last executing test programs: 42m51.397926127s ago: executing program 0 (id=2298): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000000180), 0x1, 0x512, &(0x7f0000000c40)="$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") bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="19000000040000000400000005000000", @ANYBLOB], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) socket(0x400000000010, 0x3, 0x0) fsmount(0xffffffffffffffff, 0xdfd72f8b669113ff, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000003c0)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x4, 0x0, 0x0, 0xcbf, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x8000, 0x8, 0x101, 0xd66}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x4, 0x5, 0x2, 0x4038a09, 0x4, @remote, @mcast2={0xff, 0x5}, 0x0, 0x0, 0x0, 0x5}}) r5 = userfaultfd(0x801) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ac6000/0x1000)=nil, 0x1000}, 0x2}) syz_io_uring_setup(0x5b0f, &(0x7f0000000500)={0x0, 0xfffffffc, 0x1000, 0xfffffffb, 0x359}, &(0x7f00000002c0), &(0x7f0000ff4000)) close_range(r5, r5, 0x0) 42m50.290040423s ago: executing program 0 (id=2299): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00"/12], 0x48) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x400) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mmap(&(0x7f0000215000/0x3000)=nil, 0x3000, 0x8, 0x6011, r3, 0xffffffffffffc000) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000a40)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4}, 0x8, 0x10, &(0x7f0000000000)={0x5, 0x0, 0x0, 0xc0}, 0x10}, 0x94) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000100)={0x41}, 0x10) bind$tipc(r2, 0x0, 0x0) r7 = socket$tipc(0x1e, 0x2, 0x0) sendmsg$tipc(r7, &(0x7f0000000340)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x3, {{0x41, 0x1}}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xaffa9c0077a76a7d) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000640)=ANY=[], 0x144}, 0x1, 0x0, 0x0, 0x1}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) 42m49.559313854s ago: executing program 0 (id=2300): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x282008a, &(0x7f00000007c0)=ANY=[@ANYBLOB="6e6f6e756d7461696c3d302c73686f72746e616d653d77696e39352c73686f72746e616d653d6c6f7765722c696f636861727365743d64656661756c742c756e695f786c6174653d302c6e6f6e756d7461696c3d302c757466383d302c616c6c6f775f7574696d653d30303030303030303030303030303030303030303030322c726f6469722c73686f72866e616d653d6d697865642c73686f72746e616d653d6d697865642c73686f72746e616d653d77696e39352c7569643d", @ANYRESHEX=0x0, @ANYBLOB=',uni_xlate=0,utf8=0,shortname=mixed,uni_xlate=0,shortname=winnt,\x00'], 0x96, 0x2a9, &(0x7f0000000500)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) socket(0x10, 0x3, 0x4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0, 0x4000000}, 0x94) syz_open_dev$vcsa(&(0x7f0000000300), 0x1, 0x102) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x6) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="28000000481d1dfa4cf8e275836a0b2000010329bd7000000000000200000000000000c1e221516e"], 0x28}}, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000549000/0x1000)=nil, 0x1000, 0x0) io_submit(0x0, 0x1, &(0x7f0000000a00)=[0x0]) 42m47.442087106s ago: executing program 0 (id=2304): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge0\x00'}) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x14c, r4, 0xfe12482fe0801d67, 0x0, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc, 0x8f, 0x1}, {0xc, 0x90, 0x17bfffc}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x5}, {0xc, 0x90, 0x5}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}, {0xc, 0x8f, 0x2}, {0xc, 0x90, 0xf}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x7fffffff}, {0xc, 0x90, 0x9}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}, {0xc, 0x8f, 0x9}, {0xc, 0x90, 0x800000000000007}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x20040010}, 0x4000810) fcntl$getownex(r2, 0x10, &(0x7f0000000180)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000841, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/resume', 0x149a82, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0xfffffe00, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) mount$incfs(&(0x7f0000000340)='./file0\x00', &(0x7f0000000540)='./file0\x00', &(0x7f00000005c0), 0xf8e3cc917175abf2, &(0x7f0000000740)={[{@no_bf_cache}, {@read_timeout_ms={'read_timeout_ms', 0x3d, 0x36ac}}, {@read_timeout_ms={'read_timeout_ms', 0x3d, 0x6}}, {@readahead={'readahead', 0x3d, 0x43}}, {@read_timeout_ms={'read_timeout_ms', 0x3d, 0x7f}}, {}, {@rlog_pages={'rlog_pages', 0x3d, 0x9}}], [{@smackfshat={'smackfshat', 0x3d, 'fscrypt:'}}, {@appraise_type}, {@audit}, {@fowner_lt}, {@fsmagic={'fsmagic', 0x3d, 0x7}}]}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="09000000070000000300000048"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="580000001000010400004000fedbdf2501f80000", @ANYRES32=0x0, @ANYBLOB="01020400000000002800128008000100736974001c00028008000200c6120001060008001900000005000a00fd000000080004000100010008000a00fa"], 0x58}}, 0x0) 42m44.452049711s ago: executing program 0 (id=2309): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001640)=@mangle={'mangle\x00', 0x44, 0x6, 0x4d0, 0x3a8, 0x210, 0x210, 0x0, 0x138, 0x478, 0x478, 0x478, 0x478, 0x478, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x0, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x530) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) r5 = openat(0xffffffffffffff9c, 0x0, 0x420043, 0x1) fcntl$setlease(r5, 0x400, 0x1) fremovexattr(r5, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2, 0x0, 0x0, 0x8000000}, 0x80) r7 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000000000010bd287100000000000001090224000100000000090401000103000000"], 0x0) syz_usb_control_io(r7, &(0x7f0000000040)={0x2c, &(0x7f0000000080)=ANY=[@ANYBLOB="400aa6"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io(r7, &(0x7f00000002c0)={0x2c, &(0x7f0000000080)=ANY=[], 0x0, 0x0, 0x0, 0x0}, 0x0) 42m40.787623115s ago: executing program 0 (id=2316): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) syz_emit_ethernet(0x86, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) ioctl$F2FS_IOC_SEC_TRIM_FILE(0xffffffffffffffff, 0x4018f514, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) socket(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007208", 0x39}], 0x1) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013000318680907070000000f0000ff3f04000000170a001700000000040037000d00030001332564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) syz_usb_connect$cdc_ncm(0x6, 0x74, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x62, 0x2, 0x1, 0x0, 0x40, 0x1, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "bbc238f0b455"}, {0x5, 0x24, 0x0, 0x40}, {0xd, 0x24, 0xf, 0x1, 0x400, 0x5, 0x1, 0xee}, {0x6, 0x24, 0x1a, 0x5, 0x1}}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x0, 0xaf, 0x7}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200, 0xbf, 0x9, 0x6}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0xd, 0x4, 0x6}}}}}}}]}}, &(0x7f0000000380)={0xa, &(0x7f0000000180)={0xa, 0x6, 0x201, 0x2, 0x6f, 0x7, 0x40, 0x2}, 0x1ab, &(0x7f00000001c0)={0x5, 0xf, 0x1ab, 0x6, [@ss_container_id={0x14, 0x10, 0x4, 0xf1, "a5ecb561619e56f547b22d0e6b989ded"}, @generic={0xc9, 0x10, 0x1, "86500a8250b3871d5e81d1b87e85f6de4b9d3b4adb448d01e7b7688ddc1f580461ca653a9f53bd43333e74c82b3d879cf6a624b25f7cb0bb2e8ded490e0fba643e9cc23f5d2427dba616d43a6741ba9b9749a7be55e3ea6116057d5633addad09fc4c94344ea6b3b013ad2b86e87577e35155b99eaee568213c05d3ef17b54300bb26a504e34e8ff9cb9513189e035ebe1e1f0ae5e40eb4e0e7fce1a8dfd442435c7afd6dee3d918c6144c7f1242aeac4b23fed7536201ced37a3d0b00"/198}, @ss_container_id={0x14, 0x10, 0x4, 0x1, "5ed5fd1833f21485e9d9b0215db394d5"}, @ptm_cap={0x3}, @generic={0xab, 0x10, 0x4, "2be86f92fd7b681554130d87a7dbdc87c2b7b4b2c1c35c5d49683b4a707f884bff9311dc4719ee1753c226d3019d86680ff7a585387bcb5a3a5622b663cef300d9ed1f76b3a506d6280c7ce9df037bd5d997cddebd28f7e1274d4dc56b754ba6907019cfaf8ef71c2654af4cc1d8d250252e6e1357fb205c1890fb499ca87477b2a2035340fb748daa92f6ccfe65897e41f5b4020a016a061293d48dadc438769d9f46a9b54562af"}, @ext_cap={0x7, 0x10, 0x2, 0x10, 0x5, 0x3, 0x5}]}, 0x1, [{0x75, &(0x7f0000000400)=@string={0x75, 0x3, "f6efc461b779b058de2fc8cccadcb329a4cdfa51138090e894c31d9f2b6bd037ed836f0b6690f6e7d669f2b7d6c29c304c9aeadd0679ac2d3383bea3c06533cb32f9f44b019840b512b3cc6868b72e6b1b2fe00ebde4c9c22882b1c9d463af0c91940e7c41061e350ecf3442ad06a3b767dbf0"}}]}) syz_open_dev$hiddev(&(0x7f0000000080), 0x8, 0x2a0400) 42m25.468461435s ago: executing program 32 (id=2316): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) syz_emit_ethernet(0x86, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) ioctl$F2FS_IOC_SEC_TRIM_FILE(0xffffffffffffffff, 0x4018f514, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) socket(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007208", 0x39}], 0x1) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013000318680907070000000f0000ff3f04000000170a001700000000040037000d00030001332564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) syz_usb_connect$cdc_ncm(0x6, 0x74, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x62, 0x2, 0x1, 0x0, 0x40, 0x1, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "bbc238f0b455"}, {0x5, 0x24, 0x0, 0x40}, {0xd, 0x24, 0xf, 0x1, 0x400, 0x5, 0x1, 0xee}, {0x6, 0x24, 0x1a, 0x5, 0x1}}, {{0x9, 0x5, 0x81, 0x3, 0x8, 0x0, 0xaf, 0x7}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200, 0xbf, 0x9, 0x6}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0xd, 0x4, 0x6}}}}}}}]}}, &(0x7f0000000380)={0xa, &(0x7f0000000180)={0xa, 0x6, 0x201, 0x2, 0x6f, 0x7, 0x40, 0x2}, 0x1ab, &(0x7f00000001c0)={0x5, 0xf, 0x1ab, 0x6, [@ss_container_id={0x14, 0x10, 0x4, 0xf1, "a5ecb561619e56f547b22d0e6b989ded"}, @generic={0xc9, 0x10, 0x1, "86500a8250b3871d5e81d1b87e85f6de4b9d3b4adb448d01e7b7688ddc1f580461ca653a9f53bd43333e74c82b3d879cf6a624b25f7cb0bb2e8ded490e0fba643e9cc23f5d2427dba616d43a6741ba9b9749a7be55e3ea6116057d5633addad09fc4c94344ea6b3b013ad2b86e87577e35155b99eaee568213c05d3ef17b54300bb26a504e34e8ff9cb9513189e035ebe1e1f0ae5e40eb4e0e7fce1a8dfd442435c7afd6dee3d918c6144c7f1242aeac4b23fed7536201ced37a3d0b00"/198}, @ss_container_id={0x14, 0x10, 0x4, 0x1, "5ed5fd1833f21485e9d9b0215db394d5"}, @ptm_cap={0x3}, @generic={0xab, 0x10, 0x4, "2be86f92fd7b681554130d87a7dbdc87c2b7b4b2c1c35c5d49683b4a707f884bff9311dc4719ee1753c226d3019d86680ff7a585387bcb5a3a5622b663cef300d9ed1f76b3a506d6280c7ce9df037bd5d997cddebd28f7e1274d4dc56b754ba6907019cfaf8ef71c2654af4cc1d8d250252e6e1357fb205c1890fb499ca87477b2a2035340fb748daa92f6ccfe65897e41f5b4020a016a061293d48dadc438769d9f46a9b54562af"}, @ext_cap={0x7, 0x10, 0x2, 0x10, 0x5, 0x3, 0x5}]}, 0x1, [{0x75, &(0x7f0000000400)=@string={0x75, 0x3, "f6efc461b779b058de2fc8cccadcb329a4cdfa51138090e894c31d9f2b6bd037ed836f0b6690f6e7d669f2b7d6c29c304c9aeadd0679ac2d3383bea3c06533cb32f9f44b019840b512b3cc6868b72e6b1b2fe00ebde4c9c22882b1c9d463af0c91940e7c41061e350ecf3442ad06a3b767dbf0"}}]}) syz_open_dev$hiddev(&(0x7f0000000080), 0x8, 0x2a0400) 42m14.430401941s ago: executing program 5 (id=2341): socket$packet(0x11, 0x3, 0x300) syz_mount_image$f2fs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x3, 0x5505, &(0x7f00000079c0)="$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") getrandom(&(0x7f00000004c0)=""/292, 0x124, 0x2) fsopen(&(0x7f0000000080)='cpuset\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x5, 0x0, 0x0, 0x0, 0x25}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) recvmmsg(r3, &(0x7f0000000780)=[{{0x0, 0x0, 0x0}, 0x3}], 0x1, 0x10020, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x44000, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) creat(&(0x7f00000003c0)='./bus\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0xc0185879, &(0x7f0000000680)={0x4, 0x4000000966a, 0x7d, 0x4, 0x0, 0x0, 0x2401}) 41m59.220221909s ago: executing program 33 (id=2341): socket$packet(0x11, 0x3, 0x300) syz_mount_image$f2fs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x3, 0x5505, &(0x7f00000079c0)="$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") getrandom(&(0x7f00000004c0)=""/292, 0x124, 0x2) fsopen(&(0x7f0000000080)='cpuset\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x5, 0x0, 0x0, 0x0, 0x25}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) recvmmsg(r3, &(0x7f0000000780)=[{{0x0, 0x0, 0x0}, 0x3}], 0x1, 0x10020, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x44000, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) creat(&(0x7f00000003c0)='./bus\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0xc0185879, &(0x7f0000000680)={0x4, 0x4000000966a, 0x7d, 0x4, 0x0, 0x0, 0x2401}) 16.23608739s ago: executing program 4 (id=10316): ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b52, &(0x7f0000000180)="b52be39296") ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='attr/exec\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000010000", @ANYRES32, @ANYBLOB="00000000001000000000000000", @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, &(0x7f0000001400)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) syz_emit_ethernet(0x53, 0x0, 0x0) r5 = getpid() r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r6}, 0x10) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f0000000240)=@abs, 0x6e) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000476000/0x1000)=nil) sendmmsg$unix(r8, &(0x7f0000000000), 0x651, 0x0) 13.828278988s ago: executing program 6 (id=10325): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8992, &(0x7f00000000c0)={'sit0\x00', 0x0}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000000)='system_u:object_r:systemd_unit_file_t:s0\x00', 0x29, 0x5) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0xc) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x2) mmap(&(0x7f0000419000/0x4000)=nil, 0x4000, 0x800001, 0x11, r5, 0x43200000) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0xa80, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000001240)={0x0, 0x2, 0x0, 0x0, 0x0, "001bf1000000000000002000"}) r7 = syz_open_pts(r6, 0x101) dup3(r7, r6, 0x0) 11.767742471s ago: executing program 2 (id=10327): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) socket$nl_xfrm(0x10, 0x3, 0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x25, 0x7, @val=@iter={&(0x7f0000000280)=@cgroup={0x2, r3, 0xe}, 0x10}}, 0x20) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000c40), 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) 11.718368692s ago: executing program 6 (id=10328): ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b52, &(0x7f0000000180)="b52be39296") ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='attr/exec\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000010000", @ANYRES32, @ANYBLOB="00000000001000000000000000", @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, &(0x7f0000001400)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) syz_emit_ethernet(0x53, 0x0, 0x0) r5 = getpid() r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r6}, 0x10) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000476000/0x1000)=nil) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) 11.047065533s ago: executing program 1 (id=10329): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8992, &(0x7f00000000c0)={'sit0\x00', 0x0}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000000)='system_u:object_r:systemd_unit_file_t:s0\x00', 0x29, 0x5) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0xc) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x2) mmap(&(0x7f0000419000/0x4000)=nil, 0x4000, 0x800001, 0x11, r5, 0x43200000) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0xa80, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000001240)={0x0, 0x2, 0x0, 0x0, 0x0, "001bf1000000000000002000"}) r7 = syz_open_pts(r6, 0x101) dup3(r7, r6, 0x0) 10.839656006s ago: executing program 2 (id=10330): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) socket$nl_xfrm(0x10, 0x3, 0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x25, 0x7, @val=@iter={&(0x7f0000000280)=@cgroup={0x2, r3, 0xe}, 0x10}}, 0x20) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000c40), 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) 9.054978485s ago: executing program 2 (id=10332): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) socket$nl_xfrm(0x10, 0x3, 0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x25, 0x7, @val=@iter={&(0x7f0000000280)=@cgroup={0x2, r3, 0xe}, 0x10}}, 0x20) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000c40), 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) 9.034095615s ago: executing program 1 (id=10333): ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b52, &(0x7f0000000180)="b52be39296") ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='attr/exec\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000010000", @ANYRES32, @ANYBLOB="00000000001000000000000000", @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, &(0x7f0000001400)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) syz_emit_ethernet(0x53, 0x0, 0x0) r5 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f0000000240)=@abs, 0x6e) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000476000/0x1000)=nil) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) 8.557381563s ago: executing program 4 (id=10319): ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b52, &(0x7f0000000180)="b52be39296") ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='attr/exec\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000010000", @ANYRES32, @ANYBLOB="00000000001000000000000000", @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, &(0x7f0000001400)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) syz_emit_ethernet(0x53, 0x0, 0x0) r5 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f0000000240)=@abs, 0x6e) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000476000/0x1000)=nil) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) 8.226238668s ago: executing program 2 (id=10335): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) socket$nl_xfrm(0x10, 0x3, 0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x25, 0x7, @val=@iter={&(0x7f0000000280)=@cgroup={0x2, r3, 0xe}, 0x10}}, 0x20) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000c40), 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) 7.779714676s ago: executing program 3 (id=10336): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) socket$nl_xfrm(0x10, 0x3, 0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x25, 0x7, @val=@iter={&(0x7f0000000280)=@cgroup={0x2, 0xffffffffffffffff, 0xe}, 0x10}}, 0x20) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) 7.123345926s ago: executing program 2 (id=10337): ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b52, &(0x7f0000000180)="b52be39296") ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='attr/exec\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000010000", @ANYRES32, @ANYBLOB="00000000001000000000000000", @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, &(0x7f0000001400)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) syz_emit_ethernet(0x53, 0x0, 0x0) r5 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f0000000240)=@abs, 0x6e) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000476000/0x1000)=nil) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) 7.023238208s ago: executing program 1 (id=10338): ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b52, &(0x7f0000000180)="b52be39296") ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='attr/exec\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000010000", @ANYRES32, @ANYBLOB="00000000001000000000000000", @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, &(0x7f0000001400)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) syz_emit_ethernet(0x53, 0x0, 