf5\x98\xd3\v\x00\x86\xa5\x8b\x81\x04\xaf\x03s\xe5\x86>\x0e\xa6\xe6\x1aV\x17\x8b\xed\xa7\'\xd0\r_\xe8,XVR\x13\xe5%\xb9\x88\xb8W@D\'\x17A\xc8\x80\x02J\xd4V\x00wH(\xc5v\f\xc9\xb6\xdf..$\xe6P(_\xf1\'\xc1:\xa3\xcb\xd9\xd1\xc7\x13\x99Md\x1dc\xf1\'j\x03!\x13\xd1\xb8\xbf\xe6\xb2M\b/\rp\xa5\x00\x00\x00\x00', 0x40, 0x9, 0x0) fcntl$setlease(r3, 0x400, 0x0) mq_open(&(0x7f0000000b40)='eth0\x00\xdd\xad4=2k\xf1\x05\x9b\x91y\xe1;F\xa2\x8df\xe9\x04\x00\x00\x00\x00\x0078z=\x8f\xd5F\xa4AR\xc7\x9f.\xdc\xdb\"A\x16\xd8\x19\xf1lZ\xc8\x93\xda\xf2\xc9\xe8h[u8\xc6\xfa\x9ep\xbe\a\xe2\xf5\xa3Y\x9f\xe1\x04gM\x99K$\r\xf1G\xee\xe1\xbd\x1e\xdf\xe1\x9c\x19\xda\xd3\x94EL\xca\x88\x85Q\x02\xd9L\x90\xeb%/\xb1\xeb\x11uP7\x1f\xd9b\xebF\xf8\x88\xf0\xac.\x94\xfc\v\xb1W\xef~+n\xb1\x9b\x02n]xr\xb3\x80\xbc>\xe8XX\xe6\x12\xf3\xc9\xd5\xf8\xd1\x8d\xcb9\xbf\xb0(<\xeb\x92\x8a\x16\xb7\x11^\xb6\xb7n\xd5\xb5\x00[\xdf\x94\x00\r\x95\x17\xa1h\xf8\x00\x00\x00\"\xa0\x05\xcc^\x90c\xc9}\xb8\ny\xf4\xe1\xb4.\xa4\a\x05\xbb}\x91\xf4C\xf5O\xf1a\x12\b\x86\xa16\xbb}C\xc9\x1d\\\xedD\x14\xb1w\x1e\xa0\xc1E\xb5\xf8\xab\xfb\xd9\x93\xb8vJ\x85p\xb5n\x1b\xe4\xd5g\xae\xe4\xeb\xca\xae\x1bs\xd4\xf0\xc0\xdag\x19R4\xd4\xd4\x04\xfc\x04Zb\xf6\xba\xf8B\xf6YU\xcd\xf2\xdb\xb5\xa2\xda\xdf\x8dD\xef`\x13\x15$\xceq\xd7j\xd7\xe3V\xf2\xa2\x95\xcf\x18T\xf1\xb0\xf3\xf8O', 0x1, 0x0, 0x0) 326.299826ms ago: executing program 2 (id=6192): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f00000002c0)=ANY=[], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x101301) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x11, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000e, 0x11, r1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) 1.15818ms ago: executing program 3 (id=6193): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, 0x0, 0x1) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x1, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="93430000520033"], 0xfe33) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r2, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000380)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r5}, 0x10) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000840)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@const={0x3, 0x0, 0x0, 0xa, 0x1}, @float={0x9, 0x0, 0x0, 0x10, 0x4}, @volatile={0x179, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x4e, 0x2e, 0x0, 0x0, 0x61, 0x61, 0x2e]}}, &(0x7f0000000800)=""/33, 0x45, 0x21, 0x0, 0x0, 0x10000, @value}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001a80)={0xffffffffffffffff, 0x20, &(0x7f0000000980)={&(0x7f00000008c0)=""/175, 0xaf, 0x0, &(0x7f0000001a00)=""/73, 0x49}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0xf4cfbed519ddf383, 0xc, &(0x7f00000006c0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ldst={0x0, 0x3, 0x4, 0x6, 0x6, 0x40, 0x4}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xf}], &(0x7f0000000740)='syzkaller\x00', 0x918d, 0x1000, &(0x7f0000000a00)=""/4096, 0x41100, 0x22, '\x00', 0x0, @fallback=0x22, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x1, 0x0, 0x2, 0x2}, 0x10, r9, 0xffffffffffffffff, 0x0, &(0x7f0000001ac0)=[r7, r7, r2], 0x0, 0x10, 0xe5c, @void, @value}, 0x94) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)=[{{0x0, 0xffffff3f, &(0x7f00000003c0), 0x2}}], 0x1, 0x200440d4) 441.13µs ago: executing program 3 (id=6194): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) connect$phonet_pipe(r1, &(0x7f0000000040)={0x23, 0x2e, 0x9}, 0x10) socket(0x10, 0x3, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, 0x0, 0x0) r3 = socket(0x1e, 0x4, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r4, 0x0, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0x20000000) sendmmsg(r2, 0x0, 0x0, 0x200088d5) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x28, 0x5, 0x0) io_setup(0x4, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 0s ago: executing program 3 (id=6195): getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000140)=0xc) ptrace$peeksig(0x4209, r0, &(0x7f0000000180)={0x100004, 0x1}, &(0x7f0000000440)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000380)=[{0x200000000006, 0x1, 0x7, 0x7ffc1ffb}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a0000"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5e, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r1}, 0x10) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) r2 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x4, 0x0) syz_pidfd_open(r2, 0x0) socket$l2tp6(0xa, 0x2, 0x73) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x88040, 0x0) fcntl$setlease(r3, 0x400, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0e000000040000000400000003"], 0x48) fsopen(&(0x7f0000000100)='configfs\x00', 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r5, &(0x7f0000000340)=[{&(0x7f00000008c0)=""/201, 0xc9}], 0x1, 0x0, 0x0) kernel console output (not intermixed with test programs): ] audit: type=1326 audit(1745479816.719:5329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11782 comm="syz.4.2977" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 174.399592][T11785] loop5: detected capacity change from 0 to 512 [ 174.499227][T11785] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 174.536095][T11808] xt_hashlimit: size too large, truncated to 1048576 [ 174.543005][T11808] xt_hashlimit: Unknown mode mask 80FF, kernel too old? [ 174.556498][T11785] ext4 filesystem being mounted at /349/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 174.651312][ T6889] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 174.833244][T11841] loop4: detected capacity change from 0 to 512 [ 174.840948][T11841] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 174.870242][T11841] EXT4-fs error (device loop4): ext4_quota_enable:7122: comm syz.4.3000: Bad quota inum: 29696, type: 1 [ 174.888981][T11841] EXT4-fs warning (device loop4): ext4_enable_quotas:7170: Failed to enable quota tracking (type=1, err=-117, ino=29696). Please run e2fsck to fix. [ 174.916024][T11841] EXT4-fs (loop4): mount failed [ 175.063405][T11848] xt_hashlimit: size too large, truncated to 1048576 [ 175.543210][T11871] loop5: detected capacity change from 0 to 512 [ 175.550184][T11871] EXT4-fs: Ignoring removed oldalloc option [ 175.558312][T11871] EXT4-fs error (device loop5): ext4_xattr_inode_iget:433: comm syz.5.3011: Parent and EA inode have the same ino 15 [ 175.571223][T11871] EXT4-fs error (device loop5): ext4_xattr_inode_iget:433: comm syz.5.3011: Parent and EA inode have the same ino 15 [ 175.584010][T11871] EXT4-fs (loop5): 1 orphan inode deleted [ 175.590535][T11871] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 175.616369][ T6889] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 175.651621][T11876] syzkaller0: entered allmulticast mode [ 175.657418][T11876] syzkaller0: entered promiscuous mode [ 175.665028][T11876] syzkaller0 (unregistering): left promiscuous mode [ 175.671828][T11876] syzkaller0 (unregistering): left allmulticast mode [ 175.807608][T11884] loop5: detected capacity change from 0 to 764 [ 175.884906][T11891] loop5: detected capacity change from 0 to 1024 [ 175.892320][T11891] EXT4-fs: Ignoring removed nobh option [ 175.898103][T11891] EXT4-fs: Ignoring removed bh option [ 175.909710][T11891] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 175.927074][T11891] EXT4-fs error (device loop5): ext4_mb_mark_diskspace_used:4113: comm syz.5.3019: Allocating blocks 385-513 which overlap fs metadata [ 175.946312][T11891] EXT4-fs (loop5): pa ffff888100566a10: logic 16, phys. 129, len 24 [ 175.954544][T11891] EXT4-fs error (device loop5): ext4_mb_release_inode_pa:5364: group 0, free 0, pa_free 8 [ 175.965775][T11891] EXT4-fs (loop5): Delayed block allocation failed for inode 15 at logical offset 3 with max blocks 1 with error 28 [ 175.978308][T11891] EXT4-fs (loop5): This should not happen!! Data will be lost [ 175.978308][T11891] [ 175.988213][T11891] EXT4-fs (loop5): Total free blocks count 0 [ 175.994430][T11891] EXT4-fs (loop5): Free/Dirty block details [ 176.000479][T11891] EXT4-fs (loop5): free_blocks=128 [ 176.005614][T11891] EXT4-fs (loop5): dirty_blocks=0 [ 176.010692][T11891] EXT4-fs (loop5): Block reservation details [ 176.016969][T11891] EXT4-fs (loop5): i_reserved_data_blocks=0 [ 176.033750][T11898] loop4: detected capacity change from 0 to 2048 [ 176.059488][T11898] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 176.067836][T11902] dummy0 speed is unknown, defaulting to 1000 [ 176.071901][T11898] ext4 filesystem being mounted at /660/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 176.112963][T11902] lo speed is unknown, defaulting to 1000 [ 176.141718][T11907] wg2: left promiscuous mode [ 176.146369][T11907] wg2: left allmulticast mode [ 176.160049][T11907] wg2: entered promiscuous mode [ 176.164970][T11907] wg2: entered allmulticast mode [ 176.339185][ T6498] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm kworker/u8:55: bg 0: block 345: padding at end of block bitmap is not set [ 176.376501][ T6498] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 16 with max blocks 382 with error 117 [ 176.389192][ T6498] EXT4-fs (loop4): This should not happen!! Data will be lost [ 176.389192][ T6498] [ 176.784248][T11934] O3ãc¤±: renamed from bridge_slave_0 [ 176.874307][T11940] dummy0 speed is unknown, defaulting to 1000 [ 177.035163][T11940] lo speed is unknown, defaulting to 1000 [ 177.182403][T11959] xt_hashlimit: size too large, truncated to 1048576 [ 177.189211][T11959] xt_hashlimit: Unknown mode mask 80FF, kernel too old? [ 177.236542][T11962] SELinux: failed to load policy [ 177.346233][T11969] pim6reg1: entered promiscuous mode [ 177.351819][T11969] pim6reg1: entered allmulticast mode [ 177.553817][T11982] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3055'. [ 177.606463][ T6486] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 398 with max blocks 1 with error 117 [ 177.619137][ T6486] EXT4-fs (loop4): This should not happen!! Data will be lost [ 177.619137][ T6486] [ 177.651269][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 177.716017][T11993] dummy0 speed is unknown, defaulting to 1000 [ 177.840031][T11993] lo speed is unknown, defaulting to 1000 [ 178.021777][T12009] dummy0 speed is unknown, defaulting to 1000 [ 178.109943][T12009] lo speed is unknown, defaulting to 1000 [ 178.183804][T12015] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3067'. [ 178.764790][T12035] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 179.127856][T12040] llcp: nfc_llcp_send_ui_frame: Could not allocate PDU (error=-512) [ 179.159077][T12040] llcp: nfc_llcp_send_ui_frame: Could not allocate PDU (error=-512) [ 179.221580][ T29] kauditd_printk_skb: 124 callbacks suppressed [ 179.221603][ T29] audit: type=1326 audit(1745479821.829:5454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12043 comm="syz.4.3078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fca994c5927 code=0x7ffc0000 [ 179.335175][ T29] audit: type=1326 audit(1745479821.869:5455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12043 comm="syz.4.3078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fca9946ab39 code=0x7ffc0000 [ 179.358671][ T29] audit: type=1326 audit(1745479821.869:5456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12043 comm="syz.4.3078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fca994c5927 code=0x7ffc0000 [ 179.382183][ T29] audit: type=1326 audit(1745479821.869:5457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12043 comm="syz.4.3078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fca9946ab39 code=0x7ffc0000 [ 179.405719][ T29] audit: type=1326 audit(1745479821.869:5458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12043 comm="syz.4.3078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 179.429507][ T29] audit: type=1326 audit(1745479821.869:5459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12043 comm="syz.4.3078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=306 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 179.453244][ T29] audit: type=1326 audit(1745479821.869:5460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12043 comm="syz.4.3078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 179.476924][ T29] audit: type=1326 audit(1745479821.869:5461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12043 comm="syz.4.3078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 179.500521][ T29] audit: type=1326 audit(1745479821.869:5462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12043 comm="syz.4.3078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 179.523982][ T29] audit: type=1326 audit(1745479821.869:5463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12043 comm="syz.4.3078" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 179.922503][T12071] dummy0 speed is unknown, defaulting to 1000 [ 180.012296][T12071] lo speed is unknown, defaulting to 1000 [ 180.153852][T12081] loop4: detected capacity change from 0 to 256 [ 180.161988][T12081] FAT-fs (loop4): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 180.220292][T12087] loop5: detected capacity change from 0 to 512 [ 180.271710][T12087] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 180.383290][T12087] ext4 filesystem being mounted at /383/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 180.625389][ T6889] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 180.738777][T12112] loop5: detected capacity change from 0 to 1024 [ 180.767739][T12112] EXT4-fs: Ignoring removed bh option [ 180.794833][T12112] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 180.881923][T12112] EXT4-fs error (device loop5): ext4_mb_mark_diskspace_used:4113: comm syz.5.3108: Allocating blocks 497-513 which overlap fs metadata [ 180.900147][T12112] EXT4-fs (loop5): Remounting filesystem read-only [ 180.978791][T12112] EXT4-fs (loop5): pa ffff88810653de00: logic 48, phys. 177, len 21 [ 180.994429][ T6889] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 181.032501][T12133] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=12133 comm=syz.0.3114 [ 181.052099][T12133] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3114'. [ 181.226919][T12149] netlink: 'syz.3.3120': attribute type 4 has an invalid length. [ 181.238885][T12149] netlink: 'syz.3.3120': attribute type 4 has an invalid