0x0) getpid() r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r5}, 0x10) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f0000000240)=@abs, 0x6e) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000476000/0x1000)=nil) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) 6.991509698s ago: executing program 4 (id=10339): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8992, &(0x7f00000000c0)={'sit0\x00', 0x0}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000000)='system_u:object_r:systemd_unit_file_t:s0\x00', 0x29, 0x5) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0xc) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x2) mmap(&(0x7f0000419000/0x4000)=nil, 0x4000, 0x800001, 0x11, r5, 0x43200000) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0xa80, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000001240)={0x0, 0x2, 0x0, 0x0, 0x0, "001bf1000000000000002000"}) r7 = syz_open_pts(r6, 0x101) dup3(r7, r6, 0x0) 6.87650093s ago: executing program 3 (id=10340): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8992, &(0x7f00000000c0)={'sit0\x00', 0x0}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000000)='system_u:object_r:systemd_unit_file_t:s0\x00', 0x29, 0x5) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0xc) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x2) mmap(&(0x7f0000419000/0x4000)=nil, 0x4000, 0x800001, 0x11, r5, 0x43200000) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0xa80, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000001240)={0x0, 0x2, 0x0, 0x0, 0x0, "001bf1000000000000002000"}) r7 = syz_open_pts(r6, 0x101) dup3(r7, r6, 0x0) 6.220178611s ago: executing program 2 (id=10341): ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b52, &(0x7f0000000180)="b52be39296") ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='attr/exec\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000010000", @ANYRES32, @ANYBLOB="00000000001000000000000000", @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, &(0x7f0000001400)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) syz_emit_ethernet(0x53, 0x0, 0x0) r5 = getpid() r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r6}, 0x10) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000476000/0x1000)=nil) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) 6.100464462s ago: executing program 4 (id=10342): ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b52, &(0x7f0000000180)="b52be39296") ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='attr/exec\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000010000", @ANYRES32, @ANYBLOB="00000000001000000000000000", @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, &(0x7f0000001400)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) syz_emit_ethernet(0x53, 0x0, 0x0) r5 = getpid() r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r6}, 0x10) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f0000000240)=@abs, 0x6e) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000476000/0x1000)=nil) sendmmsg$unix(r8, &(0x7f0000000000), 0x651, 0x0) 6.027687314s ago: executing program 3 (id=10343): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) socket$nl_xfrm(0x10, 0x3, 0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x25, 0x7, @val=@iter={&(0x7f0000000280)=@cgroup={0x2, 0xffffffffffffffff, 0xe}, 0x10}}, 0x20) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) 5.737120618s ago: executing program 1 (id=10344): ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b52, &(0x7f0000000180)="b52be39296") ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='attr/exec\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000010000", @ANYRES32, @ANYBLOB="00000000001000000000000000", @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, &(0x7f0000001400)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) syz_emit_ethernet(0x53, 0x0, 0x0) r5 = getpid() r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r6}, 0x10) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000476000/0x1000)=nil) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) 5.510729462s ago: executing program 6 (id=10334): ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b52, &(0x7f0000000180)="b52be39296") ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='attr/exec\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000010000", @ANYRES32, @ANYBLOB="00000000001000000000000000", @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, &(0x7f0000001400)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) syz_emit_ethernet(0x53, 0x0, 0x0) r5 = getpid() r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r6}, 0x10) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f0000000240)=@abs, 0x6e) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000476000/0x1000)=nil) sendmmsg$unix(r8, &(0x7f0000000000), 0x651, 0x0) 5.132341538s ago: executing program 3 (id=10346): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) socket$nl_xfrm(0x10, 0x3, 0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x25, 0x7, @val=@iter={&(0x7f0000000280)=@cgroup={0x2, r2, 0xe}, 0x10}}, 0x20) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) 4.96418405s ago: executing program 4 (id=10347): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) socket$nl_xfrm(0x10, 0x3, 0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r3 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x25, 0x7, @val=@iter={&(0x7f0000000280)=@cgroup={0x2, r3, 0xe}, 0x10}}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000c40), 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) 4.564349527s ago: executing program 1 (id=10348): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007110110000000000950a008000000000e8b6579ddee9ca80fa107a2a4ec3fc29eb3400fe00456b00f4161d817bc2897f8a7db7c8c936199e5ae2bafb43744e85f5bcd2f6de240f399962f2be99bb117d42323f375fc363f90af49b85a70a9bd68593a990434d57e9a1f209a1223ade"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = socket$unix(0x1, 0x5, 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000300)={0x7, 0xffffffffffffff98, 0x5, 0x7, 0x6, 0x8, 0x8, 0x3}, &(0x7f0000000100)={0x4, 0x100000001, 0x200, 0x9, 0x7, 0x7, 0x7ff, 0x1}, &(0x7f0000000140)={0x80000004, 0x0, 0x7, 0x100000000, 0x7f, 0xea2, 0xf39c, 0x9e8b}, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={[0x7]}, 0x8}) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) ftruncate(r1, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b000000000000000000000000000400", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = open(&(0x7f0000000040)='./bus\x00', 0x143142, 0x80) ftruncate(r6, 0x2007ffb) sendfile(r0, r6, 0x0, 0x1000000201005) 4.526980098s ago: executing program 6 (id=10349): mount$incfs(&(0x7f0000000140)='./file2\x00', 0x0, 0x0, 0x1888028, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, 0x0, &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) r5 = io_uring_setup(0x734a, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="140000001000010300000ae6f72087a003"], 0x3c}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), r6) socket(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r7, 0x107, 0xe, 0x0, &(0x7f00000002c0)) 954.276575ms ago: executing program 6 (id=10350): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007110110000000000950a008000000000e8b6579ddee9ca80fa107a2a4ec3fc29eb3400fe00456b00f4161d817bc2897f8a7db7c8c936199e5ae2bafb43744e85f5bcd2f6de240f399962f2be99bb117d42323f375fc363f90af49b85a70a9bd68593a990434d57e9a1f209a1223ade"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = socket$unix(0x1, 0x5, 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000300)={0x7, 0xffffffffffffff98, 0x5, 0x7, 0x6, 0x8, 0x8, 0x3}, &(0x7f0000000100)={0x4, 0x100000001, 0x200, 0x9, 0x7, 0x7, 0x7ff, 0x1}, &(0x7f0000000140)={0x80000004, 0x0, 0x7, 0x100000000, 0x7f, 0xea2, 0xf39c, 0x9e8b}, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={[0x7]}, 0x8}) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) ftruncate(r1, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b000000000000000000000000000400", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r6, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = open(&(0x7f0000000040)='./bus\x00', 0x143142, 0x80) ftruncate(r7, 0x2007ffb) sendfile(r0, r7, 0x0, 0x1000000201005) 951.236295ms ago: executing program 3 (id=10351): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8992, &(0x7f00000000c0)={'sit0\x00', 0x0}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000000)='system_u:object_r:systemd_unit_file_t:s0\x00', 0x29, 0x5) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0xc) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x2) mmap(&(0x7f0000419000/0x4000)=nil, 0x4000, 0x800001, 0x11, r5, 0x43200000) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0xa80, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000001240)={0x0, 0x2, 0x0, 0x0, 0x0, "001bf1000000000000002000"}) r7 = syz_open_pts(r6, 0x101) dup3(r7, r6, 0x0) 924.995376ms ago: executing program 1 (id=10352): ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b52, &(0x7f0000000180)="b52be39296") ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='attr/exec\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000010000", @ANYRES32, @ANYBLOB="00000000001000000000000000", @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, &(0x7f0000001400)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) syz_emit_ethernet(0x53, 0x0, 0x0) r5 = getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f0000000240)=@abs, 0x6e) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000476000/0x1000)=nil) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) 924.292116ms ago: executing program 3 (id=10353): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) socket$nl_xfrm(0x10, 0x3, 0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x25, 0x7, @val=@iter={&(0x7f0000000280)=@cgroup={0x2, 0xffffffffffffffff, 0xe}, 0x10}}, 0x20) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) 711.344359ms ago: executing program 4 (id=10354): ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b52, &(0x7f0000000180)="b52be39296") ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='attr/exec\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000010000", @ANYRES32, @ANYBLOB="00000000001000000000000000", @ANYRES32, @ANYBLOB='\x00'/27], 0x50) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, &(0x7f0000001400)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f0000000180)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) syz_emit_ethernet(0x53, 0x0, 0x0) getpid() r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r5}, 0x10) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f0000000240)=@abs, 0x6e) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000476000/0x1000)=nil) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) 0s ago: executing program 6 (id=10355): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8992, &(0x7f00000000c0)={'sit0\x00', 0x0}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000000)='system_u:object_r:systemd_unit_file_t:s0\x00', 0x29, 0x5) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0xc) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x2) mmap(&(0x7f0000419000/0x4000)=nil, 0x4000, 0x800001, 0x11, r5, 0x43200000) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0xa80, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000001240)={0x0, 0x2, 0x0, 0x0, 0x0, "001bf1000000000000002000"}) r7 = syz_open_pts(r6, 0x101) dup3(r7, r6, 0x0) kernel console output (not intermixed with test programs): vlan entered promiscuous mode [ 2467.615362][T22459] device veth1_macvtap left promiscuous mode [ 2467.637091][T22459] device veth1_macvtap entered promiscuous mode [ 2467.791462][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2467.805527][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2467.821171][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1.1: link becomes ready [ 2467.846511][T22463] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6146 sclass=netlink_route_socket pid=22463 comm=syz.6.5747 [ 2467.957361][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2467.965753][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2467.974323][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 2467.982564][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2468.230864][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 2468.361589][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2468.396606][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2468.429586][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2468.440686][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2468.451422][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2468.469913][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2468.585192][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2468.593790][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2468.602258][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2468.610859][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2468.619109][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2468.627571][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2468.635709][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2468.644016][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2468.658929][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2468.676706][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2468.760427][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2468.768588][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2468.776599][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2468.786641][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2468.794884][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2468.803118][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 2468.810852][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 2468.818531][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [ 2468.826383][T16636] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [ 2468.895886][T22474] netlink: 'syz.3.5749': attribute type 4 has an invalid length. [ 2469.327540][T22493] 9pnet_fd: p9_fd_create_tcp (22493): problem connecting socket to 127.0.0.1 [ 2470.878954][T22498] overlayfs: failed to clone upperpath [ 2471.568252][T22507] netlink: 28 bytes leftover after parsing attributes in process `syz.6.5756'. [ 2472.576577][T22533] overlayfs: failed to clone upperpath [ 2474.863986][T22560] xt_hashlimit: size too large, truncated to 1048576 [ 2475.078726][T22564] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5774'. [ 2477.251300][T22602] 9pnet_fd: p9_fd_create_tcp (22602): problem connecting socket to 127.0.0.1 [ 2479.241636][T22621] netlink: 16 bytes leftover after parsing attributes in process `syz.4.5789'. [ 2479.251269][T22621] netlink: 20 bytes leftover after parsing attributes in process `syz.4.5789'. [ 2480.252779][T22625] syz.6.5790[22625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2480.254581][T22625] syz.6.5790[22625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2484.666673][T22634] syz.4.5791[22634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2484.679267][T22634] syz.4.5791[22634] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2489.143813][T22671] xt_CT: No such helper "netbios-ns" [ 2489.587009][T22669] netlink: 'syz.6.5802': attribute type 9 has an invalid length. [ 2489.594870][T22669] netlink: 'syz.6.5802': attribute type 6 has an invalid length. [ 2491.741896][T22702] netlink: 36 bytes leftover after parsing attributes in process `syz.2.5809'. [ 2499.519459][T22758] xt_hashlimit: size too large, truncated to 1048576 [ 2502.006769][T22783] netlink: 16 bytes leftover after parsing attributes in process `syz.4.5829'. [ 2502.015871][T22783] netlink: 20 bytes leftover after parsing attributes in process `syz.4.5829'. [ 2504.453292][T22799] xt_hashlimit: size too large, truncated to 1048576 [ 2504.513948][ T28] audit: type=1326 audit(2000000621.470:4944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22798 comm="syz.1.5834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7ffc0000 [ 2505.644694][ T28] audit: type=1326 audit(2000000622.350:4945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22798 comm="syz.1.5834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fad8358e929 code=0x7ffc0000 [ 2505.891233][ T28] audit: type=1326 audit(2000000622.350:4946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22798 comm="syz.1.5834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7ffc0000 [ 2505.941511][ T28] audit: type=1326 audit(2000000622.350:4947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22798 comm="syz.1.5834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fad8358e929 code=0x7ffc0000 [ 2506.549813][T22815] 9pnet_fd: Insufficient options for proto=fd [ 2506.634342][ T28] audit: type=1326 audit(2000000622.350:4948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22798 comm="syz.1.5834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7ffc0000 [ 2506.717123][ T28] audit: type=1326 audit(2000000622.350:4949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22798 comm="syz.1.5834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fad8358e929 code=0x7ffc0000 [ 2506.756235][ T28] audit: type=1326 audit(2000000622.350:4950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22798 comm="syz.1.5834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fad8358e963 code=0x7ffc0000 [ 2508.501214][T22823] overlayfs: failed to clone upperpath [ 2508.793088][ T28] audit: type=1326 audit(2000000622.350:4951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22798 comm="syz.1.5834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fad8358d3df code=0x7ffc0000 [ 2508.839048][ T28] audit: type=1326 audit(2000000622.350:4952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22798 comm="syz.1.5834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7fad8358e9b7 code=0x7ffc0000 [ 2508.906225][ T28] audit: type=1326 audit(2000000622.350:4953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22798 comm="syz.1.5834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fad8358d290 code=0x7ffc0000 [ 2509.241896][T22838] netlink: 16 bytes leftover after parsing attributes in process `syz.4.5843'. [ 2509.251126][T22838] netlink: 20 bytes leftover after parsing attributes in process `syz.4.5843'. [ 2511.054124][T22842] overlayfs: failed to clone upperpath [ 2512.616882][T22849] netlink: 'syz.4.5844': attribute type 3 has an invalid length. [ 2512.625177][T22849] netlink: 'syz.4.5844': attribute type 3 has an invalid length. [ 2512.633029][T22849] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5844'. [ 2516.078621][T22870] 9pnet_fd: p9_fd_create_tcp (22870): problem connecting socket to 127.0.0.1 [ 2523.101814][T22922] fuse: Unknown parameter '0xffffffffffffffff' [ 2530.739927][T22976] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 2530.782709][T22976] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2532.096170][T22981] netlink: 'syz.1.5873': attribute type 6 has an invalid length. [ 2534.520236][T22984] A link change request failed with some changes committed already. Interface ip6gretap0 may have been left with an inconsistent configuration, please check. [ 2534.624869][ T28] kauditd_printk_skb: 28 callbacks suppressed [ 2534.624890][ T28] audit: type=1326 audit(2000000651.300:4982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22964 comm="syz.4.5871" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2534.654760][ T28] audit: type=1326 audit(2000000651.300:4983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22964 comm="syz.4.5871" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2534.678915][ T28] audit: type=1326 audit(2000000651.330:4984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22964 