length. [ 181.429588][T12154] syzkaller0: entered promiscuous mode [ 181.435935][T12154] syzkaller0: entered allmulticast mode [ 181.452954][T12164] IPVS: Error connecting to the multicast addr [ 181.533281][T12166] xt_CT: You must specify a L4 protocol and not use inversions on it [ 181.574072][T12171] dummy0 speed is unknown, defaulting to 1000 [ 181.619274][T12171] lo speed is unknown, defaulting to 1000 [ 182.100966][T12200] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 182.149408][T12200] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 182.214069][T12206] netlink: 'syz.3.3143': attribute type 7 has an invalid length. [ 182.221959][T12206] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3143'. [ 182.236677][T12200] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 182.313414][T12200] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 182.377020][T12200] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 182.389653][T12200] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 182.402853][T12200] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 182.415239][T12200] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 182.504451][T12213] loop4: detected capacity change from 0 to 512 [ 182.540547][T12213] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 182.554008][T12213] ext4 filesystem being mounted at /689/file0/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 182.596254][T12213] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 182.830083][T12242] loop4: detected capacity change from 0 to 2048 [ 182.927657][T12242] loop4: p1 < > p4 [ 182.938196][T12242] loop4: p4 size 8388608 extends beyond EOD, truncated [ 182.990152][T12246] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3160'. [ 183.002913][T12246] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3160'. [ 183.643861][T12313] loop5: detected capacity change from 0 to 8192 [ 183.835121][T12334] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 183.969190][T12334] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 184.009213][T12334] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 184.059439][T12334] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 184.146516][T12334] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.158528][T12334] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.170436][T12334] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.183084][T12334] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.276825][ T29] kauditd_printk_skb: 111 callbacks suppressed [ 184.276840][ T29] audit: type=1400 audit(1745479826.879:5575): avc: denied { ioctl } for pid=12356 comm="syz.2.3202" path="socket:[34281]" dev="sockfs" ino=34281 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 184.380368][T12363] ref_ctr_offset mismatch. inode: 0x2d1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x8 [ 184.468954][T12376] netlink: 128 bytes leftover after parsing attributes in process `syz.2.3211'. [ 184.499013][T12380] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3213'. [ 184.527370][T12386] SELinux: syz.5.3215 (12386) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 184.549096][T12380] dummy0 speed is unknown, defaulting to 1000 [ 184.572244][T12391] netlink: 'syz.0.3208': attribute type 10 has an invalid length. [ 184.580572][T12391] team0: Device hsr_slave_0 failed to register rx_handler [ 184.624451][T12380] lo speed is unknown, defaulting to 1000 [ 184.690050][T12401] ref_ctr increment failed for inode: 0x2ed offset: 0x9 ref_ctr_offset: 0x82 of mm: 0xffff8881075a5d80 [ 184.702094][T12400] uprobe: syz.2.3220:12400 failed to unregister, leaking uprobe [ 184.710762][ T29] audit: type=1400 audit(1745479827.309:5576): avc: denied { connect } for pid=12402 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 184.730037][ T29] audit: type=1400 audit(1745479827.309:5577): avc: denied { write } for pid=12402 comm="+}[@" laddr=fe80::a8aa:aaff:feaa:aa10 lport=1 faddr=fe80::aa scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 184.829225][T12411] netlink: 24 bytes leftover after parsing attributes in process `syz.5.3223'. [ 184.867257][ T29] audit: type=1326 audit(1745479827.459:5578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12412 comm="syz.4.3226" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 184.890854][ T29] audit: type=1326 audit(1745479827.459:5579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12412 comm="syz.4.3226" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 184.914489][ T29] audit: type=1326 audit(1745479827.469:5580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12412 comm="syz.4.3226" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 184.938241][ T29] audit: type=1326 audit(1745479827.469:5581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12412 comm="syz.4.3226" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 184.961933][ T29] audit: type=1326 audit(1745479827.469:5582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12412 comm="syz.4.3226" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 184.985538][ T29] audit: type=1326 audit(1745479827.469:5583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12412 comm="syz.4.3226" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 185.009161][ T29] audit: type=1326 audit(1745479827.469:5584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12412 comm="syz.4.3226" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 185.060701][T12418] netlink: 'syz.3.3229': attribute type 2 has an invalid length. [ 185.068780][T12418] netlink: 132 bytes leftover after parsing attributes in process `syz.3.3229'. [ 185.092915][T12419] dummy0 speed is unknown, defaulting to 1000 [ 185.175637][T12419] lo speed is unknown, defaulting to 1000 [ 185.293838][T12426] dummy0 speed is unknown, defaulting to 1000 [ 185.494076][T12448] tipc: New replicast peer: 255.255.255.255 [ 185.500342][T12448] tipc: Enabled bearer , priority 10 [ 185.565841][T12454] all: renamed from lo (while UP) [ 185.719951][T12426] lo speed is unknown, defaulting to 1000 [ 185.926266][T12462] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 185.999874][T12462] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 186.073941][T12468] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3249'. [ 186.086751][T12466] loop4: detected capacity change from 0 to 512 [ 186.094022][T12466] EXT4-fs: Ignoring removed orlov option [ 186.100633][T12462] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 186.101051][T12466] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 186.124471][T12471] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3249'. [ 186.144735][T12466] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 186.158240][T12466] ext4 filesystem being mounted at /710/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 186.191820][T12462] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 186.193155][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 186.387630][T12462] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.413096][T12462] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.438298][T12462] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.482136][T12462] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.507326][ T3381] tipc: Node number set to 1924015199 [ 186.698992][T12480] Set syz1 is full, maxelem 65536 reached [ 187.019388][T12503] netlink: 'syz.2.3262': attribute type 13 has an invalid length. [ 187.065820][T12499] x_tables: ip6_tables: tcpmss match: only valid for protocol 6 [ 187.080681][T12503] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.088000][T12503] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.224210][T12503] netdevsim netdevsim2 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 187.232695][T12503] netdevsim netdevsim2 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 187.241192][T12503] netdevsim netdevsim2 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 187.249609][T12503] netdevsim netdevsim2 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 187.297839][T12519] loop5: detected capacity change from 0 to 2048 [ 187.344793][T12519] loop5: p1 < > p3 [ 187.349420][T12519] loop5: p3 size 134217728 extends beyond EOD, truncated [ 187.487715][T12545] loop4: detected capacity change from 0 to 164 [ 187.493761][T12546] netlink: 666 bytes leftover after parsing attributes in process `syz.5.3275'. [ 187.528720][T12545] iso9660: Corrupted directory entry in block 0 of inode 1920 [ 187.532696][T12550] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3280'. [ 187.557991][T12545] iso9660: Corrupted directory entry in block 0 of inode 1920 [ 187.646526][T12559] RDS: rds_bind could not find a transport for ::ffff:172.20.20.36, load rds_tcp or rds_rdma? [ 187.651366][T12555] syzkaller0: entered promiscuous mode [ 187.662427][T12555] syzkaller0: entered allmulticast mode [ 188.309101][T12581] sg_write: data in/out 122/14 bytes for SCSI command 0x0-- guessing data in; [ 188.309101][T12581] program syz.5.3293 not setting count and/or reply_len properly [ 188.329147][T12581] __nla_validate_parse: 1 callbacks suppressed [ 188.329167][T12581] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3293'. [ 188.447953][T12593] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12593 comm=syz.2.3298 [ 188.598061][T12608] netlink: 96 bytes leftover after parsing attributes in process `syz.2.3305'. [ 188.738834][T12612] vlan4: entered allmulticast mode [ 189.017477][T12641] loop4: detected capacity change from 0 to 2048 [ 189.027688][T12644] ref_ctr increment failed for inode: 0xed0 offset: 0x9 ref_ctr_offset: 0x82 of mm: 0xffff88810005c200 [ 189.029420][T12641] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 189.039843][T12643] uprobe: syz.3.3320:12643 failed to unregister, leaking uprobe [ 189.105982][T12641] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 189.121673][T12641] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 32 with error 28 [ 189.136043][T12641] EXT4-fs (loop4): This should not happen!! Data will be lost [ 189.136043][T12641] [ 189.146102][T12641] EXT4-fs (loop4): Total free blocks count 0 [ 189.152684][T12641] EXT4-fs (loop4): Free/Dirty block details [ 189.158866][T12641] EXT4-fs (loop4): free_blocks=2415919104 [ 189.164934][T12641] EXT4-fs (loop4): dirty_blocks=32 [ 189.170327][T12641] EXT4-fs (loop4): Block reservation details [ 189.176496][T12641] EXT4-fs (loop4): i_reserved_data_blocks=2 [ 189.260390][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 189.363479][ T29] kauditd_printk_skb: 318 callbacks suppressed [ 189.363497][ T29] audit: type=1326 audit(1745479831.969:5903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12658 comm="syz.4.3325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 189.393525][ T29] audit: type=1326 audit(1745479831.969:5904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12658 comm="syz.4.3325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 189.404659][T12661] loop4: detected capacity change from 0 to 512 [ 189.417123][ T29] audit: type=1326 audit(1745479831.969:5905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12658 comm="syz.4.3325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 189.446864][ T29] audit: type=1326 audit(1745479831.969:5906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12658 comm="syz.4.3325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 189.459104][T12661] EXT4-fs (loop4): too many log groups per flexible block group [ 189.470500][ T29] audit: type=1326 audit(1745479831.969:5907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12658 comm="syz.4.3325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 189.478181][T12661] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 189.478346][T12661] EXT4-fs (loop4): mount failed [ 189.501801][ T29] audit: type=1326 audit(1745479831.969:5908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12658 comm="syz.4.3325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 189.537096][ T29] audit: type=1326 audit(1745479831.969:5909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12658 comm="syz.4.3325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 189.560571][ T29] audit: type=1326 audit(1745479831.969:5910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12658 comm="syz.4.3325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 189.584164][ T29] audit: type=1326 audit(1745479831.969:5911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12658 comm="syz.4.3325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 189.607744][ T29] audit: type=1326 audit(1745479831.969:5912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12658 comm="syz.4.3325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 189.715111][T12671] x_tables: unsorted underflow at hook 1 [ 189.825771][T12677] netlink: 'syz.2.3333': attribute type 15 has an invalid length. [ 189.900721][T12686] dummy0 speed is unknown, defaulting to 1000 [ 189.950182][T12686] lo speed is unknown, defaulting to 1000 [ 190.104757][T12699] ÿÿÿÿÿÿ: renamed from vlan1 [ 190.639613][T12717] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3357'. [ 190.639651][T12719] loop4: detected capacity change from 0 to 128 [ 190.656312][T12719] FAT-fs (loop4): Invalid FSINFO signature: 0x00615252, 0x61417272 (sector = 1) [ 190.782601][ T6432] FAT-fs (loop4): Invalid FSINFO signature: 0x00615252, 0x61417272 (sector = 1) [ 190.807117][ T6432] kworker/u8:9: attempt to access beyond end of device [ 190.807117][ T6432] loop4: rw=1, sector=137, nr_sectors = 8 limit=128 [ 190.821090][ T6432] kworker/u8:9: attempt to access beyond end of device [ 190.821090][ T6432] loop4: rw=1, sector=153, nr_sectors = 8 limit=128 [ 190.841020][ T6432] kworker/u8:9: attempt to access beyond end of device [ 190.841020][ T6432] loop4: rw=1, sector=169, nr_sectors = 8 limit=128 [ 190.870098][ T6432] kworker/u8:9: attempt to access beyond end of device [ 190.870098][ T6432] loop4: rw=1, sector=185, nr_sectors = 8 limit=128 [ 190.896008][ T6432] kworker/u8:9: attempt to access beyond end of device [ 190.896008][ T6432] loop4: rw=1, sector=201, nr_sectors = 8 limit=128 [ 190.913145][ T6432] kworker/u8:9: attempt to access beyond end of device [ 190.913145][ T6432] loop4: rw=1, sector=217, nr_sectors = 8 limit=128 [ 190.926671][ T6432] kworker/u8:9: attempt to access beyond end of device [ 190.926671][ T6432] loop4: rw=1, sector=233, nr_sectors = 8 limit=128 [ 190.940882][ T6432] kworker/u8:9: attempt to access beyond end of device [ 190.940882][ T6432] loop4: rw=1, sector=249, nr_sectors = 8 limit=128 [ 190.954360][ T6432] kworker/u8:9: attempt to access beyond end of device [ 190.954360][ T6432] loop4: rw=1, sector=265, nr_sectors = 8 limit=128 [ 190.983441][T12719] syz.4.3347: attempt to access beyond end of device [ 190.983441][T12719] loop4: rw=2049, sector=297, nr_sectors = 8 limit=128 [ 191.001969][ T6432] FAT-fs (loop4): Invalid FSINFO signature: 0x00615252, 0x61417272 (sector = 1) [ 191.127589][ T6494] FAT-fs (loop4): Invalid FSINFO signature: 0x00615252, 0x61417272 (sector = 1) [ 191.178235][T12743] netlink: 96 bytes leftover after parsing attributes in process `syz.2.3359'. [ 191.418301][T12764] syzkaller0: entered promiscuous mode [ 191.423833][T12764] syzkaller0: entered allmulticast mode [ 191.677989][T12803] pim6reg1: entered promiscuous mode [ 191.683349][T12803] pim6reg1: entered allmulticast mode [ 191.865450][T12820] futex_wake_op: syz.3.3390 tries to shift op by -1; fix this program [ 191.906350][T12824] rdma_rxe: rxe_newlink: failed to add vxcan1 [ 191.940785][T12822] batadv_slave_1: entered promiscuous mode [ 191.947635][T12821] batadv_slave_1: left promiscuous mode [ 192.078915][T12833] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12833 comm=syz.3.3396 [ 192.169953][T12841] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3400'. [ 192.309137][T12844] dummy0 speed is unknown, defaulting to 1000 [ 192.542863][T12851] ipvlan2: entered promiscuous mode [ 192.557592][T12851] bridge0: port 3(ipvlan2) entered blocking state [ 192.564171][T12851] bridge0: port 3(ipvlan2) entered disabled state [ 192.571243][T12851] ipvlan2: entered allmulticast mode [ 192.576626][T12851] bridge0: entered allmulticast mode [ 192.585094][T12851] ipvlan2: left allmulticast mode [ 192.590269][T12851] bridge0: left allmulticast mode [ 192.649828][T12862] wg2: left promiscuous mode [ 192.654534][T12862] wg2: left allmulticast mode [ 192.679010][T12862] wg2: entered promiscuous mode [ 192.683998][T12862] wg2: entered allmulticast mode [ 192.726458][T12844] lo speed is unknown, defaulting to 1000 [ 193.167150][T12883] tipc: Enabled bearer , priority 0 [ 193.174796][T12882] tipc: Resetting bearer [ 193.190289][T12882] tipc: Disabling bearer [ 193.372994][T12903] netlink: 96 bytes leftover after parsing attributes in process `syz.5.3421'. [ 193.480836][T12922] netlink: 'syz.5.3423': attribute type 1 has an invalid length. [ 193.500013][T12922] 8021q: adding VLAN 0 to HW filter on device bond3 [ 193.523362][T12922] gretap1: entered promiscuous mode [ 193.532885][T12922] bond3: (slave gretap1): making interface the new active one [ 193.541845][T12922] bond3: (slave gretap1): Enslaving as an active interface with an up link [ 193.572802][T12935] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3425'. [ 193.580865][T12922] vlan3: entered promiscuous mode [ 193.587550][T12922] bond3: entered promiscuous mode [ 193.593627][T12922] bond3: (slave vlan3): the slave hw address is in use by the bond; couldn't find a slave with a free hw address to give it (this should not have happened) [ 194.070911][T12992] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3436'. [ 194.114350][T12992] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3436'. [ 194.150425][T13001] all: renamed from lo (while UP) [ 194.397986][T13007] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 194.423015][T13019] xt_CT: No such helper "snmp" [ 194.457617][ T29] kauditd_printk_skb: 153 callbacks suppressed [ 194.457635][ T29] audit: type=1400 audit(1745479837.069:6066): avc: denied { map } for pid=13021 comm="syz.5.3446" path="socket:[37260]" dev="sockfs" ino=37260 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 194.520212][ T29] audit: type=1400 audit(1745479837.069:6067): avc: denied { read } for pid=13021 comm="syz.5.3446" path="socket:[37260]" dev="sockfs" ino=37260 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 194.584932][T13032] netlink: 'syz.0.3445': attribute type 1 has an invalid length. [ 194.602346][ T29] audit: type=1400 audit(1745479837.209:6068): avc: denied { write } for pid=13033 comm="syz.4.3450" lport=54312 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 194.631595][ T29] audit: type=1400 audit(1745479837.209:6069): avc: denied { setopt } for pid=13033 comm="syz.4.3450" lport=54312 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 194.642168][T13032] 8021q: adding VLAN 0 to HW filter on device bond3 [ 194.666330][T13032] bond2: (slave bond3): making interface the new active one [ 194.674191][T13032] bond2: (slave bond3): Enslaving as an active interface with an up link [ 194.680149][T13041] loop4: detected capacity change from 0 to 1024 [ 194.687508][T13032] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3445'. [ 194.698783][T13032] 8021q: adding VLAN 0 to HW filter on device bond2 [ 194.717106][ T29] audit: type=1400 audit(1745479837.319:6070): avc: denied { mounton } for pid=13043 comm="syz.5.3452" path="/449/bus" dev="tmpfs" ino=2398 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 194.752229][ T29] audit: type=1326 audit(1745479837.359:6071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13045 comm="syz.3.3453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ebfece969 code=0x7ffc0000 [ 194.779134][ T29] audit: type=1326 audit(1745479837.359:6072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13045 comm="syz.3.3453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6ebfece969 code=0x7ffc0000 [ 194.791134][T13041] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 194.802796][ T29] audit: type=1326 audit(1745479837.359:6073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13045 comm="syz.3.3453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ebfece969 code=0x7ffc0000 [ 194.838932][ T29] audit: type=1326 audit(1745479837.379:6074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13045 comm="syz.3.3453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6ebfece969 code=0x7ffc0000 [ 194.862594][ T29] audit: type=1326 audit(1745479837.379:6075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13045 comm="syz.3.3453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ebfece969 code=0x7ffc0000 [ 194.889499][T13041] EXT4-fs error (device loop4): ext4_mb_mark_diskspace_used:4113: comm syz.4.3451: Allocating blocks 497-513 which overlap fs metadata [ 194.943009][T13041] EXT4-fs (loop4): pa ffff88810653dee0: logic 16, phys. 145, len 23 [ 194.951209][T13041] EXT4-fs error (device loop4): ext4_mb_release_inode_pa:5364: group 0, free 0, pa_free 1 [ 194.979478][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 195.025763][T13071] netlink: 'syz.0.3462': attribute type 4 has an invalid length. [ 195.028470][T13067] loop4: detected capacity change from 0 to 2048 [ 195.041528][T13067] EXT4-fs: Ignoring removed bh option [ 195.044655][T13071] netlink: 'syz.0.3462': attribute type 4 has an invalid length. [ 195.081103][T13067] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 195.144859][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 195.174811][ T3302] block device autoloading is deprecated and will be removed. [ 195.221965][T13083] dummy0 speed is unknown, defaulting to 1000 [ 195.266903][T13083] lo speed is unknown, defaulting to 1000 [ 195.854030][T13100] dummy0 speed is unknown, defaulting to 1000 [ 196.087283][T13108] bridge_slave_0: entered promiscuous mode [ 196.312036][T13100] lo speed is unknown, defaulting to 1000 [ 196.574628][T13119] dummy0 speed is unknown, defaulting to 1000 [ 196.995596][T13119] lo speed is unknown, defaulting to 1000 [ 197.057489][T13137] wireguard0: entered promiscuous mode [ 197.063045][T13137] wireguard0: entered allmulticast mode [ 197.423353][T13135] Set syz1 is full, maxelem 65536 reached [ 197.561597][T13149] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 197.629687][T13149] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 197.685503][T13149] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 197.739891][T13149] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 197.816624][T13149] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.840196][T13149] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.881750][T13149] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.909902][T13159] netlink: 'syz.0.3495': attribute type 39 has an invalid length. [ 197.950715][T13149] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.998123][T13163] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 198.038519][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.046247][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.054058][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.061842][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.088234][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.095942][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.103728][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.111417][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.119122][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.126802][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.134517][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.142211][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.149930][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.157624][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.171652][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.179413][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.187110][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.194798][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.202489][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.210264][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.217960][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.225657][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.233542][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.241370][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.249086][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.256763][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.264447][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.272192][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.279983][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.287664][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.295328][ T9] hid-generic 0000:4000000:0000.0010: unknown main item tag 0x0 [ 198.303730][ T9] hid-generic 0000:4000000:0000.0010: hidraw0: HID v0.00 Device [syz0] on syz0 [ 198.400311][T13182] ref_ctr increment failed for inode: 0xff9 offset: 0x9 ref_ctr_offset: 0x82 of mm: 0xffff8881075a2c00 [ 198.424323][T13179] uprobe: syz.3.3503:13179 failed to unregister, leaking uprobe [ 198.460730][T13171] dummy0 speed is unknown, defaulting to 1000 [ 198.566184][T13187] vlan0: entered allmulticast mode [ 198.602120][T13189] dummy0 speed is unknown, defaulting to 1000 [ 199.107710][T13208] binfmt_misc: register: failed to install interpreter file ./file2 [ 199.315249][T13171] lo speed is unknown, defaulting to 1000 [ 199.393609][T13215] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3518'. [ 199.452795][T13189] lo speed is unknown, defaulting to 1000 [ 199.669012][ T29] kauditd_printk_skb: 57 callbacks suppressed [ 199.669029][ T29] audit: type=1400 audit(1745479842.279:6133): avc: denied { append } for pid=13223 comm="syz.5.3522" name="ptp0" dev="devtmpfs" ino=247 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 200.071869][ T29] audit: type=1400 audit(1745479842.679:6134): avc: denied { read } for pid=2987 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 200.094254][ T29] audit: type=1400 audit(1745479842.679:6135): avc: denied { search } for pid=2987 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 200.166819][ T29] audit: type=1400 audit(1745479842.729:6136): avc: denied { append } for pid=2987 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 200.189319][ T29] audit: type=1400 audit(1745479842.729:6137): avc: denied { open } for pid=2987 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 200.212099][ T29] audit: type=1400 audit(1745479842.729:6138): avc: denied { getattr } for pid=2987 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 200.926487][T13295] netlink: 140 bytes leftover after parsing attributes in process `syz.3.3552'. [ 200.935792][T13295] netlink: 140 bytes leftover after parsing attributes in process `syz.3.3552'. [ 201.052662][T13303] dummy0 speed is unknown, defaulting to 1000 [ 201.120022][T13303] lo speed is unknown, defaulting to 1000 [ 201.270325][ T3302] block device autoloading is deprecated and will be removed. [ 201.282563][ T29] audit: type=1400 audit(1745479843.889:6139): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 201.315534][ T29] audit: type=1400 audit(1745479843.889:6140): avc: denied { open } for pid=3302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 201.338809][ T29] audit: type=1400 audit(1745479843.889:6141): avc: denied { ioctl } for pid=3302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=609 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 201.596107][T13327] dummy0 speed is unknown, defaulting to 1000 [ 202.020242][T13330] dummy0 speed is unknown, defaulting to 1000 [ 202.034539][T13327] lo speed is unknown, defaulting to 1000 [ 202.420682][T13330] lo speed is unknown, defaulting to 1000 [ 202.451172][T13344] netlink: 19 bytes leftover after parsing attributes in process `syz.0.3571'. [ 202.471414][ T29] audit: type=1326 audit(1745479845.079:6142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13343 comm="syz.0.3571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ed8a0e969 code=0x7ffc0000 [ 202.518690][T13348] loop0: detected capacity change from 0 to 512 [ 202.554355][T13348] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 202.575251][T13348] ext4 filesystem being mounted at /650/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 202.631918][ T3302] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 202.706077][T13356] serio: Serial port ptm0 [ 202.981658][T13368] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3579'. [ 203.002423][T13367] loop4: detected capacity change from 0 to 2048 [ 203.022071][T13367] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 203.176504][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 203.284525][T13379] pim6reg1: entered promiscuous mode [ 203.290081][T13379] pim6reg1: entered allmulticast mode [ 203.348789][T13382] random: crng reseeded on system resumption [ 203.561146][T13385] netlink: 28 bytes leftover after parsing attributes in process `syz.4.3586'. [ 203.570189][T13385] netlink: 28 bytes leftover after parsing attributes in process `syz.4.3586'. [ 203.635279][T13392] netlink: 'syz.4.3589': attribute type 10 has an invalid length. [ 203.765828][T13407] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13407 comm=syz.2.3596 [ 203.779309][T13407] netlink: 'syz.2.3596': attribute type 1 has an invalid length. [ 203.793058][T13407] 8021q: adding VLAN 0 to HW filter on device bond2 [ 203.798722][T13411] loop4: detected capacity change from 0 to 512 [ 203.806420][T13411] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 203.808400][T13407] bond2: (slave ip6gretap1): making interface the new active one [ 203.825292][T13407] bond2: (slave ip6gretap1): Enslaving as an active interface with an up link [ 203.839725][T13407] vlan2: entered promiscuous mode [ 203.844794][T13407] bond2: entered promiscuous mode [ 203.849932][T13407] ip6gretap1: entered promiscuous mode [ 203.855571][T13407] vlan2: entered allmulticast mode [ 203.860748][T13407] bond2: entered allmulticast mode [ 203.865869][T13407] ip6gretap1: entered allmulticast mode [ 203.878392][T13411] EXT4-fs (loop4): 1 truncate cleaned up [ 203.885550][T13417] netlink: 'syz.5.3599': attribute type 10 has an invalid length. [ 203.894354][T13411] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 203.942287][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 203.981525][T13426] loop4: detected capacity change from 0 to 512 [ 204.008043][T13426] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 204.037299][T13426] ext4 filesystem being mounted at /766/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 204.058347][T13433] dummy0 speed is unknown, defaulting to 1000 [ 204.077694][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 204.098094][T13439] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3607'. [ 204.114526][T13433] lo speed is unknown, defaulting to 1000 [ 204.329993][T13441] dummy0 speed is unknown, defaulting to 1000 [ 204.491322][T13465] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3619'. [ 204.683830][T13441] lo speed is unknown, defaulting to 1000 [ 204.800622][T13483] bond3: entered promiscuous mode [ 204.806032][T13483] bond3: entered allmulticast mode [ 204.811788][T13483] 8021q: adding VLAN 0 to HW filter on device bond3 [ 204.820984][T13483] bond3 (unregistering): Released all slaves [ 204.929455][T13491] dummy0 speed is unknown, defaulting to 1000 [ 204.965278][T13491] lo speed is unknown, defaulting to 1000 [ 205.303057][T13501] netlink: 'syz.3.3631': attribute type 4 has an invalid length. [ 205.311289][T13501] netlink: 181456 bytes leftover after parsing attributes in process `syz.3.3631'. [ 205.447123][T13513] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3636'. [ 205.471762][T13513] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3636'. [ 205.531007][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 205.531025][ T29] audit: type=1400 audit(1745479848.139:6158): avc: denied { write } for pid=13514 comm="syz.3.3637" name="file0" dev="tmpfs" ino=4351 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 205.560587][ T29] audit: type=1400 audit(1745479848.139:6159): avc: denied { open } for pid=13514 comm="syz.3.3637" path="/821/file0" dev="tmpfs" ino=4351 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 205.603636][T13518] pim6reg: entered allmulticast mode [ 205.611110][T13518] pim6reg: left allmulticast mode [ 205.894933][T13539] dummy0 speed is unknown, defaulting to 1000 [ 205.941234][T13541] loop0: detected capacity change from 0 to 512 [ 205.944453][T13541] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 206.088937][T13539] lo speed is unknown, defaulting to 1000 [ 206.185795][T13541] EXT4-fs (loop0): 1 truncate cleaned up [ 206.186295][T13541] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 206.334430][ T3302] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 206.431447][T13554] loop4: detected capacity change from 0 to 512 [ 206.440585][T13556] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 206.440641][T13556] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 206.484979][T13554] EXT4-fs (loop4): 1 orphan inode deleted [ 206.491320][T13554] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 206.505058][ T6486] Quota error (device loop4): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 206.505322][T13554] ext4 filesystem being mounted at /780/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 206.514865][ T6486] EXT4-fs error (device loop4): ext4_release_dquot:6971: comm kworker/u8:43: Failed to release dquot type 1 [ 206.687958][T13554] dummy0 speed is unknown, defaulting to 1000 [ 206.800497][T13561] xt_hashlimit: max too large, truncated to 1048576 [ 207.054110][T13554] lo speed is unknown, defaulting to 1000 [ 207.478580][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 207.589137][T13592] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 207.593825][T13595] : renamed from bond0 (while UP) [ 207.964306][T13619] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3676'. [ 208.438808][T13635] loop0: detected capacity change from 0 to 2048 [ 208.450665][T13635] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 208.728981][T13651] loop4: detected capacity change from 0 to 1024 [ 208.735961][T13651] EXT4-fs: Ignoring removed nomblk_io_submit option [ 208.780008][T13651] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 208.823836][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 208.897496][T13669] loop4: detected capacity change from 0 to 512 [ 208.904466][T13669] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 208.933459][T13669] EXT4-fs (loop4): 1 truncate cleaned up [ 208.954278][T13669] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 208.969945][ T29] audit: type=1400 audit(1745479851.579:6160): avc: denied { watch watch_reads } for pid=13668 comm="syz.4.3700" path="/798/file0" dev="loop4" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 209.017254][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 209.283531][T13690] ipvlan0: entered promiscuous mode [ 209.298006][T13690] bridge0: port 1(ipvlan0) entered blocking state [ 209.304505][T13690] bridge0: port 1(ipvlan0) entered disabled state [ 209.323617][T13690] ipvlan0: entered allmulticast mode [ 209.328992][T13690] bridge0: entered allmulticast mode [ 209.347790][T13690] ipvlan0: left allmulticast mode [ 209.352870][T13690] bridge0: left allmulticast mode [ 209.369649][T13682] dummy0 speed is unknown, defaulting to 1000 [ 209.383825][ T3302] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 209.507707][T13695] loop4: detected capacity change from 0 to 128 [ 209.644064][T13702] loop0: detected capacity change from 0 to 1024 [ 209.661962][T13702] EXT4-fs: Ignoring removed bh option [ 209.694164][T13695] bio_check_eod: 104 callbacks suppressed [ 209.694184][T13695] syz.4.3710: attempt to access beyond end of device [ 209.694184][T13695] loop4: rw=2049, sector=145, nr_sectors = 8 limit=128 [ 209.747294][T13695] syz.4.3710: attempt to access beyond end of device [ 209.747294][T13695] loop4: rw=2049, sector=161, nr_sectors = 8 limit=128 [ 209.774679][T13695] syz.4.3710: attempt to access beyond end of device [ 209.774679][T13695] loop4: rw=2049, sector=177, nr_sectors = 8 limit=128 [ 209.793756][ T29] audit: type=1326 audit(1745479852.399:6161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13706 comm="syz.3.3714" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ebfece969 code=0x7fc00000 [ 209.826275][T13695] syz.4.3710: attempt to access beyond end of device [ 209.826275][T13695] loop4: rw=2049, sector=193, nr_sectors = 8 limit=128 [ 209.853315][T13695] syz.4.3710: attempt to access beyond end of device [ 209.853315][T13695] loop4: rw=2049, sector=209, nr_sectors = 8 limit=128 [ 209.880533][T13695] syz.4.3710: attempt to access beyond end of device [ 209.880533][T13695] loop4: rw=2049, sector=225, nr_sectors = 8 limit=128 [ 209.905505][T13695] syz.4.3710: attempt to access beyond end of device [ 209.905505][T13695] loop4: rw=2049, sector=241, nr_sectors = 8 limit=128 [ 209.919821][T13682] lo speed is unknown, defaulting to 1000 [ 209.922130][T13702] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 209.950616][T13695] syz.4.3710: attempt to access beyond end of device [ 209.950616][T13695] loop4: rw=2049, sector=257, nr_sectors = 8 limit=128 [ 209.976015][ T29] audit: type=1400 audit(1745479852.579:6162): avc: denied { map } for pid=13700 comm="syz.0.3713" path="/665/file1/file1" dev="loop0" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 209.999694][T13702] EXT4-fs error (device loop0): ext4_mb_mark_diskspace_used:4113: comm syz.0.3713: Allocating blocks 385-513 which overlap fs metadata [ 210.017302][T13695] syz.4.3710: attempt to access beyond end of device [ 210.017302][T13695] loop4: rw=2049, sector=273, nr_sectors = 8 limit=128 [ 210.043565][T13695] syz.4.3710: attempt to access beyond end of device [ 210.043565][T13695] loop4: rw=2049, sector=289, nr_sectors = 8 limit=128 [ 210.069360][ T29] audit: type=1400 audit(1745479852.679:6163): avc: denied { append } for pid=13700 comm="syz.0.3713" name="file1" dev="loop0" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 210.069603][T13702] EXT4-fs (loop0): pa ffff88810653dee0: logic 16, phys. 129, len 24 [ 210.100000][T13702] EXT4-fs error (device loop0): ext4_mb_release_inode_pa:5364: group 0, free 0, pa_free 8 [ 210.114239][ T29] audit: type=1400 audit(1745479852.719:6164): avc: denied { bind } for pid=13712 comm="syz.2.3716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 210.165463][ T3302] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 210.508118][ T29] audit: type=1326 audit(1745479853.119:6165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13729 comm="syz.0.3734" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ed8a0e969 code=0x7ffc0000 [ 210.531702][ T29] audit: type=1326 audit(1745479853.119:6166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13729 comm="syz.0.3734" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ed8a0e969 code=0x7ffc0000 [ 210.558545][ T29] audit: type=1326 audit(1745479853.169:6167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13729 comm="syz.0.3734" exe="/root/syz-executor" sig=0 arch=c000003e syscall=293 compat=0 ip=0x7f1ed8a0e969 code=0x7ffc0000 [ 210.582337][ T29] audit: type=1326 audit(1745479853.169:6168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13729 comm="syz.0.3734" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ed8a0e969 code=0x7ffc0000 [ 210.606158][ T29] audit: type=1326 audit(1745479853.169:6169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13729 comm="syz.0.3734" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ed8a0e969 code=0x7ffc0000 [ 210.629839][ T29] audit: type=1326 audit(1745479853.169:6170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13729 comm="syz.0.3734" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f1ed8a0e969 code=0x7ffc0000 [ 210.653735][ T29] audit: type=1326 audit(1745479853.169:6171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13729 comm="syz.0.3734" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ed8a0e969 code=0x7ffc0000 [ 210.677539][ T29] audit: type=1326 audit(1745479853.169:6172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13729 comm="syz.0.3734" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ed8a0e969 code=0x7ffc0000 [ 210.701037][ T29] audit: type=1326 audit(1745479853.169:6173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13729 comm="syz.0.3734" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f1ed8a0e969 code=0x7ffc0000 [ 210.724621][ T29] audit: type=1326 audit(1745479853.169:6174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13729 comm="syz.0.3734" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ed8a0e969 code=0x7ffc0000 [ 210.748396][ T29] audit: type=1326 audit(1745479853.169:6175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13729 comm="syz.0.3734" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1ed8a0e969 code=0x7ffc0000 [ 210.772034][ T29] audit: type=1326 audit(1745479853.169:6176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13729 comm="syz.0.3734" exe="/root/syz-executor" sig=0 arch=c000003e syscall=223 compat=0 ip=0x7f1ed8a0e969 code=0x7ffc0000 [ 210.891256][T13741] loop4: detected capacity change from 0 to 256 [ 210.908486][T13741] FAT-fs (loop4): Directory bread(block 64) failed [ 210.915143][T13741] FAT-fs (loop4): Directory bread(block 65) failed [ 210.925046][T13741] FAT-fs (loop4): Directory bread(block 66) failed [ 210.932608][T13741] FAT-fs (loop4): Directory bread(block 67) failed [ 210.952640][T13741] FAT-fs (loop4): Directory bread(block 68) failed [ 210.968114][ T3378] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 210.976224][ T3378] hid-generic 0000:0000:0000.0011: hidraw0: HID v0.00 Device [syz1] on syz0 [ 210.994628][T13741] FAT-fs (loop4): Directory bread(block 69) failed [ 211.001341][T13741] FAT-fs (loop4): Directory bread(block 70) failed [ 211.007959][T13741] FAT-fs (loop4): Directory bread(block 71) failed [ 211.014689][T13741] FAT-fs (loop4): Directory bread(block 72) failed [ 211.021790][T13741] FAT-fs (loop4): Directory bread(block 73) failed [ 211.069414][T13748] rdma_rxe: rxe_newlink: failed to add vxcan1 [ 211.106549][T13739] dummy0 speed is unknown, defaulting to 1000 [ 211.557135][T13739] lo speed is unknown, defaulting to 1000 [ 212.956563][T13855] dummy0 speed is unknown, defaulting to 1000 [ 212.993227][T13855] lo speed is unknown, defaulting to 1000 [ 213.924568][T13902] pim6reg1: entered promiscuous mode [ 213.930040][T13902] pim6reg1: entered allmulticast mode [ 214.287806][T13939] dummy0 speed is unknown, defaulting to 1000 [ 214.353432][T13939] lo speed is unknown, defaulting to 1000 [ 