comm="syz.4.5871" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2534.709155][ T28] audit: type=1326 audit(2000000651.330:4985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22964 comm="syz.4.5871" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2534.733403][ T28] audit: type=1326 audit(2000000651.330:4986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22964 comm="syz.4.5871" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2534.757202][ T28] audit: type=1326 audit(2000000651.360:4987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22964 comm="syz.4.5871" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2534.791743][ T28] audit: type=1326 audit(2000000651.360:4988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22964 comm="syz.4.5871" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2534.815727][ T28] audit: type=1326 audit(2000000651.370:4989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22964 comm="syz.4.5871" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2534.847625][ T28] audit: type=1326 audit(2000000651.380:4990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22964 comm="syz.4.5871" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2534.906302][ T28] audit: type=1326 audit(2000000651.390:4991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22964 comm="syz.4.5871" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2537.760528][T23019] syz.1.5881[23019] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2537.760910][T23019] syz.1.5881[23019] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2540.794540][T23033] syz.1.5885[23033] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2540.807320][T23033] syz.1.5885[23033] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2545.071512][T23070] overlayfs: missing 'lowerdir' [ 2545.868164][T23066] overlayfs: failed to clone upperpath [ 2548.503406][T23093] 9pnet_fd: Insufficient options for proto=fd [ 2549.200027][T23099] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 2549.315582][T23101] syz.6.5902[23101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2549.316367][T23101] syz.6.5902[23101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2553.117996][T23111] incfs: Error allocating mount info. -12 [ 2553.135266][T23111] incfs: mount failed -12 [ 2553.354949][T23123] netlink: 'syz.3.5907': attribute type 3 has an invalid length. [ 2553.363064][T23123] netlink: 'syz.3.5907': attribute type 3 has an invalid length. [ 2553.370894][T23123] netlink: 12 bytes leftover after parsing attributes in process `syz.3.5907'. [ 2555.608533][T23129] overlayfs: failed to clone upperpath [ 2555.667551][T23141] netlink: 12 bytes leftover after parsing attributes in process `syz.3.5912'. [ 2556.127730][T23152] netlink: 12 bytes leftover after parsing attributes in process `syz.3.5914'. [ 2557.487184][T23164] netlink: 108 bytes leftover after parsing attributes in process `syz.2.5916'. [ 2557.496290][T23164] netlink: 20 bytes leftover after parsing attributes in process `syz.2.5916'. [ 2557.600740][T23155] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5915'. [ 2559.587909][T23185] syz.3.5920[23185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2559.588085][T23185] syz.3.5920[23185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2563.662973][T23198] netlink: 'syz.1.5924': attribute type 3 has an invalid length. [ 2563.682401][T23198] netlink: 'syz.1.5924': attribute type 3 has an invalid length. [ 2563.690216][T23198] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5924'. [ 2568.920419][T23237] netlink: 'syz.3.5932': attribute type 27 has an invalid length. [ 2570.047236][T23248] overlayfs: missing 'lowerdir' [ 2572.403565][T23241] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 2572.436982][T23241] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2572.488992][T23241] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 2572.695831][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2572.846081][T23278] netlink: 277 bytes leftover after parsing attributes in process `syz.6.5941'. [ 2573.249046][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2574.155826][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1.1: link becomes ready [ 2574.163820][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2574.172265][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2574.180741][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 2574.188987][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2574.197718][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 2574.205905][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2574.316996][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2574.327611][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2574.336053][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2574.344595][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2574.353275][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2574.420279][T23289] syz.6.5943[23289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2574.420726][T23289] syz.6.5943[23289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2575.653270][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2575.673930][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2575.682240][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2575.690779][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2575.699072][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2575.847785][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2575.856368][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2575.864768][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 2575.872364][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 2575.880985][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [ 2576.009423][ T1591] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [ 2576.510774][T23298] overlayfs: failed to clone upperpath [ 2577.853885][T23319] netlink: 32 bytes leftover after parsing attributes in process `syz.1.5949'. [ 2578.890368][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 2580.228738][ T28] audit: type=1400 audit(2000000694.790:5005): avc: denied { getopt } for pid=23310 comm="syz.1.5949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2582.176784][T23343] syz.3.5955[23343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2582.176864][T23343] syz.3.5955[23343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2585.811901][T23338] overlayfs: failed to clone upperpath [ 2590.261900][T23377] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5962'. [ 2590.924287][T23388] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2594.618754][T23414] syz.4.5971[23414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2594.618839][T23414] syz.4.5971[23414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2598.812968][T23440] overlayfs: failed to clone upperpath [ 2604.461289][ T28] audit: type=1400 audit(2000000720.508:5006): avc: denied { connect } for pid=23448 comm="syz.6.5982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2604.838554][T23471] netlink: 16 bytes leftover after parsing attributes in process `syz.3.5987'. [ 2604.848115][T23471] netlink: 20 bytes leftover after parsing attributes in process `syz.3.5987'. [ 2605.491361][T23472] netlink: 40 bytes leftover after parsing attributes in process `syz.4.5985'. [ 2607.572721][ T28] audit: type=1400 audit(2000000723.448:5007): avc: denied { create } for pid=23460 comm="syz.4.5985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2608.977635][T23487] netlink: 'syz.1.5993': attribute type 4 has an invalid length. [ 2610.356053][T23507] netlink: 16 bytes leftover after parsing attributes in process `syz.3.5997'. [ 2610.365532][T23507] netlink: 20 bytes leftover after parsing attributes in process `syz.3.5997'. [ 2613.989275][T23532] 9pnet_fd: p9_fd_create_tcp (23532): problem connecting socket to 127.0.0.1 [ 2615.957145][T23559] netlink: 16 bytes leftover after parsing attributes in process `syz.4.6009'. [ 2615.966217][T23559] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6009'. [ 2615.995068][T23557] netlink: 104 bytes leftover after parsing attributes in process `syz.1.6008'. [ 2616.788842][T23572] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6014'. [ 2623.152975][T23609] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6022'. [ 2623.201482][T23614] netlink: 16 bytes leftover after parsing attributes in process `syz.2.6023'. [ 2623.210554][T23614] netlink: 20 bytes leftover after parsing attributes in process `syz.2.6023'. [ 2629.952869][ T28] audit: type=1400 audit(2000000975.187:5008): avc: denied { create } for pid=23637 comm="syz.3.6032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2630.531253][T23674] 9pnet_fd: p9_fd_create_tcp (23674): problem connecting socket to 127.0.0.1 [ 2631.775853][T23679] netlink: 16 bytes leftover after parsing attributes in process `syz.4.6037'. [ 2631.784893][T23679] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6037'. [ 2633.673886][T23704] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6047'. [ 2637.847910][T23734] netlink: 16 bytes leftover after parsing attributes in process `syz.4.6056'. [ 2637.856974][T23734] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6056'. [ 2644.456582][T23782] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6064'. [ 2644.901086][T23790] 9pnet_fd: Insufficient options for proto=fd [ 2645.000567][T23800] netlink: 16 bytes leftover after parsing attributes in process `syz.6.6071'. [ 2645.009837][T23800] netlink: 20 bytes leftover after parsing attributes in process `syz.6.6071'. [ 2646.929920][T23823] tipc: Started in network mode [ 2646.934891][T23823] tipc: Node identity ac14140f, cluster identity 4711 [ 2646.941865][T23823] tipc: New replicast peer: 172.30.1.2 [ 2646.947544][T23823] tipc: Enabled bearer , priority 10 [ 2648.699075][ T221] tipc: Node number set to 2886997007 [ 2650.337649][T23859] netlink: 16 bytes leftover after parsing attributes in process `syz.2.6087'. [ 2650.346732][T23859] netlink: 20 bytes leftover after parsing attributes in process `syz.2.6087'. [ 2650.406872][ T28] audit: type=1400 audit(2000000997.367:5009): avc: denied { audit_write } for pid=23850 comm="syz.4.6086" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2651.239269][T23870] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6090'. [ 2654.619813][ T28] audit: type=1400 audit(2000001001.567:5010): avc: denied { map } for pid=23877 comm="syz.6.6094" path="socket:[85510]" dev="sockfs" ino=85510 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 2657.796689][T23922] netlink: 16 bytes leftover after parsing attributes in process `syz.1.6102'. [ 2657.805763][T23922] netlink: 20 bytes leftover after parsing attributes in process `syz.1.6102'. [ 2663.211889][T23969] syz.6.6115[23969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2663.211976][T23969] syz.6.6115[23969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2664.884263][T23971] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6124'. [ 2665.449440][T23975] netlink: 16 bytes leftover after parsing attributes in process `syz.3.6117'. [ 2665.459042][T23975] netlink: 20 bytes leftover after parsing attributes in process `syz.3.6117'. [ 2668.128787][ T28] audit: type=1400 audit(2000001015.087:5011): avc: denied { getopt } for pid=23984 comm="syz.4.6121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2668.313551][T23991] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2672.885234][T24022] fuse: Unknown parameter 'gÄ' [ 2673.018581][T24025] netlink: 16 bytes leftover after parsing attributes in process `syz.4.6132'. [ 2673.027842][T24025] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6132'. [ 2679.783755][T24090] futex_wake_op: syz.1.6147 tries to shift op by -1; fix this program [ 2680.134101][ T28] audit: type=1326 audit(2000001027.949:5012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24065 comm="syz.4.6146" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2681.822754][ T28] audit: type=1326 audit(2000001027.949:5013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24065 comm="syz.4.6146" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2681.910454][ T28] audit: type=1326 audit(2000001027.949:5014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24065 comm="syz.4.6146" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2681.935700][ T28] audit: type=1326 audit(2000001027.949:5015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24065 comm="syz.4.6146" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2682.590993][ T28] audit: type=1326 audit(2000001027.949:5016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24065 comm="syz.4.6146" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2682.926495][ T28] audit: type=1326 audit(2000001027.949:5017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24065 comm="syz.4.6146" exe="/root/syz-executor" sig=0 arch=c000003e syscall=72 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2682.971206][ T28] audit: type=1326 audit(2000001027.949:5018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24065 comm="syz.4.6146" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2682.995566][ T28] audit: type=1326 audit(2000001027.949:5019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24065 comm="syz.4.6146" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2683.028553][ T28] audit: type=1326 audit(2000001027.949:5020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24065 comm="syz.4.6146" exe="/root/syz-executor" sig=0 arch=c000003e syscall=199 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2683.065981][ T28] audit: type=1326 audit(2000001027.949:5021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24065 comm="syz.4.6146" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d0c78e929 code=0x7ffc0000 [ 2683.621256][T24082] syz.6.6148 (24082) used greatest stack depth: 19552 bytes left [ 2683.666350][T24155] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6177'. [ 2683.695031][T24155] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6177'. [ 2683.902900][T24169] block device autoloading is deprecated and will be removed. [ 2684.459069][T24177] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6176'. [ 2686.002948][T24194] netlink: 76 bytes leftover after parsing attributes in process `syz.2.6190'. [ 2686.012296][T24194] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6190'. [ 2686.022229][T24194] netlink: 40 bytes leftover after parsing attributes in process `syz.2.6190'. [ 2686.043282][T24194] netlink: 40 bytes leftover after parsing attributes in process `syz.2.6190'. [ 2688.202083][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 2688.202104][ T28] audit: type=1400 audit(2000001036.059:5039): avc: denied { setopt } for pid=24210 comm="syz.3.6197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2690.385586][ T28] audit: type=1400 audit(2000001038.339:5040): avc: denied { getopt } for pid=24224 comm="syz.6.6202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2694.950297][T24266] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6212'. [ 2699.653329][T24314] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6234'. [ 2699.686196][T24314] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6234'. [ 2699.699984][T24314] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6234'. [ 2702.149583][T24360] syz.2.6247[24360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2702.149666][T24360] syz.2.6247[24360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2703.337000][ T28] audit: type=1400 audit(2000001051.299:5041): avc: denied { getopt } for pid=24384 comm="syz.2.6264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2703.389804][T24391] netlink: 60 bytes leftover after parsing attributes in process `syz.4.6267'. [ 2703.413959][T24395] overlayfs: NFS export requires "redirect_dir=nofollow" on non-upper mount, falling back to nfs_export=off. [ 2703.425723][T24391] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6267'. [ 2703.434901][T24391] netlink: 'syz.4.6267': attribute type 2 has an invalid length. [ 2703.442781][T24395] overlayfs: missing 'lowerdir' [ 2704.546499][ T28] audit: type=1400 audit(2000001052.509:5042): avc: denied { mounton } for pid=24407 comm="syz.3.6275" path="/1185/file0" dev="tmpfs" ino=6557 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 2704.546698][T24410] 9pnet_fd: p9_fd_create_unix (24410): problem connecting socket: ./file0: -111 [ 2704.737175][T24425] I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2704.750271][T24425] FAT-fs (loop9): unable to read boot sector [ 2706.867904][T24488] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6304'. [ 2706.877089][T24488] netlink: 'syz.2.6304': attribute type 1 has an invalid length. [ 2706.894797][T24488] netlink: 16 bytes leftover after parsing attributes in process `syz.2.6304'. [ 2707.451997][T24522] netlink: 123 bytes leftover after parsing attributes in process `syz.1.6317'. [ 2708.917023][T24573] syz.4.6337[24573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2708.917105][T24573] syz.4.6337[24573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2712.753580][T24638] netlink: 16 bytes leftover after parsing attributes in process `syz.4.6360'. [ 2712.774341][T24638] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6360'. [ 2713.067930][T24647] tipc: Invalid UDP bearer configuration [ 2713.067958][T24647] tipc: Enabling of bearer rejected, failed to enable media [ 2713.378214][T24664] syz.6.6372[24664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2713.378300][T24664] syz.6.6372[24664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2716.420610][T24692] tipc: New replicast peer: 172.30.1.4 [ 2716.438491][T24692] tipc: Enabled bearer , priority 10 [ 2717.134546][T24714] netlink: 16 bytes leftover after parsing attributes in process `syz.6.6386'. [ 2717.143624][T24714] netlink: 20 bytes leftover after parsing attributes in process `syz.6.6386'. [ 2718.914638][T22584] tipc: Node number set to 722801931 [ 2719.186226][T24751] tipc: Enabling of bearer rejected, already enabled [ 2720.944976][T24784] netlink: 16 bytes leftover after parsing attributes in process `syz.4.6412'. [ 2720.954544][T24784] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6412'. [ 2722.397655][T24799] tipc: Enabling of bearer rejected, already enabled [ 2727.141983][T24892] netlink: 16 bytes leftover after parsing attributes in process `syz.1.6450'. [ 2727.151476][T24892] netlink: 20 bytes leftover after parsing attributes in process `syz.1.6450'. [ 2727.869363][T24900] netlink: 'syz.1.6454': attribute type 4 has an invalid length. [ 2727.906153][T24900] netlink: 17 bytes leftover after parsing attributes in process `syz.1.6454'. [ 2727.927983][T24903] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6453'. [ 2729.187103][T24920] 9pnet_fd: Insufficient options for proto=fd [ 2731.769612][ T28] audit: type=1400 audit(2000001079.729:5043): avc: denied { relabelto } for pid=24996 comm="syz.3.6489" name="1228" dev="tmpfs" ino=6785 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 2731.818250][T25005] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2731.820111][ T28] audit: type=1400 audit(2000001079.729:5044): avc: denied { associate } for pid=24996 comm="syz.3.6489" name="1228" dev="tmpfs" ino=6785 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 2731.829706][T25005] FAT-fs (loop7): unable to read boot sector [ 2731.861898][ T28] audit: type=1400 audit(2000001079.729:5045): avc: denied { write } for pid=284 comm="syz-executor" name="1228" dev="tmpfs" ino=6785 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 2731.889850][ T28] audit: type=1400 audit(2000001079.729:5046): avc: denied { remove_name } for pid=284 comm="syz-executor" name="binderfs" dev="tmpfs" ino=6789 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 2731.917501][ T28] audit: type=1400 audit(2000001079.729:5047): avc: denied { rmdir } for pid=284 comm="syz-executor" name="1228" dev="tmpfs" ino=6785 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 2733.525739][T25039] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6505'. [ 2734.895429][T25124] syz.2.6539[25124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2734.897054][T25124] syz.2.6539[25124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2741.743043][ T28] audit: type=1400 audit(2000001089.699:5048): avc: denied { listen } for pid=25265 comm="syz.6.6593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 2742.153436][T25280] netlink: 16 bytes leftover after parsing attributes in process `syz.6.6598'. [ 2742.163035][T25280] netlink: 20 bytes leftover after parsing attributes in process `syz.6.6598'. [ 2746.177807][ T28] audit: type=1400 audit(2000001094.139:5049): avc: denied { mounton } for pid=25377 comm="syz.1.6636" path="/1309/file0" dev="tmpfs" ino=7189 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2746.201483][T25378] 9pnet_fd: Insufficient options for proto=fd [ 2746.228394][ T28] audit: type=1400 audit(2000001094.189:5050): avc: denied { relabelfrom } for pid=25379 comm="syz.2.6637" name="" dev="pipefs" ino=88871 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 2754.377366][T25624] netlink: 16 bytes leftover after parsing attributes in process `syz.1.6733'. [ 2754.386685][T25624] netlink: 20 bytes leftover after parsing attributes in process `syz.1.6733'. [ 2755.440241][T25699] netlink: 16 bytes leftover after parsing attributes in process `syz.6.6764'. [ 2755.449729][T25699] netlink: 20 bytes leftover after parsing attributes in process `syz.6.6764'. [ 2756.147192][T25701] device bridge0 entered promiscuous mode [ 2758.926933][T25773] tipc: Enabling of bearer rejected, already enabled [ 2759.249257][T25806] syz.3.6809[25806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2759.249335][T25806] syz.3.6809[25806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2760.481436][T25816] tipc: Enabling of bearer rejected, already enabled [ 2761.257946][T25854] futex_wake_op: syz.4.6829 tries to shift op by 32; fix this program [ 2761.573471][T25864] tipc: Enabling of bearer rejected, already enabled [ 2762.081137][T25875] syz.1.6839[25875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2762.081221][T25875] syz.1.6839[25875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2762.192612][T25890] 9pnet_fd: Insufficient options for proto=fd [ 2762.825724][T25919] tipc: Enabling of bearer rejected, already enabled [ 2763.599434][T25965] overlayfs: failed to clone lowerpath [ 2764.421596][T25999] tipc: New replicast peer: 172.30.1.3 [ 2764.427217][T25999] tipc: Enabled bearer , priority 10 [ 2764.730287][T26018] block device autoloading is deprecated and will be removed. [ 2764.745560][T26018] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2764.763637][T26018] FAT-fs (loop3): unable to read boot sector [ 2764.848867][T26032] netlink: 16 bytes leftover after parsing attributes in process `syz.1.6905'. [ 2765.546097][T22675] tipc: Node number set to 3392709824 [ 2765.681466][T26073] netlink: 12 bytes leftover after parsing attributes in process `syz.6.6919'. [ 2765.857330][T26082] tipc: Enabling of bearer rejected, already enabled [ 2766.961258][T26123] tipc: Enabling of bearer rejected, already enabled [ 2768.702707][T26164] tipc: Enabling of bearer rejected, already enabled [ 2770.416142][T26225] xt_bpf: check failed: parse error [ 2770.763382][T26228] tipc: Enabling of bearer rejected, already enabled [ 2771.061839][T26233] netlink: 'syz.2.6981': attribute type 12 has an invalid length. [ 2771.745070][T26279] syz.3.6999[26279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2771.745128][T26279] syz.3.6999[26279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2771.879182][T26282] tipc: Enabling of bearer rejected, already enabled [ 2772.222505][T26290] netlink: 36 bytes leftover after parsing attributes in process `syz.3.7003'. [ 2772.336541][T26310] device batadv_slave_1 entered promiscuous mode [ 2772.357591][T26310] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7010'. [ 2772.631340][T26332] netlink: 12 bytes leftover after parsing attributes in process `syz.2.7017'. [ 2772.667860][ T28] audit: type=1400 audit(2000001120.629:5051): avc: denied { write } for pid=26335 comm="syz.4.7021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2772.769996][T26344] netlink: 16 bytes leftover after parsing attributes in process `syz.3.7018'. [ 2772.779229][T26344] netlink: 20 bytes leftover after parsing attributes in process `syz.3.7018'. [ 2773.216128][ T28] audit: type=1400 audit(2000001121.169:5052): avc: denied { shutdown } for pid=26356 comm="syz.4.7028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 2773.332367][T26375] 9p: Unknown access argument 18446744073709551615: -34 [ 2775.842822][ T28] audit: type=1400 audit(2000001123.799:5053): avc: denied { map } for pid=26491 comm="syz.3.7081" path="socket:[90988]" dev="sockfs" ino=90988 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2775.921749][ T28] audit: type=1400 audit(2000001123.829:5054): avc: denied { accept } for pid=26491 comm="syz.3.7081" path="socket:[90988]" dev="sockfs" ino=90988 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2776.544319][T26508] netlink: 16 bytes leftover after parsing attributes in process `syz.4.7086'. [ 2776.553612][T26508] netlink: 20 bytes leftover after parsing attributes in process `syz.4.7086'. [ 2777.263453][T26517] netlink: 104 bytes leftover after parsing attributes in process `syz.4.7089'. [ 2777.917178][T26538] SELinux: Context system_u:object_r:semanage_exec_t:s0 is not valid (left unmapped). [ 2777.939006][ T28] audit: type=1400 audit(2000001125.899:5055): avc: denied { relabelto } for pid=26537 comm="syz.6.7095" name="" dev="pipefs" ino=47030 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:semanage_exec_t:s0" [ 2778.288662][T26568] xt_bpf: check failed: parse error [ 2778.947378][T26578] netlink: 76 bytes leftover after parsing attributes in process `syz.4.7114'. [ 2781.152545][T26661] netlink: 16 bytes leftover after parsing attributes in process `syz.2.7141'. [ 2781.161816][T26661] netlink: 20 bytes leftover after parsing attributes in process `syz.2.7141'. [ 2781.524212][T26684] 9pnet_fd: Insufficient options for proto=fd [ 2781.726966][T26693] tipc: Enabling of bearer rejected, already enabled [ 2784.554920][T26757] tipc: Enabling of bearer rejected, already enabled [ 2786.643191][T26811] tipc: Enabling of bearer rejected, already enabled [ 2788.664518][T26874] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7235'. [ 2793.173726][T26983] netlink: 16 bytes leftover after parsing attributes in process `syz.6.7266'. [ 2793.182980][T26983] netlink: 20 bytes leftover after parsing attributes in process `syz.6.7266'. [ 2793.780159][T27002] xt_hashlimit: size too large, truncated to 1048576 [ 2794.101898][T27021] netlink: 16 bytes leftover after parsing attributes in process `syz.6.7279'. [ 2794.111139][T27021] netlink: 20 bytes leftover after parsing attributes in process `syz.6.7279'. [ 2795.022691][T27046] netlink: 16 bytes leftover after parsing attributes in process `syz.4.7286'. [ 2795.031967][T27046] netlink: 20 bytes leftover after parsing attributes in process `syz.4.7286'. [ 2795.302123][T27054] syz.1.7294[27054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2795.302205][T27054] syz.1.7294[27054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2795.494220][T27062] tipc: Enabling of bearer rejected, already enabled [ 2799.684986][ T28] audit: type=1400 audit(2000001147.579:5056): avc: denied { ioctl } for pid=27183 comm="syz.6.7341" path="socket:[92737]" dev="sockfs" ino=92737 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2799.705924][T27191] syz.1.7344[27191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2799.709945][T27191] syz.1.7344[27191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2799.712101][ T28] audit: type=1400 audit(2000001147.579:5057): avc: denied { read } for pid=27183 comm="syz.6.7341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2800.247802][T27199] netlink: 16 bytes leftover after parsing attributes in process `syz.1.7345'. [ 2800.257222][T27199] netlink: 20 bytes leftover after parsing attributes in process `syz.1.7345'. [ 2803.552811][T27309] netlink: 16 bytes leftover after parsing attributes in process `syz.6.7379'. [ 2803.562088][T27309] netlink: 20 bytes leftover after parsing attributes in process `syz.6.7379'. [ 2803.974183][T27315] netlink: 16 bytes leftover after parsing attributes in process `syz.2.7384'. [ 2803.983503][T27315] netlink: 20 bytes leftover after parsing attributes in process `syz.2.7384'. [ 2804.427083][T27342] netlink: 96 bytes leftover after parsing attributes in process `syz.1.7397'. [ 2804.847532][T27353] netlink: 16 bytes leftover after parsing attributes in process `syz.2.7399'. [ 2804.856789][T27353] netlink: 20 bytes leftover after parsing attributes in process `syz.2.7399'. [ 2807.337488][T27431] x_tables: duplicate underflow at hook 4 [ 2807.543382][T27434] netlink: 16 bytes leftover after parsing attributes in process `syz.6.7429'. [ 2807.552773][T27434] netlink: 20 bytes leftover after parsing attributes in process `syz.6.7429'. [ 2808.564987][T27481] netlink: 16 bytes leftover after parsing attributes in process `syz.2.7441'. [ 2808.574304][T27481] netlink: 20 bytes leftover after parsing attributes in process `syz.2.7441'. [ 2808.970297][T27514] I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2808.984198][T27514] FAT-fs (loop9): unable to read boot sector [ 2809.826834][T27545] netlink: 16 bytes leftover after parsing attributes in process `syz.2.7477'. [ 2809.836097][T27545] netlink: 20 bytes leftover after parsing attributes in process `syz.2.7477'. [ 2810.418593][T27568] netlink: 16 bytes leftover after parsing attributes in process `syz.2.7486'. [ 2810.427789][T27568] netlink: 20 bytes leftover after parsing attributes in process `syz.2.7486'. [ 2812.300326][T27599] netlink: 16 bytes leftover after parsing attributes in process `syz.3.7497'. [ 2812.309551][T27599] netlink: 20 bytes leftover after parsing attributes in process `syz.3.7497'. [ 2812.547393][ T28] audit: type=1400 audit(2000001160.509:5058): avc: denied { relabelfrom } for pid=27604 comm="syz.2.7501" name="NETLINK" dev="sockfs" ino=94224 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2812.556172][T27605] SELinux: Context system_u:object_r:inetd_var_run_t:s0 is not valid (left unmapped). [ 2812.581910][ T28] audit: type=1400 audit(2000001160.539:5059): avc: denied { relabelto } for pid=27604 comm="syz.2.7501" name="NETLINK" dev="sockfs" ino=94224 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=netlink_netfilter_socket permissive=1 trawcon="system_u:object_r:inetd_var_run_t:s0" [ 2812.833419][T27627] netlink: 16 bytes leftover after parsing attributes in process `syz.1.7505'. [ 2812.842684][T27627] netlink: 20 bytes leftover after parsing attributes in process `syz.1.7505'. [ 2813.438736][T27647] netlink: 16 bytes leftover after parsing attributes in process `syz.3.7518'. [ 2813.447972][T27647] netlink: 20 bytes leftover after parsing attributes in process `syz.3.7518'. [ 2814.116968][T27675] x_tables: duplicate underflow at hook 4 [ 2815.147975][T27716] netlink: 16 bytes leftover after parsing attributes in process `syz.6.7542'. [ 2815.157233][T27716] netlink: 20 bytes leftover after parsing attributes in process `syz.6.7542'. [ 2815.512497][T27731] netlink: 16 bytes leftover after parsing attributes in process `syz.3.7547'. [ 2815.521773][T27731] netlink: 20 bytes leftover after parsing attributes in process `syz.3.7547'. [ 2817.312381][T27779] netlink: 16 bytes leftover after parsing attributes in process `syz.4.7565'. [ 2817.321611][T27779] netlink: 20 bytes leftover after parsing attributes in process `syz.4.7565'. [ 2820.135737][ T28] audit: type=1400 audit(2000001168.069:5060): avc: denied { bind } for pid=27840 comm="syz.3.7593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2821.775417][T27893] device veth1_macvtap left promiscuous mode [ 2821.784276][T27893] device macsec0 entered promiscuous mode [ 2822.636667][T27922] __nla_validate_parse: 1 callbacks suppressed [ 2822.636689][T27922] netlink: 132 bytes leftover after parsing attributes in process `syz.6.7618'. [ 2822.745305][ T28] audit: type=1326 audit(2000001170.699:5061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27926 comm="syz.6.7623" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fcb5718e929 code=0x0 [ 2822.834522][T27928] netlink: 16 bytes leftover after parsing attributes in process `syz.1.7622'. [ 2822.843829][T27928] netlink: 20 bytes leftover after parsing attributes in process `syz.1.7622'. [ 2824.356450][ T28] audit: type=1400 audit(2000001172.319:5062): avc: denied { name_bind } for pid=27955 comm="syz.6.7634" src=682 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hi_reserved_port_t tclass=udp_socket permissive=1 [ 2824.663139][T27976] netlink: 16 bytes leftover after parsing attributes in process `syz.2.7637'. [ 2824.672510][T27976] netlink: 20 bytes leftover after parsing attributes in process `syz.2.7637'. [ 2833.577787][T28142] netem: change failed [ 2833.973460][T28199] overlayfs: missing 'lowerdir' [ 2835.466984][T28303] tipc: Enabling of bearer rejected, already enabled [ 2837.425361][T28357] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 2840.457818][T28370] tipc: Enabling of bearer rejected, already enabled [ 2840.786391][T28401] device wireguard0 entered promiscuous mode [ 2842.355745][T28449] netlink: 16 bytes leftover after parsing attributes in process `syz.6.7829'. [ 2842.365017][T28449] netlink: 20 bytes leftover after parsing attributes in process `syz.6.7829'. [ 2845.506527][T28515] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 2845.537856][T28515] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 2845.684233][T28531] device bond_slave_1 entered promiscuous mode [ 2845.691962][T28531] netlink: 4 bytes leftover after parsing attributes in process `syz.6.7861'. [ 2845.701633][T28531] device bond_slave_1 left promiscuous mode [ 2845.868315][T28550] netlink: 20 bytes leftover after parsing attributes in process `syz.1.7867'. [ 2848.747907][T28631] overlayfs: failed to clone upperpath [ 2855.880720][T28723] overlayfs: failed to clone upperpath [ 2860.016288][T28807] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28807 comm=syz.2.7963 [ 2863.236462][T28897] bridge0: port 1(vlan0) entered blocking state [ 2863.246161][T28897] bridge0: port 1(vlan0) entered disabled state [ 2865.286478][T28915] 9pnet_fd: Insufficient options for proto=fd [ 2867.335819][ T28] audit: type=1400 audit(2000001215.289:5063): avc: denied { relabelto } for pid=28973 comm="syz.2.8028" name="NETLINK" dev="sockfs" ino=95902 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_netfilter_socket permissive=1 [ 2871.981570][T29059] tipc: Enabling of bearer rejected, already enabled [ 2873.136119][T29068] xt_bpf: check failed: parse error [ 2873.213347][T29076] overlayfs: failed to clone upperpath [ 2875.117667][T29146] overlayfs: failed to clone upperpath [ 2875.469230][T29154] tipc: Enabling of bearer rejected, already enabled [ 2877.575653][T29220] overlayfs: failed to clone upperpath [ 2877.595607][T29219] tipc: Enabling of bearer rejected, already enabled [ 2877.763912][T29230] bridge0: port 1(vlan0) entered blocking state [ 2877.777014][T29230] bridge0: port 1(vlan0) entered disabled state [ 2879.523954][T29275] tipc: Enabling of bearer rejected, already enabled [ 2881.597960][T29336] tipc: Enabling of bearer rejected, already enabled [ 2881.873905][T29351] overlayfs: failed to resolve './file2': -2 [ 2883.113606][T29373] overlayfs: failed to clone upperpath [ 2884.210581][T29407] overlayfs: failed to clone upperpath [ 2884.377509][T29417] tipc: Enabling of bearer rejected, already enabled [ 2886.620771][T29449] overlayfs: failed to clone upperpath [ 2890.303370][T29489] overlayfs: failed to clone upperpath [ 2893.942756][T29569] bridge0: port 1(vlan0) entered blocking state [ 2893.950175][T29569] bridge0: port 1(vlan0) entered disabled state [ 2895.533254][T29606] overlayfs: failed to clone upperpath [ 2896.054566][T29634] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8277'. [ 2896.421399][T29661] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8288'. [ 2896.438073][T29661] HTB: quantum of class 802C0007 is big. Consider r2q change. [ 2897.224979][T29686] tipc: Enabling of bearer rejected, already enabled [ 2898.983115][T29756] tipc: Enabling of bearer rejected, already enabled [ 2899.303599][T29763] device veth1_macvtap left promiscuous mode [ 2899.309859][T29763] device macsec0 entered promiscuous mode [ 2899.518484][T29777] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2900.832174][T29821] tipc: Enabling of bearer rejected, already enabled [ 2903.107518][T29904] overlayfs: failed to clone upperpath [ 2903.470901][T29908] tipc: Enabling of bearer rejected, already enabled [ 2903.594049][T29910] overlayfs: failed to clone upperpath [ 2904.510686][ T28] audit: type=1326 audit(2000001252.469:5064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29914 comm="syz.3.8391" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f6efc98e929 code=0x0 [ 2905.996946][T29974] tipc: Enabling of bearer rejected, already enabled [ 2906.380349][T29981] netlink: 96 bytes leftover after parsing attributes in process `syz.3.8413'. [ 2906.860847][T30001] overlayfs: failed to clone upperpath [ 2910.813284][ T28] audit: type=1400 audit(2000001258.769:5065): avc: denied { bind } for pid=30062 comm="syz.1.8444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2911.916368][T30070] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8447'. [ 2912.251117][T30092] overlayfs: failed to clone upperpath [ 2913.204210][T30132] overlayfs: failed to clone upperpath [ 2916.549397][T30188] overlayfs: failed to clone upperpath [ 2916.784378][T30199] overlayfs: failed to clone upperpath [ 2916.852631][T30207] overlayfs: failed to clone upperpath [ 2916.923002][ T28] audit: type=1400 audit(2000001264.879:5066): avc: denied { read write } for pid=30213 comm="syz.3.8502" name="file1" dev="tmpfs" ino=9153 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2916.980915][ T28] audit: type=1400 audit(2000001264.909:5067): avc: denied { open } for pid=30213 comm="syz.3.8502" path="/1659/file1" dev="tmpfs" ino=9153 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2918.338230][T30260] tipc: Enabling of bearer rejected, already enabled [ 2918.372314][T30263] bridge0: port 2(bridge_slave_1) entered disabled state [ 2918.398330][T30263] bridge0: port 2(bridge_slave_1) entered blocking state [ 2918.405542][T30263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2918.431593][T30263] device bridge0 entered promiscuous mode [ 2918.822218][T30282] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=13 sclass=netlink_route_socket pid=30282 comm=syz.2.8527 [ 2919.065042][T30291] bridge: RTM_NEWNEIGH with invalid ether address [ 2919.615838][T30317] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8540'. [ 2919.626966][T30317] IPv6: ADDRCONF(NETDEV_CHANGE): gre1: link becomes ready [ 2919.692681][T30319] overlayfs: failed to clone upperpath [ 2919.818117][T30331] tipc: Enabling of bearer rejected, already enabled [ 2919.952009][T30333] bridge: RTM_NEWNEIGH with invalid ether address [ 2920.020888][T30343] netlink: 'syz.3.8551': attribute type 3 has an invalid length. [ 2920.076447][T30354] overlayfs: failed to clone upperpath [ 2920.618780][T30376] device macsec1 entered promiscuous mode [ 2920.643053][T30376] device gretap0 entered promiscuous mode [ 2920.920843][T30396] tipc: Enabling of bearer rejected, failed to enable media [ 2922.874766][ T28] audit: type=1400 audit(2000001270.829:5068): avc: denied { setopt } for pid=30432 comm="syz.1.8587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2924.181036][T30484] device wireguard1 entered promiscuous mode [ 2924.372033][ T28] audit: type=1326 audit(2000001272.329:5069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30478 comm="syz.1.8604" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7fc00000 [ 2924.409419][ T28] audit: type=1326 audit(2000001272.359:5070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30478 comm="syz.1.8604" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fad8358e929 code=0x7fc00000 [ 2924.597390][ T28] audit: type=1326 audit(2000001272.369:5071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30478 comm="syz.1.8604" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7fc00000 [ 2924.884893][ T28] audit: type=1326 audit(2000001272.369:5072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30478 comm="syz.1.8604" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7fc00000 [ 2925.169871][ T28] audit: type=1326 audit(2000001272.369:5073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30478 comm="syz.1.8604" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7fc00000 [ 2925.217904][ T28] audit: type=1326 audit(2000001272.369:5074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30478 comm="syz.1.8604" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7fc00000 [ 2925.241925][ T28] audit: type=1326 audit(2000001272.369:5075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30478 comm="syz.1.8604" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7fc00000 [ 2925.266085][ T28] audit: type=1326 audit(2000001272.369:5076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30478 comm="syz.1.8604" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7fc00000 [ 2925.291872][ T28] audit: type=1326 audit(2000001272.369:5077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30478 comm="syz.1.8604" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7fc00000 [ 2928.415061][T30651] tipc: Enabling of bearer rejected, failed to enable media [ 2929.614058][ T28] kauditd_printk_skb: 60 callbacks suppressed [ 2929.614073][ T28] audit: type=1400 audit(2000001277.569:5138): avc: denied { read } for pid=30704 comm="syz.3.8695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2929.714199][T30718] netlink: 28 bytes leftover after parsing attributes in process `syz.6.8697'. [ 2930.767092][T30727] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8702'. [ 2931.172351][T30766] overlayfs: failed to clone upperpath [ 2932.828956][T30761] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8719'. [ 2933.311474][T30801] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8733'. [ 2935.092723][T30809] tipc: Enabling of bearer rejected, already enabled [ 2935.437480][T30825] 9pnet_fd: Insufficient options for proto=fd [ 2937.910143][T30860] tipc: Enabling of bearer rejected, already enabled [ 2940.423394][T30905] tipc: Enabling of bearer rejected, already enabled [ 2940.840183][T30927] overlayfs: failed to clone upperpath [ 2942.881587][T30968] tipc: Enabling of bearer rejected, already enabled [ 2943.733133][T30986] device ip6erspan0 entered promiscuous mode [ 2944.735171][T31011] tipc: Enabling of bearer rejected, already enabled [ 2948.026802][T31081] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8828'. [ 2957.751733][T31255] netlink: 136 bytes leftover after parsing attributes in process `syz.6.8878'. [ 2957.779771][T31255] A link change request failed with some changes committed already. Interface ip6gretap0 may have been left with an inconsistent configuration, please check. [ 2961.219416][T31320] device macsec0 entered promiscuous mode [ 2961.732825][T31317] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8895'. [ 2964.549160][T31491] netlink: 32 bytes leftover after parsing attributes in process `syz.6.8914'. [ 2967.917526][T31537] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31537 comm=syz.2.8926 [ 2969.659151][T31553] xt_l2tp: missing protocol rule (udp|l2tpip) [ 2969.837249][T31563] overlayfs: failed to clone upperpath [ 2971.836900][T31599] tipc: Enabling of bearer rejected, already enabled [ 2974.309763][ T28] audit: type=1326 audit(2000001322.269:5139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31603 comm="syz.4.8943" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7d0c78e929 code=0x7fc00000 [ 2977.544404][T31660] tipc: Enabling of bearer rejected, already enabled [ 2980.900380][T31666] block device autoloading is deprecated and will be removed. [ 2980.908542][T31666] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2980.917893][T31666] FAT-fs (loop5): unable to read boot sector [ 2984.756541][T31714] tipc: Enabling of bearer rejected, already enabled [ 2986.420429][T31733] overlayfs: failed to resolve './file1': -2 [ 2986.709010][T31736] xt_bpf: check failed: parse error [ 2996.453036][T31825] 9pnet_fd: Insufficient options for proto=fd [ 2997.103632][T31840] xt_CT: You must specify a L4 protocol and not use inversions on it [ 2998.046016][T31845] futex_wake_op: syz.3.9008 tries to shift op by -1; fix this program [ 3005.036327][T31897] netlink: 60 bytes leftover after parsing attributes in process `syz.6.9020'. [ 3006.044433][T31905] device vlan0 entered promiscuous mode [ 3009.378152][T31952] tipc: Enabling of bearer rejected, already enabled [ 3010.038217][T31956] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3010.047705][T31956] FAT-fs (loop5): unable to read boot sector [ 3012.263792][T31996] 9pnet_fd: Insufficient options for proto=fd [ 3012.297919][T31996] syz.4.9045[31996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3012.298019][T31996] syz.4.9045[31996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3012.625156][T31996] fuse: Unknown parameter '00000000000000000006' [ 3012.676907][T31996] syz.4.9045[31996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3012.677010][T31996] syz.4.9045[31996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3015.875584][T32052] syz.6.9059[32052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3015.887374][T32052] syz.6.9059[32052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3015.903499][T32052] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3017.699349][T32073] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3018.026081][T32077] xt_bpf: check failed: parse error [ 3021.000928][T32114] syz.1.9069[32114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3021.001934][T32114] syz.1.9069[32114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3024.928711][T32165] fuse: Unknown parameter 'use' [ 3026.592659][T32183] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 3026.601930][T32183] FAT-fs (loop3): unable to read boot sector [ 3027.106865][T32192] fuse: Unknown parameter '0xffffffffffffffff' [ 3028.864690][T32200] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 3032.515348][T32232] overlayfs: failed to resolve './file1': -2 [ 3033.470641][T32251] netlink: 8 bytes leftover after parsing attributes in process `syz.6.9110'. [ 3033.719388][ T28] audit: type=1326 audit(2000001381.679:5140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32258 comm="syz.6.9114" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fcb5718e929 code=0x0 [ 3037.665242][T32312] overlayfs: failed to clone upperpath [ 3040.459550][T32340] syz.6.9133[32340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3040.460285][T32340] syz.6.9133[32340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3043.108109][T32371] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3043.273270][T32372] device veth1_macvtap entered promiscuous mode [ 3043.280073][T32372] device macsec0 left promiscuous mode [ 3043.292726][T32372] device vti0 left promiscuous mode [ 3043.354247][T31428] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3045.351581][T32395] syz.1.9147[32395] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3045.352838][T32395] syz.1.9147[32395] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3046.784267][T32410] netlink: 8 bytes leftover after parsing attributes in process `syz.4.9152'. [ 3047.874626][T32442] device macsec0 entered promiscuous mode [ 3051.909890][T32479] netlink: 8 bytes leftover after parsing attributes in process `syz.2.9167'. [ 3055.691820][T32692] xt_NFQUEUE: number of queues (256) out of range (got 65538) [ 3055.841022][T32703] device wireguard0 entered promiscuous mode [ 3056.459656][T32715] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 3056.476469][T32715] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 3056.513266][T32715] device bridge0 left promiscuous mode [ 3056.792427][T32715] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3057.378630][T32728] netlink: 'syz.1.9187': attribute type 4 has an invalid length. [ 3059.398660][T32746] syz.6.9191[32746] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3059.399355][T32746] syz.6.9191[32746] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3061.174097][T32758] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3061.241928][T32758] device veth1_macvtap entered promiscuous mode [ 3061.248318][T32758] device macsec0 left promiscuous mode [ 3061.307547][T31402] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3063.123866][ T310] netlink: 'syz.2.9198': attribute type 4 has an invalid length. [ 3072.308791][ T404] netlink: 8 bytes leftover after parsing attributes in process `syz.2.9221'. [ 3076.489467][ T442] netlink: 40 bytes leftover after parsing attributes in process `syz.3.9230'. [ 3079.753278][ T472] bridge0: port 1(vlan0) entered blocking state [ 3079.759990][ T472] bridge0: port 1(vlan0) entered disabled state [ 3080.276298][ T486] ip6t_REJECT: ECHOREPLY is not supported [ 3083.270331][ T514] netlink: 'syz.4.9251': attribute type 13 has an invalid length. [ 3084.730065][ T28] audit: type=1400 audit(2000001661.574:5141): avc: denied { create } for pid=534 comm="syz.6.9255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 3087.121462][ T557] netlink: 'syz.3.9260': attribute type 3 has an invalid length. [ 3087.132856][ T557] netlink: 'syz.3.9260': attribute type 3 has an invalid length. [ 3087.140888][ T557] netlink: 12 bytes leftover after parsing attributes in process `syz.3.9260'. [ 3088.996801][ T562] netlink: 104 bytes leftover after parsing attributes in process `syz.6.9262'. [ 3092.271245][ T572] tipc: Enabling of bearer rejected, already enabled [ 3092.956091][ T583] overlayfs: failed to clone upperpath [ 3092.962214][ T28] audit: type=1400 audit(2000001669.904:5142): avc: denied { ioctl } for pid=577 comm="syz.2.9266" path="socket:[104641]" dev="sockfs" ino=104641 ioctlcmd=0x943d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3094.712328][ T597] netlink: 9 bytes leftover after parsing attributes in process `syz.6.9271'. [ 3094.722565][ T597] netlink: 5 bytes leftover after parsing attributes in process `syz.6.9271'. [ 3094.731625][ T597] 0ªX¹¦D: renamed from gretap0 [ 3094.737864][ T597] IPv6: ADDRCONF(NETDEV_CHANGE): 30ªX¹¦D: link becomes ready [ 3094.745407][ T597] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 3095.670678][ T604] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12 sclass=netlink_route_socket pid=604 comm=syz.3.9270 [ 3097.223073][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 3097.230890][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 3097.241006][ T630] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3097.384967][ T639] netlink: 'syz.3.9282': attribute type 27 has an invalid length. [ 3097.495450][ T639] device batadv_slave_1 left promiscuous mode [ 3097.656815][ T639] device macsec0 left promiscuous mode [ 3097.734893][ T642] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 3098.876643][ T642] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3099.040792][ T642] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 3099.376678][ T642] device bridge0 left promiscuous mode [ 3099.392381][ T642] device bridge0 entered promiscuous mode [ 3099.438614][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): macsec1: link becomes ready [ 3099.464403][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3099.484188][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3099.499091][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1.1: link becomes ready [ 3099.514207][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3099.532841][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3099.549719][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 3099.573380][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3099.591698][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 3099.602740][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3099.612631][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3099.625554][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3099.636098][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3100.356506][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3100.364804][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3100.656066][ T28] audit: type=1326 audit(2000001678.401:5143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=640 comm="syz.1.9284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7ffc0000 [ 3100.690020][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3100.703915][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3100.736027][ T28] audit: type=1326 audit(2000001678.411:5144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=640 comm="syz.1.9284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7ffc0000 [ 3100.743360][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3100.919270][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3100.989807][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3101.006950][ T28] audit: type=1326 audit(2000001678.441:5145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=640 comm="syz.1.9284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=221 compat=0 ip=0x7fad8358e929 code=0x7ffc0000 [ 3101.081493][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3101.086936][ T28] audit: type=1326 audit(2000001678.441:5146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=640 comm="syz.1.9284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7ffc0000 [ 3101.110048][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3101.145747][ T28] audit: type=1326 audit(2000001678.441:5147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=640 comm="syz.1.9284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7ffc0000 [ 3101.169542][ T28] audit: type=1326 audit(2000001678.521:5148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=640 comm="syz.1.9284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7fad8358e929 code=0x7ffc0000 [ 3101.193122][ T28] audit: type=1326 audit(2000001678.531:5149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=640 comm="syz.1.9284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7ffc0000 [ 3101.215199][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 3101.222808][ T28] audit: type=1326 audit(2000001678.531:5150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=640 comm="syz.1.9284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7ffc0000 [ 3101.224289][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 3101.256482][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth5: link becomes ready [ 3101.264465][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): veth4: link becomes ready [ 3101.272204][T32581] IPv6: ADDRCONF(NETDEV_CHANGE): macsec2: link becomes ready [ 3101.275365][ T28] audit: type=1326 audit(2000001678.551:5151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=640 comm="syz.1.9284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=50 compat=0 ip=0x7fad8358e929 code=0x7ffc0000 [ 3101.314466][ T28] audit: type=1326 audit(2000001678.551:5152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=640 comm="syz.1.9284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fad8358e929 code=0x7ffc0000 [ 3101.342113][ T666] netlink: 24 bytes leftover after parsing attributes in process `syz.1.9284'. [ 3102.246399][ T693] xt_bpf: check failed: parse error [ 3103.921208][ T711] overlayfs: failed to clone lowerpath [ 3106.950983][ T729] overlayfs: failed to clone lowerpath [ 3108.360936][ T745] tipc: Enabling of bearer rejected, already enabled [ 3110.294186][ T760] 9pnet_fd: p9_fd_create_tcp (760): problem connecting socket to 127.0.0.1 [ 3113.366145][ T788] overlayfs: failed to clone lowerpath [ 3114.286988][ T791] overlayfs: failed to clone lowerpath [ 3117.373504][ T808] overlayfs: failed to clone lowerpath [ 3120.723843][ T817] overlayfs: failed to clone lowerpath [ 3124.008384][ T834] overlayfs: failed to clone lowerpath [ 3126.707599][ T855] overlayfs: failed to clone lowerpath [ 3129.756110][ T866] overlayfs: failed to clone lowerpath [ 3130.658198][ T870] overlayfs: failed to clone lowerpath [ 3133.256364][ T891] overlayfs: failed to clone lowerpath [ 3133.492519][ T889] overlayfs: failed to clone lowerpath [ 3138.343289][ T911] overlayfs: failed to clone lowerpath [ 3141.066321][ T927] overlayfs: failed to clone lowerpath [ 3141.466348][ T929] overlayfs: failed to clone lowerpath [ 3142.163181][ T928] overlayfs: failed to clone lowerpath [ 3146.473838][ T948] overlayfs: failed to clone lowerpath [ 3147.056951][ T956] overlayfs: failed to clone lowerpath [ 3147.592562][ T969] overlayfs: failed to clone lowerpath [ 3149.109166][ T982] overlayfs: failed to clone lowerpath [ 3151.383961][ T1005] overlayfs: failed to clone lowerpath [ 3154.252724][ T1044] syz.4.9381[1044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3154.253396][ T1044] syz.4.9381[1044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3157.546853][ T1049] overlayfs: failed to clone lowerpath [ 3157.847360][ T1068] overlayfs: failed to clone lowerpath [ 3159.459704][ T1092] overlayfs: failed to clone lowerpath [ 3159.720257][ T1094] netlink: 'syz.1.9396': attribute type 13 has an invalid length. [ 3159.796845][ T1094] bridge0: port 2(bridge_slave_1) entered disabled state [ 3161.360062][ T1107] syz.2.9398[1107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3161.360138][ T1107] syz.2.9398[1107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3163.398582][ T28] kauditd_printk_skb: 110 callbacks suppressed [ 3163.398600][ T28] audit: type=1400 audit(2000001741.361:5263): avc: denied { search } for pid=1117 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3163.573347][ T28] audit: type=1400 audit(2000001741.401:5264): avc: denied { getattr } for pid=1117 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=502 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3163.602306][ T28] audit: type=1400 audit(2000001741.451:5265): avc: denied { write } for pid=1122 comm="rm" name="resolv.conf" dev="tmpfs" ino=493 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3163.624698][ T28] audit: type=1400 audit(2000001741.451:5266): avc: denied { remove_name } for pid=1122 comm="rm" name="eth0.dhcp" dev="tmpfs" ino=502 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3163.648234][ T28] audit: type=1400 audit(2000001741.451:5267): avc: denied { unlink } for pid=1122 comm="rm" name="eth0.dhcp" dev="tmpfs" ino=502 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3163.680631][ T28] audit: type=1400 audit(2000001741.451:5268): avc: denied { getattr } for pid=1117 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=493 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3163.747103][ T28] audit: type=1400 audit(2000001741.451:5269): avc: denied { add_name } for pid=1117 comm="dhcpcd-run-hook" name="eth0.dhcp" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3163.769010][ T28] audit: type=1400 audit(2000001741.451:5270): avc: denied { create } for pid=1117 comm="dhcpcd-run-hook" name="eth0.dhcp" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3164.544889][ T1141] overlayfs: failed to clone lowerpath [ 3164.551350][ T28] audit: type=1400 audit(2000001741.451:5271): avc: denied { write open } for pid=1117 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=14962 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3164.583581][ T28] audit: type=1400 audit(2000001741.471:5272): avc: denied { read } for pid=1123 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=493 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3165.448930][ T1156] syz.4.9406[1156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3165.449014][ T1156] syz.4.9406[1156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3168.067202][ T1173] syz.4.9410[1173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3168.532768][ T1173] syz.4.9410[1173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3173.259566][ T1213] syz.3.9420[1213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3173.271026][ T1213] syz.3.9420[1213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3185.993654][ T1307] syz.1.9445[1307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3186.005242][ T1307] syz.1.9445[1307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3186.580920][ T1299] overlayfs: failed to clone lowerpath [ 3190.629479][ T1362] overlayfs: failed to clone lowerpath [ 3190.638649][ T1363] overlayfs: failed to clone lowerpath [ 3191.121883][ T1374] overlayfs: failed to clone lowerpath [ 3191.433290][ T1376] overlayfs: failed to clone lowerpath [ 3198.043104][ T1447] syz.6.9481[1447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3198.043167][ T1447] syz.6.9481[1447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3202.077833][ T1495] overlayfs: failed to clone lowerpath [ 3202.672656][ T1500] syz.4.9491[1500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3202.672735][ T1500] syz.4.9491[1500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3206.038514][ T1538] tipc: Enabling of bearer rejected, already enabled [ 3209.575314][ T1562] overlayfs: failed to clone lowerpath [ 3210.309940][ T1566] syz.3.9511[1566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3210.310021][ T1566] syz.3.9511[1566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3211.699316][ T1596] overlayfs: failed to clone lowerpath [ 3213.547915][ T1618] syz.4.9521[1618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3213.548337][ T1618] syz.4.9521[1618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3215.651498][ T1634] overlayfs: failed to clone lowerpath [ 3215.672693][ T1635] overlayfs: failed to clone lowerpath [ 3218.104163][ T1665] overlayfs: failed to clone lowerpath [ 3219.483029][ T1672] overlayfs: failed to clone lowerpath [ 3221.390174][ T1690] overlayfs: failed to clone lowerpath [ 3224.593075][ T1709] overlayfs: failed to clone lowerpath [ 3226.139281][ T1722] overlayfs: failed to clone lowerpath [ 3230.310781][ T1749] overlayfs: failed to clone lowerpath [ 3232.250884][ T1764] syz.6.9560[1764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3232.251267][ T1764] syz.6.9560[1764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3234.611707][ T1770] overlayfs: failed to clone lowerpath [ 3234.630498][ T1773] overlayfs: failed to clone lowerpath [ 3237.135443][ T1804] syz.4.9570[1804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3237.138319][ T1804] syz.4.9570[1804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3241.256464][ T1815] netlink: 68 bytes leftover after parsing attributes in process `syz.1.9575'. [ 3242.777454][ T1834] overlayfs: failed to clone lowerpath [ 3245.604075][ T1858] overlayfs: failed to clone lowerpath [ 3246.638035][ T1871] overlayfs: failed to clone lowerpath [ 3250.080218][ T1912] overlayfs: failed to clone lowerpath [ 3255.329033][ T1959] overlayfs: failed to clone lowerpath [ 3255.809642][ T1963] overlayfs: failed to clone lowerpath [ 3261.613482][ T1993] overlayfs: failed to clone lowerpath [ 3264.976164][ T2019] overlayfs: failed to clone lowerpath [ 3269.961990][ T2056] netlink: 68 bytes leftover after parsing attributes in process `syz.6.9635'. [ 3271.737409][ T2091] netlink: 68 bytes leftover after parsing attributes in process `syz.1.9645'. [ 3272.282410][ T2102] syz.6.9646[2102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3272.282503][ T2102] syz.6.9646[2102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3276.441667][ T2137] tipc: Enabling of bearer rejected, already enabled [ 3278.935730][ T2144] netlink: 68 bytes leftover after parsing attributes in process `syz.2.9658'. [ 3283.641489][ T2166] netlink: 68 bytes leftover after parsing attributes in process `syz.6.9664'. [ 3288.790872][ T2208] netlink: 68 bytes leftover after parsing attributes in process `syz.6.9676'. [ 3291.206797][ T2230] overlayfs: unrecognized mount option "/" or missing value [ 3294.725976][ T2242] overlayfs: missing 'lowerdir' [ 3296.429883][ T2257] tipc: Enabling of bearer rejected, already enabled [ 3298.203364][ T2270] overlayfs: missing 'lowerdir' [ 3303.168107][ T2290] overlayfs: missing 'lowerdir' [ 3311.738196][ T2357] netlink: 68 bytes leftover after parsing attributes in process `syz.3.9714'. [ 3313.282935][ T2387] netlink: 68 bytes leftover after parsing attributes in process `syz.4.9721'. [ 3315.475200][ T2407] syz.4.9725[2407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3315.475283][ T2407] syz.4.9725[2407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3323.408074][ T2479] netlink: 68 bytes leftover after parsing attributes in process `syz.2.9746'. [ 3323.628656][ T2486] syz.3.9747[2486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3323.629505][ T2486] syz.3.9747[2486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3326.522073][ T2513] tipc: Enabling of bearer rejected, already enabled [ 3332.063471][ T2549] syz.1.9764[2549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3332.063555][ T2549] syz.1.9764[2549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3334.710341][ T2558] netlink: 68 bytes leftover after parsing attributes in process `syz.6.9767'. [ 3338.068597][ T2597] netlink: 68 bytes leftover after parsing attributes in process `syz.1.9777'. [ 3349.365284][ T2741] netlink: 68 bytes leftover after parsing attributes in process `syz.4.9815'. [ 3352.848891][ T2767] netlink: 68 bytes leftover after parsing attributes in process `syz.1.9822'. [ 3353.186521][ T2765] netlink: 68 bytes leftover after parsing attributes in process `syz.6.9821'. [ 3353.860460][ T2785] netlink: 68 bytes leftover after parsing attributes in process `syz.4.9826'. [ 3355.444452][ T2818] netlink: 68 bytes leftover after parsing attributes in process `syz.4.9835'. [ 3357.653311][ T6063] kworker/dying (6063) used greatest stack depth: 19488 bytes left [ 3375.391950][ T2995] netlink: 68 bytes leftover after parsing attributes in process `syz.3.9879'. [ 3375.916022][ T3019] netlink: 28 bytes leftover after parsing attributes in process `syz.4.9885'. [ 3377.847676][ T3035] netlink: 28 bytes leftover after parsing attributes in process `syz.6.9889'. [ 3380.921916][ T3060] netlink: 28 bytes leftover after parsing attributes in process `syz.3.9895'. [ 3385.986473][ T3119] netlink: 68 bytes leftover after parsing attributes in process `syz.2.9912'. [ 3387.095879][ T3128] netlink: 28 bytes leftover after parsing attributes in process `syz.6.9913'. [ 3388.466319][ T3143] syz.6.9916[3143] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3388.466446][ T3143] syz.6.9916[3143] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3389.976735][ T3144] netlink: 28 bytes leftover after parsing attributes in process `syz.2.9917'. [ 3393.359273][ T3164] netlink: 28 bytes leftover after parsing attributes in process `syz.3.9922'. [ 3396.878244][ T3187] netlink: 28 bytes leftover after parsing attributes in process `syz.2.9929'. [ 3401.710380][ T3233] netlink: 28 bytes leftover after parsing attributes in process `syz.4.9941'. [ 3401.986734][ T3237] netlink: 68 bytes leftover after parsing attributes in process `syz.6.9943'. [ 3402.385623][ T3244] netlink: 68 bytes leftover after parsing attributes in process `syz.1.9945'. [ 3402.439608][ T3247] netlink: 28 bytes leftover after parsing attributes in process `syz.6.9946'. [ 3402.562662][ T3252] netlink: 28 bytes leftover after parsing attributes in process `syz.4.9947'. [ 3403.624875][ T3280] netlink: 28 bytes leftover after parsing attributes in process `syz.3.9955'. [ 3417.883079][ T3437] netlink: 68 bytes leftover after parsing attributes in process `syz.3.9998'. [ 3427.174430][ T3542] netlink: 28 bytes leftover after parsing attributes in process `syz.6.10025'. [ 3430.990382][ T3553] netlink: 68 bytes leftover after parsing attributes in process `syz.2.10027'. [ 3441.916567][ T3623] netlink: 68 bytes leftover after parsing attributes in process `syz.1.10047'. [ 3449.369270][ T3681] netlink: 68 bytes leftover after parsing attributes in process `syz.6.10062'. [ 3451.191713][ T3710] netlink: 28 bytes leftover after parsing attributes in process `syz.4.10065'. [ 3453.885874][ T3718] netlink: 68 bytes leftover after parsing attributes in process `syz.6.10072'. [ 3478.235757][ T3903] netlink: 28 bytes leftover after parsing attributes in process `syz.6.10117'. [ 3482.215838][ T3937] netlink: 28 bytes leftover after parsing attributes in process `syz.1.10126'. [ 3484.642057][ T3954] netlink: 28 bytes leftover after parsing attributes in process `syz.1.10129'. [ 3489.501585][ T3989] netlink: 28 bytes leftover after parsing attributes in process `syz.6.10137'. [ 3491.843935][ T4024] netlink: 28 bytes leftover after parsing attributes in process `syz.1.10148'. [ 3493.374131][ T4034] netlink: 28 bytes leftover after parsing attributes in process `syz.4.10151'. [ 3493.906209][ T4036] netlink: 28 bytes leftover after parsing attributes in process `syz.2.10153'. [ 3495.416439][ T4063] netlink: 28 bytes leftover after parsing attributes in process `syz.6.10157'. [ 3497.774648][ T4074] netlink: 28 bytes leftover after parsing attributes in process `syz.4.10162'. [ 3499.045910][ T4082] netlink: 28 bytes leftover after parsing attributes in process `syz.4.10163'. [ 3501.035880][ T4070] netlink: 68 bytes leftover after parsing attributes in process `syz.2.10161'. [ 3505.780539][ T4135] netlink: 28 bytes leftover after parsing attributes in process `syz.3.10176'. [ 3509.984185][ T4167] netlink: 28 bytes leftover after parsing attributes in process `syz.1.10183'. [ 3512.505797][ T4182] netlink: 28 bytes leftover after parsing attributes in process `syz.2.10186'. [ 3524.166637][ T4300] netlink: 68 bytes leftover after parsing attributes in process `syz.1.10215'. [ 3538.003194][ T4470] netlink: 28 bytes leftover after parsing attributes in process `syz.2.10252'. [ 3547.293530][ T4568] netlink: 28 bytes leftover after parsing attributes in process `syz.4.10275'. [ 3558.623133][ T4686] bridge0: port 1(bridge_slave_0) entered blocking state [ 3558.636963][ T4686] bridge0: port 1(bridge_slave_0) entered disabled state [ 3558.652240][ T4686] device bridge_slave_0 entered promiscuous mode [ 3558.667716][ T4686] bridge0: port 2(bridge_slave_1) entered blocking state [ 3558.674975][ T4686] bridge0: port 2(bridge_slave_1) entered disabled state [ 3558.682793][ T4686] device bridge_slave_1 entered promiscuous mode [ 3559.083756][ T4686] bridge0: port 2(bridge_slave_1) entered blocking state [ 3559.091036][ T4686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3559.098374][ T4686] bridge0: port 1(bridge_slave_0) entered blocking state [ 3559.105418][ T4686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3559.176957][ T4674] bridge0: port 1(bridge_slave_0) entered disabled state [ 3559.188675][ T4674] bridge0: port 2(bridge_slave_1) entered disabled state [ 3559.197355][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3559.204945][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3559.228422][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3559.245102][ T4674] bridge0: port 1(bridge_slave_0) entered blocking state [ 3559.252305][ T4674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3559.271088][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3559.279701][ T4674] bridge0: port 2(bridge_slave_1) entered blocking state [ 3559.286800][ T4674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3559.298390][T32581] tipc: Disabling bearer [ 3559.303855][T32581] tipc: Left network mode [ 3559.311370][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3559.340191][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3559.364355][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3559.379355][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3559.466282][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3559.473985][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3559.493186][ T4686] device veth0_vlan entered promiscuous mode [ 3559.528250][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3559.538646][ T4686] device veth1_macvtap entered promiscuous mode [ 3559.568080][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3559.600333][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3559.621871][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 3559.621886][ T28] audit: type=1400 audit(2000002137.581:5276): avc: denied { mounton } for pid=4686 comm="syz-executor" path="/root/syzkaller.6nBwzu/syz-tmp" dev="sda1" ino=2051 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 3559.701002][ T28] audit: type=1400 audit(2000002137.581:5277): avc: denied { mounton } for pid=4686 comm="syz-executor" path="/root/syzkaller.6nBwzu/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 3559.732329][ T28] audit: type=1400 audit(2000002137.581:5278): avc: denied { mounton } for pid=4686 comm="syz-executor" path="/root/syzkaller.6nBwzu/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=113073 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 3559.959855][ T28] audit: type=1400 audit(2000002137.611:5279): avc: denied { mounton } for pid=4686 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=570 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 3560.240285][ T28] audit: type=1400 audit(2000002137.611:5280): avc: denied { mounton } for pid=4686 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 3560.271481][ T28] audit: type=1400 audit(2000002137.621:5281): avc: denied { read write } for pid=4686 comm="syz-executor" name="loop3" dev="devtmpfs" ino=2103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3560.301259][ T28] audit: type=1400 audit(2000002137.621:5282): avc: denied { open } for pid=4686 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=2103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3560.340214][ T28] audit: type=1400 audit(2000002137.621:5283): avc: denied { ioctl } for pid=4686 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=2103 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3561.127533][ T4728] bridge0: port 1(bridge_slave_0) entered blocking state [ 3561.134771][ T4728] bridge0: port 1(bridge_slave_0) entered disabled state [ 3561.148839][ T4728] device bridge_slave_0 entered promiscuous mode [ 3561.162617][T32581] device bridge0 left promiscuous mode [ 3564.151630][ T4728] bridge0: port 2(bridge_slave_1) entered blocking state [ 3564.159415][ T4728] bridge0: port 2(bridge_slave_1) entered disabled state [ 3564.167879][ T4728] device bridge_slave_1 entered promiscuous mode [ 3564.174621][ T4741] netlink: 28 bytes leftover after parsing attributes in process `syz.6.10310'. [ 3564.788367][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3564.796404][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3564.829356][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3564.838989][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3564.847954][ T4674] bridge0: port 1(bridge_slave_0) entered blocking state [ 3564.855057][ T4674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3564.862682][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3564.871548][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3564.880105][ T4674] bridge0: port 2(bridge_slave_1) entered blocking state [ 3564.887194][ T4674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3564.921215][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3564.936653][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3564.947807][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3564.965405][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3564.987193][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3565.001673][ T4728] device veth0_vlan entered promiscuous mode [ 3565.010333][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3565.021233][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3565.036225][T32581] tipc: Disabling bearer [ 3565.041699][T32581] tipc: Left network mode [ 3565.049336][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3565.064452][ T4728] device veth1_macvtap entered promiscuous mode [ 3565.092740][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3565.158559][ T4674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3566.273942][ T4796] bridge0: port 1(bridge_slave_0) entered blocking state [ 3566.289338][ T4796] bridge0: port 1(bridge_slave_0) entered disabled state [ 3566.308063][ T4796] device bridge_slave_0 entered promiscuous mode [ 3566.315305][ T4796] bridge0: port 2(bridge_slave_1) entered blocking state [ 3566.322473][ T4796] bridge0: port 2(bridge_slave_1) entered disabled state [ 3566.330172][ T4796] device bridge_slave_1 entered promiscuous mode [ 3566.348877][T32581] device bridge_slave_1 left promiscuous mode [ 3566.370992][T32581] bridge0: port 2(bridge_slave_1) entered disabled state [ 3567.035736][ C1] ------------[ cut here ]------------ [ 3567.041366][ C1] refcount_t: addition on 0; use-after-free. [ 3567.047625][ C1] WARNING: CPU: 1 PID: 4786 at lib/refcount.c:25 refcount_warn_saturate+0x104/0x1a0 [ 3567.057063][ C1] Modules linked in: [ 3567.060986][ C1] CPU: 1 PID: 4786 Comm: syz.3.10321 Tainted: G W 6.1.141-syzkaller-00037-gfa7e0538663e #0 [ 3567.072396][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 3567.082491][ C1] RIP: 0010:refcount_warn_saturate+0x104/0x1a0 [ 3567.088691][ C1] Code: 05 01 48 c7 c7 60 a6 a9 85 e8 38 fb dd fe 0f 0b eb df e8 6f b5 0c ff c6 05 cf ab 0b 05 01 48 c7 c7 a0 a5 a9 85 e8 1c fb dd fe <0f> 0b eb c3 e8 53 b5 0c ff c6 05 b4 ab 0b 05 01 48 c7 c7 00 a6 a9 [ 3567.108341][ C1] RSP: 0018:ffffc900001b09e0 EFLAGS: 00010246 [ 3567.114429][ C1] RAX: e133670787e79a00 RBX: 0000000000000002 RCX: ffff88813dc6e540 [ 3567.122432][ C1] RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000002 [ 3567.130433][ C1] RBP: ffffc900001b09f0 R08: dffffc0000000000 R09: fffff520000360b9 [ 3567.138440][ C1] R10: fffff520000360b9 R11: 1ffff920000360b8 R12: ffffc900001b0ba0 [ 3567.146482][ C1] R13: dffffc0000000000 R14: 0000000000000002 R15: ffff88811fd0ae00 [ 3567.154482][ C1] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 3567.163476][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3567.170104][ C1] CR2: 00007f4e40bb5f80 CR3: 000000012cf01000 CR4: 00000000003506a0 [ 3567.178120][ C1] DR0: 0000000000000000 DR1: 0000000000000001 DR2: 0000000000000000 [ 3567.186133][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 3567.194121][ C1] Call Trace: [ 3567.197428][ C1] [ 3567.200292][ C1] tipc_crypto_xmit+0x1822/0x2220 [ 3567.205343][ C1] ? __cfi_tipc_crypto_xmit+0x10/0x10 [ 3567.210753][ C1] ? __copy_skb_header+0x49f/0x630 [ 3567.215918][ C1] tipc_bearer_xmit_skb+0x226/0x380 [ 3567.221144][ C1] ? __skb_clone+0x47a/0x790 [ 3567.225828][ C1] ? __cfi_tipc_bearer_xmit_skb+0x10/0x10 [ 3567.231586][ C1] ? skb_clone+0x228/0x380 [ 3567.236031][ C1] tipc_disc_timeout+0x6a2/0x830 [ 3567.241006][ C1] ? __cfi_tipc_disc_timeout+0x10/0x10 [ 3567.246487][ C1] ? __kasan_check_write+0x14/0x20 [ 3567.251629][ C1] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 3567.257226][ C1] ? __cfi_tipc_disc_timeout+0x10/0x10 [ 3567.262706][ C1] call_timer_fn+0x46/0x2a0 [ 3567.267241][ C1] ? __cfi_tipc_disc_timeout+0x10/0x10 [ 3567.272736][ C1] __run_timers+0x639/0x9a0 [ 3567.277311][ C1] ? calc_index+0x200/0x200 [ 3567.281855][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 3567.287102][ C1] run_timer_softirq+0x6a/0xf0 [ 3567.291896][ C1] handle_softirqs+0x1d7/0x600 [ 3567.296707][ C1] __irq_exit_rcu+0x52/0xf0 [ 3567.301227][ C1] irq_exit_rcu+0x9/0x10 [ 3567.305468][ C1] sysvec_apic_timer_interrupt+0xa9/0xc0 [ 3567.311132][ C1] [ 3567.314081][ C1] [ 3567.317063][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 3567.323058][ C1] RIP: 0010:update_stack_state+0xb0/0x480 [ 3567.328822][ C1] Code: 4c 89 f7 e8 62 4a 7f 00 49 8b 06 48 83 c0 10 48 89 45 a0 44 89 f8 83 e0 01 48 f7 d8 4c 89 fa 48 83 e2 fe 48 21 d0 48 89 45 80 <4c> 89 7d d0 48 89 55 88 74 26 4c 8d 73 35 4c 89 f0 48 c1 e8 03 42 [ 3567.348473][ C1] RSP: 0018:ffffc90000b46d98 EFLAGS: 00000246 [ 3567.354577][ C1] RAX: 0000000000000000 RBX: ffffc90000b46ee8 RCX: 0000000000b46f00 [ 3567.362625][ C1] RDX: ffffc90000b471a8 RSI: ffffc90000b471a8 RDI: ffffc90000b46f40 [ 3567.370737][ C1] RBP: ffffc90000b46e58 R08: ffffc90000b46fb0 R09: ffffc90000b46fa8 [ 3567.378769][ C1] R10: 0000000000000000 R11: 1ffff92000168ddd R12: 0000000000000000 [ 3567.386773][ C1] R13: dffffc0000000000 R14: ffffc90000b46f20 R15: ffffc90000b471a8 [ 3567.394782][ C1] unwind_next_frame+0x3d5/0x700 [ 3567.399784][ C1] ? __kernel_text_address+0xd/0x30 [ 3567.405009][ C1] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 3567.411228][ C1] arch_stack_walk+0x124/0x150 [ 3567.416045][ C1] ? __reset_page_owner+0x54/0x190 [ 3567.421190][ C1] stack_trace_save+0x98/0xe0 [ 3567.425936][ C1] ? __cfi_stack_trace_save+0x10/0x10 [ 3567.431336][ C1] ? __stack_depot_save+0x36/0x480 [ 3567.436520][ C1] ? memset+0x35/0x40 [ 3567.440537][ C1] save_stack+0xf3/0x1e0 [ 3567.444806][ C1] ? __reset_page_owner+0x190/0x190 [ 3567.450059][ C1] __reset_page_owner+0x54/0x190 [ 3567.455030][ C1] free_unref_page_prepare+0x742/0x750 [ 3567.460526][ C1] free_unref_page_list+0xba/0x7c0 [ 3567.465720][ C1] release_pages+0xad1/0xb20 [ 3567.470350][ C1] ? __cfi_release_pages+0x10/0x10 [ 3567.475468][ C1] ? __kasan_check_read+0x11/0x20 [ 3567.480524][ C1] free_pages_and_swap_cache+0x86/0xa0 [ 3567.486024][ C1] tlb_flush_mmu+0x101/0x1e0 [ 3567.490634][ C1] unmap_page_range+0x20c6/0x2310 [ 3567.495707][ C1] ? __cfi_unmap_page_range+0x10/0x10 [ 3567.501121][ C1] ? mas_find+0x155/0x370 [ 3567.505490][ C1] unmap_vmas+0x31c/0x430 [ 3567.509882][ C1] ? __cfi_unmap_vmas+0x10/0x10 [ 3567.514783][ C1] ? __cfi_lru_add_drain_cpu+0x10/0x10 [ 3567.520305][ C1] ? __kasan_check_write+0x14/0x20 [ 3567.525449][ C1] exit_mmap+0x263/0xa40 [ 3567.529776][ C1] ? __cfi_exit_mmap+0x10/0x10 [ 3567.534656][ C1] ? __cfi_exit_aio+0x10/0x10 [ 3567.539405][ C1] ? uprobe_clear_state+0x2c1/0x320 [ 3567.544636][ C1] __mmput+0x93/0x320 [ 3567.548678][ C1] ? mmput+0x43/0x150 [ 3567.552691][ C1] mmput+0x4b/0x150 [ 3567.556571][ C1] do_exit+0x979/0x2650 [ 3567.560768][ C1] ? __cfi_do_exit+0x10/0x10 [ 3567.565431][ C1] ? plist_del+0x3df/0x3f0 [ 3567.569918][ C1] ? _raw_spin_unlock+0x4c/0x70 [ 3567.574906][ C1] ? futex_unqueue+0x126/0x160 [ 3567.579750][ C1] ? cgroup_freezing+0x9c/0xc0 [ 3567.584542][ C1] do_group_exit+0x210/0x2d0 [ 3567.589200][ C1] ? __kasan_check_write+0x14/0x20 [ 3567.594378][ C1] get_signal+0x13b5/0x1520 [ 3567.598951][ C1] arch_do_signal_or_restart+0xb0/0x1030 [ 3567.604611][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 3567.610221][ C1] ? tracing_record_taskinfo_sched_switch+0x80/0x3a0 [ 3567.616939][ C1] ? probe_sched_switch+0x63/0x90 [ 3567.622009][ C1] ? _raw_spin_unlock+0x4c/0x70 [ 3567.626916][ C1] ? finish_task_switch+0x16b/0x7b0 [ 3567.632143][ C1] ? __switch_to_asm+0x3a/0x60 [ 3567.636972][ C1] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 3567.643250][ C1] ? __kasan_check_read+0x11/0x20 [ 3567.648418][ C1] exit_to_user_mode_loop+0x7a/0xb0 [ 3567.653816][ C1] exit_to_user_mode_prepare+0x5a/0xa0 [ 3567.659324][ C1] syscall_exit_to_user_mode+0x1a/0x30 [ 3567.664919][ C1] do_syscall_64+0x58/0xa0 [ 3567.669493][ C1] ? clear_bhb_loop+0x30/0x80 [ 3567.674193][ C1] ? clear_bhb_loop+0x30/0x80 [ 3567.678928][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3567.684939][ C1] RIP: 0033:0x7faa05d8e929 [ 3567.689419][ C1] Code: Unable to access opcode bytes at 0x7faa05d8e8ff. [ 3567.696475][ C1] RSP: 002b:00007faa06b270e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 3567.704915][ C1] RAX: fffffffffffffe00 RBX: 00007faa05fb5fa8 RCX: 00007faa05d8e929 [ 3567.712934][ C1] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007faa05fb5fa8 [ 3567.721028][ C1] RBP: 00007faa05fb5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 3567.729057][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faa05fb5fac [ 3567.737071][ C1] R13: 0000000000000000 R14: 00007ffd8d9c8fa0 R15: 00007ffd8d9c9088 [ 3567.745073][ C1] [ 3567.748133][ C1] ---[ end trace 0000000000000000 ]--- [ 3567.753715][ C1] ------------[ cut here ]------------ [ 3567.759215][ C1] refcount_t: underflow; use-after-free. [ 3567.764976][ C1] WARNING: CPU: 1 PID: 4786 at lib/refcount.c:28 refcount_warn_saturate+0x120/0x1a0 [ 3567.774416][ C1] Modules linked in: [ 3567.778352][ C1] CPU: 1 PID: 4786 Comm: syz.3.10321 Tainted: G W 6.1.141-syzkaller-00037-gfa7e0538663e #0 [ 3567.789788][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 3567.799895][ C1] RIP: 0010:refcount_warn_saturate+0x120/0x1a0 [ 3567.806200][ C1] Code: 05 01 48 c7 c7 a0 a5 a9 85 e8 1c fb dd fe 0f 0b eb c3 e8 53 b5 0c ff c6 05 b4 ab 0b 05 01 48 c7 c7 00 a6 a9 85 e8 00 fb dd fe <0f> 0b eb a7 e8 37 b5 0c ff c6 05 95 ab 0b 05 01 48 c7 c7 40 a5 a9 [ 3567.825843][ C1] RSP: 0018:ffffc900001b09e0 EFLAGS: 00010246 [ 3567.831936][ C1] RAX: e133670787e79a00 RBX: 0000000000000003 RCX: ffff88813dc6e540 [ 3567.839954][ C1] RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000002 [ 3567.847964][ C1] RBP: ffffc900001b09f0 R08: dffffc0000000000 R09: fffff520000360dd [ 3567.855982][ C1] R10: fffff520000360dd R11: 1ffff920000360dc R12: 00000000c0000000 [ 3567.863982][ C1] R13: dffffc0000000000 R14: 0000000000000003 R15: ffff88811fd0ae00 [ 3567.872092][ C1] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 3567.881058][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3567.887855][ C1] CR2: 00007f4e40bb5f80 CR3: 000000012cf01000 CR4: 00000000003506a0 [ 3567.895860][ C1] DR0: 0000000000000000 DR1: 0000000000000001 DR2: 0000000000000000 [ 3567.903854][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 3567.911869][ C1] Call Trace: [ 3567.915164][ C1] [ 3567.918057][ C1] tipc_crypto_xmit+0x195e/0x2220 [ 3567.923144][ C1] ? __cfi_tipc_crypto_xmit+0x10/0x10 [ 3567.928590][ C1] ? __copy_skb_header+0x49f/0x630 [ 3567.933747][ C1] tipc_bearer_xmit_skb+0x226/0x380 [ 3567.939040][ C1] ? __skb_clone+0x47a/0x790 [ 3567.943676][ C1] ? __cfi_tipc_bearer_xmit_skb+0x10/0x10 [ 3567.949470][ C1] ? skb_clone+0x228/0x380 [ 3567.953995][ C1] tipc_disc_timeout+0x6a2/0x830 [ 3567.958998][ C1] ? __cfi_tipc_disc_timeout+0x10/0x10 [ 3567.964490][ C1] ? __kasan_check_write+0x14/0x20 [ 3567.969690][ C1] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 3567.975295][ C1] ? __cfi_tipc_disc_timeout+0x10/0x10 [ 3567.980824][ C1] call_timer_fn+0x46/0x2a0 [ 3567.985357][ C1] ? __cfi_tipc_disc_timeout+0x10/0x10 [ 3567.990877][ C1] __run_timers+0x639/0x9a0 [ 3567.995414][ C1] ? calc_index+0x200/0x200 [ 3567.999979][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 3568.005232][ C1] run_timer_softirq+0x6a/0xf0 [ 3568.010065][ C1] handle_softirqs+0x1d7/0x600 [ 3568.014855][ C1] __irq_exit_rcu+0x52/0xf0 [ 3568.019409][ C1] irq_exit_rcu+0x9/0x10 [ 3568.023671][ C1] sysvec_apic_timer_interrupt+0xa9/0xc0 [ 3568.029353][ C1] [ 3568.032297][ C1] [ 3568.035241][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 3568.041266][ C1] RIP: 0010:update_stack_state+0xb0/0x480 [ 3568.047019][ C1] Code: 4c 89 f7 e8 62 4a 7f 00 49 8b 06 48 83 c0 10 48 89 45 a0 44 89 f8 83 e0 01 48 f7 d8 4c 89 fa 48 83 e2 fe 48 21 d0 48 89 45 80 <4c> 89 7d d0 48 89 55 88 74 26 4c 8d 73 35 4c 89 f0 48 c1 e8 03 42 [ 3568.066765][ C1] RSP: 0018:ffffc90000b46d98 EFLAGS: 00000246 [ 3568.072860][ C1] RAX: 0000000000000000 RBX: ffffc90000b46ee8 RCX: 0000000000b46f00 [ 3568.080874][ C1] RDX: ffffc90000b471a8 RSI: ffffc90000b471a8 RDI: ffffc90000b46f40 [ 3568.088977][ C1] RBP: ffffc90000b46e58 R08: ffffc90000b46fb0 R09: ffffc90000b46fa8 [ 3568.096994][ C1] R10: 0000000000000000 R11: 1ffff92000168ddd R12: 0000000000000000 [ 3568.105073][ C1] R13: dffffc0000000000 R14: ffffc90000b46f20 R15: ffffc90000b471a8 [ 3568.113189][ C1] unwind_next_frame+0x3d5/0x700 [ 3568.118170][ C1] ? __kernel_text_address+0xd/0x30 [ 3568.123390][ C1] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 3568.129594][ C1] arch_stack_walk+0x124/0x150 [ 3568.134389][ C1] ? __reset_page_owner+0x54/0x190 [ 3568.139551][ C1] stack_trace_save+0x98/0xe0 [ 3568.144268][ C1] ? __cfi_stack_trace_save+0x10/0x10 [ 3568.149694][ C1] ? __stack_depot_save+0x36/0x480 [ 3568.154843][ C1] ? memset+0x35/0x40 [ 3568.158885][ C1] save_stack+0xf3/0x1e0 [ 3568.163157][ C1] ? __reset_page_owner+0x190/0x190 [ 3568.168421][ C1] __reset_page_owner+0x54/0x190 [ 3568.173391][ C1] free_unref_page_prepare+0x742/0x750 [ 3568.178944][ C1] free_unref_page_list+0xba/0x7c0 [ 3568.184175][ C1] release_pages+0xad1/0xb20 [ 3568.188826][ C1] ? __cfi_release_pages+0x10/0x10 [ 3568.193967][ C1] ? __kasan_check_read+0x11/0x20 [ 3568.199043][ C1] free_pages_and_swap_cache+0x86/0xa0 [ 3568.204527][ C1] tlb_flush_mmu+0x101/0x1e0 [ 3568.209180][ C1] unmap_page_range+0x20c6/0x2310 [ 3568.214260][ C1] ? __cfi_unmap_page_range+0x10/0x10 [ 3568.219687][ C1] ? mas_find+0x155/0x370 [ 3568.224059][ C1] unmap_vmas+0x31c/0x430 [ 3568.228446][ C1] ? __cfi_unmap_vmas+0x10/0x10 [ 3568.233325][ C1] ? __cfi_lru_add_drain_cpu+0x10/0x10 [ 3568.238844][ C1] ? __kasan_check_write+0x14/0x20 [ 3568.243984][ C1] exit_mmap+0x263/0xa40 [ 3568.248291][ C1] ? __cfi_exit_mmap+0x10/0x10 [ 3568.253090][ C1] ? __cfi_exit_aio+0x10/0x10 [ 3568.257916][ C1] ? uprobe_clear_state+0x2c1/0x320 [ 3568.263140][ C1] __mmput+0x93/0x320 [ 3568.267169][ C1] ? mmput+0x43/0x150 [ 3568.271185][ C1] mmput+0x4b/0x150 [ 3568.275024][ C1] do_exit+0x979/0x2650 [ 3568.279231][ C1] ? __cfi_do_exit+0x10/0x10 [ 3568.283845][ C1] ? plist_del+0x3df/0x3f0 [ 3568.288303][ C1] ? _raw_spin_unlock+0x4c/0x70 [ 3568.293183][ C1] ? futex_unqueue+0x126/0x160 [ 3568.297999][ C1] ? cgroup_freezing+0x9c/0xc0 [ 3568.302792][ C1] do_group_exit+0x210/0x2d0 [ 3568.307448][ C1] ? __kasan_check_write+0x14/0x20 [ 3568.312589][ C1] get_signal+0x13b5/0x1520 [ 3568.317149][ C1] arch_do_signal_or_restart+0xb0/0x1030 [ 3568.322804][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 3568.328399][ C1] ? tracing_record_taskinfo_sched_switch+0x80/0x3a0 [ 3568.335104][ C1] ? probe_sched_switch+0x63/0x90 [ 3568.340182][ C1] ? _raw_spin_unlock+0x4c/0x70 [ 3568.345066][ C1] ? finish_task_switch+0x16b/0x7b0 [ 3568.350333][ C1] ? __switch_to_asm+0x3a/0x60 [ 3568.355212][ C1] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 3568.361501][ C1] ? __kasan_check_read+0x11/0x20 [ 3568.366675][ C1] exit_to_user_mode_loop+0x7a/0xb0 [ 3568.371907][ C1] exit_to_user_mode_prepare+0x5a/0xa0 [ 3568.377412][ C1] syscall_exit_to_user_mode+0x1a/0x30 [ 3568.382896][ C1] do_syscall_64+0x58/0xa0 [ 3568.387349][ C1] ? clear_bhb_loop+0x30/0x80 [ 3568.392049][ C1] ? clear_bhb_loop+0x30/0x80 [ 3568.396779][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3568.402693][ C1] RIP: 0033:0x7faa05d8e929 [ 3568.407149][ C1] Code: Unable to access opcode bytes at 0x7faa05d8e8ff. [ 3568.414176][ C1] RSP: 002b:00007faa06b270e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 3568.422625][ C1] RAX: fffffffffffffe00 RBX: 00007faa05fb5fa8 RCX: 00007faa05d8e929 [ 3568.430625][ C1] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007faa05fb5fa8 [ 3568.438633][ C1] RBP: 00007faa05fb5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 3568.446635][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faa05fb5fac [ 3568.454624][ C1] R13: 0000000000000000 R14: 00007ffd8d9c8fa0 R15: 00007ffd8d9c9088 [ 3568.462653][ C1] [ 3568.465705][ C1] ---[ end trace 0000000000000000 ]--- [ 3568.471416][ C1] ------------[ cut here ]------------ [ 3568.476907][ C1] refcount_t: saturated; leaking memory. [ 3568.482662][ C1] WARNING: CPU: 1 PID: 4786 at lib/refcount.c:22 refcount_warn_saturate+0x158/0x1a0 [ 3568.492099][ C1] Modules linked in: [ 3568.496016][ C1] CPU: 1 PID: 4786 Comm: syz.3.10321 Tainted: G W 6.1.141-syzkaller-00037-gfa7e0538663e #0 [ 3568.507424][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 3568.517520][ C1] RIP: 0010:refcount_warn_saturate+0x158/0x1a0 [ 3568.523700][ C1] Code: 05 01 48 c7 c7 40 a5 a9 85 e8 e4 fa dd fe 0f 0b eb 8b e8 1b b5 0c ff c6 05 7a ab 0b 05 01 48 c7 c7 40 a5 a9 85 e8 c8 fa dd fe <0f> 0b e9 6c ff ff ff e8 fc b4 0c ff c6 05 5f ab 0b 05 01 48 c7 c7 [ 3568.543458][ C1] RSP: 0018:ffffc900001b09e0 EFLAGS: 00010246 [ 3568.549557][ C1] RAX: e133670787e79a00 RBX: 0000000000000001 RCX: ffff88813dc6e540 [ 3568.557753][ C1] RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000002 [ 3568.565931][ C1] RBP: ffffc900001b09f0 R08: dffffc0000000000 R09: fffff520000360dd [ 3568.574009][ C1] R10: fffff520000360dd R11: 1ffff920000360dc R12: ffffc900001b0ba0 [ 3568.582025][ C1] R13: dffffc0000000000 R14: 0000000000000001 R15: ffff88811fd0ae00 [ 3568.590034][ C1] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 3568.599076][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3568.605881][ C1] CR2: 00007f4e40bb5f80 CR3: 000000012cf01000 CR4: 00000000003506a0 [ 3568.613857][ C1] DR0: 0000000000000000 DR1: 0000000000000001 DR2: 0000000000000000 [ 3568.621843][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 3568.629840][ C1] Call Trace: [ 3568.633111][ C1] [ 3568.635967][ C1] tipc_crypto_xmit+0x1822/0x2220 [ 3568.641022][ C1] ? __cfi_tipc_crypto_xmit+0x10/0x10 [ 3568.646436][ C1] ? __copy_skb_header+0x49f/0x630 [ 3568.651588][ C1] tipc_bearer_xmit_skb+0x226/0x380 [ 3568.656830][ C1] ? __skb_clone+0x47a/0x790 [ 3568.661437][ C1] ? __cfi_tipc_bearer_xmit_skb+0x10/0x10 [ 3568.667180][ C1] ? skb_clone+0x228/0x380 [ 3568.671699][ C1] tipc_disc_timeout+0x6a2/0x830 [ 3568.676678][ C1] ? __cfi_tipc_disc_timeout+0x10/0x10 [ 3568.682160][ C1] ? __cfi_tipc_disc_timeout+0x10/0x10 [ 3568.687727][ C1] call_timer_fn+0x46/0x2a0 [ 3568.692256][ C1] ? __cfi_tipc_disc_timeout+0x10/0x10 [ 3568.697776][ C1] __run_timers+0x639/0x9a0 [ 3568.702305][ C1] ? calc_index+0x200/0x200 [ 3568.706836][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 3568.712061][ C1] run_timer_softirq+0x6a/0xf0 [ 3568.716852][ C1] handle_softirqs+0x1d7/0x600 [ 3568.721639][ C1] __irq_exit_rcu+0x52/0xf0 [ 3568.726168][ C1] irq_exit_rcu+0x9/0x10 [ 3568.730424][ C1] sysvec_apic_timer_interrupt+0xa9/0xc0 [ 3568.736166][ C1] [ 3568.739104][ C1] [ 3568.742028][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 3568.748030][ C1] RIP: 0010:update_stack_state+0xb0/0x480 [ 3568.753812][ C1] Code: 4c 89 f7 e8 62 4a 7f 00 49 8b 06 48 83 c0 10 48 89 45 a0 44 89 f8 83 e0 01 48 f7 d8 4c 89 fa 48 83 e2 fe 48 21 d0 48 89 45 80 <4c> 89 7d d0 48 89 55 88 74 26 4c 8d 73 35 4c 89 f0 48 c1 e8 03 42 [ 3568.773705][ C1] RSP: 0018:ffffc90000b46d98 EFLAGS: 00000246 [ 3568.779803][ C1] RAX: 0000000000000000 RBX: ffffc90000b46ee8 RCX: 0000000000b46f00 [ 3568.787884][ C1] RDX: ffffc90000b471a8 RSI: ffffc90000b471a8 RDI: ffffc90000b46f40 [ 3568.795970][ C1] RBP: ffffc90000b46e58 R08: ffffc90000b46fb0 R09: ffffc90000b46fa8 [ 3568.804026][ C1] R10: 0000000000000000 R11: 1ffff92000168ddd R12: 0000000000000000 [ 3568.812023][ C1] R13: dffffc0000000000 R14: ffffc90000b46f20 R15: ffffc90000b471a8 [ 3568.820086][ C1] unwind_next_frame+0x3d5/0x700 [ 3568.825029][ C1] ? __kernel_text_address+0xd/0x30 [ 3568.830249][ C1] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 3568.836549][ C1] arch_stack_walk+0x124/0x150 [ 3568.841319][ C1] ? __reset_page_owner+0x54/0x190 [ 3568.846453][ C1] stack_trace_save+0x98/0xe0 [ 3568.851149][ C1] ? __cfi_stack_trace_save+0x10/0x10 [ 3568.856562][ C1] ? __stack_depot_save+0x36/0x480 [ 3568.861699][ C1] ? memset+0x35/0x40 [ 3568.865721][ C1] save_stack+0xf3/0x1e0 [ 3568.869987][ C1] ? __reset_page_owner+0x190/0x190 [ 3568.875195][ C1] __reset_page_owner+0x54/0x190 [ 3568.880167][ C1] free_unref_page_prepare+0x742/0x750 [ 3568.885665][ C1] free_unref_page_list+0xba/0x7c0 [ 3568.890856][ C1] release_pages+0xad1/0xb20 [ 3568.895466][ C1] ? __cfi_release_pages+0x10/0x10 [ 3568.900604][ C1] ? __kasan_check_read+0x11/0x20 [ 3568.905721][ C1] free_pages_and_swap_cache+0x86/0xa0 [ 3568.911242][ C1] tlb_flush_mmu+0x101/0x1e0 [ 3568.915867][ C1] unmap_page_range+0x20c6/0x2310 [ 3568.921003][ C1] ? __cfi_unmap_page_range+0x10/0x10 [ 3568.926398][ C1] ? mas_find+0x155/0x370 [ 3568.930759][ C1] unmap_vmas+0x31c/0x430 [ 3568.935092][ C1] ? __cfi_unmap_vmas+0x10/0x10 [ 3568.939963][ C1] ? __cfi_lru_add_drain_cpu+0x10/0x10 [ 3568.945470][ C1] ? __kasan_check_write+0x14/0x20 [ 3568.950609][ C1] exit_mmap+0x263/0xa40 [ 3568.954978][ C1] ? __cfi_exit_mmap+0x10/0x10 [ 3568.959788][ C1] ? __cfi_exit_aio+0x10/0x10 [ 3568.964497][ C1] ? uprobe_clear_state+0x2c1/0x320 [ 3568.969734][ C1] __mmput+0x93/0x320 [ 3568.973832][ C1] ? mmput+0x43/0x150 [ 3568.977838][ C1] mmput+0x4b/0x150 [ 3568.981686][ C1] do_exit+0x979/0x2650 [ 3568.985871][ C1] ? __cfi_do_exit+0x10/0x10 [ 3568.990481][ C1] ? plist_del+0x3df/0x3f0 [ 3568.994901][ C1] ? _raw_spin_unlock+0x4c/0x70 [ 3568.999779][ C1] ? futex_unqueue+0x126/0x160 [ 3569.004575][ C1] ? cgroup_freezing+0x9c/0xc0 [ 3569.009372][ C1] do_group_exit+0x210/0x2d0 [ 3569.013990][ C1] ? __kasan_check_write+0x14/0x20 [ 3569.019134][ C1] get_signal+0x13b5/0x1520 [ 3569.023678][ C1] arch_do_signal_or_restart+0xb0/0x1030 [ 3569.029329][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 3569.034901][ C1] ? tracing_record_taskinfo_sched_switch+0x80/0x3a0 [ 3569.041612][ C1] ? probe_sched_switch+0x63/0x90 [ 3569.046679][ C1] ? _raw_spin_unlock+0x4c/0x70 [ 3569.051535][ C1] ? finish_task_switch+0x16b/0x7b0 [ 3569.056776][ C1] ? __switch_to_asm+0x3a/0x60 [ 3569.061563][ C1] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 3569.067765][ C1] ? __kasan_check_read+0x11/0x20 [ 3569.072905][ C1] exit_to_user_mode_loop+0x7a/0xb0 [ 3569.078126][ C1] exit_to_user_mode_prepare+0x5a/0xa0 [ 3569.083602][ C1] syscall_exit_to_user_mode+0x1a/0x30 [ 3569.089089][ C1] do_syscall_64+0x58/0xa0 [ 3569.093610][ C1] ? clear_bhb_loop+0x30/0x80 [ 3569.098310][ C1] ? clear_bhb_loop+0x30/0x80 [ 3569.103180][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3569.109091][ C1] RIP: 0033:0x7faa05d8e929 [ 3569.113520][ C1] Code: Unable to access opcode bytes at 0x7faa05d8e8ff. [ 3569.120730][ C1] RSP: 002b:00007faa06b270e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 3569.129182][ C1] RAX: fffffffffffffe00 RBX: 00007faa05fb5fa8 RCX: 00007faa05d8e929 [ 3569.137197][ C1] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007faa05fb5fa8 [ 3569.145357][ C1] RBP: 00007faa05fb5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 3569.153368][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faa05fb5fac [ 3569.161364][ C1] R13: 0000000000000000 R14: 00007ffd8d9c8fa0 R15: 00007ffd8d9c9088 [ 3569.169448][ C1] [ 3569.172476][ C1] ---[ end trace 0000000000000000 ]--- [ 3569.302857][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3569.316030][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3569.982818][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3570.027999][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3570.036521][ T4743] bridge0: port 1(bridge_slave_0) entered blocking state [ 3570.043595][ T4743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3570.063265][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3570.075295][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3570.088044][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3570.100643][ T4743] bridge0: port 2(bridge_slave_1) entered blocking state [ 3570.107845][ T4743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3570.180326][ T4796] device veth0_vlan entered promiscuous mode [ 3570.193451][ T4796] device veth1_macvtap entered promiscuous mode [ 3570.215291][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3570.231339][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3570.260588][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3570.418776][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3570.506757][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3570.612369][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3570.674624][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3570.689312][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3570.708261][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3570.723931][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3571.794259][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3571.808644][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3571.816517][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3571.930830][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3571.956603][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3572.225678][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3572.358991][ T4743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3572.529066][T32581] tipc: Disabling bearer [ 3572.534640][T32581] tipc: Left network mode [ 3574.029371][ T4872] bridge0: port 1(bridge_slave_0) entered blocking state [ 3574.039983][ T4872] bridge0: port 1(bridge_slave_0) entered disabled state [ 3574.071736][ T4872] device bridge_slave_0 entered promiscuous mode [ 3574.086500][ T4872] bridge0: port 2(bridge_slave_1) entered blocking state [ 3574.094123][ T4872] bridge0: port 2(bridge_slave_1) entered disabled state [ 3574.163460][ T4872] device bridge_slave_1 entered promiscuous mode [ 3574.498236][ T4872] bridge0: port 2(bridge_slave_1) entered blocking state [ 3574.505344][ T4872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3574.512700][ T4872] bridge0: port 1(bridge_slave_0) entered blocking state [ 3574.519780][ T4872] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3574.567014][ T4221] bridge0: port 1(bridge_slave_0) entered disabled state [ 3574.574537][ T4221] bridge0: port 2(bridge_slave_1) entered disabled state [ 3574.582805][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3574.590642][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3574.606849][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3574.615291][ T4221] bridge0: port 1(bridge_slave_0) entered blocking state [ 3574.622401][ T4221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3574.631411][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3574.639650][ T4221] bridge0: port 2(bridge_slave_1) entered blocking state [ 3574.646705][ T4221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3574.666541][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3574.676265][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3574.691474][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3574.709555][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3574.717869][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3574.725359][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3574.734266][ T4872] device veth0_vlan entered promiscuous mode [ 3574.745609][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3575.072352][ T4872] device veth1_macvtap entered promiscuous mode [ 3575.243805][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3575.319728][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3575.638391][T32581] tipc: Disabling bearer [ 3575.644372][T32581] tipc: Left network mode [ 3576.259187][ T4938] bridge0: port 1(bridge_slave_0) entered blocking state [ 3576.266376][ T4938] bridge0: port 1(bridge_slave_0) entered disabled state [ 3576.274103][ T4938] device bridge_slave_0 entered promiscuous mode [ 3576.281797][ T4938] bridge0: port 2(bridge_slave_1) entered blocking state [ 3576.289002][ T4938] bridge0: port 2(bridge_slave_1) entered disabled state [ 3576.339462][ T4938] device bridge_slave_1 entered promiscuous mode [ 3576.437564][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3576.445520][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3576.609461][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3576.618051][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3576.627046][ T4221] bridge0: port 1(bridge_slave_0) entered blocking state [ 3576.634552][ T4221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3576.642210][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3576.653049][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3576.662629][ T4221] bridge0: port 2(bridge_slave_1) entered blocking state [ 3576.669768][ T4221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3577.867820][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3577.876161][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3577.884189][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3581.095859][T32510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3581.133841][T32510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3581.366257][T32510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3581.379072][T32510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3581.448838][ T4938] device veth0_vlan entered promiscuous mode [ 3581.458719][ T4973] ================================================================== [ 3581.466822][ T4973] BUG: KASAN: use-after-free in tcp_metrics_flush_all+0xd3/0x210 [ 3581.469363][ T4938] device veth1_macvtap entered promiscuous mode [ 3581.474574][ T4973] Read of size 4 at addr ffff888105aa468c by task syz.3.10353/4973 [ 3581.488705][ T4973] SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 3581.491076][ T4973] CPU: 1 PID: 4973 Comm: syz.3.10353 Tainted: G W 6.1.141-syzkaller-00037-gfa7e0538663e #0 [ 3581.502468][ T4973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 3581.512548][ T4973] Call Trace: [ 3581.515872][ T4973] [ 3581.518820][ T4973] __dump_stack+0x21/0x24 [ 3581.521427][ T28] audit: type=1400 audit(2000002159.481:5284): avc: denied { write } for pid=275 comm="syz-executor" path="pipe:[7797]" dev="pipefs" ino=7797 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 3581.523186][ T4973] dump_stack_lvl+0xee/0x150 [ 3581.550779][ T4973] ? __cfi_dump_stack_lvl+0x8/0x8 [ 3581.555851][ T4973] ? __cfi__printk+0x8/0x8 [ 3581.560398][ T4973] ? _raw_spin_lock+0x8e/0xe0 [ 3581.565111][ T4973] ? tcp_metrics_flush_all+0xd3/0x210 [ 3581.570508][ T4973] print_address_description+0x71/0x210 [ 3581.576097][ T4973] print_report+0x4a/0x60 [ 3581.580464][ T4973] kasan_report+0x122/0x150 [ 3581.584994][ T4973] ? tcp_metrics_flush_all+0xd3/0x210 [ 3581.590384][ T4973] kasan_check_range+0x280/0x290 [ 3581.595352][ T4973] __kasan_check_read+0x11/0x20 [ 3581.600234][ T4973] tcp_metrics_flush_all+0xd3/0x210 [ 3581.605631][ T4973] ? __cfi_tcp_net_metrics_exit_batch+0x10/0x10 [ 3581.611895][ T4973] tcp_net_metrics_exit_batch+0x10/0x20 [ 3581.617470][ T4973] setup_net+0x8cb/0xcb0 [ 3581.621746][ T4973] ? copy_net_ns+0x5c0/0x5c0 [ 3581.626454][ T4973] ? __kasan_kmalloc+0x95/0xb0 [ 3581.631253][ T4973] ? copy_net_ns+0x185/0x5c0 [ 3581.635863][ T4973] ? kmalloc_trace+0x40/0xb0 [ 3581.640484][ T4973] copy_net_ns+0x355/0x5c0 [ 3581.644945][ T4973] create_new_namespaces+0x3a2/0x660 [ 3581.650266][ T4973] copy_namespaces+0x1d1/0x220 [ 3581.655059][ T4973] ? copy_signal+0x4ea/0x630 [ 3581.659773][ T4973] copy_process+0x12e0/0x3420 [ 3581.664571][ T4973] ? __kasan_check_write+0x14/0x20 [ 3581.669726][ T4973] ? idle_dummy+0x10/0x10 [ 3581.674084][ T4973] ? finish_task_switch+0x16b/0x7b0 [ 3581.679310][ T4973] ? __switch_to_asm+0x3a/0x60 [ 3581.684104][ T4973] kernel_clone+0x23a/0x810 [ 3581.688643][ T4973] ? __cfi_kernel_clone+0x10/0x10 [ 3581.693796][ T4973] ? __sys_bpf+0x504/0x780 [ 3581.698247][ T4973] __x64_sys_clone+0x168/0x1b0 [ 3581.703044][ T4973] ? __cfi___x64_sys_clone+0x10/0x10 [ 3581.708358][ T4973] x64_sys_call+0x990/0x9a0 [ 3581.712889][ T4973] do_syscall_64+0x4c/0xa0 [ 3581.717313][ T4973] ? clear_bhb_loop+0x30/0x80 [ 3581.722007][ T4973] ? clear_bhb_loop+0x30/0x80 [ 3581.726895][ T4973] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3581.732802][ T4973] RIP: 0033:0x7faa05d8e929 [ 3581.737227][ T4973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3581.756864][ T4973] RSP: 002b:00007faa05bbcfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 3581.765308][ T4973] RAX: ffffffffffffffda RBX: 00007faa05fb6240 RCX: 00007faa05d8e929 [ 3581.773292][ T4973] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000041200000 [ 3581.781281][ T4973] RBP: 00007faa05e10b39 R08: 0000000000000000 R09: 0000000000000000 [ 3581.789292][ T4973] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 3581.797278][ T4973] R13: 0000000000000000 R14: 00007faa05fb6240 R15: 00007ffd8d9c9088 [ 3581.805249][ T4973] [ 3581.808261][ T4973] [ 3581.810589][ T4973] Allocated by task 287: [ 3581.814851][ T4973] kasan_set_track+0x4b/0x70 [ 3581.819454][ T4973] kasan_save_alloc_info+0x25/0x30 [ 3581.824564][ T4973] __kasan_slab_alloc+0x72/0x80 [ 3581.829408][ T4973] slab_post_alloc_hook+0x4f/0x2d0 [ 3581.834514][ T4973] kmem_cache_alloc+0x16e/0x330 [ 3581.839358][ T4973] copy_net_ns+0x145/0x5c0 [ 3581.843775][ T4973] create_new_namespaces+0x3a2/0x660 [ 3581.849051][ T4973] unshare_nsproxy_namespaces+0x120/0x170 [ 3581.854781][ T4973] ksys_unshare+0x4ac/0x7b0 [ 3581.859284][ T4973] __x64_sys_unshare+0x38/0x40 [ 3581.864048][ T4973] x64_sys_call+0x767/0x9a0 [ 3581.868547][ T4973] do_syscall_64+0x4c/0xa0 [ 3581.872958][ T4973] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3581.878860][ T4973] [ 3581.881183][ T4973] Freed by task 32581: [ 3581.885244][ T4973] kasan_set_track+0x4b/0x70 [ 3581.889833][ T4973] kasan_save_free_info+0x31/0x50 [ 3581.894861][ T4973] ____kasan_slab_free+0x132/0x180 [ 3581.899975][ T4973] __kasan_slab_free+0x11/0x20 [ 3581.904736][ T4973] slab_free_freelist_hook+0xc2/0x190 [ 3581.910110][ T4973] kmem_cache_free+0x12d/0x300 [ 3581.914888][ T4973] cleanup_net+0xa58/0xb00 [ 3581.919315][ T4973] process_one_work+0x71f/0xc40 [ 3581.924332][ T4973] worker_thread+0xa29/0x11f0 [ 3581.928999][ T4973] kthread+0x281/0x320 [ 3581.933058][ T4973] ret_from_fork+0x1f/0x30 [ 3581.937471][ T4973] [ 3581.939788][ T4973] Last potentially related work creation: [ 3581.945487][ T4973] kasan_save_stack+0x3a/0x60 [ 3581.950159][ T4973] __kasan_record_aux_stack+0xb6/0xc0 [ 3581.955567][ T4973] kasan_record_aux_stack_noalloc+0xb/0x10 [ 3581.961456][ T4973] insert_work+0x51/0x300 [ 3581.965781][ T4973] __queue_work+0x9b1/0xd30 [ 3581.970278][ T4973] delayed_work_timer_fn+0x61/0x80 [ 3581.975381][ T4973] call_timer_fn+0x46/0x2a0 [ 3581.979885][ T4973] __run_timers+0x667/0x9a0 [ 3581.984382][ T4973] run_timer_softirq+0xb8/0xf0 [ 3581.989143][ T4973] handle_softirqs+0x1d7/0x600 [ 3581.993903][ T4973] __irq_exit_rcu+0x52/0xf0 [ 3581.998393][ T4973] irq_exit_rcu+0x9/0x10 [ 3582.002631][ T4973] sysvec_apic_timer_interrupt+0x58/0xc0 [ 3582.008258][ T4973] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 3582.014231][ T4973] [ 3582.016544][ T4973] Second to last potentially related work creation: [ 3582.023109][ T4973] kasan_save_stack+0x3a/0x60 [ 3582.027776][ T4973] __kasan_record_aux_stack+0xb6/0xc0 [ 3582.033145][ T4973] kasan_record_aux_stack_noalloc+0xb/0x10 [ 3582.038952][ T4973] insert_work+0x51/0x300 [ 3582.043291][ T4973] __queue_work+0x9b1/0xd30 [ 3582.047806][ T4973] delayed_work_timer_fn+0x61/0x80 [ 3582.052915][ T4973] call_timer_fn+0x46/0x2a0 [ 3582.057426][ T4973] __run_timers+0x667/0x9a0 [ 3582.061934][ T4973] run_timer_softirq+0xb8/0xf0 [ 3582.066693][ T4973] handle_softirqs+0x1d7/0x600 [ 3582.071458][ T4973] __irq_exit_rcu+0x52/0xf0 [ 3582.075956][ T4973] irq_exit_rcu+0x9/0x10 [ 3582.080189][ T4973] sysvec_apic_timer_interrupt+0xa9/0xc0 [ 3582.085822][ T4973] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 3582.091812][ T4973] [ 3582.094128][ T4973] The buggy address belongs to the object at ffff888105aa4600 [ 3582.094128][ T4973] which belongs to the cache net_namespace of size 4224 [ 3582.108443][ T4973] The buggy address is located 140 bytes inside of [ 3582.108443][ T4973] 4224-byte region [ffff888105aa4600, ffff888105aa5680) [ 3582.121790][ T4973] [ 3582.124112][ T4973] The buggy address belongs to the physical page: [ 3582.130508][ T4973] page:ffffea000416a800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aa0 [ 3582.140742][ T4973] head:ffffea000416a800 order:3 compound_mapcount:0 compound_pincount:0 [ 3582.149058][ T4973] flags: 0x4000000000010200(slab|head|zone=1) [ 3582.155126][ T4973] raw: 4000000000010200 dead000000000100 dead000000000122 ffff8881002ac480 [ 3582.163704][ T4973] raw: 0000000000000000 0000000080070007 00000001ffffffff 0000000000000000 [ 3582.172269][ T4973] page dumped because: kasan: bad access detected [ 3582.178696][ T4973] page_owner tracks the page as allocated [ 3582.184396][ T4973] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 283, tgid 283 (syz-executor), ts 24870665116, free_ts 24664638754 [ 3582.205713][ T4973] post_alloc_hook+0x1f5/0x210 [ 3582.210514][ T4973] prep_new_page+0x1c/0x110 [ 3582.215018][ T4973] get_page_from_freelist+0x2c7b/0x2cf0 [ 3582.220648][ T4973] __alloc_pages+0x19e/0x3a0 [ 3582.225322][ T4973] alloc_slab_page+0x6e/0xf0 [ 3582.229915][ T4973] new_slab+0x98/0x3d0 [ 3582.233997][ T4973] ___slab_alloc+0x6f6/0xb50 [ 3582.238851][ T4973] __slab_alloc+0x5e/0xa0 [ 3582.243201][ T4973] kmem_cache_alloc+0x1b0/0x330 [ 3582.248069][ T4973] copy_net_ns+0x145/0x5c0 [ 3582.252481][ T4973] create_new_namespaces+0x3a2/0x660 [ 3582.257765][ T4973] unshare_nsproxy_namespaces+0x120/0x170 [ 3582.263484][ T4973] ksys_unshare+0x4ac/0x7b0 [ 3582.267986][ T4973] __x64_sys_unshare+0x38/0x40 [ 3582.272751][ T4973] x64_sys_call+0x767/0x9a0 [ 3582.277254][ T4973] do_syscall_64+0x4c/0xa0 [ 3582.281659][ T4973] page last free stack trace: [ 3582.286319][ T4973] free_unref_page_prepare+0x742/0x750 [ 3582.291790][ T4973] free_unref_page+0x8f/0x530 [ 3582.296470][ T4973] __free_pages+0x67/0x100 [ 3582.300877][ T4973] __free_slab+0xca/0x1a0 [ 3582.305207][ T4973] __unfreeze_partials+0x160/0x190 [ 3582.310317][ T4973] put_cpu_partial+0xa9/0x100 [ 3582.314993][ T4973] __slab_free+0x1c4/0x280 [ 3582.319533][ T4973] ___cache_free+0xbf/0xd0 [ 3582.323953][ T4973] qlist_free_all+0xc6/0x140 [ 3582.328541][ T4973] kasan_quarantine_reduce+0x14a/0x170 [ 3582.334087][ T4973] __kasan_slab_alloc+0x24/0x80 [ 3582.338931][ T4973] slab_post_alloc_hook+0x4f/0x2d0 [ 3582.344041][ T4973] kmem_cache_alloc+0x16e/0x330 [ 3582.348897][ T4973] jbd2__journal_start+0x13d/0x6e0 [ 3582.354009][ T4973] __ext4_journal_start_sb+0x242/0x4a0 [ 3582.359467][ T4973] ext4_dirty_inode+0x8f/0x100 [ 3582.364227][ T4973] [ 3582.366555][ T4973] Memory state around the buggy address: [ 3582.372199][ T4973] ffff888105aa4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3582.380252][ T4973] ffff888105aa4600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3582.388304][ T4973] >ffff888105aa4680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3582.396353][ T4973] ^ [ 3582.400668][ T4973] ffff888105aa4700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3582.408716][ T4973] ffff888105aa4780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3582.416763][ T4973] ================================================================== [ 3582.424877][ T4973] Disabling lock debugging due to kernel taint [ 3582.431291][ T28] audit: type=1400 audit(2000002160.391:5285): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3582.455612][ T28] audit: type=1400 audit(2000002160.411:5286): avc: denied { search } for pid=84 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3582.485919][T32510] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3582.500916][T32510] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3582.508470][ T28] audit: type=1400 audit(2000002160.411:5287): avc: denied { write } for pid=84 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3582.546388][T32510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3582.554711][T32510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3582.576041][T32510] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3582.583597][ T28] audit: type=1400 audit(2000002160.411:5288): avc: denied { add_name } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3582.633341][T32510] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3582.641830][T32510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3582.651796][T32510] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3582.660339][T32510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3582.669080][ T28] audit: type=1400 audit(2000002160.411:5289): avc: denied { create } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3582.689709][ T28] audit: type=1400 audit(2000002160.411:5290): avc: denied { append open } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3582.712853][ T28] audit: type=1400 audit(2000002160.411:5291): avc: denied { getattr } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3583.321057][T32581] tipc: Disabling bearer [ 3583.326441][T32581] tipc: Left network mode [ 3583.897600][T32581] device bridge_slave_1 left promiscuous mode [ 3583.903723][T32581] bridge0: port 2(bridge_slave_1) entered disabled state [ 3583.911286][T32581] device bridge_slave_0 left promiscuous mode [ 3583.917605][T32581] bridge0: port 1(bridge_slave_0) entered disabled state [ 3583.925351][T32581] device bridge_slave_1 left promiscuous mode [ 3583.931548][T32581] bridge0: port 2(bridge_slave_1) entered disabled state [ 3583.938954][T32581] device bridge_slave_0 left promiscuous mode [ 3583.945047][T32581] bridge0: port 1(bridge_slave_0) entered disabled state [ 3583.952895][T32581] device bridge_slave_1 left promiscuous mode [ 3583.959341][T32581] bridge0: port 2(bridge_slave_1) entered disabled state [ 3583.966778][T32581] device bridge_slave_0 left promiscuous mode [ 3583.972875][T32581] bridge0: port 1(bridge_slave_0) entered disabled state [ 3583.981029][T32581] device bridge_slave_1 left promiscuous mode [ 3583.987210][T32581] bridge0: port 2(bridge_slave_1) entered disabled state [ 3583.994649][T32581] device bridge_slave_0 left promiscuous mode [ 3584.000952][T32581] bridge0: port 1(bridge_slave_0) entered disabled state [ 3584.008955][T32581] device bridge_slave_1 left promiscuous mode [ 3584.015064][T32581] bridge0: port 2(bridge_slave_1) entered disabled state [ 3584.022783][T32581] device bridge_slave_0 left promiscuous mode [ 3584.028945][T32581] bridge0: port 1(bridge_slave_0) entered disabled state [ 3584.039822][T32581] device veth1_macvtap left promiscuous mode [ 3584.045896][T32581] device veth0_vlan left promiscuous mode [ 3584.052067][T32581] device veth1_macvtap left promiscuous mode [ 3584.058185][T32581] device veth0_vlan left promiscuous mode [ 3584.064308][T32581] device veth1_macvtap left promiscuous mode [ 3584.070372][T32581] device veth0_vlan left promiscuous mode [ 3584.076480][T32581] device veth1_macvtap left promiscuous mode [ 3584.082492][T32581] device veth0_vlan left promiscuous mode [ 3584.088778][T32581] device veth1_macvtap left promiscuous mode [ 3584.094803][T32581] device veth0_vlan left promiscuous mode [ 3584.101149][T32581] device veth1_macvtap left promiscuous mode [ 3584.107295][T32581] device veth0_vlan left promiscuous mode