214.360768][T13942] pim6reg1: entered promiscuous mode [ 214.366153][T13942] pim6reg1: entered allmulticast mode [ 214.580411][T13953] dummy0 speed is unknown, defaulting to 1000 [ 214.702686][T13953] lo speed is unknown, defaulting to 1000 [ 215.577365][ T29] kauditd_printk_skb: 1151 callbacks suppressed [ 215.577378][ T29] audit: type=1326 audit(1745479858.189:7328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14002 comm="syz.4.3846" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 215.654527][ T29] audit: type=1326 audit(1745479858.219:7329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14002 comm="syz.4.3846" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x7ffc0000 [ 215.678083][ T29] audit: type=1400 audit(1745479858.239:7330): avc: denied { map_create } for pid=14015 comm="syz.5.3852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 215.697455][ T29] audit: type=1400 audit(1745479858.239:7331): avc: denied { map_create } for pid=14015 comm="syz.5.3852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 215.716781][ T29] audit: type=1400 audit(1745479858.239:7332): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 215.741049][ T29] audit: type=1400 audit(1745479858.249:7333): avc: denied { prog_load } for pid=14015 comm="syz.5.3852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 215.884209][ T29] audit: type=1326 audit(1745479858.319:7334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13977 comm="syz.2.3833" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f05e517e969 code=0x7fc00000 [ 215.907688][ T29] audit: type=1400 audit(1745479858.389:7335): avc: denied { module_request } for pid=14017 comm="syz.4.3853" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 215.930174][ T29] audit: type=1400 audit(1745479858.389:7336): avc: denied { sys_module } for pid=14017 comm="syz.4.3853" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 215.951365][ T29] audit: type=1400 audit(1745479858.389:7337): avc: denied { prog_load } for pid=14017 comm="syz.4.3853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 216.053952][T14031] dummy0 speed is unknown, defaulting to 1000 [ 216.182550][T14031] lo speed is unknown, defaulting to 1000 [ 216.341642][T14045] dummy0 speed is unknown, defaulting to 1000 [ 216.433808][T14045] lo speed is unknown, defaulting to 1000 [ 218.507285][T14138] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14138 comm=syz.3.3899 [ 218.869450][T14167] Cannot find del_set index 4 as target [ 219.470963][T14220] dummy0 speed is unknown, defaulting to 1000 [ 219.572329][T14220] lo speed is unknown, defaulting to 1000 [ 220.130493][T14256] syzkaller0: entered promiscuous mode [ 220.136093][T14256] syzkaller0: entered allmulticast mode [ 220.519260][T14305] xt_hashlimit: size too large, truncated to 1048576 [ 220.526135][T14305] xt_hashlimit: Unknown mode mask 80FF, kernel too old? [ 220.569909][T14309] netlink: 'syz.2.3977': attribute type 11 has an invalid length. [ 220.594002][ T29] kauditd_printk_skb: 924 callbacks suppressed [ 220.594021][ T29] audit: type=1400 audit(1745479863.199:8262): avc: denied { create } for pid=14310 comm="syz.2.3978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 220.621044][ T29] audit: type=1400 audit(1745479863.199:8263): avc: denied { prog_load } for pid=14310 comm="syz.2.3978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 220.640241][ T29] audit: type=1400 audit(1745479863.199:8264): avc: denied { create } for pid=14310 comm="syz.2.3978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 220.660909][ T29] audit: type=1400 audit(1745479863.199:8265): avc: denied { map_create } for pid=14310 comm="syz.2.3978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 220.680283][ T29] audit: type=1400 audit(1745479863.199:8266): avc: denied { prog_load } for pid=14310 comm="syz.2.3978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 220.699547][ T29] audit: type=1400 audit(1745479863.199:8267): avc: denied { prog_load } for pid=14310 comm="syz.2.3978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 220.718876][ T29] audit: type=1400 audit(1745479863.199:8268): avc: denied { prog_load } for pid=14310 comm="syz.2.3978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 220.738250][ T29] audit: type=1400 audit(1745479863.199:8269): avc: denied { create } for pid=14310 comm="syz.2.3978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 220.758789][ T29] audit: type=1400 audit(1745479863.209:8270): avc: denied { map_create } for pid=14312 comm="syz.2.3979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 220.778105][ T29] audit: type=1400 audit(1745479863.209:8271): avc: denied { prog_load } for pid=14312 comm="syz.2.3979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 221.296815][T14371] pim6reg1: entered promiscuous mode [ 221.302299][T14371] pim6reg1: entered allmulticast mode [ 221.818721][T14401] pim6reg1: entered promiscuous mode [ 221.824073][T14401] pim6reg1: entered allmulticast mode [ 221.913985][T14403] dummy0 speed is unknown, defaulting to 1000 [ 221.945551][T14403] lo speed is unknown, defaulting to 1000 [ 222.834660][T14460] syzkaller0: entered allmulticast mode [ 223.071622][T14475] dummy0 speed is unknown, defaulting to 1000 [ 223.182155][T14475] lo speed is unknown, defaulting to 1000 [ 223.524411][T14506] SELinux: syz.5.4065 (14506) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 223.738796][T14532] dummy0 speed is unknown, defaulting to 1000 [ 223.774052][T14532] lo speed is unknown, defaulting to 1000 [ 225.328974][T14691] dummy0 speed is unknown, defaulting to 1000 [ 225.431952][T14691] lo speed is unknown, defaulting to 1000 [ 225.608631][ T29] kauditd_printk_skb: 1016 callbacks suppressed [ 225.608649][ T29] audit: type=1400 audit(1745479868.219:9288): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 225.645843][ T29] audit: type=1400 audit(1745479868.249:9289): avc: denied { prog_load } for pid=14715 comm="syz.0.4157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 225.671422][ T29] audit: type=1400 audit(1745479868.279:9290): avc: denied { read } for pid=14715 comm="syz.0.4157" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 225.731659][ T29] audit: type=1400 audit(1745479868.339:9291): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 225.760878][ T29] audit: type=1400 audit(1745479868.369:9292): avc: denied { create } for pid=14718 comm="syz.0.4158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 225.811791][ T29] audit: type=1400 audit(1745479868.389:9293): avc: denied { create } for pid=14718 comm="syz.0.4158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 225.831586][ T29] audit: type=1400 audit(1745479868.389:9294): avc: denied { map_create } for pid=14718 comm="syz.0.4158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 225.850911][ T29] audit: type=1400 audit(1745479868.389:9295): avc: denied { prog_load } for pid=14718 comm="syz.0.4158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 225.870130][ T29] audit: type=1400 audit(1745479868.389:9296): avc: denied { prog_load } for pid=14718 comm="syz.0.4158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 225.889509][ T29] audit: type=1400 audit(1745479868.399:9297): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 226.290391][T14736] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 226.583853][T14768] pim6reg1: entered promiscuous mode [ 226.589384][T14768] pim6reg1: entered allmulticast mode [ 226.623738][T14774] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4183'. [ 226.721757][T14791] dummy0 speed is unknown, defaulting to 1000 [ 226.765176][T14791] lo speed is unknown, defaulting to 1000 [ 226.839210][ T3378] IPVS: starting estimator thread 0... [ 226.896490][T14818] pim6reg1: entered promiscuous mode [ 226.901895][T14818] pim6reg1: entered allmulticast mode [ 226.947475][T14811] IPVS: using max 2448 ests per chain, 122400 per kthread [ 227.587800][T14847] dummy0 speed is unknown, defaulting to 1000 [ 227.657793][T14847] lo speed is unknown, defaulting to 1000 [ 228.275655][T14892] xt_CT: No such helper "snmp_trap" [ 229.108203][T14957] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 230.193843][ T3378] IPVS: starting estimator thread 0... [ 230.287262][T15022] IPVS: using max 2496 ests per chain, 124800 per kthread [ 230.626005][ T29] kauditd_printk_skb: 28582 callbacks suppressed [ 230.626022][ T29] audit: type=1400 audit(1745479873.229:37871): avc: denied { map_create } for pid=15036 comm="syz.3.4299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 230.667288][ T29] audit: type=1400 audit(1745479873.269:37872): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 230.705814][ T29] audit: type=1400 audit(1745479873.279:37873): avc: denied { prog_load } for pid=15038 comm="syz.0.4300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 230.725145][ T29] audit: type=1400 audit(1745479873.279:37874): avc: denied { read } for pid=15038 comm="syz.0.4300" name="mISDNtimer" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 230.748455][ T29] audit: type=1400 audit(1745479873.279:37875): avc: denied { read } for pid=15038 comm="syz.0.4300" dev="nsfs" ino=4026532511 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 230.770018][ T29] audit: type=1400 audit(1745479873.279:37876): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 230.793384][ T29] audit: type=1400 audit(1745479873.279:37877): avc: denied { prog_load } for pid=15040 comm="syz.0.4301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 230.812736][ T29] audit: type=1400 audit(1745479873.279:37878): avc: denied { map_create } for pid=15040 comm="syz.0.4301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 230.832073][ T29] audit: type=1400 audit(1745479873.279:37879): avc: denied { prog_load } for pid=15040 comm="syz.0.4301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 230.851415][ T29] audit: type=1400 audit(1745479873.279:37880): avc: denied { prog_load } for pid=15040 comm="syz.0.4301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 231.598267][T15107] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 231.788486][T15135] bond_slave_1: mtu less than device minimum [ 231.855735][T15152] serio: Serial port ptm0 [ 232.046966][T15172] dummy0 speed is unknown, defaulting to 1000 [ 232.084808][T15172] lo speed is unknown, defaulting to 1000 [ 234.181401][T15290] syzkaller0: entered promiscuous mode [ 234.186927][T15290] syzkaller0: entered allmulticast mode [ 234.734335][T15341] dummy0 speed is unknown, defaulting to 1000 [ 234.767838][T15341] lo speed is unknown, defaulting to 1000 [ 235.644618][ T29] kauditd_printk_skb: 1182 callbacks suppressed [ 235.644636][ T29] audit: type=1400 audit(1745479878.249:39063): avc: denied { create } for pid=15410 comm="syz.3.4465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 235.692583][ T29] audit: type=1400 audit(1745479878.249:39064): avc: denied { map_create } for pid=15410 comm="syz.3.4465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 235.712145][ T29] audit: type=1400 audit(1745479878.249:39065): avc: denied { prog_load } for pid=15410 comm="syz.3.4465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 235.731509][ T29] audit: type=1400 audit(1745479878.249:39066): avc: denied { prog_load } for pid=15410 comm="syz.3.4465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 235.750852][ T29] audit: type=1400 audit(1745479878.249:39067): avc: denied { create } for pid=15410 comm="syz.3.4465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 235.771591][ T29] audit: type=1400 audit(1745479878.259:39068): avc: denied { prog_load } for pid=15412 comm="syz.3.4466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 235.791148][ T29] audit: type=1400 audit(1745479878.259:39069): avc: denied { open } for pid=15412 comm="syz.3.4466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 235.810658][ T29] audit: type=1400 audit(1745479878.259:39070): avc: denied { create } for pid=15412 comm="syz.3.4466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 235.831350][ T29] audit: type=1400 audit(1745479878.259:39071): avc: denied { create } for pid=15412 comm="syz.3.4466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 235.852062][ T29] audit: type=1400 audit(1745479878.259:39072): avc: denied { execmem } for pid=15412 comm="syz.3.4466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 236.296434][T15469] wg2: entered promiscuous mode [ 236.301415][T15469] wg2: entered allmulticast mode [ 236.327516][ T2965] page_pool_release_retry() stalled pool shutdown: id 67, 1 inflight 60 sec [ 237.005781][ T6432] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 237.016749][T15538] wg2: entered promiscuous mode [ 237.021770][T15538] wg2: entered allmulticast mode [ 237.689022][ T2965] page_pool_release_retry() stalled pool shutdown: id 69, 1 inflight 60 sec [ 237.972083][T15573] syzkaller0: entered promiscuous mode [ 237.977721][T15573] syzkaller0: entered allmulticast mode [ 237.993952][T15579] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4537'. [ 238.973124][T15641] dummy0 speed is unknown, defaulting to 1000 [ 239.014978][T15641] lo speed is unknown, defaulting to 1000 [ 239.435230][T15684] pim6reg1: entered promiscuous mode [ 239.440686][T15684] pim6reg1: entered allmulticast mode [ 239.884105][T15701] dummy0 speed is unknown, defaulting to 1000 [ 239.924335][T15701] lo speed is unknown, defaulting to 1000 [ 240.649838][ T29] kauditd_printk_skb: 865 callbacks suppressed [ 240.649855][ T29] audit: type=1400 audit(1745479883.259:39938): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 240.681076][ T29] audit: type=1400 audit(1745479883.269:39939): avc: denied { map_create } for pid=15772 comm="syz.4.4625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 240.700556][ T29] audit: type=1400 audit(1745479883.269:39940): avc: denied { prog_load } for pid=15772 comm="syz.4.4625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 240.719826][ T29] audit: type=1400 audit(1745479883.269:39941): avc: denied { prog_load } for pid=15772 comm="syz.4.4625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 240.719881][ T29] audit: type=1400 audit(1745479883.269:39942): avc: denied { prog_load } for pid=15772 comm="syz.4.4625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 240.719910][ T29] audit: type=1400 audit(1745479883.269:39943): avc: denied { prog_load } for pid=15772 comm="syz.4.4625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 240.719975][ T29] audit: type=1400 audit(1745479883.269:39944): avc: denied { map_create } for pid=15772 comm="syz.4.4625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 240.739795][ T29] audit: type=1400 audit(1745479883.309:39945): avc: denied { prog_load } for pid=15774 comm="syz.2.4626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 240.739826][ T29] audit: type=1400 audit(1745479883.309:39946): avc: denied { prog_load } for pid=15774 comm="syz.2.4626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 240.759402][ T29] audit: type=1400 audit(1745479883.349:39947): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 241.022765][T15799] syzkaller0: entered promiscuous mode [ 241.028712][T15799] syzkaller0: entered allmulticast mode [ 241.751028][T15839] dummy0 speed is unknown, defaulting to 1000 [ 241.833062][T15839] lo speed is unknown, defaulting to 1000 [ 242.087733][ T6432] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 242.158999][T15858] ip6gretap0: entered promiscuous mode [ 242.164539][T15858] ip6gretap0: entered allmulticast mode [ 242.747954][T15882] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15882 comm=syz.0.4669 [ 243.155086][T15906] veth0_vlan: entered allmulticast mode [ 243.954990][T15960] dummy0 speed is unknown, defaulting to 1000 [ 243.995721][T15960] lo speed is unknown, defaulting to 1000 [ 244.092690][T15981] serio: Serial port ptm0 [ 244.158812][T15987] dummy0 speed is unknown, defaulting to 1000 [ 244.229656][T15987] lo speed is unknown, defaulting to 1000 [ 244.333311][T16006] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 244.455499][T16015] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 244.455499][T16015] The task syz.4.4725 (16015) triggered the difference, watch for misbehavior. [ 245.262282][T16048] dummy0 speed is unknown, defaulting to 1000 [ 245.330277][T16048] lo speed is unknown, defaulting to 1000 [ 245.660767][ T29] kauditd_printk_skb: 812 callbacks suppressed [ 245.660781][ T29] audit: type=1400 audit(1745479888.269:40760): avc: denied { prog_load } for pid=16081 comm="syz.3.4753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 245.693445][ T29] audit: type=1400 audit(1745479888.299:40761): avc: denied { prog_load } for pid=16081 comm="syz.3.4753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 245.712827][ T29] audit: type=1400 audit(1745479888.299:40762): avc: denied { create } for pid=16081 comm="syz.3.4753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 245.751712][ T29] audit: type=1400 audit(1745479888.349:40763): avc: denied { map_create } for pid=16083 comm="syz.5.4754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 245.771178][ T29] audit: type=1400 audit(1745479888.349:40764): avc: denied { prog_load } for pid=16083 comm="syz.5.4754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 245.790466][ T29] audit: type=1326 audit(1745479888.349:40765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16083 comm="syz.5.4754" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f863239e969 code=0x7ffc0000 [ 245.814072][ T29] audit: type=1326 audit(1745479888.349:40766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16083 comm="syz.5.4754" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f863239e969 code=0x7ffc0000 [ 245.837673][ T29] audit: type=1326 audit(1745479888.349:40767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16083 comm="syz.5.4754" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f863239e969 code=0x7ffc0000 [ 245.861303][ T29] audit: type=1326 audit(1745479888.349:40768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16083 comm="syz.5.4754" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f863239e969 code=0x7ffc0000 [ 245.884999][ T29] audit: type=1326 audit(1745479888.349:40769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16083 comm="syz.5.4754" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f863239e969 code=0x7ffc0000 [ 246.199138][T16128] pim6reg1: entered promiscuous mode [ 246.204665][T16128] pim6reg1: entered allmulticast mode [ 246.284107][T16135] syzkaller0: entered promiscuous mode [ 246.289689][T16135] syzkaller0: entered allmulticast mode [ 246.461565][T16153] wg2: left promiscuous mode [ 246.466269][T16153] wg2: left allmulticast mode [ 246.490663][T16146] Falling back ldisc for ttyS3. [ 247.060511][T16229] dummy0 speed is unknown, defaulting to 1000 [ 247.096415][T16229] lo speed is unknown, defaulting to 1000 [ 247.295223][T16249] syzkaller0: entered promiscuous mode [ 247.300823][T16249] syzkaller0: entered allmulticast mode [ 247.624463][T16262] dummy0 speed is unknown, defaulting to 1000 [ 247.659302][T16262] lo speed is unknown, defaulting to 1000 [ 247.778909][T16270] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16270 comm=syz.5.4838 [ 248.058077][T16303] macsec0: entered promiscuous mode [ 248.335034][T16318] xt_CT: You must specify a L4 protocol and not use inversions on it [ 249.316786][T16383] pim6reg1: entered promiscuous mode [ 249.322278][T16383] pim6reg1: entered allmulticast mode [ 249.548502][T16403] xt_policy: too many policy elements [ 249.598185][T16411] dummy0 speed is unknown, defaulting to 1000 [ 249.630054][T16411] lo speed is unknown, defaulting to 1000 [ 250.671995][ T29] kauditd_printk_skb: 1404 callbacks suppressed [ 250.672012][ T29] audit: type=1400 audit(1745479893.279:42174): avc: denied { prog_load } for pid=16465 comm="syz.5.4928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 250.703144][T16475] dummy0 speed is unknown, defaulting to 1000 [ 250.737200][ T29] audit: type=1400 audit(1745479893.279:42175): avc: denied { mac_admin } for pid=16471 comm="syz.3.4931" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 250.742975][T16475] lo speed is unknown, defaulting to 1000 [ 250.758540][ T29] audit: type=1401 audit(1745479893.279:42176): op=setxattr invalid_context=73797374656D5F753A6F626A6563745F723A667361646D5F657865635F743A73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000064656C616C6C6F632C646174615F6572723D61626F72742C626172726965723D3078303030303030303030303030303030322C64696F726561645F6C6F636B2C646174615F6572723D69676E6F72652C6D61785F6469725F73697A655F6B623D3078303030303030303030303430303762312C646174615F6572723D69676E6F72652C67727071756F74612C6E6F62682C757365725F78617474722C62682C64696F726561645F6E6F6C6F636B2C000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 [ 250.764293][ T29] audit: type=1400 audit(1745479893.279:42177): avc: denied { map_create } for pid=16471 comm="syz.3.4931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 250.875035][ T29] audit: type=1400 audit(1745479893.279:42178): avc: denied { prog_load } for pid=16471 comm="syz.3.4931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 250.894311][ T29] audit: type=1400 audit(1745479893.329:42179): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 250.917673][ T29] audit: type=1400 audit(1745479893.329:42180): avc: denied { prog_load } for pid=16476 comm="syz.0.4933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 250.937074][ T29] audit: type=1400 audit(1745479893.329:42181): avc: denied { allowed } for pid=16476 comm="syz.0.4933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 250.956588][ T29] audit: type=1400 audit(1745479893.329:42182): avc: denied { create } for pid=16476 comm="syz.0.4933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 250.977359][ T29] audit: type=1400 audit(1745479893.329:42183): avc: denied { create } for pid=16476 comm="syz.0.4933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 251.338497][T16491] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4937'. [ 253.856817][T16700] wg2: entered promiscuous mode [ 253.857662][ T6435] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 253.861787][T16700] wg2: entered allmulticast mode [ 253.968932][T16708] syzkaller0: entered promiscuous mode [ 253.974452][T16708] syzkaller0: entered allmulticast mode [ 254.848416][T16763] xt_hashlimit: invalid interval [ 255.693253][ T29] kauditd_printk_skb: 827 callbacks suppressed [ 255.693320][ T29] audit: type=1400 audit(1745479898.299:43011): avc: denied { open } for pid=16800 comm="syz.3.5076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 255.733985][ T29] audit: type=1400 audit(1745479898.329:43012): avc: denied { prog_load } for pid=16800 comm="syz.3.5076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 255.753409][ T29] audit: type=1400 audit(1745479898.329:43013): avc: denied { prog_load } for pid=16800 comm="syz.3.5076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 255.775003][ T29] audit: type=1400 audit(1745479898.389:43014): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 255.802873][ T29] audit: type=1400 audit(1745479898.389:43015): avc: denied { prog_load } for pid=16804 comm="syz.3.5077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 255.822783][ T29] audit: type=1400 audit(1745479898.409:43016): avc: denied { read } for pid=16807 comm="syz.0.5078" dev="nsfs" ino=4026532511 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 255.844192][ T29] audit: type=1400 audit(1745479898.429:43017): avc: denied { prog_load } for pid=16807 comm="syz.0.5078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 255.863560][ T29] audit: type=1400 audit(1745479898.429:43018): avc: denied { create } for pid=16807 comm="syz.0.5078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 255.912942][T16813] dummy0 speed is unknown, defaulting to 1000 [ 255.948170][T16813] lo speed is unknown, defaulting to 1000 [ 255.972808][ T29] audit: type=1400 audit(1745479898.429:43019): avc: denied { read write } for pid=16807 comm="syz.0.5078" name="loop0" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 255.996161][ T29] audit: type=1400 audit(1745479898.429:43020): avc: denied { prog_load } for pid=16807 comm="syz.0.5078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 256.099915][T16822] syzkaller0: entered promiscuous mode [ 256.105435][T16822] syzkaller0: entered allmulticast mode [ 256.383090][T16857] syzkaller0: entered promiscuous mode [ 256.388661][T16857] syzkaller0: entered allmulticast mode [ 256.471807][T16864] syzkaller0: entered promiscuous mode [ 256.477379][T16864] syzkaller0: entered allmulticast mode [ 257.194828][T16904] dummy0 speed is unknown, defaulting to 1000 [ 257.234078][T16904] lo speed is unknown, defaulting to 1000 [ 257.540050][T16916] serio: Serial port ptm0 [ 257.721014][T16926] lo: entered promiscuous mode [ 258.362452][T16962] lo: entered promiscuous mode [ 258.889239][ T6475] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 259.244296][T17013] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5166'. [ 259.273612][T17013] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5166'. [ 259.293056][T17013] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5166'. [ 259.315338][T17013] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5166'. [ 260.375611][T17048] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5188'. [ 260.416441][T17048] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5188'. [ 260.466424][T17048] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5188'. [ 260.486365][T17048] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5188'. [ 260.702622][ T29] kauditd_printk_skb: 586 callbacks suppressed [ 260.702692][ T29] audit: type=1400 audit(1745479903.309:43607): avc: denied { map_create } for pid=17064 comm="syz.3.5187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 260.767587][ T29] audit: type=1400 audit(1745479903.349:43608): avc: denied { block_suspend } for pid=17062 comm="syz.2.5185" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 260.789311][ T29] audit: type=1400 audit(1745479903.369:43609): avc: denied { prog_load } for pid=17064 comm="syz.3.5187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 260.808614][ T29] audit: type=1400 audit(1745479903.369:43610): avc: denied { prog_load } for pid=17064 comm="syz.3.5187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 261.100786][ T29] audit: type=1400 audit(1745479903.709:43611): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 261.153893][ T29] audit: type=1400 audit(1745479903.749:43612): avc: denied { open } for pid=17068 comm="syz.4.5189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 261.173425][ T29] audit: type=1400 audit(1745479903.749:43613): avc: denied { prog_load } for pid=17068 comm="syz.4.5189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 261.192707][ T29] audit: type=1400 audit(1745479903.749:43614): avc: denied { prog_load } for pid=17068 comm="syz.4.5189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 261.212084][ T29] audit: type=1400 audit(1745479903.749:43615): avc: denied { prog_load } for pid=17068 comm="syz.4.5189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 261.231471][ T29] audit: type=1400 audit(1745479903.759:43616): avc: denied { map_create } for pid=17068 comm="syz.4.5189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 261.563000][T17085] dummy0 speed is unknown, defaulting to 1000 [ 261.622798][T17085] lo speed is unknown, defaulting to 1000 [ 262.564799][T17121] dummy0 speed is unknown, defaulting to 1000 [ 262.624556][T17121] lo speed is unknown, defaulting to 1000 [ 263.250099][T17159] wg2: left promiscuous mode [ 263.254764][T17159] wg2: left allmulticast mode [ 263.280042][T17159] wg2: entered promiscuous mode [ 263.285018][T17159] wg2: entered allmulticast mode Apr 24 07:31:46 syzkaller daemon.err dhcpcd[3043]: ps_sendpsmmsg: Connection refused Apr 24 07:31:46 syzkaller daemon.err dhcpc[ 263.554315][T17186] syzkaller0: entered promiscuous mode d[3043]: ps_root[ 263.560622][T17186] syzkaller0: entered allmulticast mode _recvmsgcb: failed to send message to pid 13250: Connection refused [ 264.058841][T17201] @ÿ: renamed from bond_slave_0 [ 264.087651][ T6494] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration Apr 24 07:31:46 syzkaller daemon.err dhcpcd[3043]: ps_sendpsmmsg: Connection refused Apr 24 07:31:46 syzkaller daemon.err dhcpcd[3043]: ps_root_recvmsgcb: failed to send message to pid 13282: Connection refused [ 265.340290][T17291] wg2: left promiscuous mode [ 265.345003][T17291] wg2: left allmulticast mode [ 265.707614][ T29] kauditd_printk_skb: 924 callbacks suppressed [ 265.707632][ T29] audit: type=1400 audit(1745479907.316:44541): avc: denied { prog_load } for pid=17302 comm="syz.2.5293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 265.736482][ T29] audit: type=1400 audit(1745479907.316:44542): avc: denied { execmem } for pid=17302 comm="syz.2.5293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 265.756026][ T29] audit: type=1400 audit(1745479907.316:44543): avc: denied { prog_load } for pid=17302 comm="syz.2.5293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 265.775702][ T29] audit: type=1400 audit(1745479907.316:44544): avc: denied { prog_load } for pid=17302 comm="syz.2.5293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 265.795243][ T29] audit: type=1400 audit(1745479907.316:44545): avc: denied { read write } for pid=17302 comm="syz.2.5293" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 265.819088][ T29] audit: type=1400 audit(1745479907.336:44546): avc: denied { prog_load } for pid=17306 comm="syz.0.5295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 265.838772][ T29] audit: type=1400 audit(1745479907.346:44547): avc: denied { mounton } for pid=17308 comm="syz.2.5296" path="/547/file0" dev="tmpfs" ino=2895 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 265.838810][ T29] audit: type=1326 audit(1745479907.346:44548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17308 comm="syz.2.5296" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f05e517e969 code=0x7ffc0000 [ 265.838905][ T29] audit: type=1326 audit(1745479907.346:44549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17308 comm="syz.2.5296" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f05e517e969 code=0x7ffc0000 [ 265.838928][ T29] audit: type=1326 audit(1745479907.346:44550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17308 comm="syz.2.5296" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f05e517e969 code=0x7ffc0000 Apr 24 07:31:47 syzkaller daemon.err dhcpcd[3043]: ps_sendpsmmsg: Connection refused Apr 24 07:31:47 syzkaller daemon.err dhcpcd[3043]: ps_root_recvmsgcb: failed to send message to pid 13342: Connection refused [ 267.769345][T17455] syzkaller0: entered promiscuous mode [ 267.774878][T17455] syzkaller0: entered allmulticast mode Apr 24 07:31:50 syzkaller daemon.err dhcpcd[3043]: ps_sendpsmmsg: Connection refused Apr 24 07:31:50 syzkaller daemon.err dhcpcd[3043]: ps_root_recvmsgcb: failed to send message to pid 13505: Connection refused [ 268.760726][T17503] netlink: 16 bytes leftover after parsing attributes in process `syz.2.5382'. [ 269.847752][ T6475] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 270.140879][T17576] dummy0 speed is unknown, defaulting to 1000 [ 270.215537][T17576] lo speed is unknown, defaulting to 1000 [ 270.301145][T17584] dummy0 speed is unknown, defaulting to 1000 [ 270.360795][T17584] lo speed is unknown, defaulting to 1000 [ 270.499424][T17590] xt_hashlimit: max too large, truncated to 1048576 [ 270.787194][ T29] kauditd_printk_skb: 854 callbacks suppressed [ 270.787209][ T29] audit: type=1400 audit(1745479912.316:45405): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 270.816843][ T29] audit: type=1400 audit(1745479912.336:45406): avc: denied { open } for pid=17601 comm="syz.2.5422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 270.836336][ T29] audit: type=1400 audit(1745479912.336:45407): avc: denied { create } for pid=17601 comm="syz.2.5422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 270.856187][ T29] audit: type=1400 audit(1745479912.336:45408): avc: denied { map_create } for pid=17602 comm="syz.0.5423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 270.875517][ T29] audit: type=1400 audit(1745479912.336:45409): avc: denied { prog_load } for pid=17602 comm="syz.0.5423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 270.894878][ T29] audit: type=1400 audit(1745479912.336:45410): avc: denied { read } for pid=17602 comm="syz.0.5423" dev="nsfs" ino=4026532511 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 270.916253][ T29] audit: type=1400 audit(1745479912.336:45411): avc: denied { map_create } for pid=17602 comm="syz.0.5423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 270.935591][ T29] audit: type=1400 audit(1745479912.336:45412): avc: denied { prog_load } for pid=17602 comm="syz.0.5423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 270.954872][ T29] audit: type=1400 audit(1745479912.336:45413): avc: denied { read write } for pid=17601 comm="syz.2.5422" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 270.978625][ T29] audit: type=1400 audit(1745479912.336:45414): avc: denied { read } for pid=17601 comm="syz.2.5422" dev="nsfs" ino=4026533546 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 271.830873][T17656] dummy0 speed is unknown, defaulting to 1000 [ 271.886228][T17660] dummy0 speed is unknown, defaulting to 1000 [ 271.939637][T17656] lo speed is unknown, defaulting to 1000 [ 272.062232][T17660] lo speed is unknown, defaulting to 1000 [ 272.776132][T17702] dummy0 speed is unknown, defaulting to 1000 [ 272.811815][T17702] lo speed is unknown, defaulting to 1000 [ 272.891797][T17715] dummy0 speed is unknown, defaulting to 1000 [ 272.966967][T17715] lo speed is unknown, defaulting to 1000 [ 273.040157][T17719] dummy0 speed is unknown, defaulting to 1000 [ 273.267044][T17719] lo speed is unknown, defaulting to 1000 [ 274.004639][T17765] dummy0 speed is unknown, defaulting to 1000 [ 274.112344][T17765] lo speed is unknown, defaulting to 1000 [ 274.346484][T17778] dummy0 speed is unknown, defaulting to 1000 [ 274.399536][T17781] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 274.437546][T17778] lo speed is unknown, defaulting to 1000 [ 274.605809][T17789] dummy0 speed is unknown, defaulting to 1000 [ 274.714797][T17801] dummy0 speed is unknown, defaulting to 1000 [ 274.760052][T17789] lo speed is unknown, defaulting to 1000 [ 274.890030][T17801] lo speed is unknown, defaulting to 1000 [ 275.130830][T17821] dummy0 speed is unknown, defaulting to 1000 [ 275.185089][T17821] lo speed is unknown, defaulting to 1000 [ 275.608307][ T6475] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 275.838798][ T29] kauditd_printk_skb: 696 callbacks suppressed [ 275.838815][ T29] audit: type=1400 audit(1745479917.446:46111): avc: denied { prog_load } for pid=17831 comm="syz.3.5515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 275.895306][ T29] audit: type=1400 audit(1745479917.466:46112): avc: denied { create } for pid=17831 comm="syz.3.5515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 275.915511][ T29] audit: type=1400 audit(1745479917.466:46113): avc: denied { create } for pid=17831 comm="syz.3.5515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 275.935356][ T29] audit: type=1400 audit(1745479917.476:46114): avc: denied { name_bind } for pid=17831 comm="syz.3.5515" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 275.957374][ T29] audit: type=1400 audit(1745479917.476:46115): avc: denied { map_create } for pid=17831 comm="syz.3.5515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 275.976824][ T29] audit: type=1400 audit(1745479917.476:46116): avc: denied { prog_load } for pid=17831 comm="syz.3.5515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.035791][ T29] audit: type=1400 audit(1745479917.576:46117): avc: denied { module_request } for pid=17838 comm="syz.0.5518" kmod="snd-card-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 276.057735][ T29] audit: type=1400 audit(1745479917.636:46118): avc: denied { create } for pid=17844 comm="syz.3.5520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 276.092224][ T29] audit: type=1400 audit(1745479917.636:46119): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 276.116696][ T29] audit: type=1400 audit(1745479917.686:46120): avc: denied { create } for pid=17846 comm="syz.4.5521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 276.225339][T17860] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 276.385985][T17874] dummy0 speed is unknown, defaulting to 1000 [ 276.496252][T17874] lo speed is unknown, defaulting to 1000 [ 278.589843][T17964] dummy0 speed is unknown, defaulting to 1000 [ 278.625012][T17964] lo speed is unknown, defaulting to 1000 [ 278.678551][T17975] bridge0: entered allmulticast mode [ 278.686066][T17975] bridge_slave_1: left allmulticast mode [ 278.691935][T17975] bridge_slave_1: left promiscuous mode [ 278.697766][T17975] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.710903][T17975] bridge_slave_0: left allmulticast mode [ 278.716693][T17975] bridge_slave_0: left promiscuous mode [ 278.722578][T17975] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.792634][T17978] dummy0 speed is unknown, defaulting to 1000 [ 278.835651][T17978] lo speed is unknown, defaulting to 1000 [ 279.149719][T17998] dummy0 speed is unknown, defaulting to 1000 [ 279.184697][T17998] lo speed is unknown, defaulting to 1000 [ 281.058902][ T29] kauditd_printk_skb: 993 callbacks suppressed [ 281.058915][ T29] audit: type=1400 audit(1745479922.666:47114): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 281.103583][ T29] audit: type=1400 audit(1745479922.706:47115): avc: denied { map_create } for pid=18097 comm="syz.0.5621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 281.136975][ T29] audit: type=1400 audit(1745479922.736:47116): avc: denied { prog_load } for pid=18097 comm="syz.0.5621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 281.156414][ T29] audit: type=1400 audit(1745479922.736:47117): avc: denied { prog_load } for pid=18097 comm="syz.0.5621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 281.175817][ T29] audit: type=1400 audit(1745479922.736:47118): avc: denied { prog_load } for pid=18097 comm="syz.0.5621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 281.195288][ T29] audit: type=1400 audit(1745479922.736:47119): avc: denied { allowed } for pid=18097 comm="syz.0.5621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 281.215113][ T29] audit: type=1400 audit(1745479922.736:47120): avc: denied { map_create } for pid=18097 comm="syz.0.5621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 281.234682][ T29] audit: type=1400 audit(1745479922.736:47121): avc: denied { prog_load } for pid=18097 comm="syz.0.5621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 281.254040][ T29] audit: type=1400 audit(1745479922.736:47122): avc: denied { prog_load } for pid=18097 comm="syz.0.5621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 281.273285][ T29] audit: type=1400 audit(1745479922.736:47123): avc: denied { create } for pid=18097 comm="syz.0.5621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 281.382210][ T6486] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 284.179542][T18296] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 285.149226][T18338] dummy0 speed is unknown, defaulting to 1000 [ 285.181296][T18338] lo speed is unknown, defaulting to 1000 [ 285.969852][T18363] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 285.979087][T18363] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 286.101158][ T29] kauditd_printk_skb: 1308 callbacks suppressed [ 286.101172][ T29] audit: type=1400 audit(1745479927.706:48432): avc: denied { open } for pid=18374 comm="syz.5.5737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 286.127995][ T29] audit: type=1400 audit(1745479927.736:48433): avc: denied { map_create } for pid=18374 comm="syz.5.5737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.147416][ T29] audit: type=1400 audit(1745479927.736:48434): avc: denied { prog_load } for pid=18374 comm="syz.5.5737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.166705][ T29] audit: type=1400 audit(1745479927.736:48435): avc: denied { prog_load } for pid=18374 comm="syz.5.5737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.185970][ T29] audit: type=1400 audit(1745479927.736:48436): avc: denied { prog_load } for pid=18374 comm="syz.5.5737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.205877][ T29] audit: type=1400 audit(1745479927.756:48437): avc: denied { prog_load } for pid=18370 comm="syz.4.5736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.225159][ T29] audit: type=1326 audit(1745479927.756:48438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18370 comm="syz.4.5736" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fca994ce969 code=0x0 [ 286.248276][ T29] audit: type=1400 audit(1745479927.816:48439): avc: denied { create } for pid=18374 comm="syz.5.5737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 286.389011][ T29] audit: type=1400 audit(1745479927.996:48440): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 286.428346][ T29] audit: type=1400 audit(1745479928.026:48441): avc: denied { read } for pid=18378 comm="syz.0.5738" dev="nsfs" ino=4026532511 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 286.516726][T18388] SELinux: syz.2.5742 (18388) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 287.053400][T18421] syzkaller0: entered promiscuous mode [ 287.059024][T18421] syzkaller0: entered allmulticast mode [ 287.127431][ T6469] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 287.601372][T18444] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(6) [ 287.607942][T18444] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 287.615705][T18444] vhci_hcd vhci_hcd.0: Device attached [ 287.684310][T18447] vhci_hcd: connection closed [ 287.684470][ T6494] vhci_hcd: stop threads [ 287.693482][ T6494] vhci_hcd: release socket [ 287.697975][ T6494] vhci_hcd: disconnect device [ 288.010838][T18462] dummy0 speed is unknown, defaulting to 1000 [ 288.093464][T18462] lo speed is unknown, defaulting to 1000 [ 288.304957][T18467] dummy0 speed is unknown, defaulting to 1000 [ 288.399766][T18467] lo speed is unknown, defaulting to 1000 [ 288.967300][T18483] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 290.102702][T18512] xt_policy: output policy not valid in PREROUTING and INPUT [ 290.536408][T18535] dummy0 speed is unknown, defaulting to 1000 [ 290.635678][T18535] lo speed is unknown, defaulting to 1000 [ 290.923758][T18555] dummy0 speed is unknown, defaulting to 1000 [ 290.962870][T18555] lo speed is unknown, defaulting to 1000 [ 291.113342][ T29] kauditd_printk_skb: 750 callbacks suppressed [ 291.113360][ T29] audit: type=1326 audit(1745479932.716:49192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18549 comm="syz.3.5810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6ebfec5927 code=0x7ffc0000 [ 291.143681][ T29] audit: type=1326 audit(1745479932.736:49193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18549 comm="syz.3.5810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6ebfe6ab39 code=0x7ffc0000 [ 291.167299][ T29] audit: type=1326 audit(1745479932.736:49194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18549 comm="syz.3.5810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f6ebfece969 code=0x7ffc0000 [ 291.190819][ T29] audit: type=1400 audit(1745479932.746:49195): avc: denied { write } for pid=18556 comm="syz.2.5812" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 291.214685][ T29] audit: type=1326 audit(1745479932.746:49196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18549 comm="syz.3.5810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6ebfec5927 code=0x7ffc0000 [ 291.238321][ T29] audit: type=1326 audit(1745479932.746:49197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18549 comm="syz.3.5810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6ebfe6ab39 code=0x7ffc0000 [ 291.261818][ T29] audit: type=1326 audit(1745479932.746:49198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18549 comm="syz.3.5810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f6ebfece969 code=0x7ffc0000 [ 291.285375][ T29] audit: type=1326 audit(1745479932.756:49199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18549 comm="syz.3.5810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6ebfec5927 code=0x7ffc0000 [ 291.308939][ T29] audit: type=1326 audit(1745479932.756:49200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18549 comm="syz.3.5810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6ebfe6ab39 code=0x7ffc0000 [ 291.332511][ T29] audit: type=1326 audit(1745479932.756:49201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18549 comm="syz.3.5810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f6ebfece969 code=0x7ffc0000 [ 291.383817][T18567] dummy0 speed is unknown, defaulting to 1000 [ 291.416922][T18567] lo speed is unknown, defaulting to 1000 [ 292.887730][ T6494] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 293.632084][T18644] dummy0 speed is unknown, defaulting to 1000 [ 293.660823][T18648] syzkaller0: entered promiscuous mode [ 293.666355][T18648] syzkaller0: entered allmulticast mode [ 293.673712][T18644] lo speed is unknown, defaulting to 1000 [ 293.890654][T18668] IPVS: sync thread started: state = BACKUP, mcast_ifn = sit0, syncid = 0, id = 0 [ 293.893658][T18667] IPVS: stopping backup sync thread 18668 ... [ 294.045970][T18681] dummy0 speed is unknown, defaulting to 1000 [ 294.119768][T18681] lo speed is unknown, defaulting to 1000 [ 294.244664][T18685] dummy0 speed is unknown, defaulting to 1000 [ 294.392933][T18685] lo speed is unknown, defaulting to 1000 [ 295.030741][T18720] dummy0 speed is unknown, defaulting to 1000 [ 295.227342][T18720] lo speed is unknown, defaulting to 1000 [ 296.167026][ T29] kauditd_printk_skb: 729 callbacks suppressed [ 296.167042][ T29] audit: type=1400 audit(1745479937.766:49931): avc: denied { create } for pid=18752 comm="syz.2.5888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 296.473115][T18760] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5891'. [ 296.502145][ T29] audit: type=1400 audit(1745479937.766:49932): avc: denied { create } for pid=18752 comm="syz.2.5888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 296.519935][T18760] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5891'. [ 296.522871][ T29] audit: type=1400 audit(1745479937.766:49933): avc: denied { create } for pid=18752 comm="syz.2.5888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 296.552299][ T29] audit: type=1400 audit(1745479937.766:49934): avc: denied { map_create } for pid=18752 comm="syz.2.5888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 296.571799][ T29] audit: type=1400 audit(1745479937.766:49935): avc: denied { map_create } for pid=18752 comm="syz.2.5888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 296.591220][ T29] audit: type=1400 audit(1745479937.766:49936): avc: denied { prog_load } for pid=18752 comm="syz.2.5888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 296.610546][ T29] audit: type=1400 audit(1745479937.766:49937): avc: denied { create } for pid=18752 comm="syz.2.5888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 296.630152][ T29] audit: type=1400 audit(1745479937.916:49938): avc: denied { create } for pid=18756 comm="syz.2.5889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=0 [ 296.650999][ T29] audit: type=1400 audit(1745479937.936:49939): avc: denied { create } for pid=18754 comm="syz.5.5890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 296.670819][ T29] audit: type=1400 audit(1745479937.936:49940): avc: denied { create } for pid=18754 comm="syz.5.5890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 297.055025][T18792] xt_policy: output policy not valid in PREROUTING and INPUT [ 297.151681][T18799] dummy0 speed is unknown, defaulting to 1000 [ 297.227171][T18799] lo speed is unknown, defaulting to 1000 [ 297.564645][T18803] dummy0 speed is unknown, defaulting to 1000 [ 297.614498][T18803] lo speed is unknown, defaulting to 1000 [ 297.790464][T18814] serio: Serial port ptm0 [ 298.488217][T18882] bridge0: entered allmulticast mode [ 298.551781][T18891] xt_hashlimit: max too large, truncated to 1048576 [ 298.647813][ T6432] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 299.543703][T18942] xt_limit: Overflow, try lower: 65536/2147483648 [ 301.194677][ T29] kauditd_printk_skb: 964 callbacks suppressed [ 301.194691][ T29] audit: type=1400 audit(1745479942.796:50905): avc: denied { open } for pid=19001 comm="syz.2.5990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 301.251819][ T29] audit: type=1400 audit(1745479942.836:50906): avc: denied { create } for pid=19001 comm="syz.2.5990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 301.272759][ T29] audit: type=1400 audit(1745479942.836:50907): avc: denied { allowed } for pid=19001 comm="syz.2.5990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 301.292357][ T29] audit: type=1400 audit(1745479942.836:50908): avc: denied { lock } for pid=19001 comm="syz.2.5990" path="socket:[56530]" dev="sockfs" ino=56530 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=0 [ 301.316499][ T29] audit: type=1400 audit(1745479942.836:50909): avc: denied { lock } for pid=19001 comm="syz.2.5990" path="socket:[56530]" dev="sockfs" ino=56530 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=0 [ 301.340740][ T29] audit: type=1400 audit(1745479942.836:50910): avc: denied { map_create } for pid=19001 comm="syz.2.5990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 301.360078][ T29] audit: type=1400 audit(1745479942.836:50911): avc: denied { prog_load } for pid=19001 comm="syz.2.5990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 301.379581][ T29] audit: type=1400 audit(1745479942.836:50912): avc: denied { prog_load } for pid=19001 comm="syz.2.5990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 301.401420][ T29] audit: type=1326 audit(1745479942.876:50913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19005 comm="syz.2.5992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f05e517e969 code=0x7ffc0000 [ 301.425058][ T29] audit: type=1326 audit(1745479942.876:50914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19005 comm="syz.2.5992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f05e517e969 code=0x7ffc0000 [ 301.528162][T19018] dummy0 speed is unknown, defaulting to 1000 [ 301.629082][T19018] lo speed is unknown, defaulting to 1000 [ 302.007558][T19055] dummy0 speed is unknown, defaulting to 1000 [ 302.044157][T19055] lo speed is unknown, defaulting to 1000 [ 302.052929][T19058] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19058 comm=syz.2.6011 [ 302.610562][T19086] dummy0 speed is unknown, defaulting to 1000 [ 302.677865][T19094] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(7) [ 302.684432][T19094] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 302.692041][T19094] vhci_hcd vhci_hcd.0: Device attached [ 302.733090][T19095] vhci_hcd: connection closed [ 302.733255][ T6494] vhci_hcd: stop threads [ 302.742417][ T6494] vhci_hcd: release socket [ 302.746833][ T6494] vhci_hcd: disconnect device [ 302.789504][T19086] lo speed is unknown, defaulting to 1000 [ 303.594309][T19143] dummy0 speed is unknown, defaulting to 1000 [ 303.636127][T19143] lo speed is unknown, defaulting to 1000 [ 303.768270][ T6469] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 304.020535][T19185] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=19185 comm=syz.4.6065 [ 304.217566][T19199] serio: Serial port ptm0 [ 304.663742][T19226] dummy0 speed is unknown, defaulting to 1000 [ 304.721212][T19226] lo speed is unknown, defaulting to 1000 [ 305.134311][T19246] Falling back ldisc for ptm0. [ 305.427307][T19265] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 306.069716][T19282] dummy0 speed is unknown, defaulting to 1000 [ 306.115679][T19282] lo speed is unknown, defaulting to 1000 [ 306.174609][T19286] dummy0 speed is unknown, defaulting to 1000 [ 306.197247][ T29] kauditd_printk_skb: 1132 callbacks suppressed [ 306.197264][ T29] audit: type=1400 audit(1745479947.806:52047): avc: denied { prog_load } for pid=19287 comm="syz.2.6106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 306.257235][ T29] audit: type=1400 audit(1745479947.826:52048): avc: denied { prog_load } for pid=19287 comm="syz.2.6106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 306.275710][T19286] lo speed is unknown, defaulting to 1000 [ 306.276504][ T29] audit: type=1400 audit(1745479947.826:52049): avc: denied { create } for pid=19287 comm="syz.2.6106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 306.302623][ T29] audit: type=1400 audit(1745479947.826:52050): avc: denied { prog_load } for pid=19287 comm="syz.2.6106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 306.321952][ T29] audit: type=1400 audit(1745479947.826:52051): avc: denied { create } for pid=19287 comm="syz.2.6106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 306.342967][ T29] audit: type=1400 audit(1745479947.846:52052): avc: denied { prog_load } for pid=19289 comm="syz.2.6107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 306.362264][ T29] audit: type=1400 audit(1745479947.846:52053): avc: denied { prog_load } for pid=19289 comm="syz.2.6107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 306.381649][ T29] audit: type=1400 audit(1745479947.846:52054): avc: denied { map_create } for pid=19289 comm="syz.2.6107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 306.400978][ T29] audit: type=1400 audit(1745479947.846:52055): avc: denied { prog_load } for pid=19289 comm="syz.2.6107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 306.420398][ T29] audit: type=1400 audit(1745479947.846:52056): avc: denied { create } for pid=19289 comm="syz.2.6107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 306.566973][T19305] syzkaller0: entered promiscuous mode [ 306.572618][T19305] syzkaller0: entered allmulticast mode [ 306.803745][T19323] --map-set only usable from mangle table [ 307.307627][T19360] dummy0 speed is unknown, defaulting to 1000 [ 307.341462][T19360] lo speed is unknown, defaulting to 1000 [ 307.484361][T19365] dummy0 speed is unknown, defaulting to 1000 [ 307.516489][T19365] lo speed is unknown, defaulting to 1000 [ 307.920414][T19392] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 308.083891][T19412] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 308.383549][T19446] dummy0 speed is unknown, defaulting to 1000 [ 308.421056][T19446] lo speed is unknown, defaulting to 1000 [ 308.691383][T19467] dummy0 speed is unknown, defaulting to 1000 [ 308.736104][T19467] lo speed is unknown, defaulting to 1000 [ 309.237753][T19483] ================================================================== [ 309.245886][T19483] BUG: KCSAN: data-race in atime_needs_update / inode_update_timestamps [ 309.254250][T19483] [ 309.256582][T19483] write to 0xffff888118c8a6bc of 4 bytes by task 19473 on cpu 0: [ 309.264317][T19483] inode_update_timestamps+0x139/0x250 [ 309.269803][T19483] file_update_time+0x219/0x2b0 [ 309.274672][T19483] shmem_file_write_iter+0x99/0xe0 [ 309.279806][T19483] iter_file_splice_write+0x5f2/0x980 [ 309.285204][T19483] direct_splice_actor+0x160/0x2c0 [ 309.290340][T19483] splice_direct_to_actor+0x305/0x680 [ 309.295748][T19483] do_splice_direct+0xd9/0x150 [ 309.300538][T19483] do_sendfile+0x40a/0x690 [ 309.304985][T19483] __x64_sys_sendfile64+0x113/0x160 [ 309.310215][T19483] x64_sys_call+0xfc3/0x2e10 [ 309.314833][T19483] do_syscall_64+0xc9/0x1a0 [ 309.319367][T19483] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 309.325269][T19483] [ 309.327603][T19483] read to 0xffff888118c8a6bc of 4 bytes by task 19483 on cpu 1: [ 309.335243][T19483] atime_needs_update+0x2aa/0x3e0 [ 309.340305][T19483] touch_atime+0x4a/0x350 [ 309.344660][T19483] shmem_file_splice_read+0x584/0x5d0 [ 309.350071][T19483] splice_direct_to_actor+0x26c/0x680 [ 309.355478][T19483] do_splice_direct+0xd9/0x150 [ 309.360276][T19483] do_sendfile+0x40a/0x690 [ 309.364721][T19483] __x64_sys_sendfile64+0x113/0x160 [ 309.369945][T19483] x64_sys_call+0xfc3/0x2e10 [ 309.374557][T19483] do_syscall_64+0xc9/0x1a0 [ 309.379083][T19483] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 309.384990][T19483] [ 309.387318][T19483] value changed: 0x31e190ad -> 0x327a272d [ 309.393037][T19483] [ 309.395360][T19483] Reported by Kernel Concurrency Sanitizer on: [ 309.401513][T19483] CPU: 1 UID: 0 PID: 19483 Comm: syz.5.6187 Not tainted 6.15.0-rc3-syzkaller-00032-ga79be02bba5c #0 PREEMPT(voluntary) [ 309.414037][T19483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 309.424108][T19483] ================================================================== [ 309.527755][ T6486] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 314.647515][ T6494] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration